We present Slitheen++, a decoy routing system that---in contrast to its predecessor Slitheen---is not susceptible to traffic analysis in the upstream channel. Slitheen++ overcomes key challenges such as scheduling for covert connections and technologies to more realistically emulate a real user's behavior, such as crawling or delaying overt communication. We measure Slitheen++ according to metrics that not only show the maximum theoretical throughput of the system, but for the first time, also assess the actual user experience by measuring loading times of websites from ten covert targets. We show that emulating a user increases loading times, yet raises the difficulty for an advanced censor to expose decoy routing as such. For example, crawling raises the median of the loading time for covert setups by 1 second from 7s to 8s.
History
Preferred Citation
Benedikt Birtel and Christian Rossow. Slitheen++: Stealth TLS-based Decoy Routing. In: USENIX Workshop on Free and Open Communications on the Internet (FOCI). 2020.
Primary Research Area
Algorithmic Foundations and Cryptography
Name of Conference
USENIX Workshop on Free and Open Communications on the Internet (FOCI)
Legacy Posted Date
2020-08-14
Open Access Type
Unknown
BibTeX
@inproceedings{cispa_all_3187,
title = "Slitheen++: Stealth TLS-based Decoy Routing",
author = "Birtel, Benedikt and Rossow, Christian",
booktitle="{USENIX Workshop on Free and Open Communications on the Internet (FOCI)}",
year="2020",
}