Research Article
Obfuscated Tor Traffic Identification Based on Sliding Window
Figure 5
Architecture of traffic collection. We used six servers to collect obfuscated Tor traffic. We deployed Meek-based, Obfs4-based, and FTE-based Tor clients on these servers, two for each type. In addition, we uploaded data to a data center each day.