Detecting DNS Censorship without an internal vantage point

نویسندگان

  • Will Scott
  • Sujit Packiaraj
  • Arvind Krishnamurthy
چکیده

One challenge in detecting online censorship is the need for vantage points within the censoring domains. We focus on the specific subproblem of DNS blacklisting, where servers in a particular administrative domain are instructed not to resolve requests for specific sites. We find that for this problem internal vantage points are not needed, since public DNS servers in a given domain can be directly queried. Previous work[2] has leveraged this insight in the context of a single country. We query several thousand potentially sensitive domains taken from known blacklists (such as [1] and wikileaks) against publicly available DNS servers. After removing servers with erratic behavior and conservatively defining availability as whether an IP address was returned by a server, simple statistics were used to determine if a subpopulation of measurements from a single administrative domain significantly differ from the larger population. This paper presents a condensed result, showing that the technique can be effective in identifying this type of censorship. We limit our coverage to the 59 countries in which we found at least 30 accessible DNS servers, and determine censorship to occur when the subpopulation’s mean availability is more than four standard deviations below that of the general population. We consider these results to be a lower bound, and allude to future research opportunities including how the same technique might be used to monitor widely blocked domains. BODY DNS censorship can be detected through anomalies when querying public DNS servers. At least 13 countries block otherwise available sites.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Detecting Malware Domains at the Upper DNS Hierarchy

In recent years Internet miscreants have been leveraging the DNS to build malicious network infrastructures for malware command and control. In this paper we propose a novel detection system called Kopis for detecting malware-related domain names. Kopis passively monitors DNS traffic at the upper levels of the DNS hierarchy, and is able to accurately detect malware domains by analyzing global D...

متن کامل

DNS-sly: Avoiding Censorship through Network Complexity

We design DNS-sly, a counter-censorship system which enables a covert channel between a DNS client and server. To achieve covertness and deniability in the upstream direction, DNS-sly applies user personalization, adapting to individual behaviors. In the downstream direction, it utilizes CDN-related DNS responses to embed data, while retaining statistical covertness. We show DNS-sly achieves do...

متن کامل

Global Measurement of DNS Manipulation

Despite the pervasive nature of Internet censorship and the continuous evolution of how and where censorship is applied, measurements of censorship remain comparatively sparse. Understanding the scope, scale, and evolution of Internet censorship requires global measurements, performed at regular intervals. Unfortunately, the state of the art relies on techniques that, by and large, require user...

متن کامل

Monitoring Internet Censorship with UBICA

Censorship is becoming increasingly pervasive on the Internet, with the Open Net Initiative reporting nearly 50 countries practicing some form of censorship. Previous work has reported the existence of many forms of Internet censorship (e.g., DNS tampering, packet filtering, connection reset, content filtering), each of which may be composed to build a more comprehensive censorship system. Auto...

متن کامل

The Great DNS Wall of China

Internet freedom advocacy sites [1] have studied and documented these censorship practices, enumerating the techniques employed by the censoring bodies. For example, censors block the IP addresses of controversial websites, inspect TCP packet exchanges for keywords and tamper with DNS records. These advocacy sites have already catalogued the types of sites that are censored and the means by whi...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • TinyToCS

دوره 2  شماره 

صفحات  -

تاریخ انتشار 2013