Authors: Alice, Bob, Carol, Jan Beznazwy, Amir Houmansadr
Internet Measurement Conference (IMC) 2020
The open dataset
contains code and datasets for the paper: How China Detects and Blocks Shadowsocks.
We introduce the major components of the dataset below.
The paper
directory includes:
code/pp.sh
Parallelly Parses all pcap files in a specified directory;
then it sorts packets by the timestamps and prints to stdin.
Example usage:
pp.sh path/to/pcap/dir > experiment_name.csv
The script requires tshark
and parallel
:
apt install tshark parallel # Debian-based
dnf install tshark parallel # Fedora-based
code/triggering_client_server
includes the source code of the clients and sink/responding servers used in Section 4.1.
code/prober_simulator
includes the source code of the prober simulators introduced in Section 5.1.
It can simulate both random and replay-based probes.
One can use it to check if other Shadowsocks implementations (or other circumvention tools) have similar vulnerabilities introduced in the paper.