2020
DOI: 10.1155/2020/8850472
|View full text |Cite
|
Sign up to set email alerts
|

Hidden Service Website Response Fingerprinting Attacks Based on Response Time Feature

Abstract: It has been shown that website fingerprinting attacks are capable of destroying the anonymity of the communicator at the traffic level. This enables local attackers to infer the website contents of the encrypted traffic by using packet statistics. Previous researches on hidden service attacks tend to focus on active attacks; therefore, the reliability of attack conditions and validity of test results cannot be fully verified. Hence, it is necessary to reexamine hidden service attacks from the perspective of fi… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
2
1

Relationship

1
2

Authors

Journals

citations
Cited by 3 publications
(1 citation statement)
references
References 17 publications
0
1
0
Order By: Relevance
“…Al-Naami et al webpages in the same website, they proposed to use the local request and response sequence (LRRS) as features of Internet traffic in HTTP/1.1 or HTTP/2, the raw features were slid by several different sizes of convolutional layers to generate more features in the multi-grained scanning process and the resulting features were fed into cascade forests which had a multi-layer structure, each layer consisted of the Random Forest classifiers and the Completely-Random Forest classifiers. Meng et al [87] proposed a novel Website Response Fingerprinting (WRFP) Attack based on response time feature and extremely randomized tree algorithm. Ghiette et al [88] proposed a two-stage algorithm using MinHash and locality sensitive hashing in combination with the Jaccard similarity to improve the scalability of WF attacks.…”
Section: A Approachesmentioning
confidence: 99%
“…Al-Naami et al webpages in the same website, they proposed to use the local request and response sequence (LRRS) as features of Internet traffic in HTTP/1.1 or HTTP/2, the raw features were slid by several different sizes of convolutional layers to generate more features in the multi-grained scanning process and the resulting features were fed into cascade forests which had a multi-layer structure, each layer consisted of the Random Forest classifiers and the Completely-Random Forest classifiers. Meng et al [87] proposed a novel Website Response Fingerprinting (WRFP) Attack based on response time feature and extremely randomized tree algorithm. Ghiette et al [88] proposed a two-stage algorithm using MinHash and locality sensitive hashing in combination with the Jaccard similarity to improve the scalability of WF attacks.…”
Section: A Approachesmentioning
confidence: 99%