{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,4]],"date-time":"2026-02-04T18:28:48Z","timestamp":1770229728063,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":52,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,5,13]],"date-time":"2024-05-13T00:00:00Z","timestamp":1715558400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"Institute of Information Engineering, CAS","award":["No. E3Z0041101 and No. E3Z0191101"],"award-info":[{"award-number":["No. E3Z0041101 and No. E3Z0191101"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,5,13]]},"DOI":"10.1145\/3589334.3645552","type":"proceedings-article","created":{"date-parts":[[2024,5,8]],"date-time":"2024-05-08T07:08:13Z","timestamp":1715152093000},"page":"1790-1799","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":5,"title":["Identifying VPN Servers through Graph-Represented Behaviors"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-9221-2040","authenticated-orcid":false,"given":"Chenxu","family":"Wang","sequence":"first","affiliation":[{"name":"Institute of Information Engineering, Chinese Academy of Sciences &amp; School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9037-4676","authenticated-orcid":false,"given":"Jiangyi","family":"Yin","sequence":"additional","affiliation":[{"name":"Institute of Information Engineering, Chinese Academy of Sciences &amp; School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3069-1215","authenticated-orcid":false,"given":"Zhao","family":"Li","sequence":"additional","affiliation":[{"name":"Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0046-8706","authenticated-orcid":false,"given":"Hongbo","family":"Xu","sequence":"additional","affiliation":[{"name":"Institute of Information Engineering, Chinese Academy of Sciences &amp; School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0008-6328-9696","authenticated-orcid":false,"given":"Zhongyi","family":"Zhang","sequence":"additional","affiliation":[{"name":"Institute of Information Engineering, Chinese Academy of Sciences &amp; School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4815-3463","authenticated-orcid":false,"given":"Qingyun","family":"Liu","sequence":"additional","affiliation":[{"name":"Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China"}]}],"member":"320","published-online":{"date-parts":[[2024,5,13]]},"reference":[{"key":"e_1_3_2_2_1_1","doi-asserted-by":"crossref","unstructured":"2023. FireHOL. iplists.firehol.org. Accessed: 2023--10-05.","DOI":"10.1055\/s-0043-1776091"},{"key":"e_1_3_2_2_2_1","unstructured":"2023. IBlockList. www.iblocklist.com\/lists. Accessed: 2023--10-05."},{"key":"e_1_3_2_2_3_1","unstructured":"2023. VPNChecker. https:\/\/github.com\/chenxuStep\/VPNChecker. GitHub repository."},{"key":"e_1_3_2_2_4_1","volume-title":"Topological based classification using graph convolutional networks. CoRR abs\/1911.06892","author":"Abel Roy","year":"2019","unstructured":"Roy Abel, Idan Benami, and Yoram Louzoun. 2019. Topological based classification using graph convolutional networks. CoRR abs\/1911.06892 (2019)."},{"key":"e_1_3_2_2_5_1","volume-title":"14th USENIX Symposium on Operating Systems Design and Implementation (OSDI 20)","author":"Alfatafta Mohammed","year":"2020","unstructured":"Mohammed Alfatafta, Basil Alkhatib, Ahmed Alquraan, and Samer Al-Kiswany. 2020. Toward a generic fault tolerance technique for partial network partitioning. In 14th USENIX Symposium on Operating Systems Design and Implementation (OSDI 20). 351--368."},{"key":"e_1_3_2_2_6_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2018.08.008"},{"key":"e_1_3_2_2_7_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11416-020-00353-z"},{"key":"e_1_3_2_2_8_1","doi-asserted-by":"publisher","DOI":"10.5220\/0005740704070414"},{"key":"e_1_3_2_2_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/3419394.3423658"},{"key":"e_1_3_2_2_10_1","volume-title":"Threat modeling and circumvention of Internet censorship","author":"Fifield David","unstructured":"David Fifield. 2017. Threat modeling and circumvention of Internet censorship. University of California, Berkeley."},{"key":"e_1_3_2_2_11_1","unstructured":"Python Software Foundation. 2023. socket - Low-level networking interface. https:\/\/docs.python.org\/3\/library\/socket.html (Accessed on 2023-09-04)."},{"key":"e_1_3_2_2_12_1","doi-asserted-by":"crossref","unstructured":"Sergey Frolov Jack Wampler and Eric Wustrow. 2020. Detecting Probe-resistant Proxies.. In NDSS.","DOI":"10.14722\/ndss.2020.23087"},{"key":"e_1_3_2_2_13_1","volume-title":"The Point-to-Point Protocol (PPP). https:\/\/www.rfc-editor","author":"Network Working Group","year":"2023","unstructured":"Network Working Group. 1993. The Point-to-Point Protocol (PPP). https:\/\/www.rfc-editor.org\/rfc\/rfc2637.html (Accessed on 2023-09-03)."},{"key":"e_1_3_2_2_14_1","volume-title":"et al","author":"Hagberg Aric A.","year":"2023","unstructured":"Aric A. Hagberg, Daniel A. Schult, Pieter J. Swart, et al . 2023. NetworkX. https:\/\/networkx.org\/ (Accessed on 2023-09-04)."},{"key":"e_1_3_2_2_15_1","volume-title":"https:\/\/www.rfc-editor","author":"Internet Engineering Task Force (IETF). 2011. IP Security (IPsec) and Internet Key Exchange (IKE).","year":"2023","unstructured":"Internet Engineering Task Force (IETF). 2011. IP Security (IPsec) and Internet Key Exchange (IKE). https:\/\/www.rfc-editor.org\/rfc\/rfc2637.html (Accessed on 2023-09-03)."},{"key":"e_1_3_2_2_16_1","unstructured":"Ipinfo. 2023. The trusted source for IP address data leading IP data provider - IPinfo.io. https:\/\/ipinfo.io (Accessed on 2023-09-04)."},{"key":"e_1_3_2_2_17_1","unstructured":"Ipqualityscore. 2023. Fraud Detection and Bot Detection Solutions | Detect Fraud with IPQS. https:\/\/www.ipqualityscore.com (Accessed on 2023-09-04)."},{"key":"e_1_3_2_2_18_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2022.109309"},{"key":"e_1_3_2_2_19_1","volume-title":"Proceedings of the Internet Measurement Conference","author":"Khan Mohammad Taha","year":"2018","unstructured":"Mohammad Taha Khan, Joe DeBlasio, Geoffrey M Voelker, Alex C Snoeren, Chris Kanich, and Narseo Vallina-Rodriguez. 2018. An empirical analysis of the commercial vpn ecosystem. In Proceedings of the Internet Measurement Conference 2018. 443--456."},{"key":"e_1_3_2_2_20_1","volume-title":"Semi-supervised classification with graph convolutional networks. arXiv preprint arXiv:1609.02907","author":"Kipf Thomas N","year":"2016","unstructured":"Thomas N Kipf and Max Welling. 2016. Semi-supervised classification with graph convolutional networks. arXiv preprint arXiv:1609.02907 (2016)."},{"key":"e_1_3_2_2_21_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2023.109782"},{"key":"e_1_3_2_2_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/3485447.3512217"},{"key":"e_1_3_2_2_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2019.8737507"},{"key":"e_1_3_2_2_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/3372297.3423356"},{"key":"e_1_3_2_2_25_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00500-019-04030-2"},{"key":"e_1_3_2_2_26_1","unstructured":"Gordon Fyodor Lyon. 2009. Nmap network scanning: The official Nmap project guide to network discovery and security scanning."},{"key":"e_1_3_2_2_27_1","volume-title":"Characterizing the VPN Ecosystem in the Wild. In International Conference on Passive and Active Network Measurement. Springer, 18--45","author":"Maghsoudlou Aniss","year":"2023","unstructured":"Aniss Maghsoudlou, Lukas Vermeulen, Ingmar Poese, and Oliver Gasser. 2023. Characterizing the VPN Ecosystem in the Wild. In International Conference on Passive and Active Network Measurement. Springer, 18--45."},{"key":"e_1_3_2_2_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/CyberSA.2018.8551395"},{"key":"e_1_3_2_2_29_1","unstructured":"Neo4j. 2023. Graph Algorithms. https:\/\/neo4j.com\/docs\/graph-data-science\/current\/algorithms\/ (Accessed on 2023-09-04)."},{"key":"e_1_3_2_2_30_1","volume-title":"Kantha Girish Gangadhara, and Matthew Wright","author":"Rahman Mohammad Saidur","year":"2019","unstructured":"Mohammad Saidur Rahman, Payap Sirinam, Nate Mathews, Kantha Girish Gangadhara, and Matthew Wright. 2019. Tik-Tok: The utility of packet timing in website fingerprinting attacks. arXiv preprint arXiv:1902.06421 (2019)."},{"key":"e_1_3_2_2_31_1","doi-asserted-by":"crossref","unstructured":"Reethika Ramesh Leonid Evdokimov Diwen Xue and Roya Ensafi. 2022. VPNalyzer: systematic investigation of the VPN ecosystem. In Network and Distributed System Security. 24--28.","DOI":"10.14722\/ndss.2022.24285"},{"key":"e_1_3_2_2_32_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2023.103098"},{"key":"e_1_3_2_2_33_1","doi-asserted-by":"crossref","unstructured":"Teemu Rytilahti and Thorsten Holz. 2020. On Using Application-Layer Middlebox Protocols for Peeking Behind NAT Gateways.. In NDSS.","DOI":"10.14722\/ndss.2020.24389"},{"key":"e_1_3_2_2_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2019.2953793"},{"key":"e_1_3_2_2_35_1","unstructured":"Spur. 2023. Home - Spur. https:\/\/spur.us (Accessed on 2023-09-04)."},{"key":"e_1_3_2_2_36_1","unstructured":"Pluggable Transports. 2023. Software Repository. https:\/\/software.pluggabletransports.info (Accessed on 2023-09-04)."},{"key":"e_1_3_2_2_37_1","volume-title":"Graph attention networks. arXiv preprint arXiv:1710.10903","author":"Velickovic Petar","year":"2017","unstructured":"Petar Velickovic, Guillem Cucurull, Arantxa Casanova, Adriana Romero, Pietro Lio, and Yoshua Bengio. 2017. Graph attention networks. arXiv preprint arXiv:1710.10903 (2017)."},{"key":"e_1_3_2_2_38_1","unstructured":"Vpnapi.io. 2023. VPN and Proxy Detection API. https:\/\/vpnapi.io (Accessed on 2023-09-04)."},{"key":"e_1_3_2_2_39_1","volume-title":"Chasing Shadows: A security analysis of the ShadowTLS proxy. In In Free and Open Communications on the Internet.","author":"Wang Gaukas","year":"2023","unstructured":"Gaukas Wang, Jackson Sippe, Hai Chi, and Eric Wustrow. 2023. Chasing Shadows: A security analysis of the ShadowTLS proxy. In In Free and Open Communications on the Internet."},{"key":"e_1_3_2_2_40_1","volume-title":"An Obfs-based Tor Anonymous Communication Anline Identification Method. In 2020 6th International Conference on Big Data and Information Analytics (BigDIA). IEEE, 361--366","author":"Wang Han","year":"2020","unstructured":"Han Wang, Xiangyang Luo, and Yuchen Sun. 2020. An Obfs-based Tor Anonymous Communication Anline Identification Method. In 2020 6th International Conference on Big Data and Information Analytics (BigDIA). IEEE, 361--366."},{"key":"e_1_3_2_2_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813715"},{"key":"e_1_3_2_2_42_1","volume-title":"International conference on machine learning. PMLR, 6861--6871","author":"Wu Felix","year":"2019","unstructured":"Felix Wu, Amauri Souza, Tianyi Zhang, Christopher Fifty, Tao Yu, and Kilian Weinberger. 2019. Simplifying graph convolutional networks. In International conference on machine learning. PMLR, 6861--6871."},{"key":"e_1_3_2_2_43_1","volume-title":"32nd USENIX Security Symposium (USENIX Security 23)","author":"Wu Mingshi","year":"2023","unstructured":"Mingshi Wu, Jackson Sippe, Danesh Sivakumar, Jack Burg, Peter Anderson, Xiaokang Wang, Kevin Bock, Amir Houmansadr, Dave Levin, and Eric Wustrow. 2023. How the Great Firewall of China detects and blocks fully encrypted traffic. In 32nd USENIX Security Symposium (USENIX Security 23). 2653--2670."},{"key":"e_1_3_2_2_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/3603165.3607437"},{"key":"e_1_3_2_2_45_1","volume-title":"International Conference on Collaborative Computing: Networking, Applications and Worksharing","author":"Xu Hongbo","unstructured":"Hongbo Xu, Shuhao Li, Zhenyu Cheng, Rui Qin, Jiang Xie, and Peishuai Sun. 2022. VT-GAT: A Novel VPN Encrypted Traffic Classification Model Based on Graph Attention Neural Network. In International Conference on Collaborative Computing: Networking, Applications and Worksharing. Springer, 437--456."},{"key":"e_1_3_2_2_46_1","volume-title":"How powerful are graph neural networks? arXiv preprint arXiv:1810.00826","author":"Xu Keyulu","year":"2018","unstructured":"Keyulu Xu, Weihua Hu, Jure Leskovec, and Stefanie Jegelka. 2018. How powerful are graph neural networks? arXiv preprint arXiv:1810.00826 (2018)."},{"key":"e_1_3_2_2_47_1","volume-title":"31st USENIX Security Symposium (USENIX Security 22)","author":"Xue Diwen","year":"2022","unstructured":"Diwen Xue, Reethika Ramesh, Arham Jain, Michalis Kallitsis, J Alex Halderman, Jedidiah R Crandall, and Roya Ensafi. 2022. {OpenVPN} is open to {VPN} fingerprinting. In 31st USENIX Security Symposium (USENIX Security 22). 483--500."},{"key":"e_1_3_2_2_48_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2020.3040907"},{"key":"e_1_3_2_2_49_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2018.2868922"},{"key":"e_1_3_2_2_50_1","doi-asserted-by":"publisher","DOI":"10.1109\/IWQoS54832.2022.9812882"},{"key":"e_1_3_2_2_51_1","volume-title":"Encrypted traffic classification with a convolutional long short-term memory neural network. In 2018 IEEE 20th International Conference on High Performance Computing and Communications","author":"Zou Zhuang","unstructured":"Zhuang Zou, Jingguo Ge, Hongbo Zheng, Yulei Wu, Chunjing Han, and Zhongjiang Yao. 2018. Encrypted traffic classification with a convolutional long short-term memory neural network. In 2018 IEEE 20th International Conference on High Performance Computing and Communications; IEEE 16th International Conference on Smart City; IEEE 4th International Conference on Data Science and Systems (HPCC\/SmartCity\/DSS). IEEE, 329--334."},{"key":"e_1_3_2_2_52_1","unstructured":"Zscaler. 2023. Understanding PAC Files. https:\/\/help.zscaler.com\/zia\/understanding-pac-file (Accessed on 2023-09-03)."}],"event":{"name":"WWW '24: The ACM Web Conference 2024","location":"Singapore Singapore","acronym":"WWW '24","sponsor":["SIGWEB ACM Special Interest Group on Hypertext, Hypermedia, and Web"]},"container-title":["Proceedings of the ACM Web Conference 2024"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3589334.3645552","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3589334.3645552","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T00:25:48Z","timestamp":1755822348000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3589334.3645552"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,5,13]]},"references-count":52,"alternative-id":["10.1145\/3589334.3645552","10.1145\/3589334"],"URL":"https:\/\/doi.org\/10.1145\/3589334.3645552","relation":{},"subject":[],"published":{"date-parts":[[2024,5,13]]},"assertion":[{"value":"2024-05-13","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}