{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,16]],"date-time":"2025-12-16T12:22:13Z","timestamp":1765887733500,"version":"3.41.0"},"reference-count":31,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2015,10,24]],"date-time":"2015-10-24T00:00:00Z","timestamp":1445644800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Cluster Comput"],"published-print":{"date-parts":[[2016,3]]},"DOI":"10.1007\/s10586-015-0502-4","type":"journal-article","created":{"date-parts":[[2015,10,24]],"date-time":"2015-10-24T14:29:46Z","timestamp":1445696986000},"page":"427-438","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":12,"title":["Techniques and countermeasures of website\/wireless traffic analysis and fingerprinting"],"prefix":"10.1007","volume":"19","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-9336-7298","authenticated-orcid":false,"given":"Taher Ahmed","family":"Ghaleb","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,10,24]]},"reference":[{"key":"502_CR1","doi-asserted-by":"crossref","unstructured":"Atkinson, J., Adetoye, O., Rio, M., Mitchell, J., Matich, G.: Your wifi is leaking: inferring user behaviour, encryption irrelevant. In: Wireless Communications and Networking Conference, pp. 1097\u20131102. IEEE (2013)","DOI":"10.1109\/WCNC.2013.6554717"},{"key":"502_CR2","doi-asserted-by":"crossref","unstructured":"Back, A., M\u00f6ller, U., Stiglic, A.: Traffic analysis attacks and trade-offs in anonymity providing systems. In: Information Hiding, pp. 245\u2013257. Springer (2001)","DOI":"10.1007\/3-540-45496-9_18"},{"key":"502_CR3","doi-asserted-by":"crossref","unstructured":"Berthold, O., Federrath, H., K\u00f6psell, S.: Web mixes: a system for anonymous and unobservable internet access. In: Designing Privacy Enhancing Technologies, pp. 115\u2013129. Springer (2001)","DOI":"10.1007\/3-540-44702-4_7"},{"key":"502_CR4","doi-asserted-by":"crossref","unstructured":"Bissias, G.D., Liberatore, M., Jensen, D., Levine, B.N.: Privacy vulnerabilities in encrypted http streams. In: Privacy Enhancing Technologies, pp. 1\u201311. Springer (2006)","DOI":"10.1007\/11767831_1"},{"key":"502_CR5","doi-asserted-by":"crossref","unstructured":"Cai, X., Nithyanand, R., Johnson, R.: Cs-buflo: a congestion sensitive website fingerprinting defense. In: Proceedings of the 13th Workshop on Privacy in the Electronic Society, pp. 121\u2013130. ACM (2014)","DOI":"10.1145\/2665943.2665949"},{"key":"502_CR6","doi-asserted-by":"crossref","unstructured":"Cai, X., Nithyanand, R., Wang, T., Johnson, R., Goldberg, I.: A systematic approach to developing and evaluating website fingerprinting defenses. In: Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, pp. 227\u2013238. ACM (2014)","DOI":"10.1145\/2660267.2660362"},{"key":"502_CR7","doi-asserted-by":"crossref","unstructured":"Cai, X., Zhang, X.C., Joshi, B., Johnson, R.: Touching from a distance: website fingerprinting attacks and defenses. In: Proceedings of the 2012 ACM Conference on Computer and Communications Security, pp. 605\u2013616. ACM (2012)","DOI":"10.1145\/2382196.2382260"},{"key":"502_CR8","doi-asserted-by":"crossref","unstructured":"Chan-Tin, E., et\u00a0al.: Identifying webbrowsers in encrypted communications. In: Proceedings of the 13th Workshop on Privacy in the Electronic Society, pp. 135\u2013138. ACM (2014)","DOI":"10.1145\/2665943.2665968"},{"key":"502_CR9","doi-asserted-by":"crossref","unstructured":"Dyer, K.P., Coull, S.E., Ristenpart, T., Shrimpton, T.: Peek-a-boo, i still see you: why efficient traffic analysis countermeasures fail. In: IEEE Symposium on Security and Privacy (SP), pp. 332\u2013346 (2012)","DOI":"10.1109\/SP.2012.28"},{"key":"502_CR10","doi-asserted-by":"crossref","unstructured":"Ghaleb, T.A.: Website fingerprinting as a cybercrime investigation model: role and challenges. In: First International Conference on Anti-Cybercrime (ICACC-2015), pp. 1\u20135. IEEE, In press (2015)","DOI":"10.1109\/Anti-Cybercrime.2015.7351934"},{"key":"502_CR11","doi-asserted-by":"crossref","unstructured":"Ghaleb, T.A.: Wireless\/website traffic analysis & fingerprinting: a survey of attacking techniques and countermeasures. In: International Conference on Cloud Computing (ICCC), pp. 1\u20137. IEEE (2015)","DOI":"10.1109\/CLOUDCOMP.2015.7149665"},{"key":"502_CR12","doi-asserted-by":"crossref","unstructured":"Greenstein, B., McCoy, D., Pang, J., Kohno, T., Seshan, S., Wetherall, D.: Improving wireless privacy with an identifier-free link layer protocol. In: Proceedings of the 6th International Conference on Mobile systems, Applications, and Services, pp. 40\u201353. ACM (2008)","DOI":"10.1145\/1378600.1378607"},{"key":"502_CR13","doi-asserted-by":"crossref","unstructured":"Herrmann, D., Wendolsky, R., Federrath, H.: Website fingerprinting: attacking popular privacy enhancing technologies with the multinomial na\u00efve-bayes classifier. In: Proceedings of the 2009 ACM Workshop on Cloud Computing Security, pp. 31\u201342. ACM (2009)","DOI":"10.1145\/1655008.1655013"},{"key":"502_CR14","doi-asserted-by":"crossref","unstructured":"Juarez, M., Afroz, S., Acar, G., Diaz, C., Greenstadt, R.: A critical evaluation of website fingerprinting attacks. In: Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, pp. 263\u2013274. ACM (2014)","DOI":"10.1145\/2660267.2660368"},{"key":"502_CR15","doi-asserted-by":"crossref","unstructured":"Liberatore, M., Levine, B.N.: Inferring the source of encrypted http connections. In: Proceedings of the 13th ACM conference on Computer and communications security, pp. 255\u2013263. ACM (2006)","DOI":"10.1145\/1180405.1180437"},{"key":"502_CR16","doi-asserted-by":"crossref","unstructured":"Murdoch, S.J., Danezis, G.: Low-cost traffic analysis of tor. In: IEEE Symposium on Security and Privacy, pp. 183\u2013195. IEEE (2005)","DOI":"10.1109\/SP.2005.12"},{"key":"502_CR17","doi-asserted-by":"crossref","unstructured":"Panchenko, A., Niessen, L., Zinnen, A., Engel, T.: Website fingerprinting in onion routing based anonymization networks. In: Proceedings of the 10th Annual ACM Workshop on Privacy in the Electronic Society, pp. 103\u2013114. ACM (2011)","DOI":"10.1145\/2046556.2046570"},{"key":"502_CR18","doi-asserted-by":"crossref","unstructured":"Raymond, J.F.: Traffic analysis: Protocols, attacks, design issues, and open problems. In: Designing Privacy Enhancing Technologies, pp. 10\u201329. Springer (2001)","DOI":"10.1007\/3-540-44702-4_2"},{"key":"502_CR19","doi-asserted-by":"crossref","unstructured":"Shi, Y., Matsuura, K.: Fingerprinting attack on the tor anonymity system. In: Information and Communications Security, pp. 425\u2013438. Springer (2009)","DOI":"10.1007\/978-3-642-11145-7_33"},{"key":"502_CR20","unstructured":"Sun, Q., Simon, D.R., Wang, Y.M., Russell, W., Padmanabhan, V.N., Qiu, L.: Statistical identification of encrypted web browsing traffic. In: Proceedings of IEEE Symposium on Security and Privacy, pp. 19\u201330. IEEE (2002)"},{"key":"502_CR21","doi-asserted-by":"crossref","unstructured":"Tavallaee, M., Lu, W., Ghorbani, A.A.: Online classification of network flows. In: Seventh Annual Conference on Communication Networks and Services Research , CNSR\u201909, pp. 78\u201385. IEEE (2009)","DOI":"10.1109\/CNSR.2009.22"},{"key":"502_CR22","unstructured":"Tor project: anonymity online. https:\/\/www.torproject.org (Last visited: Oct 2014)"},{"key":"502_CR23","unstructured":"Wagner, D., Schneier, B.: Analysis of the ssl 3.0 protocol. In: Proceedings of the Second USENIX Workshop on Electronic Commerce, pp. 29\u201340 (1996)"},{"key":"502_CR24","unstructured":"Wang, T., Cai, X., Nithyanand, R., Johnson, R., Goldberg, I.: Effective attacks and provable defenses for website fingerprinting. In: Proceedings of the 23th USENIX Security Symposium (USENIX) (2014)"},{"key":"502_CR25","unstructured":"Wang, T., Goldberg, I.: Comparing website fingerprinting attacks and defenses. Tech. rep., Technical Report 2013-30, CACR, 2013. http:\/\/cacr.uwaterloo.ca\/techreports\/2013\/cacr2013-30.pdf (2014)"},{"key":"502_CR26","doi-asserted-by":"crossref","unstructured":"Wang, T., Goldberg, I.: Improved website fingerprinting on tor. In: Proceedings of the 12th ACM Workshop on Workshop on Privacy in the Electronic Society, pp. 201\u2013212. ACM (2013)","DOI":"10.1145\/2517840.2517851"},{"key":"502_CR27","doi-asserted-by":"crossref","unstructured":"Wright, C.V., Ballard, L., Coull, S.E., Monrose, F., Masson, G.M.: Spot me if you can: uncovering spoken phrases in encrypted voip conversations. In: IEEE Symposium on Security and Privacy, SP 2008, pp. 35\u201349. IEEE (2008)","DOI":"10.1109\/SP.2008.21"},{"key":"502_CR28","unstructured":"Wright, C.V., Coull, S.E., Monrose, F.: Traffic morphing: an efficient defense against statistical traffic analysis. In: NDSS (2009)"},{"key":"502_CR29","doi-asserted-by":"crossref","unstructured":"Zhang, F., He, W., Liu, X., Bridges, P.G.: Inferring users\u2019 online activities through traffic analysis. In: Proceedings of the fourth ACM Conference on Wireless Network Security, pp. 59\u201370. ACM (2011)","DOI":"10.1145\/1998412.1998425"},{"key":"502_CR30","doi-asserted-by":"crossref","unstructured":"Zhang, F., He, W., Liu, X.: Defending against traffic analysis in wireless networks through traffic reshaping. In: 31st International Conference on Distributed Computing Systems, pp. 593\u2013602. IEEE (2011)","DOI":"10.1109\/ICDCS.2011.77"},{"key":"502_CR31","unstructured":"Zhioua, S., Langar, M.: Traffic analysis of web browsers. In: Proceedings of the Formal Methods for Security Workshop (FMS 2014), pp. 20\u201333. CEUR Workshop Proceedings (2014)"}],"container-title":["Cluster Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-015-0502-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10586-015-0502-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-015-0502-4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,31]],"date-time":"2025-05-31T03:46:10Z","timestamp":1748663170000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10586-015-0502-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,10,24]]},"references-count":31,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2016,3]]}},"alternative-id":["502"],"URL":"https:\/\/doi.org\/10.1007\/s10586-015-0502-4","relation":{},"ISSN":["1386-7857","1573-7543"],"issn-type":[{"type":"print","value":"1386-7857"},{"type":"electronic","value":"1573-7543"}],"subject":[],"published":{"date-parts":[[2015,10,24]]}}}