CensorSpoofer: Asymmetric Communication with IP Spoofing for Censorship-Resistant Web Browsing
نویسندگان
چکیده
A key challenge in censorship-resistant web browsing is being able to direct legitimate users to redirection proxies while preventing censors, posing as insiders, from discovering their addresses and blocking them. We propose a new framework for censorship-resistant web browsing called CensorSpoofer that addresses this challenge by exploiting the asymmetric nature of web browsing traffic and making use of IP spoofing. CensorSpoofer decouples the upstream and downstream channels, using a low-bandwidth indirect channel for delivering outbound requests (URLs) and a high-bandwidth direct channel for downloading web content. The upstream channel hides the request contents using steganographic encoding within email or instant messages, whereas the downstream channel uses IP address spoofing so that the real address of the proxies is not revealed either to legitimate users or censors. We built a proof-of-concept prototype that uses encrypted VoIP for this downstream channel and demonstrated the feasibility of using the CensorSpoofer framework in a realistic environment.
منابع مشابه
IP over Voice-over-IP for censorship circumvention
Open communication over the Internet poses a serious threat to countries with repressive regimes, leading them to develop and deploy networkbased censorship mechanisms within their networks. Existing censorship circumvention systems face different difficulties in providing unobservable communication with their clients; this limits their availability and poses threats to their users. To provide ...
متن کاملDeltaShaper: Enabling Unobservable Censorship-resistant TCP Tunneling over Videoconferencing Streams
This paper studies the possibility of using the encrypted video channel of widely used videoconferencing applications, such as Skype, as a carrier for unobservable covert TCP/IP communications. We propose and evaluate different alternatives to encode information in the video stream in order to increase available throughput while preserving the packetlevel characteristics of the video stream. We...
متن کاملOptimizing World - Wide Web for Weakly Connected MobileWorkstations : An Indirect
Modern portable computers and wireless connections over cellular telephone networks have created a new platform for distributed information processing. We have designed a communication architecture that makes it possible to exploit the existing TCP/IP communication protocols but that also takes into account speciic features of cellular links. Our communication architecture is based on the conce...
متن کاملSSL-enabled trusted communication: Spoofing and protecting the non-cautious users
The anti-spoofing community has been intensively proposing new methods for defending against new web-spoofing techniques. In this paper, we analyze the problems within current anti-spoofing mechanisms, and propose a new SSL protected trust model. Then, we describe the attacks on SSL protected trusted communication. In this paper, we also propose the new Automatic Detecting Security Indicator sc...
متن کاملUnobservable Covert Streaming for Internet Censorship Circumvention
This work studies the possibility of using the encrypted video channel of widely used video-conferencing applications, such as Skype, as a carrier for an unobservable covert channel that can be used to access arbitrary information on the Internet. Such channel can be used by citizens living in countries ruled by repressive regimes to exert their civil rights without being detected and/or blocke...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- CoRR
دوره abs/1203.1673 شماره
صفحات -
تاریخ انتشار 2012