2021
DOI: 10.1109/tii.2020.2988870
|View full text |Cite
|
Sign up to set email alerts
|

Multilevel Identification and Classification Analysis of Tor on Mobile and PC Platforms

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
13
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
6
2

Relationship

2
6

Authors

Journals

citations
Cited by 30 publications
(16 citation statements)
references
References 26 publications
0
13
0
Order By: Relevance
“…The researchers in [11], [39], [40] proposed a framework based on network flow features for Tor traffic analysis and multi-level cataloging. The model can detect the anonymous traffic L1, L2, and L3 on multiple platforms, including mobile and PC.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…The researchers in [11], [39], [40] proposed a framework based on network flow features for Tor traffic analysis and multi-level cataloging. The model can detect the anonymous traffic L1, L2, and L3 on multiple platforms, including mobile and PC.…”
Section: Related Workmentioning
confidence: 99%
“…The analysis of darknet traffic provides complete information to the cybersecurity specialists, and other IT operators about the services exploited by attackers or vulnerable to some attack [6], [7], [8], [9]. Researchers now focus on analyzing the darknet traffic, specifically detecting Tor applications to determine the malicious activities [10], [11], [12], [13], [14]. To achieve the detection objective, authors used ML, and Deep Learning (DL) techniques [15], [16], [17], [18].…”
Section: Introductionmentioning
confidence: 99%
“…Due to the layered encryption of Tor network, we also assume that the attacker cannot learn anything about packet payload. Numerous studies [4,5,[8][9][10][11][12][13] have proposed techniques to perform website fingerprinting attacks. Most of them are first extract features such as packet length, packet direction and time are collected from traffic flow at the user's end, and then uses these features to train machine learning or deep learning models.…”
Section: Wf Attackmentioning
confidence: 99%
“…Wang et al [5] proposed a Tor traffic identification and multilevel classification framework based on network flow features, which realizes the identification of anonymous traffic (L1), traffic types (L2) of anonymous traffic, and applications (L3) on a mobile and a PC platform, respectively, and further analyzed differences between the mobile and the PC platform. Gurunarayanan et al [6] developed a machine learning model to identify Tor traffic.…”
Section: Related Workmentioning
confidence: 99%