Lightweight and Effective Website Fingerprinting over Encrypted DNS

Yong Shao, Kenneth Hernandez, Kia Yang, Eric Chan-Tin, Mohammed Abuhamad

Research output: Contribution to journalArticlepeer-review

Abstract

The DNS over HTTPS (DoH) protocol is implemented to improve the original DNS protocol that uses unencrypted DNS queries and responses. With the DNS traffic, an eavesdropper can easily identify websites that a user is visiting. In order to address this concern of web privacy, encryption is used by performing a DNS lookup over HTTPS. In this paper, we studied whether the encrypted DoH traffic could be exploited to identify websites that a user has visited. This is a different type of website fingerprinting by analyzing encrypted DNS network traffic rather than the network traffic between the client and the web server. DNS typically uses fewer network packets than a website download. Our model and algorithm can accurately predict one out of 10, 000 websites with a 95% accuracy using the first 50 DoH packets. In the open-world environment with 100, 000 websites, our model achieves an F1-score of 93%.

Original languageAmerican English
JournalComputer Science: Faculty Publications and Other Works
DOIs
StatePublished - Jun 30 2023

Keywords

  • Webbrowsing
  • Website Fingerprinting
  • DoH
  • Privacy
  • DNS

Disciplines

  • Computer Sciences

Cite this