{"id":"https://openalex.org/W3109984884","doi":"https://doi.org/10.1155/2020/8850472","title":"Hidden Service Website Response Fingerprinting Attacks Based on Response Time Feature","display_name":"Hidden Service Website Response Fingerprinting Attacks Based on Response Time Feature","publication_year":2020,"publication_date":"2020-11-30","ids":{"openalex":"https://openalex.org/W3109984884","doi":"https://doi.org/10.1155/2020/8850472","mag":"3109984884"},"language":"en","primary_location":{"id":"doi:10.1155/2020/8850472","is_oa":true,"landing_page_url":"http://doi.org/10.1155/2020/8850472","pdf_url":"https://downloads.hindawi.com/journals/scn/2020/8850472.pdf","source":{"id":"https://openalex.org/S120683614","display_name":"Security and Communication Networks","issn_l":"1939-0114","issn":["1939-0114","1939-0122"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319869","host_organization_name":"Hindawi Publishing Corporation","host_organization_lineage":["https://openalex.org/P4310319869"],"host_organization_lineage_names":["Hindawi Publishing Corporation"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Security and Communication Networks","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"https://downloads.hindawi.com/journals/scn/2020/8850472.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5009458153","display_name":"Yitong Meng","orcid":"https://orcid.org/0000-0003-2736-232X"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Yitong Meng","raw_affiliation_strings":["State Key Laboratory of Mathematical Engineering and Advanced Computing, Zhengzhou 450001, China"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory of Mathematical Engineering and Advanced Computing, Zhengzhou 450001, China","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5027205215","display_name":"Jinlong Fei","orcid":"https://orcid.org/0000-0001-8499-9402"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Jinlong Fei","raw_affiliation_strings":["State Key Laboratory of Mathematical Engineering and Advanced Computing, Zhengzhou 450001, China"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory of Mathematical Engineering and Advanced Computing, Zhengzhou 450001, China","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5027205215"],"corresponding_institution_ids":[],"apc_list":{"value":2100,"currency":"USD","value_usd":2100},"apc_paid":{"value":2100,"currency":"USD","value_usd":2100},"fwci":0.4115,"has_fulltext":true,"cited_by_count":3,"citation_normalized_percentile":{"value":0.70884155,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":95},"biblio":{"volume":"2020","issue":null,"first_page":"1","last_page":"21"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9976000189781189,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":0.9961000084877014,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8703956604003906},{"id":"https://openalex.org/keywords/fingerprint","display_name":"Fingerprint (computing)","score":0.5484708547592163},{"id":"https://openalex.org/keywords/feature","display_name":"Feature (linguistics)","score":0.5328667163848877},{"id":"https://openalex.org/keywords/response-time","display_name":"Response time","score":0.527547299861908},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.5032467246055603},{"id":"https://openalex.org/keywords/network-packet","display_name":"Network packet","score":0.48777467012405396},{"id":"https://openalex.org/keywords/service","display_name":"Service (business)","score":0.47176507115364075},{"id":"https://openalex.org/keywords/server","display_name":"Server","score":0.45574143528938293},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.45119309425354004},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.40432918071746826},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.2694200277328491},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.10512754321098328}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8703956604003906},{"id":"https://openalex.org/C2777826928","wikidata":"https://www.wikidata.org/wiki/Q3745713","display_name":"Fingerprint (computing)","level":2,"score":0.5484708547592163},{"id":"https://openalex.org/C2776401178","wikidata":"https://www.wikidata.org/wiki/Q12050496","display_name":"Feature (linguistics)","level":2,"score":0.5328667163848877},{"id":"https://openalex.org/C19012869","wikidata":"https://www.wikidata.org/wiki/Q578372","display_name":"Response time","level":2,"score":0.527547299861908},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.5032467246055603},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.48777467012405396},{"id":"https://openalex.org/C2780378061","wikidata":"https://www.wikidata.org/wiki/Q25351891","display_name":"Service (business)","level":2,"score":0.47176507115364075},{"id":"https://openalex.org/C93996380","wikidata":"https://www.wikidata.org/wiki/Q44127","display_name":"Server","level":2,"score":0.45574143528938293},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.45119309425354004},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.40432918071746826},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.2694200277328491},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.10512754321098328},{"id":"https://openalex.org/C162324750","wikidata":"https://www.wikidata.org/wiki/Q8134","display_name":"Economics","level":0,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0},{"id":"https://openalex.org/C136264566","wikidata":"https://www.wikidata.org/wiki/Q159810","display_name":"Economy","level":1,"score":0.0}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.1155/2020/8850472","is_oa":true,"landing_page_url":"http://doi.org/10.1155/2020/8850472","pdf_url":"https://downloads.hindawi.com/journals/scn/2020/8850472.pdf","source":{"id":"https://openalex.org/S120683614","display_name":"Security and Communication Networks","issn_l":"1939-0114","issn":["1939-0114","1939-0122"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319869","host_organization_name":"Hindawi Publishing Corporation","host_organization_lineage":["https://openalex.org/P4310319869"],"host_organization_lineage_names":["Hindawi Publishing Corporation"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Security and Communication Networks","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:46b0ad2365f9431e88b407a971971fbf","is_oa":true,"landing_page_url":"https://doaj.org/article/46b0ad2365f9431e88b407a971971fbf","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by-sa","license_id":"https://openalex.org/licenses/cc-by-sa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Security and Communication Networks, Vol 2020 (2020)","raw_type":"article"},{"id":"pmh:oai:hindawi.com:10.1155/2020/8850472","is_oa":true,"landing_page_url":"https://doi.org/10.1155/2020/8850472","pdf_url":null,"source":{"id":"https://openalex.org/S4306400340","display_name":"Hindawi Journal of Chemistry (Hindawi)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I4210126990","host_organization_name":"Hindawi (United Kingdom)","host_organization_lineage":["https://openalex.org/I4210126990"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"Research Article"}],"best_oa_location":{"id":"doi:10.1155/2020/8850472","is_oa":true,"landing_page_url":"http://doi.org/10.1155/2020/8850472","pdf_url":"https://downloads.hindawi.com/journals/scn/2020/8850472.pdf","source":{"id":"https://openalex.org/S120683614","display_name":"Security and Communication Networks","issn_l":"1939-0114","issn":["1939-0114","1939-0122"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319869","host_organization_name":"Hindawi Publishing Corporation","host_organization_lineage":["https://openalex.org/P4310319869"],"host_organization_lineage_names":["Hindawi Publishing Corporation"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Security and Communication Networks","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W3109984884.pdf","grobid_xml":"https://content.openalex.org/works/W3109984884.grobid-xml"},"referenced_works_count":35,"referenced_works":["https://openalex.org/W1450140837","https://openalex.org/W1655958391","https://openalex.org/W2012210084","https://openalex.org/W2022586893","https://openalex.org/W2025309535","https://openalex.org/W2056132907","https://openalex.org/W2100136723","https://openalex.org/W2105486585","https://openalex.org/W2120702739","https://openalex.org/W2149280729","https://openalex.org/W2163007546","https://openalex.org/W2169178923","https://openalex.org/W2269460187","https://openalex.org/W2272516773","https://openalex.org/W2278335717","https://openalex.org/W2485000773","https://openalex.org/W2490879758","https://openalex.org/W2530437399","https://openalex.org/W2557890466","https://openalex.org/W2591712613","https://openalex.org/W2604754095","https://openalex.org/W2739484418","https://openalex.org/W2782688857","https://openalex.org/W2783301790","https://openalex.org/W2889182794","https://openalex.org/W2964602598","https://openalex.org/W2999498625","https://openalex.org/W3103367901","https://openalex.org/W4294065829","https://openalex.org/W4299319711","https://openalex.org/W6637080381","https://openalex.org/W6675565803","https://openalex.org/W6693823607","https://openalex.org/W6695009093","https://openalex.org/W6931904461"],"related_works":["https://openalex.org/W2388464034","https://openalex.org/W2533125852","https://openalex.org/W2140460949","https://openalex.org/W2105580438","https://openalex.org/W2057435755","https://openalex.org/W2018782216","https://openalex.org/W2949620858","https://openalex.org/W2770877918","https://openalex.org/W2070427278","https://openalex.org/W2099084456"],"abstract_inverted_index":{"It":[0],"has":[1],"been":[2],"shown":[3],"that":[4,180,244],"website":[5,28,118,138,222,246],"fingerprinting":[6,78,132,223],"attacks":[7,43,73],"are":[8,144,164],"capable":[9,201],"of":[10,14,30,53,58,77,107,156,173,183,202,236,252],"destroying":[11],"the":[12,15,18,27,31,51,75,104,108,128,148,170,174,181,193,226,234,249,253],"anonymity":[13],"communicator":[16],"at":[17],"traffic":[19,33],"level.":[20],"This":[21,231],"enables":[22],"local":[23],"attackers":[24],"to":[25,45,69,102,114,136,205],"infer":[26],"contents":[29],"encrypted":[32],"by":[34],"using":[35],"packet":[36],"statistics.":[37],"Previous":[38],"researches":[39],"on":[40,47,93,127,255],"hidden":[41,71,105,116,129],"service":[42,72,117,120,130],"tend":[44],"focus":[46],"active":[48],"attacks;":[49],"therefore,":[50],"reliability":[52],"attack":[54],"conditions":[55],"and":[56,97,122,151,166,185,198,217],"validity":[57],"test":[59],"results":[60,178,241],"cannot":[61],"be":[62],"fully":[63],"verified.":[64],"Hence,":[65],"it":[66,199],"is":[67,113,200],"necessary":[68],"reexamine":[70],"from":[74],"perspective":[76],"attacks.":[79],"In":[80,134],"this":[81],"paper,":[82],"we":[83,167],"propose":[84],"a":[85,214],"novel":[86],"Website":[87],"Response":[88],"Fingerprinting":[89],"(WRFP)":[90],"Attack":[91],"based":[92],"response":[94,109,131,209,237],"time":[95,238],"feature":[96],"extremely":[98],"randomized":[99],"tree":[100],"algorithm":[101],"analyze":[103],"information":[106],"fingerprint.":[110],"The":[111],"objective":[112],"monitor":[115],"pages,":[119],"types,":[121],"mounted":[123],"servers.":[124],"WRFP":[125,211],"relies":[126],"dataset.":[133],"addition":[135],"simulated":[137],"mirroring,":[139],"two":[140],"different":[141],"mounting":[142],"modes":[143],"taken":[145],"into":[146],"account,":[147],"same-source":[149],"server":[150,186],"multisource":[152],"server.":[153],"A":[154],"total":[155],"300,000":[157],"page":[158],"instances":[159],"within":[160],"30,000":[161],"domain":[162],"sites":[163],"collected,":[165],"comprehensively":[168],"evaluate":[169],"classification":[171,187],"performance":[172,196,229],"proposed":[175],"WRFP.":[176],"Our":[177,240],"show":[179],"TPR":[182],"webpages":[184],"remain":[188],"greater":[189],"than":[190,220],"93%":[191],"in":[192,208,225],"small-scale":[194],"closed-world":[195],"test,":[197],"tolerating":[203],"up":[204],"10%":[206],"fluctuations":[207],"time.":[210],"also":[212,232,242],"provides":[213],"higher":[215],"accuracy":[216],"computational":[218],"efficiency":[219],"traditional":[221],"classifiers":[224],"challenging":[227],"open-world":[228],"test.":[230],"indicates":[233],"importance":[235],"feature.":[239],"suggest":[243],"monitoring":[245],"types":[247],"improves":[248],"judgment":[250],"effect":[251],"classifier":[254],"subpages.":[256]},"counts_by_year":[{"year":2023,"cited_by_count":1},{"year":2021,"cited_by_count":2}],"updated_date":"2026-03-27T05:58:40.876381","created_date":"2025-10-10T00:00:00"}
