Website fingerprinting attack on Psiphon and its forensic analysis

Tekachew Gobena Ejeta, Hyong Joong Kim

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2 Citations (Scopus)


Internet circumvention applications – such as Psiphon – are widely used to bypass control mechanisms, and each of such anti-censorship application uses a unique mechanism to bypass internet censorship. Although anti-censorship applications provide a unique means to ensure internet freedom, some applications severely degrade network performance and possibly open the door for network security breaches. Anti-censorship applications such as Psiphon can be used as cover for hacking attempts and can assist in many criminal activities. In this paper, we analyze the Psiphon service and perform a passive traffic analysis to detect Psiphon traffic. Moreover, we profile the top 100 websites based on their Alexa rankings according to five different categories under Psiphon and perform an effective website fingerprinting attack. Our analysis uses the well-known k-nearest neighbors for website fingerprinting and support vector machine classifier to detect Psiphon traffic.

Original languageEnglish
Title of host publicationDigital Forensics and Watermarking - 16th International Workshop, IWDW 2017, Proceedings
PublisherSpringer Verlag
Number of pages10
Volume10431 LNCS
ISBN (Print)9783319641843
Publication statusPublished - 2017
Event16th International Workshop on Digital Forensics and Watermarking, IWDW 2017 - Magdeburg, Germany
Duration: 2017 Aug 232017 Aug 25

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume10431 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349


Other16th International Workshop on Digital Forensics and Watermarking, IWDW 2017


  • Digital forensics
  • Fingerprinting attack
  • Internet censorship
  • Psiphon

ASJC Scopus subject areas

  • Theoretical Computer Science
  • Computer Science(all)

Fingerprint Dive into the research topics of 'Website fingerprinting attack on Psiphon and its forensic analysis'. Together they form a unique fingerprint.

Cite this