Blocking Access to Websites. Normal operations We type the URL (e.g., to the browser.http://thainetizen.org/ So many things happen.

Slides:



Advertisements
Similar presentations
TECHNO-TONOMY Privacy & Autonomy in a Networked World Learning Module 6: Meeting People Online.
Advertisements

Fred P. Baker CCIE, CCIP(security), CCSA, MCSE+I, MCSE(2000)
Think Click Presents Danny The Dragon. Danny The Dragon is here to tell you about e-safety when on the internet.
 Natural consequence of the way Internet is organized o Best effort service means routers don’t do much processing per packet and store no state – they.
1 Web Content Delivery Reading: Section and COS 461: Computer Networks Spring 2007 (MW 1:30-2:50 in Friend 004) Ioannis Avramopoulos Instructor:
Information for Students and Families
 Proxy Servers are software that act as intermediaries between client and servers on the Internet.  They help users on private networks get information.
Internet Safety By: Caitlyn Stevenson. Information about Internet Safety  The internet is a huge deal, any child that can press a few letters on a keyboard.
How to make it easy for you customers to find and research you and your services!
PDF accessibility Susannah Pike
Why we keep doing security wrong Grant Cohoe. About Me System Administrator – RSA (The security division of EMC) OpComm Director / Sysadmin / Chairman.
Welcome Today Our Topics are: DNS (The Potential Problem for Complete Anonymity) Transparent DNS Proxy (The Problem & The Solution) How To.
© British Telecommunications plc Network Filtering.
7.7 DDoS Attack Timeline 1 st Attack Date : ’ :00 ~ ’ :00, ’ :00 ~ ’ :00 Target : (US) White House + 4 web sites (US)
The Domain Name System and DNS Blocking Malcolm Hutty Head of Public Affairs, LINX February 2011.
7.7 DDoS Attack Timeline 1 st Attack Date : ’ :00 ~ ’ :00, ’ :00 ~ ’ :00 Target : (US) White House + 4 web sites (US)
CS 101 – Nov. 23 Communication, continued LANs –Bus (ethernet) communication –Token ring communication How the Internet works: TCP/IP.
How Web Servers and The Internet Work The Basic Process.
Part A. Remote Viewing IP Surveillance Camera Application Guide.
Also known as hardware/physi cal address Customer Computer (Client) Internet Service Provider (ISP) MAC Address Each Computer has: Given by NIC card.
URLs & Web Protocols 18 URLs & Web Protocols 18. URLs & Web Protocols 18 A URL is a web address Uniform Resource Locator You say it like ‘earl’ A resource.
ANONYMIZING / WEB PRIVACY. TOOLS: STAYING ANONYMOUS ON THE INTERNET Proxy Server Tor.
Lecture 18 Page 1 CS 236 Online Prolog to Lecture 18 CS 236 On-Line MS Program Networks and Systems Security Peter Reiher.
BARDEN JUNIOR SCHOOL How to Use School . By C Carey.
Responsive Web Design The Best Way to Make Your Website a Hit! Straight Up Marketing.
Page 1 This is page one. I’m talking about it now….
Module 5 Problems Unit 3 Language in use Teaching Aims and Demands: To summarise and consolidate grammar focus : if –clause. To summarise and consolidate.
Why are we here?.
Norton Internet Security Customer Service Number Why Is Norton Antivirus Blocking Some Extensions From Being Installed On Microsoft Edge? Norton is not.
Why do we update Tenda UI?
Parent Training Facilitator Name Date Workshop A
Protecting Your Privacy Online
DDoS In the Real World Do DDoS attacks really happen?
Daniel “3ICE” Berezvai Reverse Proxy Presentation by:
HTTP AND ABSTRACTION ON THE INTERNET
DNS-sly: Avoiding Censorship through Network Complexity
One thought out solution to the problem of food waste
Creating an Account on Wikieducator
Programming Assignment #1
Practical Censorship Evasion Leveraging Content Delivery Networks
Are You Smarter Than a 5th Grader?
DDoS In the Real World Do DDoS attacks really happen?
Avatars.
Introduction Position your online or offline business
Welcome To : Group 1 VC Presentation
Client-Server Computing
WEBINAR “Automation of document generation and document processing with AutoMerge” Atlanta, 10/21/2013 Clint Higley I would like to welcome everyone to.
Exclusive Tips To Remember While Attending Real Estate Events In Houston.
Troubleshooting - Fire Stick Won’t Connect to Wi-Fi.
Information Security Session October 24, 2005
FUTURE JOBS READERS Level 1-④ Social Media Managers.
This is an ending page..
Tips for Scouts.
Open Proxy Servers Kevin Guthrie ALA, January 2003
Firewalls Jiang Long Spring 2002.
Why can’t others see my Wepage?
KEEP SAFE I will NOT give out personal information: Name -- create a screen name Address Phone number Password School address Pictures.
IGraphic Social impacts of IT
Cyber Security - Protecting Information
Ben Jones - S Rebecca Hunter - S
PDS, Primo, Aleph, MetaLib, SFX General workflow
Her friends are excluding her and talking about her behind her back.
Programming Assignment #1
An Interactive Guide for 4th and 5th graders
Your computer is the client
I am Big On Responsibility
Outline The concept of perimeter defense and networks Firewalls.
Library Resources for PSYCH 28
Presentation transcript:

Blocking Access to Websites

Normal operations We type the URL (e.g., to the browser. So many things happen behind the scene.

How things normally work

Step 1: from names to numbers Every ”house” in the Internet has an address. It looks like this:

Step 1: from names to numbers Your machine has to ”resolve” the hostname ”thainetizen.org” to this number thainetizen.org

Step 1: from names to numbers It does so by asking another machine called ”name server” what is thainetizen.org?

Step 2: make contact Then, you machine makes a contact to the web server (on the Internet) to get data. To: Giveme: thainetizen.org/ The Internet

Step 2: make contact And you get the page The Internet

Step 2: make contact But on the Internet we rarely have ”direct” contact with the web server. To: Giveme: thainetizen.org/ The Internet

Step 2: real contacts The Internet My ISP Web's ISP

Interception Blocking websites is all about interception the normal operations.

Intercepting ”calls”

Why it is theoretically so easy to intercept ”calls” You need to help of many parties to communicate, so normally you can't avoid telling them who you want to call. I want to talk with someone Who? I'm not gonna tell you.

Intercepting step 1 Who is thainetizen.org? Here: Thank you Sorry. You can't get through.

Intercepting step 2 The Internet My ISP Web's ISP To: Giveme: thainetizen.org/ To: Giveme: thainetizen.org/ ! Sorry. You can't get through.

This can be done at many levels The Internet My ISP Web's ISP To: Giveme: thainetizen.org/ To: Giveme: thainetizen.org/ ! Sorry. You can't get through. To: Giveme: thainetizen.org/

Messages The evolution of ”you-re-blocked” messages is quite interesting.

Evolution of blocking messages

1 st generation: the eye When MICT is proud of its technology... from:

2 nd generation: it's ISP job The message doesn't say the work is done by MICT. It's a problem you have with your ISP.

3 rd generation: Opps... website is broken From:

How hard it is to block websites

Intercepting 10,000 calls It is easy to intercept one call. It becomes harder to intercept all calls, without being noticed by customers.

Selective blocking Also, it is easier to intercept at lower levels. Filter communication with IPs (numbers) or URL? To: Giveme: thainetizen.org/

Selective blocking: IP Easier but hard to customize. To: Giveme: thainetizen.org/ To: Giveme: book.co.th/ To: Giveme: book.co.th/nstk

Big machines, huge money To keep up with internet traffic, to screen access to websites, you need very powerful machines.

Effectiveness? There are many tools that let users skip these interception/filtering. Tor (anonymous serfing) Anonymous proxy VPN