Hidden Service Website Response Fingerprinting Attacks Based on Response Time Feature
It has been shown that website fingerprinting attacks are capable of destroying the anonymity of the communicator at the traffic level. This enables local attackers to infer the website contents of the encrypted traffic by using packet statistics. Previous researches on hidden service attacks tend t...
Main Authors: | Yitong Meng, Jinlong Fei |
---|---|
Format: | Article |
Language: | English |
Published: |
Hindawi-Wiley
2020-01-01
|
Series: | Security and Communication Networks |
Online Access: | http://dx.doi.org/10.1155/2020/8850472 |
Similar Items
-
Deep Nearest Neighbor Website Fingerprinting Attack Technology
by: Maohua Guo, et al.
Published: (2021-01-01) -
On Realistically Attacking Tor with Website Fingerprinting
by: Wang Tao, et al.
Published: (2016-10-01) -
Tik-Tok: The Utility of Packet Timing in Website Fingerprinting Attacks
by: Rahman Mohammad Saidur, et al.
Published: (2020-07-01) -
Feature Selection for Website Fingerprinting
by: Yan Junhua, et al.
Published: (2018-10-01) -
RBP: a website fingerprinting obfuscation method against intelligent fingerprinting attacks
by: Tao Luo, et al.
Published: (2021-05-01)