We have freezed the repository with the source code that we used to collect data for our paper in ACM CCS’14 “A Critical Analysis of Website Fingerprinting Attacks” . The release is tagged in this repository.
The crawler can be used in the similar website fingerprinting studies. It uses Selenium to drive the Tor Browser and stem to control the tor. Our implementation started as a fork of tor-browser-selenium (by @isislovecruft).
For the crawl parameters such as
instance refer to the ACM WPES’13 paper by Wang and Goldberg.
- Linux packages:
python tcpdump wireshark Xvfb
- Python packages:
selenium requests stem psutil(version < 3) tld xvfbwrapper scapy
1. Configure the environment
We recommend running crawls in a VM or a container (e.g. LXC) to avoid perturbations introduced by the background network traffic and system level network settings. Please note that the crawler will not only store the Tor traffic but will capture all the network traffic generated during a visit to a website. That’s why it’s extremely important to disable all the automatic/background network traffic such as the auto-updates. See, for example the instructions for disabling automatic connections for Ubuntu.
You’ll need to set capture capabilities to your user:
sudo setcap 'CAP_NET_RAW+eip CAP_NET_ADMIN+eip' /usr/bin/dumpcap
Download the TBB and extract it to
You might want to change the MTU of your network interface and disable NIC offloads that might make the traffic collected by tcpdump look different from how it would have been seen on the wire.
Change MTU to standard ethernet MTU (1500 bytes):
sudo ifconfig <interface> mtu 1500
sudo ethtool -K <interface> tx off rx off tso off gso off gro off lro off
See the Wireshark Offloading page for more info.
2. Run a crawl with the defaults
python main.py -t WebFP -u ./etc/localized-urls-100-top.csv -c wang_and_goldberg
To get all the available command line parameters and the usage run:
python main.py --help
3. Check out the results
The collected data can be found in the
* Pcaps: `./results/latest` * Logs: `./results/latest_crawl_log`
Use Docker container
Install docker and start it.
Clone repository and change directory into it.
make run(or pass it the parameters, for example:
make run PARAMS="-t WebFP"
Sample crawl data
You can download a sample of data collected using this crawler with the configuration used by Wang and Goldberg in their WPES'13 paper (namely 10 batches, 100 pages and 4 instances per page) from here:
The crawl names include a timestamp. The list of crawls used in our study can be found in the appendix of the paper .
- Tested on Xubuntu 14.04 and Debian 7.8.
 M. Juarez, S. Afroz, G. Acar, C. Diaz, R. Greenstadt, “A Critical Analysis of Website Fingerprinting Attacks”, in the proceedings of the ACM Conference on Computer and Communications Security (CCS), pp. 263-274, ACM, 2014.
 T. Wang and I. Goldberg. “Improved Website Fingerprinting on Tor”, in the proceedings of the ACM Workshop on Privacy in the Electronic Society (WPES), pp. 201–212. ACM, 2013.