FINDING · DEFENSE

Against censors that detect blacklisted application protocols by examining only the first 30 packets of a flow (e.g., the technique in Wang et al. 2015), a single IP migration after 30 packets have been exchanged is sufficient to defeat detection while incurring minimal performance overhead—the client continues the connection normally on the new address.

From 2020-govil-mimiqMIMIQ: Masking IPs with Migration in QUIC · §5 · 2020 · Free and Open Communications on the Internet

Implications

Tags

censors
generic
techniques
dpitraffic-shapefully-encrypted-detect
defenses
randomization

Extracted by claude-sonnet-4-6 — review before relying.