Research Article

Obfuscated Tor Traffic Identification Based on Sliding Window

Table 2

Analysis of obfuscated Tor traffic identification techniques.

ReferenceFeature selectionType of algorithm/methodTargetEvaluation metrics

Yao et al. [20]Interpacket time distribution; packet size distributionThe Mixture of Gaussians-based Hidden Markov ModelMeek-basedAccuracy; precision; recall; F1-Score
He et al. [21]TLS/SSL-related features; time-related features; packet size-related featuresSupport vector machineMeek-basedAccuracy; recall
Gao [22]Time-related features; packet size-related featuresSupport vector machine; randomness detectionObfs4-basedPrecision
Zhai [23]Time-related features; packet size-related featuresNaïve Bayes; C4.5; BayesNetFTE-basedPrecision; recall; F1-Score