A critical evaluation of website fingerprinting attacks

M Juarez, S Afroz, G Acar, C Diaz… - Proceedings of the 2014 …, 2014 - dl.acm.org
Recent studies on Website Fingerprinting (WF) claim to have found highly effective attacks
on Tor. However, these studies make assumptions about user settings, adversary …

Website fingerprinting: attacking popular privacy enhancing technologies with the multinomial naïve-bayes classifier

D Herrmann, R Wendolsky, H Federrath - … of the 2009 ACM workshop on …, 2009 - dl.acm.org
Privacy enhancing technologies like OpenSSL, OpenVPN or Tor establish an encrypted
tunnel that enables users to hide content and addresses of requested websites from external …

[PDF][PDF] Traffic Morphing: An Efficient Defense Against Statistical Traffic Analysis.

CV Wright, SE Coull, F Monrose - NDSS, 2009 - git.gnunet.org
Recent work has shown that properties of network traffic that remain observable after
encryption, namely packet sizes and timing, can reveal surprising information about the …

Predicted packet padding for anonymous web browsing against traffic analysis attacks

S Yu, G Zhao, W Dou, S James - IEEE Transactions on …, 2012 - ieeexplore.ieee.org
Anonymous communication has become a hot research topic in order to meet the increasing
demand for web privacy protection. However, there are few such systems which can provide …

A first look at inter-data center traffic characteristics via yahoo! datasets

Y Chen, S Jain, VK Adhikari… - 2011 Proceedings IEEE …, 2011 - ieeexplore.ieee.org
Effectively managing multiple data centers and their traffic dynamics pose many challenges
to their operators, as little is known about the characteristics of inter-data center (D2D) traffic …

[PDF][PDF] HTTPOS: Sealing Information Leaks with Browser-side Obfuscation of Encrypted Flows.

X Luo, P Zhou, EWW Chan, W Lee, RKC Chang… - NDSS, 2011 - academia.edu
Leakage of private information from web applications—even when the traffic is encrypted—
is a major security threat to many applications that use HTTP for data delivery. This paper …

I know why you went to the clinic: Risks and realization of https traffic analysis

B Miller, L Huang, AD Joseph, JD Tygar - Privacy Enhancing Technologies …, 2014 - Springer
Revelations of large scale electronic surveillance and data mining by governments and
corporations have fueled increased adoption of HTTPS. We present a traffic analysis attack …

Website fingerprinting attack on anonymity networks based on profile hidden markov model

Z Zhuo, Y Zhang, Z Zhang, X Zhang… - IEEE Transactions on …, 2017 - ieeexplore.ieee.org
Website fingerprinting attacks can reveal the receiver in anonymous networks and cause a
potential threat to users' privacy. Previous studies focus more on identifying individual …

Sufficiency revisited: rethinking statistical algorithms in the big data era

JYL Lee, JJ Brown, LM Ryan - The American Statistician, 2017 - Taylor & Francis
The big data era demands new statistical analysis paradigms, since traditional methods
often break down when datasets are too large to fit on a single desktop computer. Divide …

Domain name encryption is not enough: Privacy leakage via IP-based website fingerprinting

NP Hoang, AA Niaki, P Gill, M Polychronakis - arXiv preprint arXiv …, 2021 - arxiv.org
Although the security benefits of domain name encryption technologies such as DNS over
TLS (DoT), DNS over HTTPS (DoH), and Encrypted Client Hello (ECH) are clear, their …