• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Sun Xueliang, Huang Anxin, Luo Xiapu, Xie Yi. Webpage Fingerprinting Identification on Tor: A Survey[J]. Journal of Computer Research and Development, 2021, 58(8): 1773-1788. DOI: 10.7544/issn1000-1239.2021.20200498
Citation: Sun Xueliang, Huang Anxin, Luo Xiapu, Xie Yi. Webpage Fingerprinting Identification on Tor: A Survey[J]. Journal of Computer Research and Development, 2021, 58(8): 1773-1788. DOI: 10.7544/issn1000-1239.2021.20200498

Webpage Fingerprinting Identification on Tor: A Survey

Funds: This work was supported by the National Natural Science Foundation of China (61771017, 61671397, 61772438, 61972313) and Hong Kong Innovation and Technology Fund Project (GHP/052/19SZ).
More Information
  • Published Date: July 31, 2021
  • With the prosperous development of Web services, protecting Web-surfing privacy has become a significant concern to society. Various protection techniques (e.g., anonymous communication networks) have been proposed to help users hide the real access targets and anonymously browse the Internet. However, Webpage fingerprinting (WF) identifications, through monitoring and analyzing network traffic, can still determine whether a Web page is visited by exploiting network traffic features, thus jeopardizing the anonymity. On the other hand, law enforcement agencies can leverage the methods of WF identification to monitor anonymous networks to prevent abusing them for carrying out illegal activities or covering up crimes. Therefore, WF identification is a significant and noteworthy technique for privacy protection and network supervision. In this survey, we first introduce the concept and development of WF identifications, and then focus on two kinds of WF identifications on Tor, a widely used anonymous network, including single-tag oriented identifications and multi-tag oriented identifications. In particular, the characteristics of these WF identifications are analyzed and these WF limitations are pointed out, such as simplistic assumptions and insufficient experiments for systematical evaluation. Finally, future research directions for WF identifications are concluded.
  • Related Articles

    [1]Wang Jindi, Tong Xiangrong. Agent Negotiation Model Based on Round Limit Change of Non-Sparse Trust Networks[J]. Journal of Computer Research and Development, 2019, 56(12): 2612-2622. DOI: 10.7544/issn1000-1239.2019.20190163
    [2]Fan Yanfang, Cai Ying. Collaboration Supported Mandatory Access Control Model[J]. Journal of Computer Research and Development, 2015, 52(10): 2411-2421. DOI: 10.7544/issn1000-1239.2015.20150574
    [3]Ge Xin, Zhao Hai, Zhang Jun. Degree Correlation and Its Features of Spreading on Networks[J]. Journal of Computer Research and Development, 2013, 50(4): 741-749.
    [4]Zhang Zhancheng, Wang Shitong, Fu-Lai Chung. Collaborative Classification Mechanism for Privacy-Preserving[J]. Journal of Computer Research and Development, 2011, 48(6): 1018-1028.
    [5]Tong Xiangrong, Huang Houkuan, Zhang Wei. A Case Based Agent Multi-Issue Negotiation Model[J]. Journal of Computer Research and Development, 2009, 46(9): 1508-1514.
    [6]Bian Zheng'ai, Liu Bo, and Luo Junzhou. A Cooperative-Game-Based Mobile Agent Task Collaboration Model in Network Management[J]. Journal of Computer Research and Development, 2007, 44(2): 193-200.
    [7]Tao Haijun, Wang Yadong, Guo Maozu, and Wang Hanlun. A Multi-Agent Negotiation Model Based on Acquaintance Coalition and Extended Contract Net Protocol[J]. Journal of Computer Research and Development, 2006, 43(7): 1155-1160.
    [8]Yang Pei, Gao Yang, Chen Zhaoqian. Persuasive Multi-Agent Multi-Issue Negotiation[J]. Journal of Computer Research and Development, 2006, 43(7): 1149-1154.
    [9]Gao Jian and Zhang Wei. An Accelerating Chaos Evolution Algorithm of Bilateral Multi-Issue Automated Negotiation in MAS[J]. Journal of Computer Research and Development, 2006, 43(6): 1104-1108.
    [10]Zhao Xinpei, Li Mingshu, Chan Keith, Wang Qing. A Negotiation-Based Approach for Software Process Collaboration[J]. Journal of Computer Research and Development, 2006, 43(2): 314-320.
  • Cited by

    Periodical cited type(2)

    1. 刘梦君,蒋新宇,石斯瑾,江南,吴笛. 人工智能教育融合安全警示:来自机器学习算法功能的原生风险分析. 江南大学学报(人文社会科学版). 2022(05): 89-101 .
    2. 刘波涛,彭长根,吴睿雪,丁红发,谢明明. 面向数字型的轻量级保形加密算法研究. 计算机研究与发展. 2019(07): 1488-1497 . 本站查看

    Other cited types(3)

Catalog

    Article views (824) PDF downloads (487) Cited by(5)

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return