“…These works have investigated both the selection of features (such as packet sizes, packet timings, direction of communication), as well as the design of classifiers (such as support vector machines, random forests, Naive Bayes) to make accurate predictions [10,29,35,36,37,45,46,53,60,66,67,73,88,89,93]. In response, several defense mechanisms have been proposed in the literature [11,12,15,63,90]. The common idea behind these defenses is to inject random delays and spurious cover traffic to perturb the traffic features and therefore obfuscate users' communications.…”