A survey on encrypted network traffic analysis applications, techniques, and countermeasures

E Papadogiannaki, S Ioannidis - ACM Computing Surveys (CSUR), 2021 - dl.acm.org
The adoption of network traffic encryption is continually growing. Popular applications use
encryption protocols to secure communications and protect the privacy of users. In addition …

De-anonymisation attacks on tor: A survey

I Karunanayake, N Ahmed, R Malaney… - … Surveys & Tutorials, 2021 - ieeexplore.ieee.org
Anonymity networks are becoming increasingly popular in today's online world as more
users attempt to safeguard their online privacy. Tor is currently the most popular anonymity …

[PDF][PDF] Website Fingerprinting at Internet Scale.

A Panchenko, F Lanze, J Pennekamp, T Engel… - NDSS, 2016 - nymity.ch
The website fingerprinting attack aims to identify the content (ie, a webpage accessed by a
client) of encrypted and anonymized connections by observing patterns of data flows such …

k-fingerprinting: A robust scalable website fingerprinting technique

J Hayes, G Danezis - … USENIX Security Symposium (USENIX Security 16 …, 2016 - usenix.org
Website fingerprinting enables an attacker to infer which web page a client is browsing
through encrypted or anonymized network connections. We present a new website …

On realistically attacking tor with website fingerprinting

T Wang, I Goldberg - Proceedings on Privacy Enhancing …, 2016 - petsymposium.org
Website fingerprinting allows a local, passive observer monitoring a web-browsing client's
encrypted channel to determine her web activity. Previous attacks have shown that website …

Unobservable communication over fully untrusted infrastructure

S Angel, S Setty - 12th USENIX Symposium on Operating Systems …, 2016 - usenix.org
Keeping communication private has become increasingly important in an era of mass
surveillance and state-sponsored attacks. While hiding the contents of a conversation has …

Riffle: An efficient communication system with strong anonymity

AH Kwon, D Lazar, S Devadas, B Ford - 2015 - dspace.mit.edu
Existing anonymity systems sacrifice anonymity for efficient communication or vice-versa.
Onion-routing achieves low latency, high bandwidth, and scalable anonymous …

Tik-tok: The utility of packet timing in website fingerprinting attacks

MS Rahman, P Sirinam, N Mathews… - arXiv preprint arXiv …, 2019 - arxiv.org
A passive local eavesdropper can leverage Website Fingerprinting (WF) to deanonymize the
web browsing activity of Tor users. The value of timing information to WF has often been …

Torank: Identifying the most influential suspicious domains in the tor network

MW Al-Nabki, E Fidalgo, E Alegre… - Expert Systems with …, 2019 - Elsevier
The Tor network hosts a significant amount of hidden services related to suspicious
activities. Law Enforcement Agencies need to monitor and to investigate crimes hidden …

The rise of website fingerprinting on Tor: Analysis on techniques and assumptions

MAIM Aminuddin, ZF Zaaba, A Samsudin, F Zaki… - Journal of Network and …, 2023 - Elsevier
Tor is one of the most popular anonymity networks that allows Internet users to hide their
browsing activity. Hiding browsing activity is essential for Internet users to increase their …