{"title":"Together may be better: A novel framework and high-consistency feature for proxy traffic analysis","authors":"Yuantu Luo , Jun Tao , Linxiao Yu , Yuehao Zhu","doi":"10.1016/j.comnet.2025.111672","DOIUrl":null,"url":null,"abstract":"<div><div>Encrypted and proxy-based traffic has been critical in ensuring communication security but also pose significant challenges for traffic analysis, such as obscured traffic patterns, the inability to correlate pre- and post-proxy flows, and the increased complexity of analyzing encapsulated data. To address these challenges and enable comprehensive proxy traffic analysis, this paper proposes <em>TrafficTracer</em>, a novel proxy traffic capturing framework designed to overcome limitations in existing methods, such as port-missing issues and the inability to correlate pre- and post-proxy traffic. By modifying the open-source proxy application Clash, <em>TrafficTracer</em> extracts inner connection information, enabling complete traffic flow tracing. Furthermore, building on the whole-procedure proxy traffic captured by <em>TrafficTracer</em>, we design Flow Reversals (FR), a robust feature capturing the consistency of traffic flow characteristics before and after proxy encapsulation. Experimental evaluations demonstrate that <em>TrafficTracer</em> significantly enhances raw packet capture efficiency and alleviates port-missing issues. Moreover, FR exhibits strong proxy feature invariability and temporal consistency, outperforming traditional features in maintaining pre- and post-proxy traffic correlations. These results indicate that leveraging <em>TrafficTracer</em> and FR can effectively facilitate the analysis of the entire proxy traffic procedure and hold promise for traffic analysis performance improvement.</div></div>","PeriodicalId":50637,"journal":{"name":"Computer Networks","volume":"272 ","pages":"Article 111672"},"PeriodicalIF":4.6000,"publicationDate":"2025-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Computer Networks","FirstCategoryId":"94","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S1389128625006395","RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"COMPUTER SCIENCE, HARDWARE & ARCHITECTURE","Score":null,"Total":0}
引用次数: 0
Abstract
Encrypted and proxy-based traffic has been critical in ensuring communication security but also pose significant challenges for traffic analysis, such as obscured traffic patterns, the inability to correlate pre- and post-proxy flows, and the increased complexity of analyzing encapsulated data. To address these challenges and enable comprehensive proxy traffic analysis, this paper proposes TrafficTracer, a novel proxy traffic capturing framework designed to overcome limitations in existing methods, such as port-missing issues and the inability to correlate pre- and post-proxy traffic. By modifying the open-source proxy application Clash, TrafficTracer extracts inner connection information, enabling complete traffic flow tracing. Furthermore, building on the whole-procedure proxy traffic captured by TrafficTracer, we design Flow Reversals (FR), a robust feature capturing the consistency of traffic flow characteristics before and after proxy encapsulation. Experimental evaluations demonstrate that TrafficTracer significantly enhances raw packet capture efficiency and alleviates port-missing issues. Moreover, FR exhibits strong proxy feature invariability and temporal consistency, outperforming traditional features in maintaining pre- and post-proxy traffic correlations. These results indicate that leveraging TrafficTracer and FR can effectively facilitate the analysis of the entire proxy traffic procedure and hold promise for traffic analysis performance improvement.
期刊介绍:
Computer Networks is an international, archival journal providing a publication vehicle for complete coverage of all topics of interest to those involved in the computer communications networking area. The audience includes researchers, managers and operators of networks as well as designers and implementors. The Editorial Board will consider any material for publication that is of interest to those groups.