Research Article

Website Fingerprinting Attacks Based on Homology Analysis

Table 2

Dataset used in the experiment.

NameAnonymous methodTraining setTest setPurpose

SSH-200SSH200 × 20200 × 5Close world
Shadowsocks-200Shadowsocks200 × 20200 × 5Close world
SSH-2000SSHN/A2000 × 1Open world
Shadowsocks-2000ShadowsocksN/A2000 × 1Open world