Research Article
Obfuscated Tor Traffic Identification Based on Sliding Window
Figure 4
The process of feature extraction. First, we split the TCP flow into sets of packets. Then for each packet in each packet set, we extract its inner-packet interval, packet size, and direction. At last, we calculate 12 features of each packet set.