Search Mailing List Archives


Limit search to: Subject & Body Subject Author
Sort by: Reverse Sort
Limit to: All This Week Last Week This Month Last Month
Select Date Range     through    

[liberationtech] Obfuscation / Network Steganography Research

Tom Ritter tom at ritter.vg
Mon Nov 4 17:11:28 PST 2013


On 3 November 2013 23:29, Lucas Dixon <ldixon at google.com> wrote:
> I'm trying to put together a good reading and person list for what is
> currently known on network steganography (in particular, network traffic
> obfuscation):
>
> What are the methods by which one type of traffic can be distinguished from
> another, and how can one type of traffic be hidden as another. How much
> computation and extra bandwidth do you have to pay to make it how much
> harder to distinguish? And what's the current computation and memory
> capacity of DPI machines?


I would also check out:

http://defcon.org/html/links/dc-archives/dc-21-archive.html#Wiley
https://github.com/blanu/Dust

He's done a lot of testing on real world hardware to understand how
DPI distinguishes things and written tools to send traffic through
permuting it until it no longer matches.

-tom



More information about the liberationtech mailing list