FINDING · DETECTION

A single-protocol circumvention system creates a detectable anomaly: when the system is active, the traffic pattern on that protocol diverges from the same user's baseline behavior, which anomaly-based detectors can classify. Users who also legitimately use the tunneled service in daily life produce two distinct signatures — one with and one without the circumvention layer — further compounding detectability.

From 2016-zarras-leveragingLeveraging Internet Services to Evade Censorship · §5.2 · 2016 · Information Security Conference

Implications

Tags

censors
generic
techniques
traffic-shapeml-classifier
defenses
meta-resistance

Extracted by claude-sonnet-4-6 — review before relying.