Infranet: Circumventing Web Censorship and Surveillance

نویسندگان

  • Nick Feamster
  • Magdalena Balazinska
  • Greg Harfst
  • Hari Balakrishnan
  • David R. Karger
چکیده

An increasing number of countries and companies routinely block or monitor access to parts of the Internet. To counteract these measures, we propose Infranet, a system that enables clients to surreptitiously retrieve sensitive content via cooperating Web servers distributed across the global Internet. These Infranet servers provide clients access to censored sites while continuing to host normal uncensored content. Infranet uses a tunnel protocol that provides a covert communication channel between its clients and servers, modulated over standard HTTP transactions that resemble innocuous Web browsing. In the upstream direction, Infranet clients send covert messages to Infranet servers by associating meaning to the sequence of HTTP requests being made. In the downstream direction, Infranet servers return content by hiding censored data in uncensored images using steganographic techniques. We describe the design, a prototype implementation, security properties, and performance of Infranet. Our security analysis shows that Infranet can successfully circumvent several sophisticated censoring techniques.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Implementation and Security Analysis of the Infranet Anti-Censorship System

As the Internet has grown in popularity, so have efforts to control and monitor its use. Countries such as China [46] and Saudi Arabia [25] already block certain kinds of content and more may follow as censorship tools become increasingly sophisticated. In response, Feamster et al. have proposed Infranet [10], a system allowing clients to retrieve sensitive content through a distributed network...

متن کامل

Facade: High-Throughput, Deniable Censorship Circumvention Using Web Search

Censorship circumvention systems that use HTTP as cover traffic make tradeoffs between deniability and performance by offering either deniability at the expense of performance (e.g., Infranet) or performance at the expense of deniability (e.g., StegoTorus). These systems do so because HTTP is typically very asymmetric, with very little capacity to carry covert data in each HTTP GET request; hig...

متن کامل

Lecture 23: Network surveillance and censorship

In today’s lecture, we’ll discuss two threats to the Internet that have emerged over the last few years: network surveillance and network censorship. Network surveillance is the act of monitoring a user’s network activity (e.g., who the user is talking to, what the user is talking about, and when the user is talking). Network surveillance is typically done in secret so that the user being monit...

متن کامل

Evasion Tactics

The number of countries that censor and monitor their citizens’ use of the Internet is increasing. While it is no secret that China and Iran censor the Internet, at least 25 countries, including Pakistan, Ethiopia, Thailand and Uzbekistan, also have technical filtering regimes in place. Some of the technology is even exported by western companies: search engines, blog hosting providers and emai...

متن کامل

Three Researchers, Five Conjectures: An Empirical Analysis of TOM-Skype Censorship and Surveillance

We present an empirical analysis of TOM-Skype censorship and surveillance. TOM-Skype is an Internet telephony and chat program that is a joint venture between TOM Online (a mobile Internet company in China) and Skype Limited. TOM-Skype contains both voice-overIP functionality and a chat client. The censorship and surveillance that we studied for this paper is specific to the chat client and is ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2002