Examining Adversarial Examples as Defensive Approach Against Web Fingerprinting Attacks

dc.contributor.advisorElahi, Tariq
dc.contributor.authorAlzamil, Layla
dc.date.accessioned2023-11-07T08:16:04Z
dc.date.available2023-11-07T08:16:04Z
dc.date.issued2023
dc.description.abstractIn the age of online surveillance, and the growth in privacy and security concerns for individuals activities over the internet. Tor browser is a widely used anonymisation network offering security and privacy-enhanced features to protect users online. However, web fingerprinting attacks (WF) have been a challenging threat that aims to deanonymise users browsing activities over Tor. This interdisciplinary project contributes to defending against WF attacks by employing the “attack-on-attack” approach, where Adversarial Examples (AEs) attacks are launched to exploit existing vulnerabilities in the neural network architecture. The FGSM and DeepFool construction methods are implemented to introduce perturbed data to these models and lead them to misclassify, significantly decreasing the classifier prediction accuracy.
dc.format.extent37
dc.identifier.urihttps://hdl.handle.net/20.500.14154/69584
dc.language.isoen
dc.publisherSaudi Digital Library
dc.subjectTor
dc.subjectWeb fingerprinting
dc.subjectAdversarial Examples
dc.subjectArtificial Intelligence
dc.subjectCyber Security
dc.subjectPrivacy
dc.titleExamining Adversarial Examples as Defensive Approach Against Web Fingerprinting Attacks
dc.typeThesis
sdl.degree.departmentInformatics
sdl.degree.disciplineCyber Security, Privacy and Trust
sdl.degree.grantorUniversity of Edinburgh
sdl.degree.nameMaster of Science

Files

Copyright owned by the Saudi Digital Library (SDL) © 2024