FINDING · EVALUATION
Unsupervised k-Means clustering on I2P traffic features (port, payload length, protocol type) produced no natural cluster structure — distortion decreased almost linearly with k showing no elbow point — confirming that I2P's obfuscation successfully destroys simple separable patterns that shallow classifiers rely on. CNNs were required to detect any signal at all.
From 2026-rohrer-convolutional-neural-networks-deanonymisation-i2p — Convolutional-Neural-Networks for Deanonymisation of I2P Traffic · §V First Experiment, Figure 12 · 2026 · arXiv preprint
Implications
- I2P-style protocol obfuscation raises the classifier complexity floor to deep learning — circumvention protocols should aim to defeat simple statistical classifiers as a baseline, forcing attackers toward CNNs whose generalization to real-world conditions is poor.
- Mixing TCP and UDP simultaneously (as I2P does) contributes to this non-separability and should be considered in pluggable transport design.
Tags
Extracted by claude-sonnet-4-6 — review before relying.