TSA-WF: Exploring the Effectiveness of Time Series Analysis for Website Fingerprinting

📅 2025-05-20
📈 Citations: 0
Influential: 0
📄 PDF
🤖 AI Summary
This paper addresses the lack of temporal localization capability in website fingerprinting (WF) over encrypted tunnels (e.g., Tor). To this end, we propose TSA-WF—a novel framework that pioneers the integration of classical time-series analysis into WF. TSA-WF explicitly preserves both temporal ordering and packet-direction features via trajectory-direction–time encoding, dynamic time warping (DTW)-based alignment, and subsequent time-series modeling. In single-label classification, TSA-WF achieves accuracy competitive with state-of-the-art deep learning methods while demonstrating robustness against dedicated WF defenses. In multi-label settings—where multiple websites are visited sequentially—TSA-WF does not improve overall identification accuracy but, for the first time, enables approximate localization of the start time of target website visits, thereby filling a critical gap in fine-grained temporal localization for encrypted traffic analysis.

Technology Category

Application Category

📝 Abstract
Website fingerprinting (WF) is a technique that allows an eavesdropper to determine the website a target user is accessing by inspecting the metadata associated with the packets she exchanges via some encrypted tunnel, e.g., Tor. Recent WF attacks built using machine learning (and deep learning) process and summarize trace metadata during their feature extraction phases. This methodology leads to predictions that lack information about the instant at which a given website is detected within a (potentially large) network trace comprised of multiple sequential website accesses -- a setting known as extit{multi-tab} WF. In this paper, we explore whether classical time series analysis techniques can be effective in the WF setting. Specifically, we introduce TSA-WF, a pipeline designed to closely preserve network traces' timing and direction characteristics, which enables the exploration of algorithms designed to measure time series similarity in the WF context. Our evaluation with Tor traces reveals that TSA-WF achieves a comparable accuracy to existing WF attacks in scenarios where website accesses can be easily singled-out from a given trace (i.e., the extit{single-tab} WF setting), even when shielded by specially designed WF defenses. Finally, while TSA-WF did not outperform existing attacks in the multi-tab setting, we show how TSA-WF can help pinpoint the approximate instant at which a given website of interest is visited within a multi-tab trace.footnote{This preprint has not undergone any post-submission improvements or corrections. The Version of Record of this contribution is published in the Proceedings of the 20th International Conference on Availability, Reliability and Security (ARES 2025)}
Problem

Research questions and friction points this paper is trying to address.

Detecting websites via encrypted tunnel metadata analysis
Improving multi-tab website fingerprinting accuracy
Exploring time series techniques for trace timing preservation
Innovation

Methods, ideas, or system contributions that make the work stand out.

Uses time series analysis for website fingerprinting
Preserves network traces' timing characteristics
Measures time series similarity in WF context
🔎 Similar Papers
No similar papers found.
M
Michael Wrana
University of Waterloo, Ontario, Canada
U
Uzma Maroof
University of Waterloo, Ontario, Canada
Diogo Barradas
Diogo Barradas
University of Waterloo
PrivacyNetwork securityCensorship CircumventionDigital Forensics