Research Article
Hidden Service Website Response Fingerprinting Attacks Based on Response Time Feature
Figure 2
Website fingerprinting attack and defense data traffic. (a) Original encrypted communication data traffic. (b) Fingerprinting defense deformed data traffic.
(a) |
(b) |