- A crawler implementation that can collect the website traffic with different browser settings
- A naive browser classifier implementation to predict the Tor browser version and security setting given network traffic
- Code for feature extraction given the raw network pcap file
- Verification regarding Tor browser settings' impacts on network traffic patterns
version and security setting datasets are included in the link
$ change code/Config.py(torbrowser directory to either torbrowser_902 | torbrowser_806 | torbrowser_752)
$ change Dockerfile, change argument in code/setup.sh to the specific torbrowser version
$ docker build -t <imageName> .
$ ./run.sh <image_name> <container_name> <outputdir>(volume)
$ cd code
$ pip3 install -r requirements.txt
$ python3 FeatureExtract.py -i <TrafficDir> -o <outputdir>
<TrafficDir>: in csv form(the output of pcapParser)
$ cd code/
$ pip3 install -r requirements.txt
$ cd code/browserclassifier/
$ pip3 install -r mlrequirements.txt
$ configure the MLConfig.py
$ python3 browserClassifier.py -i <Traffic feature dir, the outputdir of feature extraction> -o <outputdir>