FINDING · EVALUATION
Table 1 shows Slitheen is the first decoy routing system to simultaneously defend against latency analysis, website fingerprinting, and protocol fingerprinting attacks, while also resisting TCP replay and Crazy Ivan active attacks. This security is achieved at the cost of requiring symmetric flows and inline blocking—requirements previously considered prohibitive—which the authors argue are increasingly met by commercial DPI traffic-shaping appliances (e.g., Sandvine) already deployed by ISPs.
From 2016-bocovich-slitheen — Slitheen: Perfectly Imitated Decoy Routing through Traffic Replacement · §4.5, Table 1 · 2016 · Computer and Communications Security
Implications
- The security-versus-deployability trade-off in decoy routing is not fixed: ISP-grade DPI boxes that already support inline flow modification and forced symmetry lower the deployment barrier for high-security, blocking-capable relay designs.
- Designs that sacrifice latency/fingerprinting resistance to avoid inline blocking (e.g., TapDance) gain deployability at the cost of being trivially detectable by a censor with basic traffic analysis capability.
Tags
Extracted by claude-sonnet-4-6 — review before relying.