• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Sun Xueliang, Huang Anxin, Luo Xiapu, Xie Yi. Webpage Fingerprinting Identification on Tor: A Survey[J]. Journal of Computer Research and Development, 2021, 58(8): 1773-1788. DOI: 10.7544/issn1000-1239.2021.20200498
Citation: Sun Xueliang, Huang Anxin, Luo Xiapu, Xie Yi. Webpage Fingerprinting Identification on Tor: A Survey[J]. Journal of Computer Research and Development, 2021, 58(8): 1773-1788. DOI: 10.7544/issn1000-1239.2021.20200498

Webpage Fingerprinting Identification on Tor: A Survey

Funds: This work was supported by the National Natural Science Foundation of China (61771017, 61671397, 61772438, 61972313) and Hong Kong Innovation and Technology Fund Project (GHP/052/19SZ).
More Information
  • Published Date: July 31, 2021
  • With the prosperous development of Web services, protecting Web-surfing privacy has become a significant concern to society. Various protection techniques (e.g., anonymous communication networks) have been proposed to help users hide the real access targets and anonymously browse the Internet. However, Webpage fingerprinting (WF) identifications, through monitoring and analyzing network traffic, can still determine whether a Web page is visited by exploiting network traffic features, thus jeopardizing the anonymity. On the other hand, law enforcement agencies can leverage the methods of WF identification to monitor anonymous networks to prevent abusing them for carrying out illegal activities or covering up crimes. Therefore, WF identification is a significant and noteworthy technique for privacy protection and network supervision. In this survey, we first introduce the concept and development of WF identifications, and then focus on two kinds of WF identifications on Tor, a widely used anonymous network, including single-tag oriented identifications and multi-tag oriented identifications. In particular, the characteristics of these WF identifications are analyzed and these WF limitations are pointed out, such as simplistic assumptions and insufficient experiments for systematical evaluation. Finally, future research directions for WF identifications are concluded.
  • Related Articles

    [1]Zhang Yuhong, Zhi Wenwu, Li Peipei, Hu Xuegang. Semi-Supervised Method for Cross-Lingual Word Embedding Based on an Adversarial Model with Double Discriminators[J]. Journal of Computer Research and Development, 2023, 60(9): 2127-2136. DOI: 10.7544/issn1000-1239.202220036
    [2]Liu Jiefang, Wang Shitong, Wang Jun, Deng Zhaohong. Core Vector Regression for Attribute Effect Control on Large Scale Dataset[J]. Journal of Computer Research and Development, 2017, 54(9): 1979-1991. DOI: 10.7544/issn1000-1239.2017.20160519
    [3]Shu Jian, Tang Jin, Liu Linlan, Hu Gang, Liu Song. Fuzzy Support Vector Regression-Based Link Quality Prediction Model for Wireless Sensor Networks[J]. Journal of Computer Research and Development, 2015, 52(8): 1842-1851. DOI: 10.7544/issn1000-1239.2015.20140670
    [4]Huang Huajuan, Ding Shifei, Shi Zhongzhi. Smooth CHKS Twin Support Vector Regression[J]. Journal of Computer Research and Development, 2015, 52(3): 561-568. DOI: 10.7544/issn1000-1239.2015.20131444
    [5]Yang Chunfang, Liu Fenlin, and Luo Xiangyang. Histograms Difference and Quantitative Steganalysis of JPEG Steganography Based on Relative Entropy[J]. Journal of Computer Research and Development, 2011, 48(8): 1563-1569.
    [6]Xiong Jinzhi, Xu Jianmin, and Yuan Huaqiang. Convergenceness of a General Formulation for Polynomial Smooth Support Vector Regressions[J]. Journal of Computer Research and Development, 2011, 48(3): 464-470.
    [7]Zeng Fanzi, Liang Zhenhua, and Li Renfa. An Approach to Mobile Position Tracking Based on Support Vector Regression and Game Theory[J]. Journal of Computer Research and Development, 2010, 47(10): 1709-1713.
    [8]Ling Ping, Wang Zhe, Zhou Chunguang, Huang Lan. Reduced Support Vector Clustering[J]. Journal of Computer Research and Development, 2010, 47(8): 1372-1381.
    [9]Qiao Lishan, Chen Songcan, Wang Min. Image Thresholding Based on Relevance Vector Machine[J]. Journal of Computer Research and Development, 2010, 47(8): 1329-1337.
    [10]Liu Xiangdong, Luo Bin, and Chen Zhaoqian. Optimal Model Selection for Support Vector Machines[J]. Journal of Computer Research and Development, 2005, 42(4): 576-581.
  • Cited by

    Periodical cited type(2)

    1. 刘梦君,蒋新宇,石斯瑾,江南,吴笛. 人工智能教育融合安全警示:来自机器学习算法功能的原生风险分析. 江南大学学报(人文社会科学版). 2022(05): 89-101 .
    2. 刘波涛,彭长根,吴睿雪,丁红发,谢明明. 面向数字型的轻量级保形加密算法研究. 计算机研究与发展. 2019(07): 1488-1497 . 本站查看

    Other cited types(4)

Catalog

    Article views (832) PDF downloads (489) Cited by(6)

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return