Date of Award

6-2-2023

Document Type

Thesis

Degree Name

Computer Science, MS

First Advisor

Donghoon Kim

Committee Members

Hai Jiang; Hung-Chi Su

Call Number

LD 251 .A566t 2023 A45

Abstract

Website fingerprinting attacks have revealed a vulnerability in Tor's network. Previous studies have shown success rates against the V2 onion service network and the possibility of real-time fingerprinting. With the transition to V3 onion services, there has yet to be any recent research on the impact of these changes on website fingerprinting attacks and the feasibility of real-time fingerprinting attacks. This work consists of two experiments: A Comparative Study of Website Fingerprinting Attacks in V2 and V3 Onion Services of Tor Networks and Enhanced Real-Time Fingerprinting Attacks on Tor Networks. These experiments involve analyzing the differences between V2 and V3 onion services and the feasibility of real-time fingerprinting attacks by utilizing a reduced set of features that have already been proven effective. The results indicate that it is possible to maintain performance in terms of accuracy, precision, recall, f1-score, and training time by minimizing the number of features. The results also indicate that V3 is less secure than V2 in website fingerprinting attacks.

Rights Management

Creative Commons Attribution 4.0 International License
This work is licensed under a Creative Commons Attribution 4.0 International License.

Included in

Cybersecurity Commons

Share

COinS
 
 

To view the content in your browser, please download Adobe Reader or, alternately,
you may Download the file to your hard drive.

NOTE: The latest versions of Adobe Reader do not support viewing PDF files within Firefox on Mac OS and if you are using a modern (Intel) Mac, there is no official plugin for viewing PDF files within the browser window.