Matches in SemOpenAlex for { <https://semopenalex.org/work/W2408392488> ?p ?o ?g. }
Showing items 1 to 66 of
66
with 100 items per page.
- W2408392488 abstract "Website Fingerprinting is a passive attack based on analysis of web traffic. The attacker generally uses a mole in the system and analyses the web traffic over a period of time. These attacks are generally used to break the anonymity in the dark web. The important feature is that the attacker is not bothered about decrypting the data. We shall analyze the various methodologies and feasibility of Website Fingerprinting in real world. Keywords-Timing attacks, Website Fingerprinting ,TOR I. INTRODUCTION Every connection between the client and the server is recognized by the ISP. Modern protocols like SSL provide data integrity i.e. it is difficult to break the encryption and obtain the plain text. However, this does not ensure the anonymity of servers and clients since details about each interaction and data transfer can be obtained. This forms the basis of Website fingerprinting attacks. The connection of each client to any website in the Internet has certain traffic patterns and packet characteristics. This is called the fingerprint. The attacker tries to match the fingerprint of a particular user with all available fingerprints which are acquired over a period of time. In this way, the attacker tries to find the website participating in the connection. The attacker need not break the encryption. Adversary models are prepared to work in the closed world or dark web and in the open world. Suppose a user visits a website www.xyz.com. Initially, the HTML file related to the home page is downloaded. The HTML page may have download links for images, spreadsheets or files. Let us assume that the home page of xyz.com has only 5 files and the user downloads 2 files among them. The size of each file and the order constitutes an important part of the fingerprint. The attacker has to gather data about the various possible permutations of file access over a period of time. Thus, thousands of fingerprints may be generated for a real website. The attacker then tries to match the fingerprint of the user and attempts to know the website participating in the connection. These attacks have been tried on many encryption and anonymity services. The attack on TOR is the most prominent among these. TOR uses multiple layers of encryption initially. The random circuit for data transmission is selected. Decryption takes place at each node. The final node also called the Exit node decrypts the final layer of encryption and the plain text is transmitted to the receiver. The receiver could be a server in the dark web as well. The initial node in the TOR circuit is called the Guard node. Fingerprinting attackers generally target the guard node. Malicious guard nodes are used to monitor the traffic and classifiers are used to determine the possible nodes in the circuit." @default.
- W2408392488 created "2016-06-24" @default.
- W2408392488 creator A5013718703 @default.
- W2408392488 creator A5065417042 @default.
- W2408392488 date "2016-05-19" @default.
- W2408392488 modified "2023-09-23" @default.
- W2408392488 title "Website Fingerprinting: Approaches and Feasibility" @default.
- W2408392488 cites W1450140837 @default.
- W2408392488 cites W1866884617 @default.
- W2408392488 cites W2120702739 @default.
- W2408392488 hasPublicationYear "2016" @default.
- W2408392488 type Work @default.
- W2408392488 sameAs 2408392488 @default.
- W2408392488 citedByCount "0" @default.
- W2408392488 crossrefType "journal-article" @default.
- W2408392488 hasAuthorship W2408392488A5013718703 @default.
- W2408392488 hasAuthorship W2408392488A5065417042 @default.
- W2408392488 hasConcept C110875604 @default.
- W2408392488 hasConcept C11392498 @default.
- W2408392488 hasConcept C136764020 @default.
- W2408392488 hasConcept C148730421 @default.
- W2408392488 hasConcept C178005623 @default.
- W2408392488 hasConcept C2777826928 @default.
- W2408392488 hasConcept C38652104 @default.
- W2408392488 hasConcept C41008148 @default.
- W2408392488 hasConcept C41065033 @default.
- W2408392488 hasConcept C93996380 @default.
- W2408392488 hasConceptScore W2408392488C110875604 @default.
- W2408392488 hasConceptScore W2408392488C11392498 @default.
- W2408392488 hasConceptScore W2408392488C136764020 @default.
- W2408392488 hasConceptScore W2408392488C148730421 @default.
- W2408392488 hasConceptScore W2408392488C178005623 @default.
- W2408392488 hasConceptScore W2408392488C2777826928 @default.
- W2408392488 hasConceptScore W2408392488C38652104 @default.
- W2408392488 hasConceptScore W2408392488C41008148 @default.
- W2408392488 hasConceptScore W2408392488C41065033 @default.
- W2408392488 hasConceptScore W2408392488C93996380 @default.
- W2408392488 hasIssue "5" @default.
- W2408392488 hasLocation W24083924881 @default.
- W2408392488 hasOpenAccess W2408392488 @default.
- W2408392488 hasPrimaryLocation W24083924881 @default.
- W2408392488 hasRelatedWork W103430383 @default.
- W2408392488 hasRelatedWork W1525967479 @default.
- W2408392488 hasRelatedWork W1905266829 @default.
- W2408392488 hasRelatedWork W2058833769 @default.
- W2408392488 hasRelatedWork W2153253414 @default.
- W2408392488 hasRelatedWork W2183575394 @default.
- W2408392488 hasRelatedWork W2187625908 @default.
- W2408392488 hasRelatedWork W2301019720 @default.
- W2408392488 hasRelatedWork W2344575221 @default.
- W2408392488 hasRelatedWork W2587086969 @default.
- W2408392488 hasRelatedWork W2615262536 @default.
- W2408392488 hasRelatedWork W2619063599 @default.
- W2408392488 hasRelatedWork W2783010943 @default.
- W2408392488 hasRelatedWork W2792059428 @default.
- W2408392488 hasRelatedWork W2944600015 @default.
- W2408392488 hasRelatedWork W3005771177 @default.
- W2408392488 hasRelatedWork W3042908668 @default.
- W2408392488 hasRelatedWork W2184049164 @default.
- W2408392488 hasRelatedWork W2236588499 @default.
- W2408392488 hasRelatedWork W2777144016 @default.
- W2408392488 hasVolume "3" @default.
- W2408392488 isParatext "false" @default.
- W2408392488 isRetracted "false" @default.
- W2408392488 magId "2408392488" @default.
- W2408392488 workType "article" @default.