As our digital presence expands, safeguarding private data and preserving online privacy becomes paramount. Thus, motivating the development of secure DNS systems, such as DNS over TLS or HTTPS. The vulnerability of these protocols against privacy attacks has led to the development of the Oblivious DNS-over-HTTPS (ODoH) protocol. Nevertheless, the extent of ODoH's effectiveness in protecting clients' privacy is still unknown. This study investigates ODoH resiliency against website fingerprinting attacks in the open-world setting. We deploy an ODoH testbed on GENI for data collection and employ deep learning techniques such as ensemble learning for data analysis. Our findings reveal that a passive adversary can identify targeted websites using ODoH traces with an accuracy of 94\%. Additionally, we analyze the impact of various factors, including clients' locations, available resolvers, and time stability, on the attack's success. Finally, we prototype a mitigation strategy and demonstrate its effectiveness in safeguarding clients privacy.

Privacy Analysis of Oblivious DNS over HTTPS: A Website Fingerprinting Study / Amir Salari, Mohammad; Kumar, Abhinav; Rinaudi, Federico; Tourani, Reza; Sacco, Alessio; Esposito, Flavio. - ELETTRONICO. - (2025), pp. 415-428. (Intervento presentato al convegno 55th Annual IEEE/IFIP International Conference on Dependable Systems and Networks tenutosi a Naples (ITA) nel June 23-26, 2025) [10.1109/DSN64029.2025.00048].

Privacy Analysis of Oblivious DNS over HTTPS: A Website Fingerprinting Study

Federico Rinaudi;Alessio Sacco;
2025

Abstract

As our digital presence expands, safeguarding private data and preserving online privacy becomes paramount. Thus, motivating the development of secure DNS systems, such as DNS over TLS or HTTPS. The vulnerability of these protocols against privacy attacks has led to the development of the Oblivious DNS-over-HTTPS (ODoH) protocol. Nevertheless, the extent of ODoH's effectiveness in protecting clients' privacy is still unknown. This study investigates ODoH resiliency against website fingerprinting attacks in the open-world setting. We deploy an ODoH testbed on GENI for data collection and employ deep learning techniques such as ensemble learning for data analysis. Our findings reveal that a passive adversary can identify targeted websites using ODoH traces with an accuracy of 94\%. Additionally, we analyze the impact of various factors, including clients' locations, available resolvers, and time stability, on the attack's success. Finally, we prototype a mitigation strategy and demonstrate its effectiveness in safeguarding clients privacy.
2025
979-8-3315-1201-9
File in questo prodotto:
File Dimensione Formato  
ODoH__DSN_.pdf

accesso aperto

Tipologia: 2. Post-print / Author's Accepted Manuscript
Licenza: Pubblico - Tutti i diritti riservati
Dimensione 1.26 MB
Formato Adobe PDF
1.26 MB Adobe PDF Visualizza/Apri
Privacy_Analysis_of_Oblivious_DNS_over_HTTPS_a_Website_Fingerprinting_Study.pdf

accesso riservato

Tipologia: 2a Post-print versione editoriale / Version of Record
Licenza: Non Pubblico - Accesso privato/ristretto
Dimensione 1.59 MB
Formato Adobe PDF
1.59 MB Adobe PDF   Visualizza/Apri   Richiedi una copia
Pubblicazioni consigliate

I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.

Utilizza questo identificativo per citare o creare un link a questo documento: https://hdl.handle.net/11583/3001664