2021
DOI: 10.1155/2021/3265300
|View full text |Cite
|
Sign up to set email alerts
|

PF : Website Fingerprinting Attack Using Probabilistic Topic Model

Abstract: Website fingerprinting (WFP) attack enables identifying the websites a user is browsing even under the protection of privacy-enhancing technologies (PETs). Previous studies demonstrate that most machine-learning attacks need multiple types of features as input, thus inducing tremendous feature engineering work. However, we show the other alternative. That is, we present Probabilistic Fingerprinting (PF), a new website fingerprinting attack that merely leverages one type of features. They are produced by using … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2023
2023
2023
2023

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 29 publications
(61 reference statements)
0
1
0
Order By: Relevance
“…Li et al [97] constructed a resource loading tree (RLTree) to represent a website, based on the multiple initial TCP sessions generated by visiting the website, and proposed a novel WF attack based on RLTree similarity. Hongcheng Zou et al [98] presented Probabilistic Fingerprinting (PF), a new WF attack based on kNN, using topic probability vectors of traffic instances as features. Kexin Zou et al [99] proposed a novel lightweight WF attack on Bitcoin hidden service, using a random decision forest classifier with features from TLS packet size and direction.…”
Section: A Approachesmentioning
confidence: 99%
“…Li et al [97] constructed a resource loading tree (RLTree) to represent a website, based on the multiple initial TCP sessions generated by visiting the website, and proposed a novel WF attack based on RLTree similarity. Hongcheng Zou et al [98] presented Probabilistic Fingerprinting (PF), a new WF attack based on kNN, using topic probability vectors of traffic instances as features. Kexin Zou et al [99] proposed a novel lightweight WF attack on Bitcoin hidden service, using a random decision forest classifier with features from TLS packet size and direction.…”
Section: A Approachesmentioning
confidence: 99%