Internet Censorship detection: A survey

نویسندگان

  • Giuseppe Aceto
  • Antonio Pescapè
چکیده

Internet Censorship is a phenomenon that crosses several study fields, from computer networking and computer security to social sciences; together with censorship detection and censorship circumvention it has impact on Internet infrastructure, protocols and user behaviors. Detection of Internet Censorship is the basis for the study of this phenomenon, and recently it has received focus from a technical point of view. Due to the heterogeneity of study fields and approaches, the scientific corpus on these topics is still in need of an overall analysis, based on coherent framework and lexicon to describe the experimented approaches and findings. In this paper we present a survey on Internet Censorship detection. We propose a reference for censoring techniques and a characterization of censoring systems, with definitions of related concepts. Based on the censoring techniques investigated in literature, we propose an analysis and discussion of censorship detection techniques and architectures and we present a chronological synopsis of the literature adopting or introducing them. Then we collect, study, and discuss available tools and platforms for censorship detection, and propose a characterization scheme to analyze and compare them. Finally, we compare and discuss detection architectures, tools and platforms, and we use the results to infer current challenges and for proposing new directions in the field of censorship detection.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Survey of Anomaly Detection Approaches in Internet of Things

Internet of Things is an ever-growing network of heterogeneous and constraint nodes which are connected to each other and the Internet. Security plays an important role in such networks. Experience has proved that encryption and authentication are not enough for the security of networks and an Intrusion Detection System is required to detect and to prevent attacks from malicious nodes. In this ...

متن کامل

Internet Censorship in Italy: A First Look at 3G/4G Networks

The techniques used to enforce Internet Censorship vary, and as a consequence the users can experience different results while accessing the same censored content in different contexts. While the corpus of Internet censorship studies is growing, to the best of our knowledge we are the first to focus on censorship detection on 3G/4G (hereafter mobile) network operators. After an introduction on ...

متن کامل

Packets Lost in the Wild: An Analysis of Empirical Approaches to Measure Internet Censorship

Over the past 20 years, the Internet has transformed into a global medium of communication via the publishing and access of content. Even though it is built on the very axioms of global connectivity, free speech, and net neutrality, there have been multiple instances of blocking by censoring regimes to restrict Internet traffic across their borders. On average, 25.3% of Internet users experienc...

متن کامل

Bypassing Internet Censorship for News Broadcasters

News organizations are often the targets of Internet censorship. This paper will look at two technical considerations for the BBC, based on its distribution of non-English content into countries such as Iran and China, where the news services are permanently unavailable from the official BBC websites: blocking detection and circumvention. This study examines an internal BBC prototype system bui...

متن کامل

The Anatomy of Web Censorship in Pakistan

Over the years, the Internet has democratized the flow of information. Unfortunately, in parallel, authoritarian regimes and other entities (such as ISPs) for their vested interests have curtailed this flow by partially or fully censoring the web. The policy, mechanism, and extent of this censorship varies from country to country. We present the first study of the cause, effect, and mechanism o...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • Computer Networks

دوره 83  شماره 

صفحات  -

تاریخ انتشار 2015