• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Sun Xueliang, Huang Anxin, Luo Xiapu, Xie Yi. Webpage Fingerprinting Identification on Tor: A Survey[J]. Journal of Computer Research and Development, 2021, 58(8): 1773-1788. DOI: 10.7544/issn1000-1239.2021.20200498
Citation: Sun Xueliang, Huang Anxin, Luo Xiapu, Xie Yi. Webpage Fingerprinting Identification on Tor: A Survey[J]. Journal of Computer Research and Development, 2021, 58(8): 1773-1788. DOI: 10.7544/issn1000-1239.2021.20200498

Webpage Fingerprinting Identification on Tor: A Survey

Funds: This work was supported by the National Natural Science Foundation of China (61771017, 61671397, 61772438, 61972313) and Hong Kong Innovation and Technology Fund Project (GHP/052/19SZ).
More Information
  • Published Date: July 31, 2021
  • With the prosperous development of Web services, protecting Web-surfing privacy has become a significant concern to society. Various protection techniques (e.g., anonymous communication networks) have been proposed to help users hide the real access targets and anonymously browse the Internet. However, Webpage fingerprinting (WF) identifications, through monitoring and analyzing network traffic, can still determine whether a Web page is visited by exploiting network traffic features, thus jeopardizing the anonymity. On the other hand, law enforcement agencies can leverage the methods of WF identification to monitor anonymous networks to prevent abusing them for carrying out illegal activities or covering up crimes. Therefore, WF identification is a significant and noteworthy technique for privacy protection and network supervision. In this survey, we first introduce the concept and development of WF identifications, and then focus on two kinds of WF identifications on Tor, a widely used anonymous network, including single-tag oriented identifications and multi-tag oriented identifications. In particular, the characteristics of these WF identifications are analyzed and these WF limitations are pointed out, such as simplistic assumptions and insufficient experiments for systematical evaluation. Finally, future research directions for WF identifications are concluded.
  • Related Articles

    [1]Yu Ruiqi, Zhang Xinyun, Ren Shuang. A Review of Quantum Machine Learning Algorithms Based on Variational Quantum Circuit[J]. Journal of Computer Research and Development, 2025, 62(4): 821-851. DOI: 10.7544/issn1000-1239.202330979
    [2]Yue Wenjing, Qu Wenwen, Lin Kuan, Wang Xiaoling. Survey of Cardinality Estimation Techniques Based on Machine Learning[J]. Journal of Computer Research and Development, 2024, 61(2): 413-427. DOI: 10.7544/issn1000-1239.202220649
    [3]Chen Kerui, Meng Xiaofeng. Interpretation and Understanding in Machine Learning[J]. Journal of Computer Research and Development, 2020, 57(9): 1971-1986. DOI: 10.7544/issn1000-1239.2020.20190456
    [4]Wang Ting, Wang Na, Cui Yunpeng, Li Huan. The Optimization Method of Wireless Network Attacks Detection Based on Semi-Supervised Learning[J]. Journal of Computer Research and Development, 2020, 57(4): 791-802. DOI: 10.7544/issn1000-1239.2020.20190880
    [5]Ma Chencheng, Du Xuehui, Cao Lifeng, Wu Bei. burst-Analysis Website Fingerprinting Attack Based on Deep Neural Network[J]. Journal of Computer Research and Development, 2020, 57(4): 746-766. DOI: 10.7544/issn1000-1239.2020.20190860
    [6]Wang Guizhi, Lü Guanghong, Jia Wucai, Jia Chuanghui, Zhang Jianshen. A Review on the Application of Machine Learning in SDN Routing Optimization[J]. Journal of Computer Research and Development, 2020, 57(4): 688-698. DOI: 10.7544/issn1000-1239.2020.20190837
    [7]Jiang Shuhao, Yan Guihai, Li Jiajun, Lu Wenyan, Li Xiaowei. A Quantitative Analysis on the “Approximatability” of Machine Learning Algorithms[J]. Journal of Computer Research and Development, 2017, 54(6): 1337-1347. DOI: 10.7544/issn1000-1239.2017.20170086
    [8]Liu Yufeng, Li Renfa. Graph Regularized Semi-Supervised Learning on Heterogeneous Information Networks[J]. Journal of Computer Research and Development, 2015, 52(3): 606-613. DOI: 10.7544/issn1000-1239.2015.20131147
    [9]Li Zhiyuan, Wang Ruchuan. A P2P Network Traffic Identification Approach Based on Machine Learning[J]. Journal of Computer Research and Development, 2011, 48(12): 2253-2260.
    [10]Chen Feifei and Gui Xiaolin. Research on Dynamic Trust-Level Evaluation Mechanism Based on Machine Learning[J]. Journal of Computer Research and Development, 2007, 44(2): 223-229.
  • Cited by

    Periodical cited type(7)

    1. 李学龄,柴雁欣,萧展辉,包新晔. 面向项目全生命周期的语义融合模型的构建. 自动化技术与应用. 2025(01): 173-176+184 .
    2. 王法胜,贺冰,孙福明,周慧. 自适应内容感知空间正则化相关滤波跟踪算法. 吉林大学学报(工学版). 2024(10): 3037-3049 .
    3. 吴捷,马小虎. 基于稀疏约束与双线索选择的目标跟踪算法. 火力与指挥控制. 2023(02): 19-25 .
    4. 姜文涛,张博强. 通道和异常适应性的目标跟踪算法. 计算机科学与探索. 2023(07): 1644-1657 .
    5. 张博. 基于残差神经网络的目标运动边界视觉快速跟踪算法. 探测与控制学报. 2023(03): 37-42+50 .
    6. 全震,吕静. 城市道路绿化结构信息高精度提取仿真. 计算机仿真. 2023(06): 216-219+337 .
    7. 姜文涛,崔江磊. 旋转区域提议网络的孪生神经网络跟踪算法. 计算机工程与应用. 2022(24): 247-255 .

    Other cited types(12)

Catalog

    Article views (808) PDF downloads (484) Cited by(19)

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return