On 3 November 2013 23:29, Lucas Dixon <[email protected]> wrote:
> I'm trying to put together a good reading and person list for what is
> currently known on network steganography (in particular, network traffic
> obfuscation):
>
> What are the methods by which one type of traffic can be distinguished from
> another, and how can one type of traffic be hidden as another. How much
> computation and extra bandwidth do you have to pay to make it how much
> harder to distinguish? And what's the current computation and memory
> capacity of DPI machines?


I would also check out:

http://defcon.org/html/links/dc-archives/dc-21-archive.html#Wiley
https://github.com/blanu/Dust

He's done a lot of testing on real world hardware to understand how
DPI distinguishes things and written tools to send traffic through
permuting it until it no longer matches.

-tom
-- 
Liberationtech is public & archives are searchable on Google. Violations of 
list guidelines will get you moderated: 
https://mailman.stanford.edu/mailman/listinfo/liberationtech. Unsubscribe, 
change to digest, or change password by emailing moderator at 
[email protected].

Reply via email to