FINDING · DEFENSE
Spreading UDP datagrams across a randomized port range breaks traditional 5-tuple-based session tracking, randomizes per-port inter-arrival times, and reduces per-port throughput to a small fraction of the aggregate—making per-flow statistical analysis significantly harder. Critically, the number of random ports does not reduce aggregate throughput: GoHop measured 76.8 Mbps (1 port) versus 78.5 Mbps (100 ports) at the virtual NIC.
From 2014-wang-gohop — GoHop: Personal VPN to Defend from Censorship · §III.C, §V.A, Table II · 2014 · International Conference on Advanced Communication Technology
Implications
- Use UDP multi-port randomization to break 5-tuple session reconstruction at zero throughput cost; a range of ≥1,000 ports lowers per-port throughput enough to impede per-flow classifiers.
- This defense collapses if the adversary aggregates all flows within a detectable port range—obfuscate the range itself or inject noise traffic outside it to prevent range fingerprinting.
Tags
Extracted by claude-sonnet-4-6 — review before relying.