Website fingerprinting attacks, which use statistical analysis on network traffic to compromise user privacy, have been shown to be effective even if the traffic is sent over anonymity-preserving networks such as Tor. The classical attack model used to evaluate website fingerprinting attacks assumes an on-path adversary, who can observe all traffic traveling between the user's computer and the secure network.

Instructions: 

Untar the data.Every directory means different settings of the data collection:

Javascript collected data:

linux_chrome: the data was collected on linux OS using chrome browser.

linux_ff59:the data was collected on linux OS using  firefox browser.

linux_tor:the data was collected on linux OS using  Tor browser.

win_chrome:  the data was collected on windows10 OS using chrome browser.

win_ff59:the data was collected on windows10 oS using firefox browser.

mac_safari: the data was collected on Mac machine using safari browser.

linux_tor_counter    :the data was collected on linux OS using  Tor browser while running countermeasures.

CW: closed worls detting , every website appear several times.

OW: open worls setting, every website appear only one (or very few) times.

 

Use the following online colab script to run the test set on the classifiers;

https://colab.research.google.com/drive/1UgbqVvoEjpG61c1CYbKdjZz8kQKHGlgU

 

 

 

Categories:
613 Views

Data for the article in the Transactions on Industrial Informatics

Categories:
140 Views

The steganography and steganalysis of audio, especially compressed audio, have drawn increasing attention in recent years, and various algorithms are proposed. However, there is no standard public dataset for us to verify the efficiency of each proposed algorithm. Therefore, to promote the study field, we construct a dataset including 33038 stereo WAV audio clips with a sampling rate of 44.1 kHz and duration of 10s. And, all audio files are from the Internet through data crawling, which is for a better simulation of a real detection environment.

Categories:
1474 Views

The data contains BTC Blockchain ledger of 100M, from February 3, 2009 to April 25, 2011. It also includes analysis results of the ledger: 10 characteristic indicators and 2 money laundering models.

Categories:
356 Views

This work intend to identify characteristics in network traffic that are able to distinguish the normal network behavior from denial of service attacks. One way to classify anomalous traffic is the data analysis of the packets header. This dataset contains labeled examples of normal traffic (23.088 instances), TCP Flood attacks (14.988 instances), UDP Flood (6.894 instances), HTTP Flood (347 instances) and HTTP Slow (183 instances) distributed in 73 numeric variables.

Categories:
596 Views

This dataset is benchmark dataset we use in our research for Intrusion Detection System.

Categories:
525 Views

Spectroreflectometric techniques for dactiloscopy and optical nail diagnostics are proposed and aproved on "DATACOLOR 3890"-based measuring system.

Categories:
114 Views

OWL file of PLATONT onotology and a sysml file of a reconstrcted architecure of a Raspberry-pi platform.

Categories:
97 Views

This Data provides a report on the number of Cyberattacks received by Zapaat Search Engine - the server being hosted in India. A list of offending IP addresses is also provided.

Categories:
381 Views

This dataset provides the source data for the figures and tables found in the paper "Elliptic Curve Lightweight Cryptography: a Survey."

Categories:
310 Views

Pages