![]() divide approaches to censorship circumvention traffic into two types: steganograpic and polymorphic (see Section V and Table 3). The censor also allows a connection if its first six bytes are non-whitespace printable characters.The censor uses protocol fingerprinting to exempt connections from blocking if the first several bytes of the payload match common protocols (including TLS, HTTP, and SSH).GFW seems to censor connections whose payload contains less than 70% printable characters.While the traffic classification appears to be deterministic, the blocking is probabilistic. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |