Censorship in the Wild: Analyzing Internet Filtering in Syria

@article{Abdelberi2014CensorshipIT,
  title={Censorship in the Wild: Analyzing Internet Filtering in Syria},
  author={Chaabane Abdelberi and Terence Chen and Mathieu Cunche and Emiliano De Cristofaro and Arik Friedman and Mohamed Ali K{\^a}afar},
  journal={Proceedings of the 2014 Conference on Internet Measurement Conference},
  year={2014}
}
Internet censorship is enforced by numerous governments worldwide, however, due to the lack of publicly available information, as well as the inherent risks of performing active measurements, it is often hard for the research community to investigate censorship practices in the wild. Thus, the leak of 600GB worth of logs from 7 Blue Coat SG-9000 proxies, deployed in Syria to filter Internet traffic at a country scale, represents a unique opportunity to provide a detailed snapshot of a real… 

Where The Light Gets In: Analyzing Web Censorship Mechanisms in India

This work developed various techniques and heuristics to correctly assess censorship and study the underlying mechanism used by nine major ISPs in India, and demonstrated that existing censorship detection tools like OONI are grossly inaccurate.

Characterization of Internet censorship from multiple perspectives

This dissertation demonstrates how the censor's blocking choices can leave behind a detectable pattern in network communications, that can be leveraged to establish exact mechanisms of censorship.

Many Roads Lead To Rome: How Packet Headers Influence DNS Censorship Measurement

Internet censorship is widespread, impacting citizens of hundreds of countries around the world. Recent work has devel-oped techniques that can perform widespread, longitudinal measurements of global

Threat modeling and circumvention of Internet censorship

This research builds up an abstract model of the circumvention problem and examines how to adapt it to concrete censorship challenges, and presents two circumvention designs: domain fronting, which derives its resistance to blocking from the censor's reluctance to block other useful services; and Snowflake, based on quickly changing peer-to-peer proxy servers.

Understanding the Practices of Global Censorship through Accurate, End-to-End Measurements

The core of Disguiser is a control server that replies with a static payload to provide the ground truth of server responses to accurately detect the censorship activities and reveal the censor deployment without manual efforts.

Augur: Internet-Wide Detection of Connectivity Disruptions

Augur is introduced, a method and accompanying system that utilizes TCP/IP side channels to measure reachability between two Internet locations without directly controlling a measurement vantage point at either location, and scalable, statistically robust methods to infer network-layer filtering are developed.

Internet Censorship detection: A survey

Ultrasurf Traffic Classification: Detection and Prevention

In this study, a comprehensive overview on Internet censorship and anti-censorship applications is provided by analyzing Ultrasurf behavior, classifying its traffic patterns and proposing a behavioral-based solution that is capable of detecting and preventing the UltrAsurf traffic at the network level.

Censorship Detection : a Survey

This paper proposes a reference for censoring techniques and a characterization of censoring systems, with definitions of related concepts, and presents a chronological synopsis of the literature adopting or introducing them.

Internet Censorship in Italy: A First Look at 3G/4G Networks

The preliminary results of an experimental campaign using the five major mobile operators in Italy show that there is no homogeneity of treatment for a censored resource across different mobile operators, and have significance regarding the transparency and precision of censorship, and the possibilities for circumvention and detection strategies.
...

References

SHOWING 1-10 OF 56 REFERENCES

Internet Censorship in Iran: A First Look

The network topology of the censorship infrastructure in Iran is mapped and it is found that it relies heavily on centralized equipment, a property that might be fruitfully exploited by next generation approaches to censorship circumvention.

ConceptDoppler: a weather tracker for internet censorship

ConceptDoppler, an architecture for maintaining a censorship “weather report” about what keywords are filtered over time is proposed, and it is shown that LSA can effectively pare down a corpus of text and cluster filtered keywords for efficient probing.

The Anatomy of Web Censorship in Pakistan

The first study of the cause, effect, and mechanism of web censorship in Pakistan is presented, using a publicly available list of blocked websites and checking their accessibility from multiple networks within the country to compare two generations of blocking systems.

Analysis of country-wide internet outages caused by censorship

This paper detected what it believes were Libya's attempts to test firewall-based blocking before they executed more aggressive BGP-based disconnection during censorship episodes in Egypt and Libya.

Three Researchers, Five Conjectures: An Empirical Analysis of TOM-Skype Censorship and Surveillance

An empirical analysis of TOM-Skype censorship and surveillance is presented and five conjectures are presented that are believed to be formal enough to be hypotheses that the Internet censorship research community could potentially answer with more data and appropriate computational and analytic techniques.

Host Fingerprinting and Tracking on the Web: Privacy and Security Implications

A large-scale study to quantify the amount of information revealed by common host identifiers, which includes month-long anonymized datasets collected by the Hotmail web-mail service and the Bing search engine, which include millions of hosts across the global IP address space.

A Taxonomy of Censors and Anti-Censors: Part I-Impacts of Internet Censorship

An historical account of censorship through the lens of news coverage in the past decade is outlined, and a taxonomy of the principles, techniques, and technologies of Internet censorship are presented to highlight the challenges in anti-censorship.

A Taxonomy of Internet Censorship and Anti-Censorship Draft Version December 31 , 2010

Internet is supposed to be born free, yet it is censored almost everywhere, and severely censored in a few countries. The tug-of-war on the Internet between censors and anti-censors is intensifying.

Internet Censorship in China: Where Does the Filtering Occur?

This work explores the AS-level topology of China's network, and probes the firewall to find the locations of filtering devices, finding that even though most filtering occurs in border ASes, choke points also exist in many provincial networks.

The Hidden Internet of Iran: Private Address Allocations on a National Network

During provisional research on the country's censorship regime, initial indicators were found that telecommunications entities in Iran allowed private addresses to route domestically, creating a hidden network only reachable within the country.
...