FINDING · DETECTION
A censor can defeat the anomaly detector without triggering an alert by replacing blocked user traffic with synthetic requests from adversary-controlled machines, keeping per-jurisdiction connection counts within the typical range. The paper explicitly identifies this as an unaddressed active-attack vector.
From 2011-danezis-anomaly-based — An anomaly-based censorship-detection system for Tor · §6 · 2011 · The Tor Project
Implications
- Aggregate connection-count monitors are vulnerable to state-level traffic injection; supplement with per-bridge or per-relay behavioral signals that cannot be spoofed by substituting synthetic clients.
- Design detection systems to cross-validate connection counts against independent signals (e.g., bridge reachability probes, OONI data) to resist adversarial substitution.
Tags
Extracted by claude-sonnet-4-6 — review before relying.