Research Article
PF : Website Fingerprinting Attack Using Probabilistic Topic Model
Table 4
Accuracy in a closed-world scenario on the AleSS287’s defended datasets.
| Attack on the probabilistic dummy packet defense |
| Attacks | | | | | | | | | | | | PF | 95.73 | 90.67 | 80.65 | 72.99 | 62.53 | 55.66 | 42.59 | 39.55 | 34.05 | 26.22 | 23.17 | PHMM | 62.89 | 60.10 | 55.92 | 52.79 | 43.72 | 34.15 | 24.04 | 11.15 | 5.74 | 2.96 | 1.92 | DF | 86.41 | 18.03 | 1.22 | 0.53 | 0.53 | 0.53 | 0.53 | 0.35 | 0.35 | 0.35 | 0.35 |
| Attack on the probabilistic MTU padding defense | Attacks | | | | | | | | | | | | PF | 95.73 | 94.68 | 93.99 | 93.03 | 90.06 | 89.72 | 84.64 | 76.04 | 63.93 | 32.93 | 0.78 | PHMM | 62.89 | 61.84 | 58.01 | 56.97 | 50.17 | 38.15 | 26.13 | 8.36 | 1.90 | 0.17 | 0 |
|
|