CSE 592 INTERNET CENSORSHIP (FALL 2015) LECTURE 10 PHILLIPA GILL – STONY BROOK UNIVERSITY.

Slides:



Advertisements
Similar presentations
By Brian Langone. Internet censorship is essentially a method used by corporations, governments and others in order to filter what a user can view on.
Advertisements

Lesson 1. Course Outline E-Commerce and its types, Internet and WWW Basics, Internet standards and protocols, IP addressing, Data communication on internet,
ITIS 1210 Introduction to Web-Based Information Systems Chapter 44 How Firewalls Work How Firewalls Work.
Topic 2: Information Communication Internet Censorship in China From July 2009 Ürümqi Riots point of view Dan Ru ISYM-540-P 07/09/2009.
THE INTERNET IN CHINA 384 million users by the end of 2009 (Xinhua News Agency, Jan. 15, 2010) Top three uses are online music, online news and search.
Skills: none Concepts: log, IP address, URL, packet header and body, geo-location, anonymity, proxy server, advertising signals, hacking, social graph.
 Firewalls and Application Level Gateways (ALGs)  Usually configured to protect from at least two types of attack ▪ Control sites which local users.
Censorship Traditionally: Deletion of materials that the gorvernment or media considers to be objectionable Internet censorship often just blocks access.
Anonymity on the Internet Jess Wilson. Anonymizing Proxy What is a proxy? – An intermediary between you and the internet How does it make you anonymous?
Forced Internet Filtering Thomas Mahoney. Internet Filtering ► Techniques  Technical blocking  Search result removal  Take-Down  Self-Censorship ►
Concept Doppler: A weather Tracker For Internet Censorship Author: Jedidiah R. Crandall, Danial Zinn, Michael Byrd, Earl Barr, Rich East Presented At:
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. 6 Packet Filtering By Whitman, Mattord, & Austin© 2008 Course Technology.
Internet Basics.
Pro Exchange SPAM Filter An Exchange 2000 based spam filtering solution.
FIREWALL TECHNOLOGIES Tahani al jehani. Firewall benefits  A firewall functions as a choke point – all traffic in and out must pass through this single.
Mohammed Saiyeedur Rahman.  E-commerce is buying and selling goods over the internet. This could include selling/buying mobile phones, clothes or DVD’s.
By: Colby Shifflett Dr. Grossman Computer Science /01/2009.
Norman SecureSurf Protect your users when surfing the Internet.
Internet Censorship in China By Shipeng Xu. What content is censored? Social networks: Facebook, Twitter, Youtube and Flikr etc. Any news sources contains.
Packet Filtering. 2 Objectives Describe packets and packet filtering Explain the approaches to packet filtering Recommend specific filtering rules.
Chapter 6: Packet Filtering
Part 2  Access Control 1 CAPTCHA Part 2  Access Control 2 Turing Test Proposed by Alan Turing in 1950 Human asks questions to another human and a computer,
1 Semester 2 Module 10 Intermediate TCP/IP Yuda college of business James Chen
Implementing ISA Server Publishing. Introduction What Are Web Publishing Rules? ISA Server uses Web publishing rules to make Web sites on protected networks.
Firewall and Internet Access Mechanism that control (1)Internet access, (2)Handle the problem of screening a particular network or an organization from.
Internet Concept and Terminology. The Internet The Internet is the largest computer system in the world. The Internet is often called the Net, the Information.
1.1 What is the Internet What is the Internet? The Internet is a shared media (coaxial cable, copper wire, fiber optics, and radio spectrum) communication.
Lecture#1 on Internet. Internet Addressing IP address: pattern of 32 or 128 bits often represented in dotted decimal notation IP address: pattern of 32.
CSE 592 INTERNET CENSORSHIP (FALL 2015) LECTURE 03 PHILLIPA GILL STONY BROOK UNIVERSITY, COMPUTER SCIENCE ACKS: SLIDES BASED ON MATERIAL FROM NICK WEAVER’S.
Packet Filtering Chapter 4. Learning Objectives Understand packets and packet filtering Understand approaches to packet filtering Set specific filtering.
The Inter-network is a big network of networks.. The five-layer networking model for the internet.
Fundamentals of Proxying. Proxy Server Fundamentals  Proxy simply means acting on someone other’s behalf  A Proxy acts on behalf of the client or user.
Firewalls  Firewall sits between the corporate network and the Internet Prevents unauthorized access from the InternetPrevents unauthorized access from.
Network Security. 2 SECURITY REQUIREMENTS Privacy (Confidentiality) Data only be accessible by authorized parties Authenticity A host or service be able.
Scanning & Enumeration Lab 3 Once attacker knows who to attack, and knows some of what is there (e.g. DNS servers, mail servers, etc.) the next step is.
Securing the Network Infrastructure. Firewalls Typically used to filter packets Designed to prevent malicious packets from entering the network or its.
ConceptDoppler : A Weather Tracker for Internet censorship Presenter : 장 공 수.
McLean HIGHER COMPUTER NETWORKING Lesson 14 Firewalls & Filtering Comparison of Internet content filtering methods: firewalls, Internet filtering.
Internet Architecture and Governance
CSE 592 INTERNET CENSORSHIP (FALL 2015) LECTURE 08 PHILLIPA GILL – STONY BROOK UNIVERSITY.
CSE 592 INTERNET CENSORSHIP (FALL 2015) LECTURE 12.
1 Network Firewalls CSCI Web Security Spring 2003 Presented By Yasir Zahur.
Presentation by: Jennifer Collins Roldan Padilla.
CSE 592 INTERNET CENSORSHIP (FALL 2015) LECTURE 20 PHILLIPA GILL - STONY BROOK U.
CSE 592 INTERNET CENSORSHIP (FALL 2015) LECTURE 22 PHILLIPA GILL - STONY BROOK U.
Carol Spizzichino Fall 2015 YOUTUBE.
CSE 592 INTERNET CENSORSHIP (FALL 2015) LECTURE 16 PHILLIPA GILL - STONY BROOK U.
IT 210: Web-based IT Fall 2012 Lecture: Network Basics, OSI, & Internet Architecture.
Role Of Network IDS in Network Perimeter Defense.
Uploading Web Page  It would be meaningful to share your web page with the rest of the net user.  Thus, we have to upload the web page to the web server.
The Internet Technological Background. Topic Objectives At the end of this topic, you should be able to do the following: Able to define the Internet.
Regan Little. Definition Methods of Screening Types of Firewall Network-Level Firewalls Circuit-Level Firewalls Application-Level Firewalls Stateful Multi-Level.
Think / Pair / Share What are Human Rights?
The Great Firewall of China What is it and how does it work?
CS590B/690B Detecting network interference (Fall 2016)
CS590B/690B Detecting Network Interference (Fall 2016)
CS590B690B Detecting network interference
CS590/690 Detecting network interference Fall 2016
Practical Censorship Evasion Leveraging Content Delivery Networks
Host of Troubles : Multiple Host Ambiguities in HTTP Implementations
Think / Pair / Share What are Human Rights?
Introduction to Networking
Vocabulary Prototype: A preliminary sketch of an idea or model for something new. It’s the original drawing from which something real might be built or.
CS590B/690B Detecting network interference (Spring 2018)
CS590B/690B Detecting Network Interference Spring 2018
I. Basic Network Concepts
China is Losing a War Over Internet
Firewalls Routers, Switches, Hubs VPNs
Think / Pair / Share What are Human Rights?
Presentation transcript:

CSE 592 INTERNET CENSORSHIP (FALL 2015) LECTURE 10 PHILLIPA GILL – STONY BROOK UNIVERSITY

WHERE WE ARE Last time: Case study: Iran + Pakistan Questions? Revisit hands on activity … RIPEstat page for AS 12880: Try looking up other Iranian networks NDT data in Google ail=false&bcs=d&nselm=h&met_y=download_throughput&scale_y=lin&ind_y =false&rdim=country&idim=country:364&ifdim=country&ind=false OOKLA Speed test: _y=avg_download_speed

ASSIGNMENT 1 DISCUSSION Some questions led to confusion Part 1 Q2 who are the source and destination (most people got this): Source ICSI ; Destination Baidu (accepted anything from the destination whois since it was a weird looking record). Q3 Why did Wireshark flag Packet 8 as a retransmission? Q4 What is unusual about the response in packet 9? (there was a typo in this question, I reduced total by 3 for it) Q5 (most people got this): Is it the same device responding to packet 8 as the first GET (packet 4)?

ASSIGNMENT 1 DISCUSSION Some questions led to confusion Part 2 Q2 What is missing from the TCP connection? Handshake! Q3 Flow or packet level censor? (a lot of people had trouble with this!) Q4 What is returned in response to the HTTP GET? Part 3 On path or in path censor? Why?

TEST YOUR KNOWLEDGE (IRAN) 1.How did the government assert control over the Internet in 2001? 2.What were the conflicting goals of Iran in implementing censorship? 3.What was the end result of these? 4.What is the `campaign for halal Internet’? Why did people fear this? 5.What is the purpose of IP addresses designated in RFC1918? 6.What are two techniques used by Anderson to map an internal 10.x.x.x address to an external IP? 7.What is the idea of “dimming the Internet”? 8.How can “dimming” be measured? 9.How did the pseudonymous paper identify filtering based on the host header? 10.What type of proxy did they find?

TEST YOUR KNOWLEDGE (PAKISTAN) 1.Why is censorship in Pakistan well known? 2.Which protocol allowed collateral damage when they censored YouTube? 3.What is the main form of censorship in Pakistan identified by the Web censorship paper? 4.What are the most common circumvention techniques in Pakistan? 5.What are some circumvention techniques that were found to work for Pakistan censorship? 6.Which product did CitizenLab find in Pakistan? 7.How did they find the IP of installations of the product? 8.How did they verify that the installations were used for censorship?

TODAY Case Study: China Background (ONI report) Concept Doppler (Crandall et al.) Locating the censors (Xu et al.) Great Cannon  Seminar Tuesday October 1pm!

BACKGROUND China: one-party state, ruled by the Chinese Communist Party (CCP) Conflict between IT development and ability to contain sensitive or threatening information Several milestones challenged gov’t control: Anniversary of Tibetan Uprising in 2008: Protests in Lhasa 2008 Beijing Olympics, pressures to lessen censorship Foreign reporters had unprecedented access within the country Domestic news still highly restricted Unfettered Internet access for foreign journalists restricted to “games-related” Web sites 2009 Riots in Urumqi led to Internet restrictions to “quench the riot … and prevent violent” State sponsored Web site access (31 sites) slowly restored but Internet access in Xinjiang was effectively severed for 10 months

BACKGROUND Google refuses to comply with legal requirements of content filtering in China Attempts to hack gmail accounts of human rights activists Google wanted to establish a truly free and open search engine or officially close Google.cn Google’s actions placed PRC’s censorship practices in the international spotlight China’s population means that even at 28.9% Internet penetration the country has the most Internet users in the world Mobile networking is important for bridging the rural/urban divide 10% of users access the Internet only on a mobile device Widespread use of Internet has led to a change in the public discourse and exposing corruption of government officials and even dismissal of senior officials

INTERNET FILTERING IN CHINA Initial project: Green Dam Youth Escort project Filtering at the level of the user’s computer Analysis by ONI + StopBadware showed that it wasn’t effective in blocking all pornography and would unpredictably block political and religious content Follow on project: “Blue Dam” with more features mandated to be installed by ISPs Server side/ISP-level blocking of content deemed to be inappropriate Blog services are also responsible for policing content on their sites Must install keyword filters + delete accounts of violating users More on this in the online social networking lecture …

TODAY’S READINGS ConceptDoppler: A Weather Tracker for Internet Censorship. Crandall et al Internet Censorship in China: Where Does the Filtering Occur? Xu et al. 2011

CONCEPTDOPPLER Goals: Develop the capability to monitor both the technical censorship mechanism and how it is used E.g., to answer questions such as why was “keyword blocked” in a given place and time Focus on keyword blocking: less collateral damage, less negative fall out than blunt censorship techniques Specific aim to monitor the set of blocked keywords over time and monitor for variations between regions Useful for circumvention (e.g., encoding keywords to make them unidentifiable to DPI boxes). The need for continuous monitoring of censored keywords requires efficient probing: Latent semantic analysis + techniques from Web search to minimize the set of keywords that must be probed.

EXPERIMENT 1 TEST GFC 72 hours of HTTP GETs to 1.Send FALUN (blocked keyword) until a RST is received 2.Switch to send TEST (benign word) until a valid HTTP response is received Observation: hosts are blocked from communicating for 90 seconds after sending the bad keyword.

RESULTS: BLOCKING IS NOT 100% RELIABLE White = not blocked; grey = blocked X = 0 is 15:00 in Beijing Y = # of probes Diurnal trends in filtering effectiveness

EXPERIMENT 2: FIND GFC FIREWALLS Target URLs probed = top 100 URLs returned by Google for the queries: site:x where X=.cn,.com.cn,.edu.cn,.org.cn, and.net.cn No RSTs observed if the connection was not open -> GFC is stateful

WHERE ARE THE CENSORS?

FINDING KEYWORDS EFFICIENTLY Latent semantic analysis (LSA) to find keywords related to concepts the government might filter Details of LSA in the paper. Experimental set up: Gather all the pages of Chinese language Wikipedia 12 term lists based on 12 general concepts (terms are selected to be most related to the concept via LSA) Probed 2,500 terms from each of the 12 lists

NUMBER OF KEYWORDS FOUND X axis = bins of 250 keywords Y axis = # of blocked keywords found Key takeaway: 2,500 tested terms selected via LSA contains many more Blocked keywords than randomly chosen terms

LIMITATIONS Scale: Querying each 2,500 word list takes hours; heavy use of network resources False positives + false negatives No way to claim these lists are exhaustive … Potentials for evation: If we know what keywords are filtered when we observe them we can be clever and hide them E.g., fragment IP packets on the keyword, HTML comments in the word: fa lun Use different encodings for keywords: F%61lun Gong Put keywords in Captchas or insert other characters: g0ng

READING 2: MAPPING THE GFC Presentation

HANDS ON ACTIVITY Online reports of Chinese censorship: &l=EVERYTHING China Chats data: Video chat censorship: files/foci15_slides_knockel.pdf