ConceptDoppler : A Weather Tracker for Internet censorship Presenter : 장 공 수.

Slides:



Advertisements
Similar presentations
Multicast congestion control on many-to- many videoconferencing Xuan Zhang Network Research Center Tsinghua University, China.
Advertisements

© 2015 Imperva, Inc. All rights reserved. Collateral DDoS Ido Leibovich, ADC.
11 TROUBLESHOOTING Chapter 12. Chapter 12: TROUBLESHOOTING2 OVERVIEW  Determine whether a network communications problem is related to TCP/IP.  Understand.
Network Security Topologies Chapter 11. Learning Objectives Explain network perimeter’s importance to an organization’s security policies Identify place.
How do Networks work – Really The purposes of set of slides is to show networks really work. Most people (including technical people) don’t know Many people.
 Firewalls and Application Level Gateways (ALGs)  Usually configured to protect from at least two types of attack ▪ Control sites which local users.
1 A survey of Internet Topology Discovery. 2 Outline Motivations Internet topology IP Interface Level Router Level AS Level PoP Level.
Page: 1 Director 1.0 TECHNION Department of Computer Science The Computer Communication Lab (236340) Summer 2002 Submitted by: David Schwartz Idan Zak.
Chapter Extension 7 How the Internet Works © 2008 Prentice Hall, Experiencing MIS, David Kroenke.
Forced Internet Filtering Thomas Mahoney. Internet Filtering ► Techniques  Technical blocking  Search result removal  Take-Down  Self-Censorship ►
Concept Doppler: A weather Tracker For Internet Censorship Author: Jedidiah R. Crandall, Danial Zinn, Michael Byrd, Earl Barr, Rich East Presented At:
Web and Internet Part I ST: Introduction to Web Interface Design Prof. Angela Guercio Spring 2007.
Authors: Thomas Ristenpart, et at.
Chapter Subnets in TCP/IP Networks © N. Ganesan, Ph.D.
Lesson 19 Internet Basics.
Firewalls and VPNS Team 9 Keith Elliot David Snyder Matthew While.
TCP/IP.
Pro Exchange SPAM Filter An Exchange 2000 based spam filtering solution.
1 Proceeding the Second Exercises on Computer and Systems Engineering Professor OKAMURA Laboratory. Othman Othman M.M.
Guide to TCP/IP, Third Edition
TCP/IP Protocol Suite 1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 9 Internet Control Message.
Packet Filtering. 2 Objectives Describe packets and packet filtering Explain the approaches to packet filtering Recommend specific filtering rules.
Lecturer: Ghadah Aldehim
Chapter 4. After completion of this chapter, you should be able to: Explain “what is the Internet? And how we connect to the Internet using an ISP. Explain.
© British Telecommunications plc Network Filtering.
Enabling Embedded Systems to access Internet Resources.
Networks QUME 185 Introduction to Computer Applications.
CSE 592 INTERNET CENSORSHIP (FALL 2015) LECTURE 03 PHILLIPA GILL STONY BROOK UNIVERSITY, COMPUTER SCIENCE ACKS: SLIDES BASED ON MATERIAL FROM NICK WEAVER’S.
CIS 450 – Network Security Chapter 3 – Information Gathering.
Copyright © Lopamudra Roychoudhuri
Module 10: Monitoring ISA Server Overview Monitoring Overview Configuring Alerts Configuring Session Monitoring Configuring Logging Configuring.
CONTENTS  INTRODUCTION.  KEYWORDS  WHAT IS FIREWALL ?  WHY WE NEED FIREWALL ?  WHY NOT OTHER SECURITY MECHANISM ?  HOW FIREWALL WORKS ?  WHAT IT.
Chapter 8 Cookies And Security JavaScript, Third Edition.
Firewalls. Intro to Firewalls Basically a firewall is a __________to keep destructive forces away from your ________ ____________.
An Overview of the Internet: The Internet: Then and Now How the Internet Works Major Features of the Internet.
Code Red Worm Propagation Modeling and Analysis Cliff Changchun Zou, Weibo Gong, Don Towsley Univ. Massachusetts, Amherst.
Delivery, Forwarding, and Routing of IP Packets
McLean HIGHER COMPUTER NETWORKING Lesson 14 Firewalls & Filtering Comparison of Internet content filtering methods: firewalls, Internet filtering.
Internet Architecture and Governance
CSE 592 INTERNET CENSORSHIP (FALL 2015) LECTURE 10 PHILLIPA GILL – STONY BROOK UNIVERSITY.
1 UNIT 13 The World Wide Web Lecturer: Kholood Baselm.
CSE 592 INTERNET CENSORSHIP (FALL 2015) LECTURE 08 PHILLIPA GILL – STONY BROOK UNIVERSITY.
CSE 592 INTERNET CENSORSHIP (FALL 2015) LECTURE 12.
Computer Networking.  The basic tool for observing the messages exchanged between executing protocol entities  Captures (“sniffs”) messages being sent/received.
CSE 592 INTERNET CENSORSHIP (FALL 2015) LECTURE 22 PHILLIPA GILL - STONY BROOK U.
1 Kyung Hee University Chapter 6 Delivery Forwarding, and Routing of IP Packets.
70-293: MCSE Guide to Planning a Microsoft Windows Server 2003 Network, Enhanced Chapter 4: Planning and Configuring Routing and Switching.
1 Centroid Based multi-document summarization: Efficient sentence extraction method Presenter: Chen Yi-Ting.
Firewalls A brief introduction to firewalls. What does a Firewall do? Firewalls are essential tools in managing and controlling network traffic Firewalls.
LSNDI RMRA 1 Design and troubleshooting M Clements.
PROXY SERVER Kalyani Ravi. A proxy server is essentially an electronic gatekeeper, residing between an organization's internal network and the Internet,
1 UNIT 13 The World Wide Web. Introduction 2 Agenda The World Wide Web Search Engines Video Streaming 3.
1 UNIT 13 The World Wide Web. Introduction 2 The World Wide Web: ▫ Commonly referred to as WWW or the Web. ▫ Is a service on the Internet. It consists.
Improving Security Over Ipv6 Authentication Header Protocol using IP Traceback and TTL Devon Thomas, Alex Isaac, Majdi Alharthi, Ali Albatainah & Abdelshakour.
Chapter Subnets in TCP/IP Networks © N. Ganesan, Ph.D.
FIREWALLS By k.shivakumar 08k81f0025. CONTENTS Introduction. What is firewall? Hardware vs. software firewalls. Working of a software firewalls. Firewall.
Ping and Traceroute by Aleisa A. Drivere Supervisor Graciela Perera.
The Great Firewall of China What is it and how does it work?
Behrouz A. Forouzan TCP/IP Protocol Suite, 3rd Ed.
Practical Censorship Evasion Leveraging Content Delivery Networks
Error and Control Messages in the Internet Protocol
Forwarding and Routing IP Packets
Packet Switching To improve the efficiency of transferring information over a shared communication line, messages are divided into fixed-sized, numbered.
Internet Control Message Protocol Version 4 (ICMPv4)
Design open relay based DNS blacklist system
HCC class lecture 13 comments
70-293: MCSE Guide to Planning a Microsoft Windows Server 2003 Network, Enhanced Chapter 4: Planning and Configuring Routing and Switching.
Introducing Schoolwires Forms & Surveys Module
IP Control Gateway (IPCG)
Subnets in TCP/IP Networks © N. Ganesan, Ph.D.
Presentation transcript:

ConceptDoppler : A Weather Tracker for Internet censorship Presenter : 장 공 수

Hanyang Univ. Computer Security Lab. Paper Information Title : ConceptDoppler : A Weather Tracker for Internet Censorship Authors : Jedidiah R. Crandall, Daniel Zinn, Michael Byrd Publish : ACM 2007

Hanyang Univ. Computer Security Lab. Content 1. INTRODUCTION 3. LSA-BASED THE PROBING 2. PROBING THE GFC 4. FUTURE WORK 5. CONCULSION

Hanyang Univ. Computer Security Lab. Called the “Great Firewall of China,” or “Golden Shield” –IP address blocking –DNS redirection –Legal restrictions –etc… –Keyword filtering Blog servers, chat, HTTP traffic All probing can be performed from outside of China 1. Introduction(1/3) ■ Internet Censorship in China

Hanyang Univ. Computer Security Lab. Where is the keyword filtering implemented? –Internet measurement techniques to locate the filtering routers What words are being censored? –Efficient probing via document summary techniques 1. Introduction(2/3) ■ This Research has Two Parts

Hanyang Univ. Computer Security Lab. ■ Keyword-based Censorship ● The ability to filter keywords is an effective tool for governments that censor the Internet. - Numerous techniques comprise censorship, including IP address blocking, DNS redirection, and a myriad of legal restictions, but the ability to filter keywords in URL requests or HTML responses allows a high granularity of control that achieves the censor’s goal with low cost. ( ※ Manually filtering web content can also be precise but is prohibitively expensive.). ● Censorship is an economic activity. - The Internet has economic benefits and more blunt methods of censorship than keyword filtering, such as blocking entire web sites or services, decrease those benefits ex) while the Chinese government has shut down service for entire ISPs, temporarily blocked Internet traffic from overseas universities, and could conceivably stop any flow of information, they have also been responsive to complaints about censorship from Chinese citizens. 1. Introduction(3/3)

Hanyang Univ. Computer Security Lab. 2. Probing The GFC(1/5) ■ ConceptDoppler’s Infrastructure They use the netfilter module Queue to capture all packets elicited by probes. They access these packets in Perl and Python scripts, using SWIG to wrap the system library libipq. They recorded all packets sent and received, in their entirety, in a PostgreSQL database. They experiments require the construction of TCP/IP packets. For this they used Scapy, a python library for packet manipulation.

Hanyang Univ. Computer Security Lab. 2. Probing The GFC(2/5) ■ The GFC does not Filter peremptorily at All Time Target : They launched probes against for 72 hours. Method - They started by sending “FALUN” (a known filtered keyword) until they received RSTs from the GFC at which point they switched to “TEST” (a word known to not be filtered) until they got a valid HTTP response to our GET request. - After each test that provoked a RST, They waited for 30 seconds before probing with “TEST”; after tests that did not trigger RSTs, they waited for 5 seconds, then probed with “FALUN”. Slipping Filtered Keywords Through

Hanyang Univ. Computer Security Lab. 2. Probing The GFC(3/5) ■ Filtering Statistics From 00:00 to 24:00 The x-axis is the time of day and the y-axis is measured in individual probes. What is most important to notice in Figure is that there are diurnal patterns, with the GFC filtering becoming less effective sometimes more than one fourth of offending packets through, possibly during busy Internet traffic periods. (A value of 0 on the x-axis of Figure corresponds to midnight 00:00 Pacific Standard Time which is 3 in the afternoon 15:00 in Beijing.)

Hanyang Univ. Computer Security Lab. 2. Probing The GFC(4/5) ■ Discovering GFC Routers The goal of this experiment To identify the IP address of the first GFC router between our probing site s and t, a target web site within China, as shown in Figure. The general idea of the experiment To increase the TTL field of the packets They send out, starting from low values corresponding to routers outside of China. To identify GFC routers, Algorithm 1 randomly selects a target IP address from T, the list of targets compiled above.

Hanyang Univ. Computer Security Lab. 2. Probing The GFC(5/5) Filtering does not always, or even principally, occur at the first hop into China’s address space, with only 29.6% of filtering occurring at the first hop and 11.8% occurring beyond the third, with as many as 13 hops in one case; and Routers within CHINANET-* perform 83.3% of all filtering. ☞ GFC ≠ Firewall

Hanyang Univ. Computer Security Lab. 3. LSA-Based Probing(1/4) ■ Discovering Blacklisted Keywords Using LSA To test for new filtered keywords efficiently, They must try only words that are related to concepts that they suspect the government might filter. Latent semantic analysis(LSA) is a way to summarize the semantics of a corpus of text conceptually. ■ Reason of Using LSA They encoded the terms with UTF-8 HTTP encoding and tested each against search.yahoo.cn.com, waiting 100 seconds after a RST and 5 seconds otherwise. A RST packet indicates that a word was filtered and is therefore on the blacklist. Then by manual filtering they removed 56 false positives from the final filtered keyword list.

Hanyang Univ. Computer Security Lab. LSA Background(1/2) ■ What is LSA? Latent semantic analysis Word-document model describes the occurrences of terms in documents ■ LSA Word-document matrix W X = d 1 d d j d N w1w2wiwMw1w2wiwM w ij w ij : weight(importance) tf ij : j-th terms’s count in i-th documents df j :i-th document’s count in j-th term’s

Hanyang Univ. Computer Security Lab. T o : orthogonal, unit-length columns D o : orthogonal, unit-length columns S o : Diagonal Matrix t : Matrix X’s terms d : Matirx X’s documents m : Matix X’s rank (< min(t,d)) T : t × k S : k × k D’ : k × d LSA Background(2/2) Example

Hanyang Univ. Computer Security Lab. ■ Start With a Large Corpus (Wikipedia of Chinese-lang) 3. LSA-Based Probing(2/4) ■ LSA of Chinese Wikipedia n=94,863 documents and m=942,033 terms

Hanyang Univ. Computer Security Lab. 3. LSA-Based Probing(4/4) ■ LSA Results In total, they discovered 122 unknown keywords.

Hanyang Univ. Computer Security Lab. 4. Future Work ■ Discovering Unknown Keywords 1.Applying LSA to larger Chinese corpuses 2.Keeping the corpus up-to-date on current events 3.Technical implementation 4.Implementation possibilities 5.HTML responses 6.More complex rulesets 7.Imprecise filtering(ex : breasts, Cancer-breasts) ■ Internet Measurement 1.IP tunneling or traffic engineering. 2.IXPs Technical implementation. 3.Route dependency. 4.HTML responses. 5.Destination dependency.

Hanyang Univ. Computer Security Lab. 5. Conclusions GFC keyword filtering is more a panopticon than a firewall motivating surveillance rather than evasion as a focus of technical research. ☞ GFC ≠ Firewall, GFC ≈ Panopticon Probing the GFC is arduous motivating efficient probing via LSA

Hanyang Univ. Computer Security Lab. © The New Yorker Collection 1993 Peter Steiner from cartoonlink.com. All rights reserved. Thank you very much !!!