{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,21]],"date-time":"2026-04-21T14:52:38Z","timestamp":1776783158082,"version":"3.51.2"},"reference-count":43,"publisher":"Wiley","license":[{"start":{"date-parts":[[2021,7,14]],"date-time":"2021-07-14T00:00:00Z","timestamp":1626220800000},"content-version":"unspecified","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"National Key R&D Program of China","award":["2019QY1302"],"award-info":[{"award-number":["2019QY1302"]}]},{"name":"National Key R&D Program of China","award":["2019QY1305"],"award-info":[{"award-number":["2019QY1305"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Security and Communication Networks"],"published-print":{"date-parts":[[2021,7,14]]},"abstract":"<jats:p>By website fingerprinting (WF) technologies, local listeners are enabled to track the specific website visited by users through an investigation of the encrypted traffic between the users and the Tor network entry node. The current triplet fingerprinting (TF) technique proved the possibility of small sample WF attacks. Previous research methods only concentrate on extracting the overall features of website traffic while ignoring the importance of website local fingerprinting characteristics for small sample WF attacks. Thus, in the present paper, a deep nearest neighbor website fingerprinting (DNNF) attack technology is proposed. The deep local fingerprinting features of websites are extracted via the convolutional neural network (CNN), and then the k-nearest neighbor (k-NN) classifier is utilized to classify the prediction. When the website provides only 20 samples, the accuracy can reach 96.2%. We also found that the DNNF method acts well compared to the traditional methods in coping with transfer learning and concept drift problems. In comparison to the TF method, the classification accuracy of the proposed method is improved by 2%\u20135% and it is only dropped by 3% when classifying the data collected from the same website after two months. These experiments revealed that the DNNF is a more flexible, efficient, and robust website fingerprinting attack technology, and the local fingerprinting features of websites are particularly important for small sample WF attacks.<\/jats:p>","DOI":"10.1155\/2021\/5399816","type":"journal-article","created":{"date-parts":[[2021,7,15]],"date-time":"2021-07-15T19:20:09Z","timestamp":1626376809000},"page":"1-14","source":"Crossref","is-referenced-by-count":11,"title":["Deep Nearest Neighbor Website Fingerprinting Attack Technology"],"prefix":"10.1155","volume":"2021","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-7990-4165","authenticated-orcid":true,"given":"Maohua","family":"Guo","sequence":"first","affiliation":[{"name":"State Key Laboratory of Mathematical Engineering and Advanced Computing, Zhengzhou 450002, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8499-9402","authenticated-orcid":true,"given":"Jinlong","family":"Fei","sequence":"additional","affiliation":[{"name":"State Key Laboratory of Mathematical Engineering and Advanced Computing, Zhengzhou 450002, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2736-232X","authenticated-orcid":true,"given":"Yitong","family":"Meng","sequence":"additional","affiliation":[{"name":"State Key Laboratory of Mathematical Engineering and Advanced Computing, Zhengzhou 450002, China"}]}],"member":"311","reference":[{"key":"1","doi-asserted-by":"publisher","DOI":"10.1145\/3278532.3278549"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.2478\/popets-2020-0043"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.2478\/popets-2020-0013"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1155\/2020\/8850472"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3354217"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.2478\/popets-2019-0070"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2019.09.008"},{"key":"8","first-page":"1928","article-title":"Deep fingerprinting: undermining website fingerprinting defenses with deep learning","author":"P. Sirinam"},{"issue":"5","key":"9","doi-asserted-by":"crossref","first-page":"1081","DOI":"10.1109\/TIFS.2017.2762825","article-title":"Website fingerprinting attack on anonymity networks based on profile hidden Markov model","volume":"13","author":"Z. Zhuo","year":"2017","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"10","article-title":"Automated website fingerprinting through deep learning","author":"V. Rimmer","year":"2017"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1145\/2046556.2046570"},{"key":"12","first-page":"143","article-title":"Effective attacks and provable defenses for website fingerprinting","author":"T. Wang"},{"key":"13","first-page":"1187","article-title":"k-fingerprinting: a robust scalable website fingerprinting technique","author":"J. Hayes"},{"key":"14","first-page":"149","article-title":"Adaptive fingerprinting: website fingerprinting over few encrypted traffic","author":"C. Wang"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2019.03.019"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1007\/s10586-017-0955-8"},{"key":"17","first-page":"171","article-title":"Fingerprinting websites using traffic analysis","author":"A. Hintz"},{"key":"18","first-page":"1","article-title":"Privacy vulnerabilities in encrypted HTTP streams","author":"G. D. Bissias"},{"key":"19","first-page":"19","article-title":"Statistical identification of encrypted web browsing traffic","author":"Q. Sun"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1093\/comjnl\/bxr065"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1145\/1180405.1180437"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1109\/infcom.2012.6195628"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-15497-3_13"},{"key":"24","first-page":"31","article-title":"Website fingerprinting: attacking popular privacy enhancing technologies with the multinomial Na\u00efve-Bayes classifier","author":"D. Herrmann"},{"key":"25","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2016.23477"},{"key":"26","first-page":"1962","article-title":"Deepcorr: strong flow correlation attacks on tor using deep learning","author":"M. Nasr"},{"key":"27","first-page":"15","article-title":"Fingerprinting attack on tor anonymity using deep learning","volume":"42","author":"K. Abe","year":"2016","journal-title":"Proceedings of the Asia-Pacific Advanced Network"},{"key":"28","doi-asserted-by":"publisher","DOI":"10.2478\/popets-2019-0043"},{"key":"29","doi-asserted-by":"publisher","DOI":"10.1145\/2517840.2517851"},{"key":"30","first-page":"4077","article-title":"Prototypical networks for few-shot learning","volume-title":"Advances in Neural Information Processing Systems","author":"J. Snell","year":"2017"},{"key":"31","doi-asserted-by":"publisher","DOI":"10.1109\/cvpr.2018.00131"},{"key":"32","doi-asserted-by":"publisher","DOI":"10.1109\/cvpr42600.2020.01222"},{"key":"33","doi-asserted-by":"publisher","DOI":"10.1109\/cvpr42600.2020.00419"},{"key":"34","doi-asserted-by":"publisher","DOI":"10.1109\/cvpr.2019.00743"},{"key":"35","first-page":"1","article-title":"In defense of nearest-neighbor based image classification","author":"O. Boiman"},{"key":"36","doi-asserted-by":"publisher","DOI":"10.1109\/cvpr.2015.7298594"},{"key":"37","doi-asserted-by":"publisher","DOI":"10.1109\/cvpr.2014.220"},{"key":"38","article-title":"Layer normalization","author":"J. L. Ba","year":"2016"},{"key":"39","first-page":"448","article-title":"Batch normalization: accelerating deep network training by reducing internal covariate shift","author":"S. Ioffe"},{"key":"40","first-page":"1","article-title":"Dilated convolution neural network with LeakyReLU for environmental sound classification","author":"X. Zhang"},{"key":"41","doi-asserted-by":"crossref","first-page":"242","DOI":"10.4018\/978-1-60566-766-9.ch011","article-title":"Transfer learning","volume-title":"Handbook of Research on Machine Learning Applications and Trends: Algorithms, Methods, and Techniques","author":"L. Torrey","year":"2010"},{"key":"42","volume-title":"The Problem of Concept Drift: Definitions and Related Work","author":"A. Tsymbal","year":"2004"},{"key":"43","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660368"}],"container-title":["Security and Communication Networks"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2021\/5399816.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2021\/5399816.xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2021\/5399816.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,7,15]],"date-time":"2021-07-15T19:20:28Z","timestamp":1626376828000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.hindawi.com\/journals\/scn\/2021\/5399816\/"}},"subtitle":[],"editor":[{"given":"Weizhi","family":"Meng","sequence":"additional","affiliation":[]}],"short-title":[],"issued":{"date-parts":[[2021,7,14]]},"references-count":43,"alternative-id":["5399816","5399816"],"URL":"https:\/\/doi.org\/10.1155\/2021\/5399816","relation":{},"ISSN":["1939-0122","1939-0114"],"issn-type":[{"value":"1939-0122","type":"electronic"},{"value":"1939-0114","type":"print"}],"subject":[],"published":{"date-parts":[[2021,7,14]]}}}