Research Article

Hidden Service Website Response Fingerprinting Attacks Based on Response Time Feature

Figure 2

Website fingerprinting attack and defense data traffic. (a) Original encrypted communication data traffic. (b) Fingerprinting defense deformed data traffic.
(a)
(b)