Research Article

Obfuscated Tor Traffic Identification Based on Sliding Window

Figure 4

The process of feature extraction. First, we split the TCP flow into sets of packets. Then for each packet in each packet set, we extract its inner-packet interval, packet size, and direction. At last, we calculate 12 features of each packet set.