Domain Name Encryption Is Not Enough: Privacy Leakage via IP-based Website Fingerprinting

02/16/2021
by   Nguyen Phong Hoang, et al.
0

Domain name encryptions (DoTH and ESNI) have been proposed to improve security and privacy while browsing the web. Although the security benefit is clear, the positive impact on user privacy is still questionable. Given that the mapping between domains and their hosting IPs can be easily obtained, the websites a user visits can still be inferred by a network-level observer based on the destination IPs of user connections. However, content delivery networks, DNS-based load balancing, co-hosting of different websites on the same server, and IP churn, all contribute towards making domain-IP mappings unstable, and prevent straightforward IP-based browsing tracking for the majority of websites. We show that this instability is not a roadblock for browsing tracking (assuming a universal DoTH and ESNI deployment), by introducing an IP-based fingerprinting technique that allows a network-level observer to identify the website a user visits with high accuracy, based solely on the IP address information obtained from the encrypted traffic. Our technique exploits the complex structure of most websites, which load resources from several domains besides their own primary domain. We extract the domains contacted while browsing 220K websites to construct domain-based fingerprints. Each domain-based fingerprint is then converted to an IP-based fingerprint by periodically performing DNS lookups. Using the generated fingerprints, we could successfully identify 91 IPs. We also evaluated the fingerprints' robustness over time, and demonstrate that they are still effective at identifying 70 two months. We conclude by discussing strategies for website owners and hosting providers to hinder IP-based website fingerprinting and maximize the privacy benefits offered by domain name encryption.

READ FULL TEXT
research
11/01/2019

Assessing the Privacy Benefits of Domain Name Encryption

As Internet users have become more savvy about the potential for their I...
research
03/01/2021

IP-based Subject Access Requests Denied

Understanding the legal status of IP addresses is complex. In Europe, th...
research
10/30/2021

Uncovering IP Address Hosting Types Behind Malicious Websites

Hundreds of thousands of malicious domains are created everyday. These m...
research
07/14/2023

Assessing and Exploiting Domain Name Misinformation

Cloud providers' support for network evasion techniques that misrepresen...
research
04/02/2020

Typosquatting for Fun and Profit: Cross-Country Analysis of Pop-Up Scam

Today, many different types of scams can be found on the internet. Onlin...
research
11/06/2019

Polymorphic Encryption and Pseudonymisation of IP Network Flows

We describe a system, PEP3, for storage and retrieval of IP flow informa...
research
10/19/2021

The Impact of User Location on Cookie Notices (Inside and Outside of the European Union)

The web is global, but privacy laws differ by country. Which set of priv...

Please sign up or login with your details

Forgot password? Click here to reset