FINDING · DEFENSE

Protocol Proxy uses 'protected static protocols' — UDP-based protocols whose blocking causes severe collateral damage (e.g., Synchrophasor power-grid traffic, NTP) — as cover channels. Because any detection rule that fires on Protocol Proxy traffic also fires on legitimate PMU traffic, censors face a forced trade-off between blocking circumvention and disrupting critical infrastructure.

From 2020-oakley-protocolProtocol Proxy: An FTE-based covert channel · §3, §5 · 2020 · Computers \& Security

Implications

Tags

censors
generic
techniques
dpitraffic-shape
defenses
format-transformmimicrysteganography

Extracted by claude-sonnet-4-6 — review before relying.