Cirripede: circumvention infrastructure using router redirection with plausible deniability

@inproceedings{Houmansadr2011CirripedeCI,
  title={Cirripede: circumvention infrastructure using router redirection with plausible deniability},
  author={Amir Houmansadr and Giang T. K. Nguyen and Matthew C. Caesar and Nikita Borisov},
  booktitle={CCS '11},
  year={2011}
}
Many users face surveillance of their Internet communications and a significant fraction suffer from outright blocking of certain destinations. Anonymous communication systems allow users to conceal the destinations they communicate with, but do not hide the fact that the users are using them. The mere use of such systems may invite suspicion, or access to them may be blocked. We therefore propose Cirripede, a system that can be used for unobservable communication with Internet destinations… 

Figures and Tables from this paper

On Combinatoric Approach to Circumvent Internet Censorship Using Decoy Routers
TLDR
Two polynomial time algorithms are introduced which handle the deployment of decoy routers under the presence of uncooperative ASes and are compared and analyzed to compare and analyze the performance of these algorithms.
Alibi Routing
TLDR
This paper introduces the problem of finding "proofs of avoidance": evidence that the paths taken by a packet and its response avoided a user-specified set of "forbidden" geographic regions and presents Alibi Routing, a peer-to-peer overlay routing system for finding alibis securely and efficiently.
The Devil's in The Details: Placing Decoy Routers in the Internet
TLDR
It is demonstrated with real paths that the number of ASes required for a world-wide DR framework is small, and censor nations' attempts to filter traffic along the paths transiting these 30 ASes will not only block their own citizens, but others residing in foreign ASes.
SiegeBreaker: An SDN Based Practical Decoy Routing System
TLDR
A novel DR system, Siege- Breaker (SB), which solves the aforementioned problems using an SDN-based architecture and achieves performance comparable to direct TCP downloads, for both in-lab setups, and Internet based tests involving commercial SDN switches.
Slitheen: Perfectly Imitated Decoy Routing through Traffic Replacement
TLDR
This work proposes Slitheen, a decoy routing system capable of perfectly mimicking the traffic patterns of overt sites, and shows how recent innovations in traffic-shaping technology for ISPs mitigate previous deployability challenges.
SkypeMorph: Protocol Obfuscation for Censorship Resistance
TLDR
This thesis addresses the issue of preventing censors from detecting a certain type of traffic, for instance Tor connections, by observing the communications between a remote node and nodes in their network through a generic model in which the client obfuscates its messages to the bridge in a widely used protocol over the Internet.
Rebound: Decoy routing on asymmetric routes via error messages
TLDR
Rebound is presented, a decoy routing protocol that tolerates asymmetric routes without modifying the route taken by any packet that passes through the decoy router, making it more difficult to detect or disrupt than previous decoy routed protocols.
Qi points : placing decoy routers in the internet
TLDR
A map of the structure of the Internet is constructed, as a graph of such AS-level paths and a new way to identify key points those few ASes which appear on a large fraction of paths leading to these popular websites is presented.
SkypeMorph: protocol obfuscation for Tor bridges
TLDR
This work proposes a model in which the client obfuscates its messages to the bridge in a widely used protocol over the Internet, to make it difficult for the censoring adversary to distinguish between the obfuscated bridge connections and actual Skype calls using statistical comparisons.
Secure asymmetry and deployability for decoy routing systems
TLDR
A technique for supporting route asymmetry in previously symmetric decoy routing systems is proposed, more secure than previous asymmetric proposals and provides an option for tiered deployment, allowing more cautious ASes to deploy a lightweight, non-blocking relay station that aids in defending against routing-capable adversaries.
...
...

References

SHOWING 1-10 OF 78 REFERENCES
Nonesuch: a mix network with sender unobservability
TLDR
Nonesuch is presented: a mix network with steganographic submission and probabilistic identification and attenuation of cover traffic, which prevents cover traffic from travelling through the network in an infinite loop, while making it infeasible for an entrance node to distinguish senders.
Proximax : A Measurement Based System for Proxies Dissemination
TLDR
Proximax is a robust system that continuously distributes pools of proxies to a large number of channels in a way that maximizes the usage of these proxies while minimizing the risk of having them blocked.
Telex: Anticensorship in the Network Infrastructure
TLDR
A new cryptographic scheme based on elliptic curves for tagging TLS handshakes such that the tag is visible to a Telex station but not to a censor, which is used to build a protocol that allows clients to connect to Telex stations while resisting both passive and active attacks.
Infranet: Circumventing Web Censorship and Surveillance
TLDR
The design, a prototype implementation, security properties, and performance of Infranet, a system that enables clients to surreptitiously retrieve sensitive content via cooperating Web servers distributed across the global Internet, are described.
Preventing encrypted traffic analysis
TLDR
This dissertation introduces the design of a proxy system called TrafficMimic that implements realistic cover traffic tunneling and can be used alone or integrated with the Tor anonymity system and develops several biasing techniques that can safely improve performance with biasing while preventing both traffic analysis and defense detection attacks.
Network covert channels: design, analysis, detection, and elimination
TLDR
It is shown that traffic analysis can counter traditional event-based covert channels, which do not employ any additional scheme to obfuscate the channel further, and a new family of covert channels that do not produce such anomaly are introduced.
Tor: The Second-Generation Onion Router
TLDR
This second-generation Onion Routing system addresses limitations in the original design by adding perfect forward secrecy, congestion control, directory servers, integrity checking, configurable exit policies, and a practical design for location-hidden services via rendezvous points.
Thwarting Web Censorship with Untrusted Messenger Discovery
TLDR
This paper proposes separating the proxy into two distinct components—the messenger, which the client discovers using keyspace hopping and which simply acts as a gateway to the Internet; and the portal, whose identity is widely-published and whose responsibility it is to interpret and serve the client’s requests for censored content.
Proximax: Measurement-Driven Proxy Dissemination (Short Paper)
TLDR
Proximax is a robust system that continuously distributes pools of proxies to a large number of channels in a way that maximizes the usage of these proxies while minimizing the risk of having them blocked.
On the risks of serving whenever you surf: vulnerabilities in Tor's blocking resistance design
TLDR
This work identifies three key architectural shortcomings of the bridge design that lead to an attack that can expose the IP address of bridge operators visiting certain web sites over Tor.
...
...