Research Article
Website Fingerprinting Attacks Based on Homology Analysis
Table 2
Dataset used in the experiment.
| Name | Anonymous method | Training set | Test set | Purpose |
| SSH-200 | SSH | 200 × 20 | 200 × 5 | Close world | Shadowsocks-200 | Shadowsocks | 200 × 20 | 200 × 5 | Close world | SSH-2000 | SSH | N/A | 2000 × 1 | Open world | Shadowsocks-2000 | Shadowsocks | N/A | 2000 × 1 | Open world |
|
|