Score: 1

Assessing User Privacy Leakage in Synthetic Packet Traces: An Attack-Grounded Approach

Published: August 15, 2025 | arXiv ID: 2508.11742v1

By: Minhao Jin, Hongyu He, Maria Apostolaki

BigTech Affiliations: Princeton University

Potential Business Impact:

Finds hidden user info in fake internet traffic.

Current synthetic traffic generators (SynNetGens) promise privacy but lack comprehensive guarantees or empirical validation, even as their fidelity steadily improves. We introduce the first attack-grounded benchmark for assessing the privacy of SynNetGens directly from the traffic they produce. We frame privacy as membership inference at the traffic-source level--a realistic and actionable threat for data holders. To this end, we present TraceBleed, the first attack that exploits behavioral fingerprints across flows using contrastive learning and temporal chunking, outperforming prior membership inference baselines by 172%. Our large-scale study across GAN-, diffusion-, and GPT-based SynNetGens uncovers critical insights: (i) SynNetGens leak user-level information; (ii) differential privacy either fails to stop these attacks or severely degrades fidelity; and (iii) sharing more synthetic data amplifies leakage by 59% on average. Finally, we introduce TracePatch, the first SynNetGen-agnostic defense that combines adversarial ML with SMT constraints to mitigate leakage while preserving fidelity.

Country of Origin
🇺🇸 United States

Page Count
19 pages

Category
Computer Science:
Cryptography and Security