Machine learning-powered encrypted network traffic analysis: A comprehensive survey

M Shen, K Ye, X Liu, L Zhu, J Kang… - … Surveys & Tutorials, 2022 - ieeexplore.ieee.org
Traffic analysis is the process of monitoring network activities, discovering specific patterns,
and gleaning valuable information from network traffic. It can be applied in various fields …

De-anonymisation attacks on tor: A survey

I Karunanayake, N Ahmed, R Malaney… - … Surveys & Tutorials, 2021 - ieeexplore.ieee.org
Anonymity networks are becoming increasingly popular in today's online world as more
users attempt to safeguard their online privacy. Tor is currently the most popular anonymity …

Deep fingerprinting: Undermining website fingerprinting defenses with deep learning

P Sirinam, M Imani, M Juarez, M Wright - Proceedings of the 2018 ACM …, 2018 - dl.acm.org
Website fingerprinting enables a local eavesdropper to determine which websites a user is
visiting over an encrypted connection. State-of-the-art website fingerprinting attacks have …

Automated website fingerprinting through deep learning

V Rimmer, D Preuveneers, M Juarez… - arXiv preprint arXiv …, 2017 - arxiv.org
Several studies have shown that the network traffic that is generated by a visit to a website
over Tor reveals information specific to the website through the timing and sizes of network …

Subverting website fingerprinting defenses with robust traffic representation

M Shen, K Ji, Z Gao, Q Li, L Zhu, K Xu - 32nd USENIX Security …, 2023 - usenix.org
Anonymity networks, eg, Tor, are vulnerable to various website fingerprinting (WF) attacks,
which allows attackers to perceive user privacy on these networks. However, the defenses …

k-fingerprinting: A robust scalable website fingerprinting technique

J Hayes, G Danezis - … USENIX Security Symposium (USENIX Security 16 …, 2016 - usenix.org
Website fingerprinting enables an attacker to infer which web page a client is browsing
through encrypted or anonymized network connections. We present a new website …

Triplet fingerprinting: More practical and portable website fingerprinting with n-shot learning

P Sirinam, N Mathews, MS Rahman… - Proceedings of the 2019 …, 2019 - dl.acm.org
Website Fingerprinting (WF) attacks pose a serious threat to users' online privacy, including
for users of the Tor anonymity system. By exploiting recent advances in deep learning, WF …

Defeating {DNN-Based} traffic analysis systems in {Real-Time} with blind adversarial perturbations

M Nasr, A Bahramali, A Houmansadr - 30th USENIX Security …, 2021 - usenix.org
Deep neural networks (DNNs) are commonly used for various traffic analysis problems, such
as website fingerprinting and flow correlation, as they outperform traditional (eg, statistical) …

Keeping the smart home private with smart (er) iot traffic shaping

N Apthorpe, DY Huang, D Reisman… - arXiv preprint arXiv …, 2018 - arxiv.org
The proliferation of smart home Internet of Things (IoT) devices presents unprecedented
challenges for preserving privacy within the home. In this paper, we demonstrate that a …

Trafficsliver: Fighting website fingerprinting attacks with traffic splitting

W De la Cadena, A Mitseva, J Hiller… - Proceedings of the …, 2020 - dl.acm.org
Website fingerprinting (WFP) aims to infer information about the content of encrypted and
anonymized connections by observing patterns of data flows based on the size and direction …