M. Nirmala, B. Rajalakshmi, Pragya Goel, Swapnil Shukla, Pragati Subhadarshinee
{"title":"针对各种攻击的网站指纹防御算法","authors":"M. Nirmala, B. Rajalakshmi, Pragya Goel, Swapnil Shukla, Pragati Subhadarshinee","doi":"10.1109/TEMSMET56707.2023.10149997","DOIUrl":null,"url":null,"abstract":"A local listener can identify the websites a user is accessing via an encrypted connection thanks to website fingerprinting. Modern web fingerprinting techniques have been demonstrated to be successful even against Tor. RBP and Walkie-Talkie, two recent lightweight website fingerprinting protections for Tor that significantly weaken current attacks, have been suggested. We attempted to compare the current Website fingerprinting attack strategies and defense algorithms in this paper. RBP and Walkie-Talkie algorithms have been used as protection mechanisms in some of our studies. Our research is based on determining the efficacy of defense algorithms against different attacks and contrasting the various attack algorithms that are now accessible. To do this, we used homology analysis.","PeriodicalId":179553,"journal":{"name":"2023 IEEE 3rd International Conference on Technology, Engineering, Management for Societal impact using Marketing, Entrepreneurship and Talent (TEMSMET)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-02-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Website Fingerprinting Defensive Algorithms Against Various Attacks\",\"authors\":\"M. Nirmala, B. Rajalakshmi, Pragya Goel, Swapnil Shukla, Pragati Subhadarshinee\",\"doi\":\"10.1109/TEMSMET56707.2023.10149997\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"A local listener can identify the websites a user is accessing via an encrypted connection thanks to website fingerprinting. Modern web fingerprinting techniques have been demonstrated to be successful even against Tor. RBP and Walkie-Talkie, two recent lightweight website fingerprinting protections for Tor that significantly weaken current attacks, have been suggested. We attempted to compare the current Website fingerprinting attack strategies and defense algorithms in this paper. RBP and Walkie-Talkie algorithms have been used as protection mechanisms in some of our studies. Our research is based on determining the efficacy of defense algorithms against different attacks and contrasting the various attack algorithms that are now accessible. To do this, we used homology analysis.\",\"PeriodicalId\":179553,\"journal\":{\"name\":\"2023 IEEE 3rd International Conference on Technology, Engineering, Management for Societal impact using Marketing, Entrepreneurship and Talent (TEMSMET)\",\"volume\":\"9 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2023-02-10\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2023 IEEE 3rd International Conference on Technology, Engineering, Management for Societal impact using Marketing, Entrepreneurship and Talent (TEMSMET)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/TEMSMET56707.2023.10149997\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2023 IEEE 3rd International Conference on Technology, Engineering, Management for Societal impact using Marketing, Entrepreneurship and Talent (TEMSMET)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/TEMSMET56707.2023.10149997","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Website Fingerprinting Defensive Algorithms Against Various Attacks
A local listener can identify the websites a user is accessing via an encrypted connection thanks to website fingerprinting. Modern web fingerprinting techniques have been demonstrated to be successful even against Tor. RBP and Walkie-Talkie, two recent lightweight website fingerprinting protections for Tor that significantly weaken current attacks, have been suggested. We attempted to compare the current Website fingerprinting attack strategies and defense algorithms in this paper. RBP and Walkie-Talkie algorithms have been used as protection mechanisms in some of our studies. Our research is based on determining the efficacy of defense algorithms against different attacks and contrasting the various attack algorithms that are now accessible. To do this, we used homology analysis.