SHARE
Facebook X Pinterest WhatsApp

Internet Better If All Packets Treated Equall

thumbnail Internet Better If All Packets Treated Equall

In an article presented on CIO, independent network security researcher Erik Hjelmvik takes a closer look at network neutrality and protocol discrimination. Hjelmvik says the Internet would be a better place if it treated all packets equal, but ISPs can discriminate against certain protocols, forcing the need for protocol obfuscation. Such obfuscation of measurable protocol […]

Nov 23, 2010
Enterprise Networking Planet content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More

In an article presented on CIO, independent network security researcher Erik Hjelmvik takes a closer look at network neutrality and protocol discrimination. Hjelmvik says the Internet would be a better place if it treated all packets equal, but ISPs can discriminate against certain protocols, forcing the need for protocol obfuscation. Such obfuscation of measurable protocol properties inhibits the ability for researchers to measure trends and usage of various protocols and applications on the Internet, but P2P file sharing applications such as Vuze, uTorrent, Skype and eMule introduced protocol obfuscation techniques to avoid being fingerprinted by the port independent traffic classification methods.


“The concept of protocol obfuscation implies that measurable properties of the network traffic, such as deterministic packet sizes and byte sequences, are concealed/clouded so that they appear random. The obfuscation of payload data is typically achieved by employing encryption, and flow properties are obfuscated by adding random sized paddings to the payload. These obfuscation techniques do not always provide sufficient protection against traffic shaping. In the technical report titled “Breaking and Improving Protocol Obfuscation” Wolfgang John and I show how even P2P applications that employ protocol obfuscation are identifiable with statistical measurements. The obfuscated protocols used by BitTorrent and eDonkey P2P file sharing applications can for example be identified by measuring packet sizes and directions of the first packets in a TCP session.”

Read the Full Story at CIO

Recommended for you...

4 Phishing Examples: Spot and Avoid Fraudulent Attacks
Examples of Ransomware: A Cautionary Tale
Juniper, Cato Build Out SASE Platform Offerings
Jeff Burt
Feb 4, 2022
Pandemic Leads to Permanent Changes in Workforce, WAN: Aryaka
Jeff Burt
Jan 20, 2022
Enterprise Networking Planet Logo

Enterprise Networking Planet aims to educate and assist IT administrators in building strong network infrastructures for their enterprise companies. Enterprise Networking Planet contributors write about relevant and useful topics on the cutting edge of enterprise networking based on years of personal experience in the field.

Property of TechnologyAdvice. © 2025 TechnologyAdvice. All Rights Reserved

Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.