Ignoring the Great Firewall of China

  title={Ignoring the Great Firewall of China},
  author={Richard Clayton and Steven J. Murdoch and Robert N. M. Watson},
  booktitle={Privacy Enhancing Technologies},
The so-called “Great Firewall of China” operates, in part, by inspecting TCP packets for keywords that are to be blocked. If the keyword is present, TCP reset packets (viz: with the RST flag set) are sent to both endpoints of the connection, which then close. However, because the original packets are passed through the firewall unscathed, if the endpoints completely ignore the firewall’s resets, then the connection will proceed unhindered. Once one connection has been blocked, the firewall… CONTINUE READING
Highly Influential
This paper has highly influenced 28 other papers. REVIEW HIGHLY INFLUENTIAL CITATIONS
Highly Cited
This paper has 200 citations. REVIEW CITATIONS

From This Paper

Topics from this paper.


Publications citing this paper.
Showing 1-10 of 131 extracted citations

Investigation of mobile App behaviors, from the aspect of real world mobile backend system

2017 IEEE Jordan Conference on Applied Electrical Engineering and Computing Technologies (AEECT) • 2017
View 3 Excerpts
Highly Influenced

On Migratory Behavior in Video Consumption

CIKM • 2017
View 8 Excerpts
Highly Influenced

Internet Censorship detection: A survey

Computer Networks • 2015
View 7 Excerpts
Highly Influenced

200 Citations

Citations per Year
Semantic Scholar estimates that this publication has 200 citations based on the available data.

See our FAQ for additional information.


Publications referenced by this paper.
Showing 1-10 of 11 references

Censorship Is In the Router

N. Villeneuve
View 1 Excerpt

Failures in a Hybrid Content Blocking System

Privacy Enhancing Technologies • 2005
View 4 Excerpts

Local content filtering Procedure

King Abdulaziz City for Science, Technology
Internet Services Unit, KACST • 2004
View 1 Excerpt

Probing Chinese search engine filtering

The OpenNet Initiative
Bulletin 005, • 2004
View 1 Excerpt

Slipping in the Window: TCP Reset Attacks

P. Watson
CanSecWest/core04 • 2004
View 2 Excerpts

Government mandated blocking of foreign Web content

DFN-Arbeitstagung über Kommunikationsnetze • 2003
View 3 Excerpts

Web Sites Sharing IP Addresses: Prevalence and Significance

B. Edelman
Berkman Center for Internet and Society • 2003
View 1 Excerpt

Defending Against Sequence

S. Bellovin
Number Attacks. RFC1948, • 1996

Similar Papers

Loading similar papers…