Article ID | Journal | Published Year | Pages | File Type |
---|---|---|---|---|
4954495 | Computer Communications | 2016 | 9 Pages |
Abstract
One of the main applications of low latency anonymity networks, such as Tor, is to protect data and users' privacy from interception over the Internet. This paper presents a novel passive website fingerprinting attack to defeat Tor's anonymity mechanism with a significant improvement in comparison with similar methods. Unlike the state-of-the-art approaches, the proposed method does not need to change the sequence of IP packets exchanged between users and the first relay in the network. We introduce a new method based on the Fast Fourier Transform to calculate the similarity distance of instances from traffic patterns. In this way, the time complexity of feature extraction is reduced by a factor of 400 during the classification process. Considering a closed-world scenario, our method easily spots on target websites with a minimum success rate of 95%. As yet another notable payoff, the accuracy keeps up more robustly while the polarity of target website grows gradually.
Related Topics
Physical Sciences and Engineering
Computer Science
Computer Networks and Communications
Authors
Hojjat Jahani, Saeed Jalili,