Encrypted channels expose only two statistical features to an external observer: packet sizes and inter-packet arrival times. Original Traffic Morphing (Wright et al. 2009) shaped only packet-size distributions, leaving inter-packet timing as an unobfuscated fingerprint identical to the source (Tor) distribution. SkypeMorph extends Traffic Morphing to jointly sample from nth-order conditional distributions of both packet sizes and inter-packet delays (tested up to n = 3), closing the timing gap.
From 2012-moghaddam-skypemorph — SkypeMorph: Protocol Obfuscation for Tor Bridges
· §4.3, §4.4
· 2012
· Computer and Communications Security
Implications
Any traffic-shaping layer must independently shape both packet sizes and inter-arrival times; omitting timing from the morphing matrix leaves a trivially detectable fingerprint even when sizes are correctly distributed.
Maintain empirical nth-order joint distributions (n ≥ 2) of the cover protocol so the oracle can condition each packet's timing and size on recent history, reproducing higher-order statistical patterns the censor may exploit.