OnionPeeler: A Website Fingerprinting Attack Targeting Tor Onion Services
We utilized two onion website datasets. One dataset, a publicly available set provided by Overdorf et al., was collected from the second version of onion websites. You can access the original dataset through this link. We also offer our processed version of this dataset. The other dataset was collected by us from the third version of onion websites and has been processed into separate files, categorizing packet direction, TCP payload size, and packet arrival times. It can be accessed through the this link.
To be announced
The source code for this work has been made publicly available, and the associated research has been submitted for academic review to EAI SecureComm 2024. Please acknowledge the source when using or referencing this source code.