FINDING · EVALUATION
ML-based VPN classifiers report FPRs of 1.4–5.5%, all exceeding the GFW's estimated practical threshold of 0.6%, while the simple RFC-heuristic approach achieves 0.11%; this indicates that real-world censors are more likely to adopt lightweight heuristic detectors than opaque ML pipelines.
From 2024-hanlon-detecting — Detecting VPN Traffic through Encapsulated TCP Behavior · §4.2 Overall Classifier Results · 2024 · Free and Open Communications on the Internet
Implications
- Circumvention tool designers should threat-model against simple threshold-based heuristics derived from protocol specs, not just against trained classifiers—the simpler attacks are more deployment-realistic.
- Evaluating a new transport against heuristic detectors (packet-size bounds, timing quantiles, handshake patterns) should be a standard pre-deployment check alongside ML-classifier evasion.
Tags
Extracted by claude-sonnet-4-6 — review before relying.