Concept Doppler: A weather Tracker For Internet Censorship Author: Jedidiah R. Crandall, Danial Zinn, Michael Byrd, Earl Barr, Rich East Presented At:

Slides:



Advertisements
Similar presentations
Web Content Control Application Providing Secure & Reliable Internet Access December 2010.
Advertisements

Ch. 2 Protocol Architecture. 2.1 The Need for a Protocol Architecture Same set of layered functions need to exist in the two communicating systems. Key.
Ningning HuCarnegie Mellon University1 Optimizing Network Performance In Replicated Hosting Peter Steenkiste (CMU) with Ningning Hu (CMU), Oliver Spatscheck.
© 2015 Imperva, Inc. All rights reserved. Collateral DDoS Ido Leibovich, ADC.
Censorship Resistance: Decoy Routing Amir Houmansadr CS660: Advanced Information Assurance Spring 2015 Content may be borrowed from other resources. See.
ConceptDoppler: A Weather Tracker for Internet Censorship Jedidiah R. Crandall Joint work with Daniel Zinn, Michael Byrd, Earl Barr,
ConceptDoppler: A Weather Tracker for Internet Censorship Jedidiah R. Crandall Joint work with Daniel Zinn, Michael Byrd, Earl Barr,
Censorship Traditionally: Deletion of materials that the gorvernment or media considers to be objectionable Internet censorship often just blocks access.
1 Some TCP/IP Basics....NFSDNSTELNETSMTPFTP UDPTCP IP and ICMP Ethernet, serial line,..etc. Application Layer Transport Layer Network Layer Low-level &
TCP/IP Network and Firewall. IP Packet Protocol  1 ICMP packet  6 TCP packet  17 UDP packet.
Prepared By E.Musa Alyaman1 Networking Theory Chapter 1.
Freedom of Expression Harun Kotan ITEC317 Harun Kotan ITEC317.
1 Enabling Secure Internet Access with ISA Server.
Firewalls CS158B Don Tran. What is a Firewall? A firewall can be a program or a device that controls access to a network.
Internet Censorship in China By Shipeng Xu. What content is censored? Social networks: Facebook, Twitter, Youtube and Flikr etc. Any news sources contains.
Module 1: Reviewing the Suite of TCP/IP Protocols.
Chinese internet control: Corporate collaboration Rebecca MacKinnon 4/20/2006
9/11/2015Home Networking1 Bob.test Have Road Runner Unhappy about reports of constant probes of machines Policy decision –I want to prevent unauthorized.
4: Network Layer4a-1 IP addresses: how to get one? Hosts (host portion): r hard-coded by system admin in a file r DHCP: Dynamic Host Configuration Protocol:
Part 2  Access Control 1 CAPTCHA Part 2  Access Control 2 Turing Test Proposed by Alan Turing in 1950 Human asks questions to another human and a computer,
ConceptDoppler: A Weather Tracker for Internet Censorship Jedidiah R. Crandall Joint work with Daniel Zinn, Michael Byrd, Earl Barr, and Rich East This.
Adrian Crenshaw. Darknets  There are many definitions, but mine is “anonymizing private networks ”  Use of encryption.
Access Control List ACL. Access Control List ACL.
FIREWALKING. KNOW YOUR ENEMY: FIREWALLS What is a firewall? A device or set of devices designed to permit or deny network transmissions based upon a set.
CSE 592 INTERNET CENSORSHIP (FALL 2015) LECTURE 03 PHILLIPA GILL STONY BROOK UNIVERSITY, COMPUTER SCIENCE ACKS: SLIDES BASED ON MATERIAL FROM NICK WEAVER’S.
Web Filtering and Censoring This paper appears in: Computer Issue Date : March 2010 Volume : 43, Issue:3 On page(s): 94 ISSN : INSPEC Accession.
Chapter 20 – Firewalls The function of a strong position is to make the forces holding it practically unassailable —On War, Carl Von Clausewitz.
1 © 2004 Cisco Systems, Inc. All rights reserved. CCNA 2 v3.1 Module 11 Access Control Lists (ACLs)
Firewalls. Intro to Firewalls Basically a firewall is a __________to keep destructive forces away from your ________ ____________.
SOS: Security Overlay Service Angelos D. Keromytis, Vishal Misra, Daniel Rubenstein- Columbia University ACM SIGCOMM 2002 CONFERENCE, PITTSBURGH PA, AUG.
Access Control List (ACL)
 network appliances to filter network traffic  filter on header (largely based on layers 3-5) Internet Intranet.
© 2006 Cisco Systems, Inc. All rights reserved. Cisco IOS Threat Defense Features.
ConceptDoppler : A Weather Tracker for Internet censorship Presenter : 장 공 수.
McLean HIGHER COMPUTER NETWORKING Lesson 14 Firewalls & Filtering Comparison of Internet content filtering methods: firewalls, Internet filtering.
CSE 592 INTERNET CENSORSHIP (FALL 2015) LECTURE 10 PHILLIPA GILL – STONY BROOK UNIVERSITY.
CSE 592 INTERNET CENSORSHIP (FALL 2015) LECTURE 12.
Workpackage 3 New security algorithm design ICS-FORTH Ipswich 19 th December 2007.
Network Sniffer Anuj Shah Advisor: Dr. Chung-E Wang Department of Computer Science.
ACCESS CONTROL LIST.
2015/12/121 Extracting Key Terms From Noisy and Multi-theme Documents Maria Grineva, Maxim Grinev and Dmitry Lizorkin Proceeding of the 18th International.
Security fundamentals Topic 10 Securing the network perimeter.
Tracking Rejected Traffic.  When creating Cisco router access lists, one of the greatest downfalls of the log keyword is that it only records matches.
CSE 592 INTERNET CENSORSHIP (FALL 2015) LECTURE 22 PHILLIPA GILL - STONY BROOK U.
Configuring Network Connectivity Lesson 7. Skills Matrix Technology SkillObjective DomainObjective # Using the Network and Sharing Center Use the Network.
AQA A2 COMP 3: Internet Security. Lesson Aim By the end of the lesson: By the end of the lesson: Describe different security issues and recommend tools/techniques.
Access Control List (ACL) W.lilakiatsakun. Transport Layer Review (1) TCP (Transmission Control Protocol) – HTTP (Web) – SMTP (Mail) UDP (User Datagram.
KYUNG-HWA KIM HENNING SCHULZRINNE 12/09/2008 INTERNET REAL-TIME LAB, COLUMBIA UNIVERSITY DYSWIS.
Passive Duplicate Address Detection (DAD) Sangho Shin Andrea Forte Henning Schulzrinne Columbia University.
FIREWALLS Created and Presented by: Dawn Blitch & Fredda Hutchinson.
Latent Semantic Analysis (LSA) Jed Crandall 16 June 2009.
An Effective Defense Against Spam Laundering Author: Mengjun Xie, Heng Yin, Haining Wang Presented At: CCS’ 06 Prepared By: Amit Shrivastava.
ConceptDoppler: A Weather Tracker for Internet Censorship Daniel Zinn Joint work with Jedidiah R. Crandall, Michael Byrd, Earl Barr, and Rich East.
Security Benefits of Firewall Protection
أمن المعلومات لـ أ. عبدالرحمن محجوب حمد mtc.edu.sd أمن المعلومات Information Security أمن المعلومات Information Security  أ. عبدالرحمن محجوب  Lec (5)
The Great Firewall of China What is it and how does it work?
NET 536 Network Security Firewalls and VPN
CS590B/690B Detecting network interference (Fall 2016)
CS590B/690B Detecting Network Interference (Fall 2016)
CS590B690B Detecting network interference
Firewall Exercise.
CS590B/690B Detecting network interference (Spring 2018)
The Challenges of DNS Resolution in China Tim Hale, Solutions Engineer.
Session 3 Response Measure
Design open relay based DNS blacklist system
Introduction of KNS55 Platform
Firewalls.
服务外包概论 Basics of Service Outsourcing
DNS Cache Poisoning.
No-Jump-into-Latency in China's Internet
Presentation transcript:

Concept Doppler: A weather Tracker For Internet Censorship Author: Jedidiah R. Crandall, Danial Zinn, Michael Byrd, Earl Barr, Rich East Presented At: 14 th ACM Conference on CCS, 29-Nov 2007 Prepared By: Amit Shrivastava

Understanding the relationship between sensitive concepts and blocked keywords will lead to more effective tracking of Internet censorship. Motivation

Experiment Great Firewall of China (GFC) is a system set up by the Chinese government for censoring the Internet.  Concept Doppler : An architecture to track the list of keywords that a government uses to censor Internet using GFC (Great firewall of china) LSA (Latent Semantic analysis) an efficient way to produce a blacklist of censored words via probing.

Internet Censorship in China Called the “Great Firewall of China,” or “Golden Shield” IP address blocking DNS redirection Legal restrictions etc… Keyword filtering Blog servers, chat, HTTP traffic

Censorship of GET Requests. GET falun.html RST

ConceptDoppler Framework

Discovering GFC Router

Locating Filtering Routers. TTL=2 falun ICMP Error TTL=1 falun RST

First Hops ChinaNET performed 77% of all filtering, and 99.1% of all filtering at the first hop

Latent Semantic Analysis.

LSA-Continuation ni,j is the number of occurrences of the considered term in document dj, the denominator is the number of occurrences of all terms in document dj. | D | : total number of documents in the corpus : number of documents where the term ti appears.

LSA-Continuation. the dot product between two term vectors gives the correlation between the terms over the documents. The matrix product XXT contains all these dot products.dot productcorrelationmatrix product the matrix XTX contains the dot products between all the document vectors, giving their correlation over the terms.

Result They found 122 key words

Contribution Paper Provided LSA which is an effective manner for understanding between sensitive concept and blocked keywords which led to more effective tracking of internet censorship.

Weekness ConceptDoppler functionality not clearly explained. Author has taken GFC for explaining conceptDoppler but its not certain weather his experiment will be effective in other network as well.

How to improve Detailed information about functionality of ConceptDoppler. Novel algorithm for LSA to get complete coverage of blacklist words.

. Thank You