FINDING · DEFENSE

Encrypted channels expose only two statistical features to an external observer: packet sizes and inter-packet arrival times. Original Traffic Morphing (Wright et al. 2009) shaped only packet-size distributions, leaving inter-packet timing as an unobfuscated fingerprint identical to the source (Tor) distribution. SkypeMorph extends Traffic Morphing to jointly sample from nth-order conditional distributions of both packet sizes and inter-packet delays (tested up to n = 3), closing the timing gap.

From 2012-moghaddam-skypemorphSkypeMorph: Protocol Obfuscation for Tor Bridges · §4.3, §4.4 · 2012 · Computer and Communications Security

Implications

Tags

techniques
traffic-shapedpi
defenses
randomizationmimicrymeta-resistance

Extracted by claude-sonnet-4-6 — review before relying.