Learn More
Tor is a popular anonymizing network and the existing work shows that it can preserve users' privacy from website fingerprinting attacks well. However, based on our extensive analysis, we find it is the overlap of web objects in returned web pages that make the traffic features obfuscated, thus degrading the attack detection rate. In this paper, we propose(More)
Tor has become one of the most popular overlay networks for anonymizing TCP traffic. Hidden service provided by Tor allows users to run a TCP server under a pseudonym, and its resources can be accessed without the operator's real identity being revealed. In this paper, we propose a novel HTTP based application-level attack against Tor's hidden web service.(More)
Tor is a famous anonymity communication system for preserving users' online privacy. It supports TCP applications and packs application data into encrypted equal-sized cells to hide some private information of users, such as the running application type (Web, P2P, FTP, Others). The known of application types is harmful because they can be used to reduce the(More)
Cloud computing's distributed architecture helps ensure service resilience and robustness. Meanwhile, the big data stored in the cloud are valuable and sensitive and they are becoming attractive targets of attackers. In real life, attackers can carry out attacks such as Advanced Persistent Threat (APT) to invade cloud infrastructure and steal cloud users'(More)
MicroRNAs (miRNAs) can regulate gene expression at post-transcriptional levels, thereby influence cancer risk. The aim of the current study is to investigate association between miR-199a rs74723057 and MET rs1621 and HCC risk in 1032 HCC patients and 1060 cancer-free controls. These two SNPs were genotyped by using the Agena MassARRAY genotyping system.(More)
Mobile application (simply "app") identification at a per-flow granularity is vital for traffic engineering, network management, and security practices in cloud computing. While challenge is caused by a growing fraction of encrypted traffic such as HTTPS. To address this challenge, we have analyzed mobile apps' traffic carefully and observed(More)
Tor is a famous anonymous communication system for preserving users’ online privacy. It supports TCP applications and packs upper-layer application data into encrypted equal-sized cells with onion routing to hide private information of users. However, we note that the current Tor design cannot conceal certain application behaviors. For example, P2P(More)
  • 1