Research Article

Hidden Service Website Response Fingerprinting Attacks Based on Response Time Feature

Algorithm 1

Algorithm of website mounting.
Input: Mounted website collection (Webm), website public information (Webopen), website privacy information (Webprivacy), website configuration (CF), and website data space (DS)
Output: Server scenario (Sce)
Steps:
(1)
(2)
(3)
(4)
(5)
(6)  
(7)   
(8)   
(9)    
(10)   end if
(11)  end if
(12)
(13)   
(14)  
(15)
(16)end for