A review on machine learning–based approaches for Internet traffic classification

O Salman, IH Elhajj, A Kayssi, A Chehab - Annals of Telecommunications, 2020 - Springer
Traffic classification acquired the interest of the Internet community early on. Different
approaches have been proposed to classify Internet traffic to manage both security and …

De-anonymisation attacks on tor: A survey

I Karunanayake, N Ahmed, R Malaney… - … Surveys & Tutorials, 2021 - ieeexplore.ieee.org
Anonymity networks are becoming increasingly popular in today's online world as more
users attempt to safeguard their online privacy. Tor is currently the most popular anonymity …

The anonymity of the dark web: A survey

J Saleem, R Islam, MA Kabir - Ieee Access, 2022 - ieeexplore.ieee.org
The dark web is a section of the Internet that is not accessible to search engines and
requires an anonymizing browser called Tor. Its hidden network and anonymity pave the …

Survey on improving data utility in differentially private sequential data publishing

X Yang, T Wang, X Ren, W Yu - IEEE Transactions on Big Data, 2017 - ieeexplore.ieee.org
The massive generation, extensive sharing, and deep exploitation of data in the big data era
have raised unprecedented privacy threats. To address privacy concerns, various privacy …

Fundamentals of physical layer anonymous communications: Sender detection and anonymous precoding

Z Wei, F Liu, C Masouros… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
In the era of big data, anonymity is recognized as an important attribute in privacy-preserving
communications. The existing anonymous authentication and routing designs are applied at …

Towards an efficient defense against deep learning based website fingerprinting

Z Ling, G Xiao, W Wu, X Gu, M Yang… - IEEE INFOCOM 2022 …, 2022 - ieeexplore.ieee.org
Website fingerprinting (WF) attacks allow an attacker to eavesdrop on the encrypted network
traffic between a victim and an anonymous communication system so as to infer the real …

[PDF][PDF] 网络空间安全体系与关键技术

罗军舟, 杨明, 凌振, 吴文甲, 顾晓丹 - 中国科学: 信息科学, 2016 - cse.seu.edu.cn
摘要网络空间是一种包含互联网, 通信网, 物联网, 工控网等信息基础设施, 并由人–机–
物相互作用而形成的动态虚拟空间. 网络空间安全既涵盖包括人, 机, 物等实体在内的基础设施 …

A novel application classification attack against Tor

G He, M Yang, J Luo, X Gu - Concurrency and Computation …, 2015 - Wiley Online Library
Tor is a famous anonymous communication system for preserving users' online privacy. It
supports TCP applications and packs upper‐layer application data into encrypted equal …

Detection of virtual private network traffic using machine learning

S Miller, K Curran, T Lunney - International Journal of Wireless …, 2020 - igi-global.com
The detection of unauthorized users can be problematic for techniques that are available at
present if the nefarious actors are using identity hiding tools such as anonymising proxies or …

An active de-anonymizing attack against tor web traffic

M Yang, X Gu, Z Ling, C Yin… - Tsinghua Science and …, 2017 - ieeexplore.ieee.org
Tor is pervasively used to conceal target websites that users are visiting. A de-
anonymization technique against Tor, referred to as website fingerprinting attack, aims to …