Research Article

Deep Nearest Neighbor Website Fingerprinting Attack Technology

Figure 1

The attacker can observe the encrypted communication between the user and the Tor network entrance when a user visits a website through the Tor network.