FINDING · DETECTION

Geddes et al. demonstrated that acknowledgement packets in covert-channel circumvention systems can be identified through timing characteristics and selectively interfered with to disrupt the tunnel [§4.3, CCS 2013]. A Turbo Tunnel session layer adds fixed-overhead headers and periodic ACK/keepalive traffic that may produce distinctive timing patterns absent in legitimate flows, potentially increasing susceptibility to traffic-shape classifiers.

From 2020-fifield-turboTurbo Tunnel, a good way to design censorship circumvention protocols · §2 · 2020 · Free and Open Communications on the Internet

Implications

Tags

censors
generic
techniques
traffic-shape
defenses
meta-resistance

Extracted by claude-sonnet-4-6 — review before relying.