FINDING · DETECTION

Censorship classifiers and traffic analysis attacks consistently exploit the initial seconds of a proxy connection, where packet-size, inter-arrival-time, and burst features are maximally discriminative. Cited work demonstrates that website fingerprinting classifiers trained solely on the first few seconds of Tor traffic achieve high accuracy, and real-world GFW detection of fully-encrypted protocols also targets early-connection bytes.

From 2025-pereira-extendedExtended Abstract: Traffic Shaping for Network Protocols: A Modular and Developer-Friendly Framework · §1 · 2025 · Free and Open Communications on the Internet

Implications

Tags

censors
cngeneric
techniques
traffic-shapewebsite-fingerprintml-classifierdpifully-encrypted-detect

Extracted by claude-sonnet-4-6 — review before relying.