FINDING · DEFENSE

The framework confines active traffic shaping to the first N seconds of a connection (N is a user-defined parameter, e.g., N=10), after which normal unmodified traffic resumes. The authors hypothesize that this design keeps per-session throughput and latency overhead negligible, since the shaping window is a small fraction of total connection time; N can be extended to the full session if the censor is believed capable of classifying beyond early traffic.

From 2025-pereira-extendedExtended Abstract: Traffic Shaping for Network Protocols: A Modular and Developer-Friendly Framework · §2.3, §3 · 2025 · Free and Open Communications on the Internet

Implications

Tags

censors
generic
techniques
traffic-shape
defenses
randomizationmeta-resistance

Extracted by claude-sonnet-4-6 — review before relying.