Inferring Application Type Information from Tor Encrypted Traffic

@article{He2014InferringAT,
  title={Inferring Application Type Information from Tor Encrypted Traffic},
  author={Gaofeng He and Ming Yang and Junzhou Luo and Xiaodan Gu},
  journal={2014 Second International Conference on Advanced Cloud and Big Data},
  year={2014},
  pages={220-227}
}
Tor is a famous anonymity communication system for preserving users' online privacy. It supports TCP applications and packs application data into encrypted equal-sized cells to hide some private information of users, such as the running application type (Web, P2P, FTP, Others). The known of application types is harmful because they can be used to reduce the anonymity set and facilitate other attacks. However, unfortunately, the current Tor design cannot conceal certain application behaviors… CONTINUE READING

References

Publications referenced by this paper.
Showing 1-10 of 28 references

A New Cell-Counting-Based Attack Against Tor

IEEE/ACM Transactions on Networking • 2012
View 2 Excerpts

Enhancing Tor's performance using real-time traffic classification

ACM Conference on Computer and Communications Security • 2012
View 1 Excerpt

Throttling Tor Bandwidth Parasites

USENIX Security Symposium • 2012
View 2 Excerpts

Touching from a distance: website fingerprinting attacks and defenses

ACM Conference on Computer and Communications Security • 2012
View 2 Excerpts

Similar Papers

Loading similar papers…