{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,14]],"date-time":"2025-05-14T02:41:37Z","timestamp":1747190497609,"version":"3.40.5"},"reference-count":32,"publisher":"Wiley","license":[{"start":{"date-parts":[[2021,10,4]],"date-time":"2021-10-04T00:00:00Z","timestamp":1633305600000},"content-version":"unspecified","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"National Key Research Projects","award":["2019QY1302","2019QY1305"],"award-info":[{"award-number":["2019QY1302","2019QY1305"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Security and Communication Networks"],"published-print":{"date-parts":[[2021,10,4]]},"abstract":"<jats:p>Website fingerprinting attacks allow attackers to determine the websites that users are linked to, by examining the encrypted traffic between the users and the anonymous network portals. Recent research demonstrated the feasibility of website fingerprinting attacks on Tor anonymous networks with only a few samples. Thus, this paper proposes a novel small-sample website fingerprinting attack method for SSH and Shadowsocks single-agent anonymity network systems, which focuses on analyzing homology relationships between website fingerprinting. Based on the latter, we design a Convolutional Neural Network-Bidirectional Long Short-Term Memory (CNN-BiLSTM) attack classification model that achieves 94.8% and 98.1% accuracy in classifying SSH and Shadowsocks anonymous encrypted traffic, respectively, when only 20 samples per site are available. We also highlight that the CNN-BiLSTM model has significantly better migration capabilities than traditional methods, achieving over 90% accuracy when applied on a new set of monitored sites with only five samples per site. Overall, our experiments demonstrate that CNN-BiLSTM is an efficient, flexible, and robust model for website fingerprinting attack classification.<\/jats:p>","DOI":"10.1155\/2021\/6070451","type":"journal-article","created":{"date-parts":[[2021,10,5]],"date-time":"2021-10-05T03:53:38Z","timestamp":1633406018000},"page":"1-14","source":"Crossref","is-referenced-by-count":4,"title":["Website Fingerprinting Attacks Based on Homology Analysis"],"prefix":"10.1155","volume":"2021","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-7990-4165","authenticated-orcid":true,"given":"Maohua","family":"Guo","sequence":"first","affiliation":[{"name":"State Key Laboratory of Mathematical Engineering and Advanced Computing, Zhengzhou 450002, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8499-9402","authenticated-orcid":true,"given":"Jinlong","family":"Fei","sequence":"additional","affiliation":[{"name":"State Key Laboratory of Mathematical Engineering and Advanced Computing, Zhengzhou 450002, China"}]}],"member":"311","reference":[{"key":"1","doi-asserted-by":"publisher","DOI":"10.2478\/popets-2021-0029"},{"key":"2","first-page":"5","article-title":"The utility of packet timing in website fingerprinting attacks","author":"M. S. Rahman","year":"2020"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3354217"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.2478\/popets-2019-0070"},{"first-page":"1928","article-title":"Deep fingerprinting: undermining website fingerprinting defenses with deep learning","author":"P. Sirinam","key":"5"},{"issue":"5","key":"6","doi-asserted-by":"crossref","first-page":"1081","DOI":"10.1109\/TIFS.2017.2762825","article-title":"Website fingerprinting attack on anonymity networks based on profile hidden Markov model","volume":"13","author":"Z. Zhuo","year":"2017","journal-title":"IEEE Transactions on Information Forensics and Security"},{"volume-title":"Automated Website Fingerprinting through Deep Learning","year":"2017","author":"V. Rimmer","key":"7"},{"first-page":"1187","article-title":"k-fingerprinting: A robust scalable website fingerprinting technique","author":"J. Hayes","key":"8"},{"key":"9","first-page":"15","article-title":"Fingerprinting attack on Tor anonymity using deep learning","volume":"42","author":"K. Abe","year":"2016","journal-title":"Proceedings of the Asia-Pacific Advanced Network"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1145\/2517840.2517851"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1007\/s11416-020-00353-z"},{"key":"12","first-page":"401","article-title":"I2P data communication system","volume-title":"Proceedings of ICN","author":"B. Zantout","year":"2011"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.21236\/ada465464"},{"issue":"9","key":"14","article-title":"The anonymizer-protecting user privacy on the web","volume":"4","author":"J. Boyan","year":"1997","journal-title":"Computer-Mediated Communication Magazine"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2016.23477"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1145\/2046556.2046570"},{"first-page":"31","article-title":"Website fingerprinting: attacking popular privacy enhancing technologies with the multinomial na\u00efve-bayes classifier","author":"D. Herrmann","key":"17"},{"author":"G. Koch","key":"18","article-title":"Siamese neural networks for one-shot image recognition"},{"volume-title":"Traffic Analysis of Ssl Encrypted Web Browsing","year":"1998","author":"H. Cheng","key":"19"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1109\/cvpr42600.2020.01222"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1109\/cvpr.2019.00743"},{"key":"22","first-page":"4077","article-title":"Prototypical networks for few-shot learning","volume-title":"Advances in Neural Information Processing Systems","author":"J. Snell","year":"2017"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1186\/s12859-017-1842-2"},{"first-page":"448","article-title":"Batch normalization: accelerating deep network training by reducing internal covariate shift","author":"S. Ioffe","key":"24"},{"key":"25","doi-asserted-by":"publisher","DOI":"10.1109\/icdsp.2017.8096153"},{"first-page":"19","article-title":"Statistical identification of encrypted web browsing traffic","author":"Q. Sun","key":"26"},{"key":"27","doi-asserted-by":"publisher","DOI":"10.4018\/978-1-60566-766-9.ch011"},{"key":"28","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-45744-4_2"},{"first-page":"1375","article-title":"Walkie-talkie: an efficient defense against passive website fingerprinting attacks","author":"T. Wang","key":"29"},{"first-page":"1971","article-title":"Trafficsliver: Fighting website fingerprinting attacks with traffic splitting","author":"W. D. L. Cadena","key":"30"},{"first-page":"717","article-title":"Zero-delay lightweight defenses against website fingerprinting","author":"J. Gong","key":"31"},{"key":"32","doi-asserted-by":"crossref","first-page":"1594","DOI":"10.1109\/TIFS.2020.3039691","article-title":"Mockingbird: defending against deep-learning-based website fingerprinting attacks with adversarial traces","volume":"16","author":"M. S. Rahman","year":"2020","journal-title":"IEEE Transactions on Information Forensics and Security"}],"container-title":["Security and Communication Networks"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2021\/6070451.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2021\/6070451.xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2021\/6070451.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,10,5]],"date-time":"2021-10-05T03:53:52Z","timestamp":1633406032000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.hindawi.com\/journals\/scn\/2021\/6070451\/"}},"subtitle":[],"editor":[{"given":"Weiwei","family":"Liu","sequence":"additional","affiliation":[]}],"short-title":[],"issued":{"date-parts":[[2021,10,4]]},"references-count":32,"alternative-id":["6070451","6070451"],"URL":"https:\/\/doi.org\/10.1155\/2021\/6070451","relation":{},"ISSN":["1939-0122","1939-0114"],"issn-type":[{"type":"electronic","value":"1939-0122"},{"type":"print","value":"1939-0114"}],"subject":[],"published":{"date-parts":[[2021,10,4]]}}}