{"id":"https://openalex.org/W3093805859","doi":"https://doi.org/10.1145/3419394.3423644","title":"How China Detects and Blocks Shadowsocks","display_name":"How China Detects and Blocks Shadowsocks","publication_year":2020,"publication_date":"2020-10-22","ids":{"openalex":"https://openalex.org/W3093805859","doi":"https://doi.org/10.1145/3419394.3423644","mag":"3093805859"},"language":"en","primary_location":{"id":"doi:10.1145/3419394.3423644","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3419394.3423644","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the ACM Internet Measurement Conference","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":null,"display_name":"Alice","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Alice","raw_affiliation_strings":["GFW Report"],"affiliations":[{"raw_affiliation_string":"GFW Report","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5048049911","display_name":"Bob","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Bob","raw_affiliation_strings":["GFW Report"],"affiliations":[{"raw_affiliation_string":"GFW Report","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5051079753","display_name":"Carol Carol","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Carol","raw_affiliation_strings":["GFW Report"],"affiliations":[{"raw_affiliation_string":"GFW Report","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5017581630","display_name":"Jan Beznazwy","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Jan Beznazwy","raw_affiliation_strings":["Independent consultant"],"affiliations":[{"raw_affiliation_string":"Independent consultant","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5018588864","display_name":"Amir Houmansadr","orcid":"https://orcid.org/0000-0002-7553-6657"},"institutions":[{"id":"https://openalex.org/I24603500","display_name":"University of Massachusetts Amherst","ror":"https://ror.org/0072zz521","country_code":"US","type":"education","lineage":["https://openalex.org/I24603500"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Amir Houmansadr","raw_affiliation_strings":["University of Massachusetts Amherst"],"affiliations":[{"raw_affiliation_string":"University of Massachusetts Amherst","institution_ids":["https://openalex.org/I24603500"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":1.4565,"has_fulltext":false,"cited_by_count":21,"citation_normalized_percentile":{"value":0.83894,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":95,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"111","last_page":"124"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12326","display_name":"Network Packet Processing and Optimization","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/firewall","display_name":"Firewall (physics)","score":0.7570635080337524},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6996511220932007},{"id":"https://openalex.org/keywords/server","display_name":"Server","score":0.648086667060852},{"id":"https://openalex.org/keywords/blocking","display_name":"Blocking (statistics)","score":0.6331373453140259},{"id":"https://openalex.org/keywords/network-packet","display_name":"Network packet","score":0.5173794031143188},{"id":"https://openalex.org/keywords/china","display_name":"China","score":0.5097245573997498},{"id":"https://openalex.org/keywords/ip-address","display_name":"Ip address","score":0.46264517307281494},{"id":"https://openalex.org/keywords/entropy","display_name":"Entropy (arrow of time)","score":0.4314768314361572},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.4067692458629608},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.40323519706726074},{"id":"https://openalex.org/keywords/geography","display_name":"Geography","score":0.09263339638710022}],"concepts":[{"id":"https://openalex.org/C77714075","wikidata":"https://www.wikidata.org/wiki/Q5452017","display_name":"Firewall (physics)","level":5,"score":0.7570635080337524},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6996511220932007},{"id":"https://openalex.org/C93996380","wikidata":"https://www.wikidata.org/wiki/Q44127","display_name":"Server","level":2,"score":0.648086667060852},{"id":"https://openalex.org/C144745244","wikidata":"https://www.wikidata.org/wiki/Q4927286","display_name":"Blocking (statistics)","level":2,"score":0.6331373453140259},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.5173794031143188},{"id":"https://openalex.org/C191935318","wikidata":"https://www.wikidata.org/wiki/Q148","display_name":"China","level":2,"score":0.5097245573997498},{"id":"https://openalex.org/C2985371682","wikidata":"https://www.wikidata.org/wiki/Q11135","display_name":"Ip address","level":2,"score":0.46264517307281494},{"id":"https://openalex.org/C106301342","wikidata":"https://www.wikidata.org/wiki/Q4117933","display_name":"Entropy (arrow of time)","level":2,"score":0.4314768314361572},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.4067692458629608},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.40323519706726074},{"id":"https://openalex.org/C205649164","wikidata":"https://www.wikidata.org/wiki/Q1071","display_name":"Geography","level":0,"score":0.09263339638710022},{"id":"https://openalex.org/C183915046","wikidata":"https://www.wikidata.org/wiki/Q1316152","display_name":"Charged black hole","level":4,"score":0.0},{"id":"https://openalex.org/C166957645","wikidata":"https://www.wikidata.org/wiki/Q23498","display_name":"Archaeology","level":1,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C104062141","wikidata":"https://www.wikidata.org/wiki/Q2601295","display_name":"Extremal black hole","level":3,"score":0.0},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3419394.3423644","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3419394.3423644","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the ACM Internet Measurement Conference","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":19,"referenced_works":["https://openalex.org/W1409124109","https://openalex.org/W1714781699","https://openalex.org/W2005625871","https://openalex.org/W2052565897","https://openalex.org/W2111695118","https://openalex.org/W2153156723","https://openalex.org/W2299844482","https://openalex.org/W2760683562","https://openalex.org/W2763967737","https://openalex.org/W2772282277","https://openalex.org/W2889299479","https://openalex.org/W2904643047","https://openalex.org/W2906033594","https://openalex.org/W2930003501","https://openalex.org/W2972532057","https://openalex.org/W3008748509","https://openalex.org/W3015305429","https://openalex.org/W3047255554","https://openalex.org/W6863951927"],"related_works":["https://openalex.org/W3145114053","https://openalex.org/W2506521144","https://openalex.org/W2374794717","https://openalex.org/W2361273211","https://openalex.org/W1968856480","https://openalex.org/W2912508499","https://openalex.org/W1937926640","https://openalex.org/W2387304108","https://openalex.org/W2738271573","https://openalex.org/W2978111377"],"abstract_inverted_index":{"Shadowsocks":[0,24,43,71],"is":[1,93],"one":[2],"of":[3,20,23,37,60,78],"the":[4,21,34,53,56,61,85],"most":[5],"popular":[6],"circumvention":[7],"tools":[8],"in":[9,65,81],"China.":[10],"Since":[11],"May":[12],"2019,":[13],"there":[14],"have":[15],"been":[16],"numerous":[17],"anecdotal":[18],"reports":[19],"blocking":[22],"from":[25],"Chinese":[26],"users.":[27],"In":[28],"this":[29],"study,":[30],"we":[31,50],"reveal":[32],"how":[33],"Great":[35],"Firewall":[36],"China":[38],"(GFW)":[39],"detects":[40],"and":[41,44,58],"blocks":[42],"its":[45,91],"variants.":[46],"Using":[47],"measurement":[48],"experiments,":[49],"find":[51],"that":[52],"GFW":[54],"uses":[55],"length":[57],"entropy":[59],"first":[62],"data":[63],"packet":[64],"each":[66],"connection":[67],"to":[68,84,88],"identify":[69],"probable":[70],"traffic,":[72],"then":[73],"sends":[74],"seven":[75],"different":[76,82],"types":[77],"active":[79],"probes,":[80],"stages,":[83],"corresponding":[86],"servers":[87],"test":[89],"whether":[90],"guess":[92],"correct.":[94]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":2},{"year":2024,"cited_by_count":9},{"year":2023,"cited_by_count":3},{"year":2022,"cited_by_count":3},{"year":2021,"cited_by_count":3}],"updated_date":"2026-04-16T08:26:57.006410","created_date":"2025-10-10T00:00:00"}
