Catch up on stories from the past week (and beyond) at the Slashdot story archive


Forgot your password?
Encryption Security Privacy

HTTPS More Vulnerable To Traffic Analysis Attacks Than Suspected 17

msm1267 writes "Researchers have built new attack techniques against HTTPS traffic that have been effective in learning details on users' surfing habits, leaking sensitive data that could impact privacy. They tested against 600 leading healthcare, finance, legal services and streaming video sites, including Netflix. Their attack, they said in a research paper, reduced errors from previous methodologies more than 3 ½ times. They also demonstrate a defense against this attack that reduces the accuracy of attacks by 27 percent by increasing the effectiveness of packet level defenses in HTTPS, the paper said. 'We design our attack to distinguish minor variations in HTTPS traffic from significant variations which indicate distinct traffic contents,' the paper said. 'Minor traffic variations may be caused by caching, dynamically generated content, or user-specific content including cookies. Our attack applies clustering techniques to identify patterns in traffic.'"
This discussion has been archived. No new comments can be posted.

HTTPS More Vulnerable To Traffic Analysis Attacks Than Suspected

Comments Filter:
  • by JoshuaZ ( 1134087 ) on Friday March 07, 2014 @01:54PM (#46429111) Homepage
    The most interesting bit is not in the summary. Given individual websites they could identify which specific webpage one was visiting thus leaking with high probability all sorts of medical, financial and legal information. Examples used include from medicine the websites of the Mayo Clinic and Planned Parenthood, from finance Wells Fargo and Bank of America, and from entertainment Youtube and Netflix. This sort of thing could be used for all sorts of surveillance or blackmail. Even just knowing what Youtube videos one is watching could be used for such ends.
    • by mveloso ( 325617 ) on Friday March 07, 2014 @02:04PM (#46429209)

      The "leaks" seem more like they can track the path of a user through a website, given the structure of the links and the relative size of the pages. I don't think they claimed they could tell what the data was on the page, but sometimes the fact that a user is on a given page is enough (depending on the structure of the site).

      For youtube, they'd have to figure out the relative sizes of all the pages, which might be difficult to do (and the size will change depending on he comments and browser used).

      • by Cramer ( 69040 )

        Right. They first crawl the site to build a map of the encrypted pages. Then by looking at other encrypted streams, they can guess, with approx. 89% accuracy, what page it was. The overwhelming point here is that it is a complete and utter GUESS . Without decrypting the contents, they don't know for sure what it is. The issue for SSL is that it's not very good encryption if my https traffic for foo.html is sufficiently the same as another https session's traffic for foo.html -- i.e. it's failing the te

        • by Jorl17 ( 1716772 )
          And do you think this is specific to HTTPS, or rather a problem with most encryption techniques as we use them (given that we're not zero-padding input data to make it all rougly the same size, that is, pretty indistinguishable)?
          • by Cramer ( 69040 )

            In this case, it's specific against SSL. But in general, this is another form of differential crypt-analysis. Any credible encryption system takes steps to prevent this. (simply put, a single bit change in either key or plaintext should not have an easily predictable effect on the ciphertext.) As far as I know, no one has tried this method on other crypto methods.

            Size alone is a very weak means of mapping content. Almost every modern web application has some variability in the output size at any given URL

  • Their attack ... reduced errors from previous methodologies more than 3 ½ times.

    There has got to be a clearer way of saying that. Do they mean "to less than 28%?"

    • Their attack ... reduced errors from previous methodologies more than 3 ½ times.

      There has got to be a clearer way of saying that. Do they mean "to less than 28%?"

      The errors were at X before, now they're under negative 2.5X.

  • This might be another reason that one should consider using VPNs, even if on a trusted network. At least an attacker would be able to see traffic go by, but not know where it is going to, especially if there is a program in the background doing random HTTPS queries to various sites for noise.

    Of course, the downside of VPNs is that a lot of them have their outgoing IP address flagged, so Google either demands a CAPTCHA before use, or just gives the middle finger and denies access entirely.

    • It is more like you need a TOR styled VPN, routing your traffic over different paths and aggregating/dis-aggregating so there is never a single point that all your traffic flows through. Not especially efficient.

    • by pigiron ( 104729 )

      Yes, but have you taken Dark Matter into account?

You can do more with a kind word and a gun than with just a kind word. - Al Capone