ResearchTrend.AI
  • Communities
  • Connect sessions
  • AI calendar
  • Organizations
  • Join Slack
  • Contact Sales
Papers
Communities
Social Events
Terms and Conditions
Pricing
Contact Sales
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2026 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 1902.06421
199
152
v1v2v3v4 (latest)

Tik-Tok: The Utility of Packet Timing in Website Fingerprinting Attacks

18 February 2019
Mohammad Saidur Rahman
Payap Sirinam
Nate Mathews
K. Gangadhara
M. Wright
ArXiv (abs)PDFHTML
Abstract

A passive local eavesdropper can leverage Website Fingerprinting (WF) to deanonymize the web browsing activity of Tor users. The value of timing information to WF has often been discounted in recent works due to the volatility of low-level timing information. In this paper, we more carefully examine the extent to which packet timing can be used to facilitate WF attacks. We propose a new set of timing-related features based on burst-level characteristics, as well as evaluate the effectiveness of raw timing information in a deep-learning-based WF attack. To summarize our findings: (i) we achieve 84.32% accuracy on undefended Tor using only our new timing features; (ii) using directional timing, we get 93.5% on WTF-PAD traffic, several points above the prior state-of-the-art; (iii) we get 66.70% accuracy against onion sites using only timing data, higher than using only directional data; and (iv) we get 0.98 precision and 0.92 recall on undefended Tor in the open-world setting using only raw timing. These findings indicate that developers of WF defenses need to consider timing as a potential fingerprint for sites and protect against its use by the attacker. Additionally, in our study of timing, we implemented a prototype of the Walkie-Talkie (W-T) defense and collected a new W-T dataset, on which we get accuracy results above 90%, far above the theoretical maximum accuracy for the defense of 50%. We discuss the reasons for these findings and challenges in Walkie-Talkie that must be addressed before it could be deployed.

View on arXiv
Comments on this paper