DEFENSES

randomization   Traffic randomization / shaping

Hide the underlying protocol by deliberate randomization of size/timing/payload.

11 PAPERS ON FILE