VPN adoption has increased due to privacy concerns, leading to attempts by governments and ISPs to track or block VPN traffic. OpenVPN vulnerabilities allow for effective fingerprinting of connections, even obfuscated ones. A two-phase framework was developed to passively filter and actively probe OpenVPN connections, achieving a high identification rate with negligible false positives. The implications of VPN fingerprintability are discussed, urging providers to adopt more robust detection countermeasures.
他の言語に翻訳
原文コンテンツから
arxiv.org
深掘り質問