Research Article

A Covert-Aware Anonymous Communication Network for Social Communication

Table 1

Various parameters.

ParametersProbabilityReasons

ThroughputPI/OThe throughput can show whether the node exchanges data with unknown computers
DNSPDNSDNS can figure whether some in common domain name is used or the domain fronting is used
DstIPPDstIPThe IP is in the blacklist or not
ProcessPProcessSome software such as Tor client can be shown by the cloud provider or supervisor
PortPPortCorresponding port can be some software's fingerprint such as syncthing and its 8384&22000