Search papers, labs, and topics across Lattice.
This paper re-evaluates website fingerprinting (WF) attacks on Tor by constructing a realistic open-world background traffic dataset from unlabeled Tor traffic and synthetic monitored traces, addressing limitations of previous lab-based studies. They benchmarked state-of-the-art WF attacks from a guard-relay vantage point under cross-network conditions using a large-scale dataset of 800,000 traces. Results show that WF attacks remain highly effective, achieving 0.956 precision and 0.922 recall at a 9% base rate, and that timing-independent classifiers are more robust to network variability.
Website fingerprinting attacks on Tor are still alarmingly effective in the real world, achieving >90% precision and recall even against realistic background noise and network jitter.
Website fingerprinting (WF) attacks on Tor can infer user destinations from encrypted traffic metadata. However, their real-world effectiveness remains debated due to laboratory settings that fail to capture network fluctuations, evaluate noise, and create a representative open world. In this work, we re-examine WF from a guard-relay vantage point using a novel, privacy-preserving methodology that builds an open-world background from real, unlabeled Tor traffic paired with synthetic monitored traces. Using this methodology, we collect a large-scale dataset of over 800,000 traces. We then benchmark state-of-the-art WF attacks under a cross-network setting and show that WF remains highly effective against real Tor open-world traffic: the best-performing attack achieves 0.956 precision and 0.922 recall at a 9% base rate. We further present results that demonstrate robustness to small training sets, network jitter, and concept drift. Moreover, we show that timing-independent classifiers are significantly more robust to network variability than others. Finally, we provide the first systematic study of Tor's Conflux traffic-splitting, where we show that a guard node with a latency advantage can maintain high attack effectiveness even when traffic is split.