Privacy of DNS-over-HTTPS: Requiem for a Dream?

Cited 0 time in webofscience Cited 0 time in scopus
  • Hit : 282
  • Download : 0
DC FieldValueLanguage
dc.contributor.authorCsikor, Leventeko
dc.contributor.authorSingh, Himanshuko
dc.contributor.authorKang, Min Sukko
dc.contributor.authorDivakaran, Dinil Monko
dc.date.accessioned2021-11-30T06:50:00Z-
dc.date.available2021-11-30T06:50:00Z-
dc.date.created2021-11-29-
dc.date.issued2021-09-06-
dc.identifier.citationIEEE European Symposium on Security and Privacy (EuroS&P), pp.252 - 271-
dc.identifier.urihttp://hdl.handle.net/10203/289705-
dc.description.abstractThe recently proposed DNS-over-HTTPS (DoH) protocol is becoming increasingly popular in addressing the privacy concerns of exchanging plain-text DNS messages over potentially malicious transit networks (e.g., mass surveillance at ISPs). By employing HTTPS to encrypt DNS communications, DoH traffic inherently becomes indistinguishable from regular encrypted Web traffic, rendering active disruption (e.g., downgrading to the plain-text DNS) by transit networks extremely hard. In this work, we investigate whether DoH traffic is indeed indistinguishable from encrypted Web traffic. To this end, we collect several DoH traffic traces corresponding to 25 resolvers (including major ones, e.g., Google and Cloudftare) by visiting thousands of domains in Alexa's list of top-ranked websites at different geographical locations and environments. Based on the collected traffic, we train a machine learning model to classify HTTPS traffic as either Web or DoH. With our DoH identification model in place, we show that an authoritarian ISP can identify ∼97.4% (∼90%) of the DoH packets correctly in a closed-world (open-world) setting while only misclassifying 1 in 10,000 Web packets. To counter this DoH identification model, we propose an effective mitigation technique, making the identification model impractical for ISPs to filter and consequently downgrade DoH to plain-text DNS communications.-
dc.languageEnglish-
dc.publisherIEEE European Symposium on Security and Privacy-
dc.titlePrivacy of DNS-over-HTTPS: Requiem for a Dream?-
dc.typeConference-
dc.identifier.scopusid2-s2.0-85119254874-
dc.type.rimsCONF-
dc.citation.beginningpage252-
dc.citation.endingpage271-
dc.citation.publicationnameIEEE European Symposium on Security and Privacy (EuroS&P)-
dc.identifier.conferencecountryAU-
dc.identifier.conferencelocationVirtual-
dc.identifier.doi10.1109/EuroSP51992.2021.00026-
dc.contributor.localauthorKang, Min Suk-
dc.contributor.nonIdAuthorCsikor, Levente-
dc.contributor.nonIdAuthorSingh, Himanshu-
dc.contributor.nonIdAuthorDivakaran, Dinil Mon-
Appears in Collection
CS-Conference Papers(학술회의논문)
Files in This Item
There are no files associated with this item.

qr_code

  • mendeley

    citeulike


rss_1.0 rss_2.0 atom_1.0