Skip to main content

Leveraging Internet Services to Evade Censorship

  • Conference paper
  • First Online:
Information Security (ISC 2016)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 9866))

Included in the following conference series:

Abstract

Free and uncensored access to the Internet is an important right nowadays. Repressive regimes, however, prevent their citizens from freely using the Internet and utilize censorship to suppress unwanted content. To overcome such filtering, researchers introduced circumvention systems that avoid censorship by cloaking and redirecting the censored traffic through a legitimate channel. Sadly, this solution can raise alerts to censors, especially when it is mistakenly used. In this paper, we argue that relying on a single channel is not sufficient to evade censorship since the usage pattern of a circumvention system differs compared to a legitimate use of a service. To address this limitation of state-of-the-art systems, we introduce Camouflage, an approach to combine multiple non-blocked communication protocols and dynamically switch among these tunnels. Each protocol is only used for a limited amount of time and the Internet connection is transparently routed through instances of different censorship circumvention systems. We prototype Camouflage by using applications which are based on these protocols and also offer end-to-end encryption to prevent censors from distinguishing circumvention systems from regular services. We evaluate Camouflage in countries that impose censorship and demonstrate that our approach can successfully bypass existing censorship systems while remaining undetected.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. MailMyWeb, June 2013. http://www.mailmyweb.com

  2. The Foe Project, November 2013. https://code.google.com/p/foe-project

  3. Berthold, O., Federrath, H., Köpsell, S.: Web MIXes: a system for anonymous and unobservable internet access. In: Federrath, H. (ed.) Designing Privacy Enhancing Technologies. LNCS, vol. 2009, pp. 115–129. Springer, Heidelberg (2001)

    Chapter  Google Scholar 

  4. Boyan, J.: The anonymizer - protecting user privacy on the web. Comput. Mediated Commun. Mag. 4(9) (1997)

    Google Scholar 

  5. Burnett, S., Feamster, N., Vempala, S.: Chipping away at censorship firewalls with user-generated content. In: USENIX Security Symposium (2010)

    Google Scholar 

  6. Castelluccia, C., De Cristofaro, E., Francillon, A., Kaafar, M.-A.: EphPub: toward robust Ephemeral Publishing. In: IEEE International Conference on Network Protocols (2011)

    Google Scholar 

  7. Chaum, D.L.: Untraceable electronic mail, return addresses, and digital pseudonyms. Commun. ACM 24(2), 84–90 (1981)

    Article  Google Scholar 

  8. Chui, M., Manyika, J., Bughin, J., Dobbs, R., Roxburgh, C., Sarrazin, H., Westergren, M.: The Social Economy: Unlocking Value and Productivity Through Social Technologies. McKinsey, New York (2012)

    Google Scholar 

  9. Crandall, J.R., Zinn, D., Byrd, M., Barr, E.T., East, R.: ConceptDoppler: a weather tracker for internet censorship. In: ACM Conference on Computer and Communications Security, CCS (2007)

    Google Scholar 

  10. Crispin, J.: The importance of VoIP and a business continuity plan for business survival, June 2011. http://www.tech2date.com/the-importance-of-voip-and-a-business-continuity-plan-for-business-survival.html

  11. Dai, W.: Pipenet 1.1. Usenet post (1996)

    Google Scholar 

  12. Dainotti, A., Squarcella, C., Aben, E., Claffy, K.C., Chiesa, M., Russo, M., Pescapé, A.: Analysis of country-wide internet outages caused by censorship. In: ACM SIGCOMM Conference on Internet Measurement, IMC (2011)

    Google Scholar 

  13. Danezis, G., Dingledine, R., Mathewson, N.: Mixminion: design of a type III anonymous remailer protocol. In: IEEE Symposium on Security and Privacy (2003)

    Google Scholar 

  14. Dingledine, R.: Tor and circumvention: lessons learned. In: Rogaway, P. (ed.) CRYPTO 2011. LNCS, vol. 6841, pp. 485–486. Springer, Heidelberg (2011)

    Chapter  Google Scholar 

  15. Dingledine, R., Mathewson, N.: Design of a blocking-resistant anonymity system. The Tor Project, Technical report, 11:15–16 (2006)

    Google Scholar 

  16. Dingledine, R., Mathewson, N., Syverson, P.: Tor: the second-generation onion router. In: USENIX Security Symposium (2004)

    Google Scholar 

  17. Douglas, T.L.: The importance of VoIP, May 2010. http://ezinearticles.com/?The-Importance-of-VoIP&id=4278231

  18. Dynamic Internet Technology: Dynaweb, November 2013. http://www.dit-inc.us/dynaweb

  19. Feamster, N., Balazinska, M., Harfst, G., Balakrishnan, H., Karger, D.R.: Infranet: circumventing web censorship and surveillance. In: USENIX Security Symposium (2002)

    Google Scholar 

  20. Feamster, N., Balazinska, M., Wang, W., Balakrishnan, H., Karger, D.R.: Thwarting web censorship with untrusted messenger discovery. In: Dingledine, R. (ed.) PET 2003. LNCS, vol. 2760, pp. 125–140. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

  21. Geambasu, R., Kohno, T., Levy, A.A., Levy, H.M.: Vanish: increasing data privacy with self-destructing data. In: USENIX Security Symposium (2009)

    Google Scholar 

  22. Geddes, J., Schuchard, M., Hopper, N.: Cover your ACKs: pitfalls of covert channel censorship circumvention. In: ACM Conference on Computer and Communications Security, CCS (2013)

    Google Scholar 

  23. Global Internet Freedom Consortium (GIFC): The great firewall revealed, December 2002. http://www.internetfreedom.org/files/WhitePaper/ChinaGreatFirewallRevealed.pdf

  24. Gulcu, C., Tsudik, G.: Mixing e-mail with Babel. In: ISOC Network and Distributed System Security Symposium, NDSS (1996)

    Google Scholar 

  25. Houmansadr, A., Brubaker, C., Shmatikov, V.: The parrot is dead: observing unobservable network communications. In: IEEE Symposium on Security and Privacy (2013)

    Google Scholar 

  26. Houmansadr, A., Riedl, T., Borisov, N., Singer, A.: I want my voice to be heard: IP over Voice-over-IP for unobservable censorship circumvention. In: ISOC Network and Distributed System Security Symposium, NDSS (2013)

    Google Scholar 

  27. Leberknight, C.S., Chiang, M., Poor, H.V., Wong, F.: A taxonomy of internet censorship and anti-censorship, December 2012. http://www.princeton.edu/chiangm/anticensorship.pdf

  28. Leiba, B.: RFC 2177: IMAp. 4 IDLE Command, June 1997

    Google Scholar 

  29. Leskovec, J., Horvitz, E.: Planetary-scale views on a large instant-messaging network. In: International Conference on World Wide Web, WWW (2008)

    Google Scholar 

  30. Levine, B.N., Shields, C.: Hordes: a multicast based protocol for anonymity. J. Comput. Secur. 10(3), 213–240 (2002)

    Article  Google Scholar 

  31. MacKinnon, R.: Race to the bottom-corporate complicity in Chinese internet censorship. In: Human Rights Watch, HRW (2009)

    Google Scholar 

  32. Mathewson, N.: The Tor project - a simple obfuscating proxy, November 2013. https://gitweb.torproject.org/obfsproxy.git

  33. McCoy, D., Morales, J.A., Levchenko, K.: Proximax: a measurement based system for proxies dissemination. In: International Conference on Financial Cryptography and Data Security, FC (2011)

    Google Scholar 

  34. McMillan, R.: China’s great firewall spreads overseas, March 2010. http://www.networkworld.com/news/2010/032510-chinas-great-firewall-spreads.html

  35. Moghaddam, H.M., Li, B., Derakhshani, M., Goldberg, I.: SkypeMorph: protocol obfuscation for Tor bridges. In: ACM Conference on Computer and Communications Security, CCS (2012)

    Google Scholar 

  36. Papadopoulos, P., Papadogiannakis, A., Polychronakis, M., Zarras, A., Holz, T., Markatos, E.P.: K-subscription: privacy-preserving microblogging browsing through obfuscation. In: Annual Computer Security Applications Conference, ACSAC (2013)

    Google Scholar 

  37. Perlman, R.: The ephemerizer: making data disappear. J. Inf. Syst. Secur. (JISSec) 1, 51–68 (2005)

    Google Scholar 

  38. Serjantov, A., Sewell, P.: Passive attack analysis for connection-based anonymity systems. In: Snekkenes, E., Gollmann, D. (eds.) ESORICS 2003. LNCS, vol. 2808, pp. 116–131. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

  39. Sherwood, R., Bhattacharjee, B., Srinivasan, A.: \(P^5\): a protocol for scalable anonymous communication. In: IEEE Symposium on Security and Privacy (2002)

    Google Scholar 

  40. Statista: Daily time spent playing video games per capita in the United States, September 2014. http://www.statista.com/statistics/186960/time-spent-with-videogames-in-the-us-since-2002

  41. Statistic Brain: Skype statistics, September 2012. http://www.statisticbrain.com/skype-statistics

  42. Ultrareach Internet Corporation: Ultrasurf, November 2013. http://www.ultrasurf.us

  43. Walsh, K., Sirer, E.G.: Experience with an object reputation system for peer-to-peer filesharing. In: USENIX Symposium on Networked Systems Design and Implementation, NSDI (2006)

    Google Scholar 

  44. Wang, Q., Gong, X., Nguyen, G.T., Houmansadr, A., Borisov, N.: CensorSpoofer: asymmetric communication using IP spoofing for censorship-resistant web browsing. In: ACM Conference on Computer and Communications Security, CCS (2012)

    Google Scholar 

  45. Weinberg, Z., Wang, J., Yegneswaran, V., Briesemeister, L., Cheung, S., Wang, F., Boneh, D.: StegoTorus: a camouflage proxy for the Tor anonymity system. In: ACM Conference on Computer and Communications Security, CCS (2012)

    Google Scholar 

  46. Wilkins, B.: 25 shocking facts about Chinese censorship, July 2009. http://www.onlinecollege.org/2009/07/05/25-shocking-facts-about-chinese-censorship

  47. Zander, S., Armitage, G., Branch, P.: Covert channels in multiplayer first person shooter online games. In: IEEE Conference on Local Computer Networks, LCN (2008)

    Google Scholar 

  48. Zander, S., Armitage, G., Branch, P.: Reliable transmission over covert channels in first person shooter multiplayer games. In: IEEE Conference on Local Computer Networks, LCN (2009)

    Google Scholar 

  49. Zarras, A., Kohls, K., Dürmuth, M., Pöpper, C.: Neuralyzer: flexible expiration times for the revocation of online data. In: ACM Conference on Data and Application Security and Privacy, CODASPY (2016)

    Google Scholar 

  50. Zhou, W., Houmansadr, A., Caesar, M., Borisov, N.: SWEET: serving the web by exploiting email tunnels. In: Privacy Enhancing Technologies Symposium, PETS (2013)

    Google Scholar 

  51. Zhu, T., Bronk, C., Wallach, D.S.: An analysis of Chinese search engine filtering. arXiv preprint arXiv:1107.3794 (2011)

  52. Zhu, T., Phipps, D., Pridgen, A., Crandall, J.R., Wallach, D.S.: The velocity of censorship: high-fidelity detection of microblog post deletions. In: USENIX Security Symposium (2013)

    Google Scholar 

Download references

Acknowledgments

The research was supported by the German Federal Ministry of Education and Research under grant 16KIS0328 (IUNO).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Apostolis Zarras .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer International Publishing Switzerland

About this paper

Cite this paper

Zarras, A. (2016). Leveraging Internet Services to Evade Censorship. In: Bishop, M., Nascimento, A. (eds) Information Security. ISC 2016. Lecture Notes in Computer Science(), vol 9866. Springer, Cham. https://doi.org/10.1007/978-3-319-45871-7_16

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-45871-7_16

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-45870-0

  • Online ISBN: 978-3-319-45871-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics