A Comprehensive Survey of Website Fingerprinting Attacks and Defenses in Tor: Advances and Open Challenges

📅 2025-10-13
📈 Citations: 0
Influential: 0
📄 PDF
🤖 AI Summary
Tor is vulnerable to Website Fingerprinting (WFP) attacks—especially in open-world settings—with high accuracy, while existing defenses struggle to jointly optimize privacy, performance, and usability; moreover, no systematic survey exists. This paper first unifies WFP research into three core directions: dataset construction, attack modeling, and defense mechanisms. Through taxonomic classification and multi-dimensional comparative analysis—including threat models, feature granularity, and emerging challenges like multi-label browsing—we comprehensively evaluate the trade-offs of state-of-the-art methods. We propose the first holistic framework covering the full technical stack: machine learning–based detection, traffic shaping, adversarial perturbation, and adaptive padding. Our analysis identifies key bottlenecks and practical deployment constraints, and distills open problems and future research directions—providing both theoretical foundations and actionable guidance for enhancing Tor’s privacy guarantees.

Technology Category

Application Category

📝 Abstract
The Tor network provides users with strong anonymity by routing their internet traffic through multiple relays. While Tor encrypts traffic and hides IP addresses, it remains vulnerable to traffic analysis attacks such as the website fingerprinting (WF) attack, achieving increasingly high fingerprinting accuracy even under open-world conditions. In response, researchers have proposed a variety of defenses, ranging from adaptive padding, traffic regularization, and traffic morphing to adversarial perturbation, that seek to obfuscate or reshape traffic traces. However, these defenses often entail trade-offs between privacy, usability, and system performance. Despite extensive research, a comprehensive survey unifying WF datasets, attack methodologies, and defense strategies remains absent. This paper fills that gap by systematically categorizing existing WF research into three key domains: datasets, attack models, and defense mechanisms. We provide an in-depth comparative analysis of techniques, highlight their strengths and limitations under diverse threat models, and discuss emerging challenges such as multi-tab browsing and coarse-grained traffic features. By consolidating prior work and identifying open research directions, this survey serves as a foundation for advancing stronger privacy protection in Tor.
Problem

Research questions and friction points this paper is trying to address.

Surveying website fingerprinting attacks on Tor anonymity
Analyzing trade-offs in traffic obfuscation defense strategies
Identifying open challenges for Tor privacy protection
Innovation

Methods, ideas, or system contributions that make the work stand out.

Systematically categorizes website fingerprinting research domains
Compares techniques under diverse threat models comprehensively
Identifies emerging challenges for future privacy protection
🔎 Similar Papers
No similar papers found.
Y
Yuwen Cui
Bellini College of Artificial Intelligence, Cybersecurity and Computing, University of South Florida
G
Guangjing Wang
Bellini College of Artificial Intelligence, Cybersecurity and Computing, University of South Florida
K
Khanh Vu
Bellini College of Artificial Intelligence, Cybersecurity and Computing, University of South Florida
Kai Wei
Kai Wei
Amazon
Computational social scienceNLPSLU
K
Kehan Shen
Bellini College of Artificial Intelligence, Cybersecurity and Computing, University of South Florida
Zhengyuan Jiang
Zhengyuan Jiang
Duke University
AI SecuityContent Moderation
X
Xiao Han
Bellini College of Artificial Intelligence, Cybersecurity and Computing, University of South Florida
N
Ning Wang
Bellini College of Artificial Intelligence, Cybersecurity and Computing, University of South Florida
Zhuo Lu
Zhuo Lu
University of South Florida
Wireless Mobile SecurityData and AI SecurityIoT Security
Y
Yao Liu
Bellini College of Artificial Intelligence, Cybersecurity and Computing, University of South Florida