Date of Award
6-2-2023
Document Type
Thesis
Degree Name
Computer Science, MS
First Advisor
Donghoon Kim
Committee Members
Hai Jiang; Hung-Chi Su
Call Number
LD 251 .A566t 2023 A45
Abstract
Website fingerprinting attacks have revealed a vulnerability in Tor's network. Previous studies have shown success rates against the V2 onion service network and the possibility of real-time fingerprinting. With the transition to V3 onion services, there has yet to be any recent research on the impact of these changes on website fingerprinting attacks and the feasibility of real-time fingerprinting attacks. This work consists of two experiments: A Comparative Study of Website Fingerprinting Attacks in V2 and V3 Onion Services of Tor Networks and Enhanced Real-Time Fingerprinting Attacks on Tor Networks. These experiments involve analyzing the differences between V2 and V3 onion services and the feasibility of real-time fingerprinting attacks by utilizing a reduced set of features that have already been proven effective. The results indicate that it is possible to maintain performance in terms of accuracy, precision, recall, f1-score, and training time by minimizing the number of features. The results also indicate that V3 is less secure than V2 in website fingerprinting attacks.
Rights Management
This work is licensed under a Creative Commons Attribution 4.0 International License.
Recommended Citation
Akinyemi, Olusegun, "V3 Onion Service Vulnerability on Website Fingerprinting" (2023). Student Theses and Dissertations. 192.
https://arch.astate.edu/all-etd/192