Research Article
A Covert-Aware Anonymous Communication Network for Social Communication
| Parameters | Probability | Reasons |
| Throughput | PI/O | The throughput can show whether the node exchanges data with unknown computers | DNS | PDNS | DNS can figure whether some in common domain name is used or the domain fronting is used | DstIP | PDstIP | The IP is in the blacklist or not | Process | PProcess | Some software such as Tor client can be shown by the cloud provider or supervisor | Port | PPort | Corresponding port can be some software's fingerprint such as syncthing and its 8384&22000 |
|
|