Research Article

Hidden Service Website Response Fingerprinting Attacks Based on Response Time Feature

Algorithm 2

Response time measurement algorithm.
Input: the continuous incoming and outgoing TCP packet collection (T), response time frequency bins (RT_Bins)
Output: Response time (ΔRT), response time frequency array (ΔRT.F)
Steps:
(1)   
(2)  
(3)   
(4)    
(5)    
(6)    
(7)   
(8)  
(9)  
(10)
(11)  
(12)   
(13)  
(14)  
(15)  
(16)