FINDING · DETECTION
obfs4 and obfs⋆ produce characteristic wire patterns—bursts of roughly MTU-sized payloads followed by a randomly-sized chaff packet—that CNN classifiers detect purely from packet-size sequences without payload inspection. A trivial per-bridge entropy-biasing re-encoding (obfs⋆) completely defeats the hand-tuned decision tree (0% precision, 0% recall) but does not reduce CNN detectability, because the CNN generalizes across size-distribution variants.
From 2024-wails-precisely — On Precisely Detecting Censorship Circumvention in Real-World Networks · §V-E, §IV-D-3, Figure 4 · 2024 · Network and Distributed System Security
Implications
- Randomizing payload bytes is necessary but not sufficient; obfuscation protocols must also randomize packet sizes and inter-packet burst shapes to defeat CNN-based flow classifiers that operate on size sequences alone.
- Per-bridge packet-size diversity defeats protocol-specific hand-tuned classifiers but not generalizing deep learning models; polymorphic size/burst profiles that vary session-to-session are needed to reduce CNN confidence.
Tags
Extracted by claude-sonnet-4-6 — review before relying.