FINDING · DEFENSE

All prior decoy routing systems (Cirripede, Telex, TapDance, Slitheen, Waterfall) require the DR to inspect every traversing flow — either all TCP SYN packets or all TLS flows — to identify DR requests, creating a privacy breach for non-DR users and a computational bottleneck. SiegeBreaker eliminates this by using an out-of-band email pre-registration (encrypted to the controller's 2048-bit RSA public key) that pins the controller's inspection rule to a single client-IP/OD-IP/ISN triple, so only authenticated potential DR flows are ever redirected.

From 2020-sharma-siegebreakerSiegeBreaker: An SDN Based Practical Decoy Routing System · §3, §4.3 · 2020 · Privacy Enhancing Technologies

Implications

Tags

censors
generic
techniques
dpi
defenses
meta-resistancetunneling

Extracted by claude-sonnet-4-6 — review before relying.