CensorSpoofer: Asymmetric Communication with IP Spoofing for Censorship-Resistant Web Browsing

نویسندگان

  • Qiyan Wang
  • Xun Gong
  • Giang T. K. Nguyen
  • Amir Houmansadr
  • Nikita Borisov
چکیده

A key challenge in censorship-resistant web browsing is being able to direct legitimate users to redirection proxies while preventing censors, posing as insiders, from discovering their addresses and blocking them. We propose a new framework for censorship-resistant web browsing called CensorSpoofer that addresses this challenge by exploiting the asymmetric nature of web browsing traffic and making use of IP spoofing. CensorSpoofer decouples the upstream and downstream channels, using a low-bandwidth indirect channel for delivering outbound requests (URLs) and a high-bandwidth direct channel for downloading web content. The upstream channel hides the request contents using steganographic encoding within email or instant messages, whereas the downstream channel uses IP address spoofing so that the real address of the proxies is not revealed either to legitimate users or censors. We built a proof-of-concept prototype that uses encrypted VoIP for this downstream channel and demonstrated the feasibility of using the CensorSpoofer framework in a realistic environment.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

IP over Voice-over-IP for censorship circumvention

Open communication over the Internet poses a serious threat to countries with repressive regimes, leading them to develop and deploy networkbased censorship mechanisms within their networks. Existing censorship circumvention systems face different difficulties in providing unobservable communication with their clients; this limits their availability and poses threats to their users. To provide ...

متن کامل

DeltaShaper: Enabling Unobservable Censorship-resistant TCP Tunneling over Videoconferencing Streams

This paper studies the possibility of using the encrypted video channel of widely used videoconferencing applications, such as Skype, as a carrier for unobservable covert TCP/IP communications. We propose and evaluate different alternatives to encode information in the video stream in order to increase available throughput while preserving the packetlevel characteristics of the video stream. We...

متن کامل

Optimizing World - Wide Web for Weakly Connected MobileWorkstations : An Indirect

Modern portable computers and wireless connections over cellular telephone networks have created a new platform for distributed information processing. We have designed a communication architecture that makes it possible to exploit the existing TCP/IP communication protocols but that also takes into account speciic features of cellular links. Our communication architecture is based on the conce...

متن کامل

SSL-enabled trusted communication: Spoofing and protecting the non-cautious users

The anti-spoofing community has been intensively proposing new methods for defending against new web-spoofing techniques. In this paper, we analyze the problems within current anti-spoofing mechanisms, and propose a new SSL protected trust model. Then, we describe the attacks on SSL protected trusted communication. In this paper, we also propose the new Automatic Detecting Security Indicator sc...

متن کامل

Unobservable Covert Streaming for Internet Censorship Circumvention

This work studies the possibility of using the encrypted video channel of widely used video-conferencing applications, such as Skype, as a carrier for an unobservable covert channel that can be used to access arbitrary information on the Internet. Such channel can be used by citizens living in countries ruled by repressive regimes to exert their civil rights without being detected and/or blocke...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • CoRR

دوره abs/1203.1673  شماره 

صفحات  -

تاریخ انتشار 2012