Research Article

Detecting ShadowsocksR User Based on Intelligence of Cyber Entities

Table 1

Comparison of the related Shadowsocks (R) detection methods.

ReferenceYearObjectMain techniquesDefects

[8]2022SSAdded the sliding window JS divergence feature. Includes random forest.Method to identify smartphone applications from the network traffic of SS proxy.
[9]2020ProxyUncertainty-based traffic sample selection strategy. Includes random forest.Types of proxies that can be detected are limited.
[10]2018SSBit-flow features and XGboost algorithm.Insufficient features for traffic characterization.
[11]2020SSCNN. Includes random forestDeep learning needs enough training samples.
[12]2019SSNovel SS detection method based on flow context and host behavior.Applicability of the method is affected by scenario.
[13]2021SSH + SSCNN-BiLSTM algorithm.Poor applicability in real network environments.
[14]2017SSMulti-granularity heuristic traffic detection algorithm and mixed stream division-based website fingerprint detection algorithm.Not applicable to multi-obfuscation SSR traffic detection.
[15]2020SSRXGboost algorithm.Only focused on identification of traffic camouflaged with HTTP protocol in SSR.
[16]2021SSRDART algorithm.Only focused on identification of traffic camouflaged with HTTP and TLS protocols in SSR.
[17]2021SS and SSRProtocol analysis and GOSS algorithm.No effective distinction between SS and SSR.