2020
DOI: 10.48550/arxiv.2008.03254
|View full text |Cite
Preprint
|
Sign up to set email alerts
|

Evaluating Snowflake as an Indistinguishable Censorship Circumvention Tool

Abstract: Tor is the most well-known tool for circumventing censorship. Unfortunately, Tor traffic has been shown to be detectable using deep-packet inspection. WebRTC is a popular web framework that enables browser-to-browser connections. Snowflake is a novel pluggable transport that leverages WebRTC to connect Tor clients to the Tor network. In theory, Snowflake was created to be indistinguishable from other WebRTC services.In this paper, we evaluate the indistinguishability of Snowflake. We collect over 6,500 DTLS ha… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
2
1

Relationship

1
2

Authors

Journals

citations
Cited by 3 publications
(3 citation statements)
references
References 4 publications
0
3
0
Order By: Relevance
“…Censors can distinguish tunneled streams carrying covert traffic from those that do not using basic traffic analysis [40] or more sophisticated machine learning techniques [12] that can even operate at line speed directly on network switches [13]. Common problems are that mismatches between the use of a tunnel and its covert protocol enable identification [34], particularly during protocol initialization as in the case of attacks on obfs4 [79] and Snowflake [49]. Active probing may also be used to identify systems whose response (or lack thereof) is distinguishing [24,27,32].…”
Section: Related Workmentioning
confidence: 99%
“…Censors can distinguish tunneled streams carrying covert traffic from those that do not using basic traffic analysis [40] or more sophisticated machine learning techniques [12] that can even operate at line speed directly on network switches [13]. Common problems are that mismatches between the use of a tunnel and its covert protocol enable identification [34], particularly during protocol initialization as in the case of attacks on obfs4 [79] and Snowflake [49]. Active probing may also be used to identify systems whose response (or lack thereof) is distinguishing [24,27,32].…”
Section: Related Workmentioning
confidence: 99%
“…In order to compare and determine the effectiveness of the method for identifying Snowflake traffic based on DTLS handshake fingerprinting features, we combined DTLS handshake traffic from other WebRTC applications collected during the study of Snowflake indistinguishable by K. MacMillan et al [36] with randomly selected flows from the Snowflake traffic we collected, formed a new WebRTC DTLS handshake fingerprint dataset. The effective traffic flow of the dataset is shown in Table 3.…”
Section: Measures Flowsmentioning
confidence: 99%
“…We leverage the Snowflake Fingerprintability dataset [48] to walkthrough pcapML. The dataset contains over 6,500 DTLS handshakes collected to evaluate the indistinguishability of Snowflake, a pluggable-transport for Tor that leverages WebRTC, with handshakes from other WebRTC applications: Facebook messenger, Google Hangouts, and Discord.…”
Section: Design and Usagementioning
confidence: 99%