On 3 November 2013 23:29, Lucas Dixon <[email protected]> wrote: > I'm trying to put together a good reading and person list for what is > currently known on network steganography (in particular, network traffic > obfuscation): > > What are the methods by which one type of traffic can be distinguished from > another, and how can one type of traffic be hidden as another. How much > computation and extra bandwidth do you have to pay to make it how much > harder to distinguish? And what's the current computation and memory > capacity of DPI machines?
I would also check out: http://defcon.org/html/links/dc-archives/dc-21-archive.html#Wiley https://github.com/blanu/Dust He's done a lot of testing on real world hardware to understand how DPI distinguishes things and written tools to send traffic through permuting it until it no longer matches. -tom -- Liberationtech is public & archives are searchable on Google. Violations of list guidelines will get you moderated: https://mailman.stanford.edu/mailman/listinfo/liberationtech. Unsubscribe, change to digest, or change password by emailing moderator at [email protected].
