FINDING · DETECTION

A passive, router-level VPN fingerprinting technique exploits the design convention that all user traffic is tunneled to a single VPN server IP. By counting packets per device-to-IP session at the home router and flagging sessions where PACKETS_COUNT exceeds threshold T=500 within WINDOW=300 seconds, the method achieved a 100% detection rate for all VPN implementations that route all traffic through one server, with zero false positives across uncontrolled 4-day experiments.

From 2024-almutairi-fingerprintingFingerprinting VPNs with Custom Router Firmware: A New Censorship Threat Model · §III–IV · 2024 · Consumer Communications \& Networking Conference

Implications

Tags

censors
generic
techniques
traffic-shapeip-blocking
defenses
tunneling

Extracted by claude-sonnet-4-6 — review before relying.