FINDING · DETECTION
Shadowsocks traffic appears as ordinary TCP with no payload keywords or obvious protocol markers because the entire payload is encrypted; firewalls cannot distinguish it from generic TLS without behavioral flow analysis. This makes signature- and keyword-based detection ineffective against it.
From 2017-deng-random — The Random Forest based Detection of Shadowsock's Traffic · §III.A · 2017 · Intelligent Human-Machine Systems and Cybernetics
Implications
- Payload encryption alone is insufficient — flow-level behavioral features remain accessible even when packet content is opaque.
- Designs that randomize flow-level metadata (burst patterns, packet size distributions) are necessary to defeat classifiers that operate on this residual surface.
Tags
Extracted by claude-sonnet-4-6 — review before relying.