FINDING · DETECTION

CNN-based passive traffic analysis failed to deanonymize I2P services when transferred from a controlled lab to the public I2P network. Lab-trained models produced mostly unusable results: the 'Without port' variant misclassified Class 2 packets at 71.6–88.4× the true count, and the 'Without payload' variant was only marginally better (12.8–13.2× false positives), demonstrating that lab-learned patterns do not generalize to real-world I2P traffic.

From 2026-rohrer-convolutional-neural-networks-deanonymisation-i2pConvolutional-Neural-Networks for Deanonymisation of I2P Traffic · §V Fourth Experiment / Table VIII · 2026 · arXiv preprint

Implications

Tags

censors
generic
techniques
ml-classifiertraffic-shape
defenses
tor

Extracted by claude-sonnet-4-6 — review before relying.