FINDING · DETECTION
Censorship classifiers and traffic analysis attacks consistently exploit the initial seconds of a proxy connection, where packet-size, inter-arrival-time, and burst features are maximally discriminative. Cited work demonstrates that website fingerprinting classifiers trained solely on the first few seconds of Tor traffic achieve high accuracy, and real-world GFW detection of fully-encrypted protocols also targets early-connection bytes.
From 2025-pereira-extended — Extended Abstract: Traffic Shaping for Network Protocols: A Modular and Developer-Friendly Framework · §1 · 2025 · Free and Open Communications on the Internet
Implications
- Prioritize obfuscating traffic features in the first 10–30 seconds of any proxy connection; per-session full shaping is costly, but early-window shaping captures most of the classifier's signal.
- Test circumvention tools specifically against classifiers trained on early-session windows, not just full-session traffic traces.
Tags
Extracted by claude-sonnet-4-6 — review before relying.