2021
DOI: 10.1002/int.22660
|View full text |Cite
|
Sign up to set email alerts
|

Hidden service publishing flow homology comparison using profile‐hidden markov model

Abstract: In recent years, web servers pay attention to privacy and anonymity protection and choose to rely on hidden service to avoid exposure of the real geographic locations. Several studies have confirmed that hidden service is vulnerable to flow correlation attacks, specifically, the attacker has the ability to synchronize the behavior of both sides of the communication after observing the flow for an extended period of time. However, since hidden service publish descriptor flow is transient behavioral traffic, aut… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2022
2022
2022
2022

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(3 citation statements)
references
References 33 publications
(61 reference statements)
0
3
0
Order By: Relevance
“…Although the attacker pursues the optimal strategy under the entirely rational condition, the degree of subjective cognition determines that the attacker can only grasp limited information. As a combination of game and Markov theory, 33 the stochastic game is a multistage game model, which conforms to the multiround process. Markov process is used to describe the transition of game state caused by actions of both sides.…”
Section: The Intelligent Proactive Defense Strategymentioning
confidence: 99%
“…Although the attacker pursues the optimal strategy under the entirely rational condition, the degree of subjective cognition determines that the attacker can only grasp limited information. As a combination of game and Markov theory, 33 the stochastic game is a multistage game model, which conforms to the multiround process. Markov process is used to describe the transition of game state caused by actions of both sides.…”
Section: The Intelligent Proactive Defense Strategymentioning
confidence: 99%
“…The article's major emphasis was on the mathematical foundations of the intron and exon hidden states. In 2021, [14] published a systematic review with Hidden Markov Models as its focus.…”
Section: Review Of Literaturementioning
confidence: 99%
“…Reference [20] employed the PHMM models to detect malware in ProDroid Android apps with an accuracy rate of 94.6 percent. Reference [21] compared the homology in Hidden Publishing Services using the PHMM characteristics. Reference [22] constructed the Markov model, Hidden Markov Model, Profile Hidden Markov Model, and Artificial Neural Network while modelling the gene sequences of cancer patients.…”
Section: Review Of Literaturementioning
confidence: 99%