CS590B690B Detecting network interference

Slides:



Advertisements
Similar presentations
Freedom of Speech (Part 3)
Advertisements

By Brian Langone. Internet censorship is essentially a method used by corporations, governments and others in order to filter what a user can view on.
Northside I.S.D. Acceptable Use Policy
ITIS 1210 Introduction to Web-Based Information Systems Chapter 44 How Firewalls Work How Firewalls Work.
Web Filtering and Deep Packet Inspection Artyom Churilin Tallinn University of Technology 2011.
Topic 2: Information Communication Internet Censorship in China From July 2009 Ürümqi Riots point of view Dan Ru ISYM-540-P 07/09/2009.
Copyrights and Internet Piracy: SOPA and PIPA Essential Questions… What are SOPA and PIPA? Should people make money off of their creativity? How damaging.
Self-Censorship in China Eric Schabel & Fahad Pervaiz.
THE INTERNET IN CHINA 384 million users by the end of 2009 (Xinhua News Agency, Jan. 15, 2010) Top three uses are online music, online news and search.
By Leo Koo and Chris Mendoza AP Government Mr. Lohman Period 4.
Censorship Traditionally: Deletion of materials that the gorvernment or media considers to be objectionable Internet censorship often just blocks access.
Anonymity on the Internet Jess Wilson. Anonymizing Proxy What is a proxy? – An intermediary between you and the internet How does it make you anonymous?
A Community Without Borders By Brian McLaughlin Thomas Charnock Brian Schweitzer.
Forced Internet Filtering Thomas Mahoney. Internet Filtering ► Techniques  Technical blocking  Search result removal  Take-Down  Self-Censorship ►
Social Media and Political Activism
Internet Censorship Sri Reddy Internet and Web Systems 2 Presentation.
Internet Censorship By: Austin Tyler And, Lisa. Introduction  Ever since there has been an Internet, there have been attempts to control it. However,
Pro Exchange SPAM Filter An Exchange 2000 based spam filtering solution.
Norman SecureSurf Protect your users when surfing the Internet.
Internet Censorship in China By Shipeng Xu. What content is censored? Social networks: Facebook, Twitter, Youtube and Flikr etc. Any news sources contains.
Chinese internet control: Corporate collaboration Rebecca MacKinnon 4/20/2006
CS 4001Mary Jean Harrold1 Class 24 ŸFreedom of speech in cyberspace ŸAssign ŸAssignment 8—due today ŸTerm paper—due 11/20.
CS 3043 Social Implications Of Computing 9/21/2015© 2008 Keith A. Pray 1 Class 9 Freedom Of Speech Keith A. Pray Instructor socialimps.keithpray.net.
Moral, Social and Ethical issues associated with the Internet
Network and Perimeter Security Paula Kiernan Senior Consultant Ward Solutions.
Our Freedoms – Expression: Speech and Information.
Internet in 21st Century. We all use web in our daily lives, from our mobiles or computers. However we do not realize how fast internet is getting bigger.
GOVERNMENT REGULATION AND SURVEILLANCE OF THE INTERNET Ayman Irziqat Katarzyna Kosarska Sergio Pradel.
McLean HIGHER COMPUTER NETWORKING Lesson 14 Firewalls & Filtering Comparison of Internet content filtering methods: firewalls, Internet filtering.
CSE 592 INTERNET CENSORSHIP (FALL 2015) LECTURE 09 PHILLIPA GILL – STONY BROOK UNIVERSITY.
CSE 592 INTERNET CENSORSHIP (FALL 2015) LECTURE 10 PHILLIPA GILL – STONY BROOK UNIVERSITY.
CSE 592 INTERNET CENSORSHIP (FALL 2015) LECTURE 08 PHILLIPA GILL – STONY BROOK UNIVERSITY.
CSE 592 INTERNET CENSORSHIP (FALL 2015) LECTURE 12.
By Ben Smith. What is COICA? What effect it will have on the web? How does it work? How to prevent COICA from passing Summary.
Presentation by: Jennifer Collins Roldan Padilla.
Carol Spizzichino Fall 2015 YOUTUBE.
COMP 2903 A30 – Google and Saving Face in China Danny Silver JSOCS, Acadia University.
The Internet Things change fast! Who thinks we can keep up?
Digital Law -The Deep Web- Digital Law -The Deep Web- Liam Leppard Matthias Lee Russell Wong.
Uploading Web Page  It would be meaningful to share your web page with the rest of the net user.  Thus, we have to upload the web page to the web server.
Regan Little. Definition Methods of Screening Types of Firewall Network-Level Firewalls Circuit-Level Firewalls Application-Level Firewalls Stateful Multi-Level.
The Internet and the WWW IT-IDT-5.1. History of the Internet How did the Internet originate? Goal: To function if part of network were disabled Became.
CS 590B/690B DETECTING NETWORK INTERFERENCE (FALL 2016) PROF. PHILLIPA GILL UNIVERSITY OF MASSACHUSETTS -- AMHERST LECTURE 02 ACKS: SLIDES BASED ON MATERIAL.
Think / Pair / Share What are Human Rights?
CS590/690B Detecting network interference (Fall 2016)
Internet Culture in China
CS590B/690B Detecting Network interference (Fall 2016)
CS590B/690B Detecting Network Interference (Fall 2016)
CS590B/690B Detecting Network Interference (FALL 2016)
CS590B/690B Detecting network interference (Fall 2016)
CONNECTING TO THE INTERNET
CS590B/690B Detecting Network Interference (Fall 2016)
Children’s Internet Protection Act (CIPA)
CS590/690 Detecting network interference Fall 2016
CS590B/690B Detecting Network Interference (Fall 2016)
CS590B/690B Detecting Network Interference (Fall 2016)
Host of Troubles : Multiple Host Ambiguities in HTTP Implementations
Think / Pair / Share What are Human Rights?
CS590B/690B Detecting Network Interference
Introduction to Networking
PART III Ethical Issues in Business
CS590B/690B Detecting network interference (Spring 2018)
CS590B/690B Detecting Network Interference Spring 2018
Why the government should monitor its citizens using technology
China is Losing a War Over Internet
Firewalls Routers, Switches, Hubs VPNs
Think / Pair / Share What are Human Rights?
Internet Culture in China
CS590B/690B Detecting network interference (Spring 2018)
A Glimpse Into a Few Current Tech Projects
Presentation transcript:

CS590B690B Detecting network interference Lecture 10 Phillipa Gill – umasS Amherst

Where we are Last time: Case study: Iran + Pakistan Questions? Revisit hands on activity … RIPEstat page for AS 12880: https://stat.ripe.net/AS12880#tabId=at-a-glance Try looking up other Iranian networks NDT data in Google http://www.google.com/publicdata/explore?ds=e9krd11m38onf_&ctype=l&str ail=false&bcs=d&nselm=h&met_y=download_throughput&scale_y=lin&ind_y =false&rdim=country&idim=country:364&ifdim=country&ind=false OOKLA Speed test: http://www.google.com/publicdata/explore?ds=z8ii06k9csels2_&ctype=l&met _y=avg_download_speed

Test your knowledge (Iran) How did the government assert control over the Internet in 2001? What were the conflicting goals of Iran in implementing censorship? What was the end result of these? What is the `campaign for halal Internet’? Why did people fear this? What is the purpose of IP addresses designated in RFC1918? What are two techniques used by Anderson to map an internal 10.x.x.x address to an external IP? What is the idea of “dimming the Internet”? How can “dimming” be measured? How did the pseudonymous paper identify filtering based on the host header? What type of proxy did they find?

Test your knowledge (Pakistan) Why is censorship in Pakistan well known? Which protocol allowed collateral damage when they censored YouTube? How does the ISP Lens paper differ from other papers we’ve studied in the class? What types of filtering does the ISP lens paper identify and how? What was the impact of filtering? On user behavior? On content providers? On service providers?

Today Case Study: China Background (ONI report) Great Cannon Locating the censors (Xu et al.) http://pam2011.gatech.edu/papers/pam2011--Xu.pdf

background China: one-party state, ruled by the Chinese Communist Party (CCP) Conflict between IT development and ability to contain sensitive or threatening information Several milestones challenged gov’t control: Anniversary of Tibetan Uprising in 2008: Protests in Lhasa 2008 Beijing Olympics, pressures to lessen censorship Foreign reporters had unprecedented access within the country Domestic news still highly restricted Unfettered Internet access for foreign journalists restricted to “games-related” Web sites 2009 Riots in Urumqi led to Internet restrictions to “quench the riot … and prevent violent” State sponsored Web site access (31 sites) slowly restored but Internet access in Xinjiang was effectively severed for 10 months

Background 2 2010 Google refuses to comply with legal requirements of content filtering in China Attempts to hack gmail accounts of human rights activists Google wanted to establish a truly free and open search engine or officially close Google.cn Google’s actions placed PRC’s censorship practices in the international spotlight China’s population means that even at 28.9% Internet penetration the country has the most Internet users in the world Mobile networking is important for bridging the rural/urban divide 10% of users access the Internet only on a mobile device Widespread use of Internet has led to a change in the public discourse and exposing corruption of government officials and even dismissal of senior officials

Internet filtering in china Initial project: Green Dam Youth Escort project Filtering at the level of the user’s computer Analysis by ONI + StopBadware showed that it wasn’t effective in blocking all pornography and would unpredictably block political and religious content Follow on project: “Blue Dam” with more features mandated to be installed by ISPs Server side/ISP-level blocking of content deemed to be inappropriate Blog services are also responsible for policing content on their sites Must install keyword filters + delete accounts of violating users More on this in the online social networking lecture …

Today’s readings Great Cannon Internet Censorship in China: Where Does the Filtering Occur? Xu et al. 2011

Hands on activity Online reports of Chinese censorship: https://en.greatfire.org/ http://www.herdict.org/explore/indepth?fc=CN http://www.google.com/transparencyreport/traffic/explorer/?r=CN &l=EVERYTHING China Chats data: https://china-chats.net/ Video chat censorship: https://www.usenix.org/sites/default/files/conference/protected- files/foci15_slides_knockel.pdf