Research Article

MSFA: Multiple System Fingerprint Attack Scheme for IoT Anonymous Communication

Table 5

The partial traffic of Amazon site.

1Upstream-68-68-68-68-68-68-68-68-1416-68-68-68-68
Downstream68686116861168611686111416141614161416

2Upstream-68-68-68-68-68-68-68-68-1026-68-68-68-68
Downstream686116116868611141614169991416999141680568

3Upstream-611-68-611-68-611-68-1416-1416-1416-68-68-611-611
Downstream6861114161416141614166861168141629114161416

4Upstream-68-68-68-1416-68-68-68-68-68-68-68-68-68
Downstream68-611611112561111256111416141614161416681416

5Upstream-68-863-68-68-68-68-68-68-68-1416-611-68-68
Downstream11256811251416141614161416141614161416141614161416

6Upstream-68-68-68-611-68-611-68-291-1416-68-68-572-68
Downstream6868686116814161416141614161416141614161416

7Upstream-1416-1416-68-68-1416-1416-805-1416-1416-80-1416-1416-1416
Downstream686868611141614161416141614161416141614161416

8Upstream-68-68-68-68-68-68-68-68-68-68-68-68-68
Downstream686116116861168611141614161416141638868

9Upstream-68-68-68-68-68-68-68-68-68-68-68-68-68
Downstream68686111416141614161416681416141614165141416

10Upstream-68-68-68-80-68-68-68-68-68-68-68-68-68
Downstream68-611611686111125611141614161416141668611