Jump to content

V2Ray

From Wikipedia, the free encyclopedia
V2Ray
Original authorVictoria Raymond
Initial release0.1 (September 18, 2015)
Repositorygithub.com/v2fly
Written inGo
LicenseMIT License
Websitev2ray.com

V2Ray is an open-source protocol part of the Project V platform, designed to enhance privacy and bypass censorship. It supports multiple tunneling protocols like VMess, Shadowsocks, SOCKS, and HTTP. Its modular design allows flexible configurations to adapt to various internet censorship scenarios.[1][2][3][4]

Specifications

[edit]

VMess is V2Ray's primary protocol, uses strong encryption and dynamic port allocation to resist DPI-based detection. V2Ray can obfuscate traffic to mimic HTTPS or WebSocket and adjusts to changing network conditions, making it effective in censorship-heavy environments such as China.[1][2][5]

References

[edit]
  1. ^ a b Orofino, Antonino (2024). "An Investigation of VPN Fingerprinting". ETH Zurich. doi:10.3929/ethz-b-000715378. hdl:20.500.11850/715378.
  2. ^ a b Hale, Erin. "China's volunteer programmers work in the shadows to set the internet free". Al Jazeera. Retrieved 2025-10-03.
  3. ^ Litvinov, V. L. (September 2025). "Research of Methods for Recognizing Anonymized Traffic". 2025 VI International Conference on Control in Technical Systems (CTS). pp. 127–130. doi:10.1109/CTS67336.2025.11196346. ISBN 979-8-3315-5854-3.
  4. ^ Wu, Hua; Liu, Yujie; Cheng, Guang; Hu, Xiaoyan (2022). "Real-time Identification of VPN Traffic based on Counting Bloom Filter and Chained Hash Table from Sampled Data in High-speed Networks". ICC 2022 - IEEE International Conference on Communications. pp. 5070–5075. doi:10.1109/icc45855.2022.9839256. ISBN 978-1-5386-8347-7.
  5. ^ He, Yanjie; Li, Wei (2025). "A Lightweight Deep Learning Approach for Encrypted Proxy Traffic Detection". Security and Communication Networks. 2025 (1) 4469975. doi:10.1155/sec/4469975. ISSN 1939-0122.