V2Ray
Appearance
| V2Ray | |
|---|---|
| Original author | Victoria Raymond |
| Initial release | 0.1 (September 18, 2015) |
| Repository | github |
| Written in | Go |
| License | MIT License |
| Website | v2ray |
V2Ray is an open-source protocol part of the Project V platform, designed to enhance privacy and bypass censorship. It supports multiple tunneling protocols like VMess, Shadowsocks, SOCKS, and HTTP. Its modular design allows flexible configurations to adapt to various internet censorship scenarios.[1][2][3][4]
Specifications
[edit]VMess is V2Ray's primary protocol, uses strong encryption and dynamic port allocation to resist DPI-based detection. V2Ray can obfuscate traffic to mimic HTTPS or WebSocket and adjusts to changing network conditions, making it effective in censorship-heavy environments such as China.[1][2][5]
References
[edit]- ^ a b Orofino, Antonino (2024). "An Investigation of VPN Fingerprinting". ETH Zurich. doi:10.3929/ethz-b-000715378. hdl:20.500.11850/715378.
- ^ a b Hale, Erin. "China's volunteer programmers work in the shadows to set the internet free". Al Jazeera. Retrieved 2025-10-03.
- ^ Litvinov, V. L. (September 2025). "Research of Methods for Recognizing Anonymized Traffic". 2025 VI International Conference on Control in Technical Systems (CTS). pp. 127–130. doi:10.1109/CTS67336.2025.11196346. ISBN 979-8-3315-5854-3.
- ^ Wu, Hua; Liu, Yujie; Cheng, Guang; Hu, Xiaoyan (2022). "Real-time Identification of VPN Traffic based on Counting Bloom Filter and Chained Hash Table from Sampled Data in High-speed Networks". ICC 2022 - IEEE International Conference on Communications. pp. 5070–5075. doi:10.1109/icc45855.2022.9839256. ISBN 978-1-5386-8347-7.
- ^ He, Yanjie; Li, Wei (2025). "A Lightweight Deep Learning Approach for Encrypted Proxy Traffic Detection". Security and Communication Networks. 2025 (1) 4469975. doi:10.1155/sec/4469975. ISSN 1939-0122.