Essays about: "Website fingerprinting"
Showing result 1 - 5 of 6 essays containing the words Website fingerprinting.
-
1. Impact of fixed-rate fingerprinting defense on cloud gaming experience
University essay from Linköpings universitet/Institutionen för datavetenskapAbstract : Cloud gaming has emerged as a popular solution to meet the increasing hardware de-mands of modern video games, allowing players with dated or non-sufficient hardwareto access high-quality gaming experiences. However, the growing reliance on cloud ser-vices has led to heightened concerns regarding user privacy and the risk of fingerprintingattacks. READ MORE
-
2. Towards Realistic Datasets forClassification of VPN Traffic : The Effects of Background Noise on Website Fingerprinting Attacks
University essay from Karlstads universitet/Institutionen för matematik och datavetenskap (from 2013)Abstract : Virtual Private Networks (VPNs) is a booming business with significant margins once a solid user base has been established and big VPN providers are putting considerable amounts of money into marketing. However, there exists Website Fingerprinting (WF) attacks that are able to correctly predict which website a user is visiting based on web traffic even though it is going through a VPN tunnel. READ MORE
-
3. The Effect Background Traffic in VPNs has on Website Fingerprinting
University essay from Karlstads universitet/Institutionen för matematik och datavetenskap (from 2013)Abstract : Tor and VPNs are used by many to be anonymous and circumvent censorship on the Internet. Therefore, traffic analysis attacks that enable adversaries to link users to their online activities are a severe threat. READ MORE
-
4. Web browser privacy: Popular desktop web browsers ability to continuously spoof their fingerprint
University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskapAbstract : Background. Web tracking is a constant threat to our privacy when browsing the web. There exist multiple methods of tracking, but browser fingerprinting is more elusive and difficult to control. READ MORE
-
5. Evaluation of a Proposed Traffic-Splitting Defence for Tor : Using Directional Time and Simulation Against TrafficSliver
University essay from Karlstads universitet/Institutionen för matematik och datavetenskap (from 2013)Abstract : Tor is a Privacy-Enhancing Technology based on onion routing which lets its users browse the web anonymously. Even though the traffic is encrypted in multiple layers, traffic analysis can still be used to gather information from meta-data such as time, size, and direction of the traffic. READ MORE