FINDING · DEFENSE

Observation-based FTE constructs each packet field exclusively from values previously observed in real host-protocol traffic, guaranteeing syntactic equivalence. Wireshark correctly decodes Protocol Proxy-generated packets as valid Synchrophasor frames with correct checksums, and the Phasor Data Concentrator hardware accepts them; any rule blocking Protocol Proxy traffic must therefore also block legitimate PMU packets.

From 2020-oakley-protocolProtocol Proxy: An FTE-based covert channel · §5.1, §7 · 2020 · Computers \& Security

Implications

Tags

censors
generic
techniques
dpi
defenses
format-transformmimicry

Extracted by claude-sonnet-4-6 — review before relying.