Research Article

Defending against Deep-Learning-Based Flow Correlation Attacks with Adversarial Examples

Algorithm 1

Traffic consensus generate algorithm.
Input: Cycle , Time , Website Groups , Traffic File , Adversarial Samples Method
Output: Traffic consensus
(1)While %  = = 0
(2)For website in do
(3)If is live then
(4)  Dump from ingress and egress Tor flows
(5)  Extract traffic characteristics from
(6)  Adversarial samples  =  ()
(7)  Write S to the traffic consensus {}
(8)Else
(9)  Continue
(10)End if
(11)End while