Skip to main content

Proximax: Measurement-Driven Proxy Dissemination (Short Paper)

  • Conference paper

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 7035))

Abstract

Many people currently use proxies to circumvent government censorship that blocks access to content on the Internet. Unfortunately, the dissemination channels used to distribute proxy server locations are increasingly being monitored to discover and quickly block these proxies. This has given rise to a large number of ad hoc dissemination channels that leverage trust networks to reach legitimate users and at the same time prevent proxy server addresses from falling into the hands of censors. To address this problem in a more principled manner, we present Proximax, a robust system that continuously distributes pools of proxies to a large number of channels. The key research challenge in Proximax is to distribute the proxies among the different channels in a way that maximizes the usage of these proxies while minimizing the risk of having them blocked. This is challenging because of two conflicting goals: widely disseminating the location of the proxies to fully utilize their capacity and preventing (or at least delaying) their discovery by censors.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Wilson, D.: Burmese internet taken down with ddos attack (2010), http://www.techeye.net/internet/burmese-internet-taken-down-with-ddos-attack

  2. Moe, W.: No change as junta clamps down on suu kyi news (2010), http://www.irrawaddy.org/article.php?art_id=20151

  3. Mackinnon, R.: No quick fixes for internet freedom (2010), http://online.wsj.com/article/SB10001424052748704104104575622080860055498.html

  4. Huffington, A.: Facebook, twitter and the search for peace in the middle east (2010), http://www.huffingtonpost.com/arianna-huffington/facebook-twitter-and-the-_b_788378.html?ir=Technology

  5. Freegate - dynamic internet technology, http://www.dit-inc.us/freegate

  6. Tor bridges specification, http://gitweb.torproject.org/tor.git?a=blob_plain;hb=HEAD;f=doc/spec/bridges-spec.txt

  7. The proxy fight for iranian democracy (2009), http://www.renesys.com/blog/2009/06/the-proxy-fight-for-iranian-de.shtml

  8. MacKinnon, R.: China’s censorship arms race escalates (2009), http://www.circleid.com/posts/20090928_chinas_censorship_arms_race_escalates/

  9. Lewman, A.: Bridges and china, new thread (2010), http://archives.seul.org/or/talk/May-2010/msg00264.html

  10. Dingledine, R., Mathewson, N., Syverson, P.: Tor: The second-generation onion router. In: Proceedings of the 13th USENIX Security Symposium (August 2004)

    Google Scholar 

  11. Dingledine, R., Mathewson, N.: Design of a blocking-resistant anonymity system (2007), https://svn.torproject.org/svn/tor/tags/tor-0_2_0_19_alpha/doc/design-paper/blocking.pdf

  12. Proxy china - free anonymous surfing, http://www.proxychina.org/

  13. Psiphon design overview 1.0 (2009), http://psiphon.ca/documents/Psiphon_Design_Overview_1_0.pdf

  14. Sovran, Y., Libonati, A., Li, J.: Pass it on: Social networks stymie censors. In: 7th International Workshop on Peer-to-Peer Systems, IPTPS (2008)

    Google Scholar 

  15. Mahdian, M.: Fighting Censorship with Algorithms. In: Boldi, P. (ed.) FUN 2010. LNCS, vol. 6099, pp. 296–306. Springer, Heidelberg (2010)

    Chapter  Google Scholar 

  16. Burnett, S., Feamster, N., Vempala, S.: Chipping away at censorship firewalls with user-generated content. In: Usenix Security (August 2010)

    Google Scholar 

  17. Riden, J.: How fast-flux service networks work, http://www.honeynet.org/node/132

Download references

Author information

Authors and Affiliations

Authors

Editor information

George Danezis

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

McCoy, D., Morales, J.A., Levchenko, K. (2012). Proximax: Measurement-Driven Proxy Dissemination (Short Paper). In: Danezis, G. (eds) Financial Cryptography and Data Security. FC 2011. Lecture Notes in Computer Science, vol 7035. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-27576-0_21

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-27576-0_21

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-27575-3

  • Online ISBN: 978-3-642-27576-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics