FINDING · DEFENSE

To match legitimate user behavior, the Camouflage dispatcher enforces empirically derived per-protocol session time limits: email 1–3 minutes, file sharing 5–10 minutes, instant messaging 15–20 minutes, and VoIP 20–30 minutes (Table 1). Sessions exceeding these windows produce a detectable deviation from population-level usage norms.

From 2016-zarras-leveragingLeveraging Internet Services to Evade Censorship · §5.2, Table 1 · 2016 · Information Security Conference

Implications

Tags

censors
generic
techniques
traffic-shape
defenses
meta-resistancetunneling

Extracted by claude-sonnet-4-6 — review before relying.