2015 IEEE Symposium Series on Computational Intelligence 2015
DOI: 10.1109/ssci.2015.19
|View full text |Cite
|
Sign up to set email alerts
|

P2V: Effective Website Fingerprinting Using Vector Space Representations

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2017
2017
2023
2023

Publication Types

Select...
3
1
1

Relationship

0
5

Authors

Journals

citations
Cited by 6 publications
(1 citation statement)
references
References 10 publications
0
1
0
Order By: Relevance
“…Kwon et al [71] evaluated CART, C4.5, and kNN classifiers for WF attacks on Tor hidden service clients and servers, and found that kNN worked best. Al-Naami et al [72] proposed the packet to vector (P2V) approach based on the naïve Bayes classifier, they constructed a corpus from network packets and represented these packets as real-valued vectors, and modeled WF attack using the Global Vector space representation (GloVe). Hayes et al [73] presented k-fingerprinting, a new WF technique based on random decision forests, which achieved better performance than previous attacks over standard web pages as well as Tor hidden services even against WF defenses.…”
Section: A Approachesmentioning
confidence: 99%
“…Kwon et al [71] evaluated CART, C4.5, and kNN classifiers for WF attacks on Tor hidden service clients and servers, and found that kNN worked best. Al-Naami et al [72] proposed the packet to vector (P2V) approach based on the naïve Bayes classifier, they constructed a corpus from network packets and represented these packets as real-valued vectors, and modeled WF attack using the Global Vector space representation (GloVe). Hayes et al [73] presented k-fingerprinting, a new WF technique based on random decision forests, which achieved better performance than previous attacks over standard web pages as well as Tor hidden services even against WF defenses.…”
Section: A Approachesmentioning
confidence: 99%