FINDING · DETECTION
CNN-based passive traffic analysis failed to deanonymize I2P services when transferred from a controlled lab to the public I2P network. Lab-trained models produced mostly unusable results: the 'Without port' variant misclassified Class 2 packets at 71.6–88.4× the true count, and the 'Without payload' variant was only marginally better (12.8–13.2× false positives), demonstrating that lab-learned patterns do not generalize to real-world I2P traffic.
From 2026-rohrer-convolutional-neural-networks-deanonymisation-i2p — Convolutional-Neural-Networks for Deanonymisation of I2P Traffic · §V Fourth Experiment / Table VIII · 2026 · arXiv preprint
Implications
- I2P's unidirectional tunnel architecture and mix-net design already provide strong resistance to CNN-based passive fingerprinting — circumvention tools adopting similar multi-hop, unidirectional tunnel designs inherit this robustness for free.
- High traffic heterogeneity in real-world deployments is itself a defense property; circumvention infrastructure should avoid homogeneous controlled environments that could simplify classifier training.
Tags
Extracted by claude-sonnet-4-6 — review before relying.