ProxyKiller: An Anonymous Proxy Traffic Attack Model Based on Traffic Behavior Graphs

Published: 01 Jan 2024, Last Modified: 08 Apr 2025ESORICS (2) 2024EveryoneRevisionsBibTeXCC BY-SA 4.0
Abstract: As common tools for evading censorship and protecting privacy, anonymous proxies are widely favored for their lightweight and easy deployment. In recent years, anonymous proxies have continually evolved regarding traffic obfuscation and masking strategies. Due to the lack of design targeting the connection behavior features of different proxy flows, current methods for proxy traffic identification often suffer from high false positive rates. Consequently, these methods are insufficient for real-world applications. This masks the deficiencies of existing anonymous proxy technologies in combating detection models based on flow relationship analysis.
Loading

OpenReview is a long-term project to advance science through improved peer review with legal nonprofit status. We gratefully acknowledge the support of the OpenReview Sponsors. © 2025 OpenReview