FINDING · DETECTION
Geneva packet-manipulation probing traffic exhibits distinctive features — corrupt data-offset fields, smaller packet sizes, overlapping TCP segments, TTL variance, and non-zero SYN packets — that allow simple ML classifiers (Decision Trees, Random Forests, Logistic Regression, SVM) to detect it with AUC > 0.99. A subsequent TRW-based IP-level detector can then block the source IP with high confidence after inspecting only 2 Geneva probing flows.
From 2023-amich-deresistor — DeResistor: Toward Detection-Resistant Probing for Evasion of Internet Censorship · §4.1–§4.2 · 2023 · USENIX Security Symposium
Implications
- Packet-manipulation strategy generators must minimize deviations in TCP header fields (data-offset, checksum, TTL, SYN options) from baseline benign traffic to avoid flow-level ML fingerprinting during the censor-probing phase.
- Any tool that probes a censor repeatedly from the same IP is at risk of sequential-hypothesis-test IP blocking after as few as 2 anomalous flows — probing infrastructure should rotate source IPs or distribute probes across nodes.
Tags
Extracted by claude-sonnet-4-6 — review before relying.