Research Article
Obfuscated Tor Traffic Identification Based on Sliding Window
Table 2
Analysis of obfuscated Tor traffic identification techniques.
| Reference | Feature selection | Type of algorithm/method | Target | Evaluation metrics |
| Yao et al. [20] | Interpacket time distribution; packet size distribution | The Mixture of Gaussians-based Hidden Markov Model | Meek-based | Accuracy; precision; recall; F1-Score | He et al. [21] | TLS/SSL-related features; time-related features; packet size-related features | Support vector machine | Meek-based | Accuracy; recall | Gao [22] | Time-related features; packet size-related features | Support vector machine; randomness detection | Obfs4-based | Precision | Zhai [23] | Time-related features; packet size-related features | Naïve Bayes; C4.5; BayesNet | FTE-based | Precision; recall; F1-Score |
|
|