FINDING · DETECTION
A protocol-agnostic classifier that identifies RFC-mandated TCP behaviors (three-way handshake, 500ms ACK, 2×RMSS acknowledgement) leaking through UDP-based VPN tunnels achieves a false positive rate of 0.11–0.29% on real campus traffic, an order of magnitude lower than ML-based VPN detection techniques (FPR 1.4–5.5%) and on par with the GFW's estimated heuristic FPR of 0.6%.
From 2024-hanlon-detecting — Detecting VPN Traffic through Encapsulated TCP Behavior · §3–§4.2 · 2024 · Free and Open Communications on the Internet
Implications
- VPN and proxy protocols must treat encapsulated transport-layer behavior (handshake packet sizes, ACK timing, segment pacing) as an observable fingerprint surface, not just payload entropy.
- Designing tunnels that multiplex multiple flows or use QUIC/UDP-native semantics rather than TCP-over-UDP eliminates the 3WHS and ACK timing signals entirely.
Tags
Extracted by claude-sonnet-4-6 — review before relying.