skip to main content
10.1145/2382196.2382212acmconferencesArticle/Chapter ViewAbstractPublication PagesccsConference Proceedingsconference-collections
research-article

CensorSpoofer: asymmetric communication using IP spoofing for censorship-resistant web browsing

Authors Info & Claims
Published:16 October 2012Publication History

ABSTRACT

A key challenge in censorship-resistant web browsing is being able to direct legitimate users to redirection proxies while preventing censors, posing as insiders, from discovering their addresses and blocking them. We propose a new framework for censorship-resistant web browsing called CensorSpoofer that addresses this challenge by exploiting the asymmetric nature of web browsing traffic and making use of IP spoofing. CensorSpoofer de-couples the upstream and downstream channels, using a low-bandwidth indirect channel for delivering outbound requests (URLs) and a high-bandwidth direct channel for downloading web content. The upstream channel hides the request contents using steganographic encoding within Email or instant messages, whereas the downstream channel uses IP address spoofing so that the real address of the proxies is not revealed either to legitimate users or censors. We built a proof-of-concept prototype that uses encrypted VoIP for this downstream channel and demonstrated the feasibility of using the CensorSpoofer framework in a realistic environment.

References

  1. Dynaweb. http://www.dongtaiwang.com/home_en.php.Google ScholarGoogle Scholar
  2. Ultrasurf. http://www.ultrareach.com.Google ScholarGoogle Scholar
  3. Ten ways to discover Tor bridges. https://blog.torproject.org/blog/research-problems-ten-ways-discover-tor-bridges.Google ScholarGoogle Scholar
  4. TriangleBoy Whitepaper. http://www.webrant.com/ safeweb_site/html/www/tboy_whitepaper.html.Google ScholarGoogle Scholar
  5. MailMyWeb. http://www.mailmyweb.com/.Google ScholarGoogle Scholar
  6. Feed Over Email (F.O.E). http://code.google.com/p/foe-project/.Google ScholarGoogle Scholar
  7. WASTE. http://waste.sourceforge.net/.Google ScholarGoogle Scholar
  8. Blink. http://icanblink.com/.Google ScholarGoogle Scholar
  9. SFLphone. http://sflphone.org/.Google ScholarGoogle Scholar
  10. Zfone. http://zfoneproject.com/.Google ScholarGoogle Scholar
  11. pjsua. http://www.pjsip.org/.Google ScholarGoogle Scholar
  12. PhonerLite. http://www.phonerlite.de/index_en.htm.Google ScholarGoogle Scholar
  13. Microsoft Lync. http://technet.microsoft.com/en-us/library/gg195673.aspx.Google ScholarGoogle Scholar
  14. CounterPath. http://www.counterpath.com/softphone-products.html.Google ScholarGoogle Scholar
  15. Cisco IP phones. http://www.cisco.com/en/US/docs/voice_ip_comm/cucm/security/4_0_1/secuview.html.Google ScholarGoogle Scholar
  16. Grandstream. http://www.grandstream.com/products/ip-voice-telephony/enterprise-ip-phones/gxp1100.Google ScholarGoogle Scholar
  17. nmap. http://nmap.org/.Google ScholarGoogle Scholar
  18. The MIT ANA Spoofer project. http://spoofer.csail.mit.edu/.Google ScholarGoogle Scholar
  19. netfilter-queue. http://www.netfilter.org/projects/libnetfilter_queue/.Google ScholarGoogle Scholar
  20. IP geolocation database. http://ipinfodb.com/.Google ScholarGoogle Scholar
  21. XMPPPY. http://xmpppy.sourceforge.net/.Google ScholarGoogle Scholar
  22. QtWebKit. http://trac.webkit.org/wiki/QtWebKit.Google ScholarGoogle Scholar
  23. OpenSSL. www.openssl.org.Google ScholarGoogle Scholar
  24. How censorship works in china: A brief overview. http://www.hrw.org/reports/2006/china0806/3.htm#_Toc142395821.Google ScholarGoogle Scholar
  25. Mikey: Multimedia internet keying. http://www.ietf.org/rfc/rfc3830.txt.Google ScholarGoogle Scholar
  26. Reed-solomon forward error correction (fec) schemes. http://www.ietf.org/rfc/rfc5510.txt.Google ScholarGoogle Scholar
  27. Sdp: Session description protocol. http://www.ietf.org/rfc/rfc4566.txt.Google ScholarGoogle Scholar
  28. The secure real-time transport protocol (srtp). http://www.ietf.org/rfc/rfc3711.txt.Google ScholarGoogle Scholar
  29. Sip: Session initiation protocol. http://www.ietf.org/rfc/rfc3261.txt.Google ScholarGoogle Scholar
  30. Top 50 autonomous systems. http://cyber.law.harvard.edu/netmaps/country_detail.php/?cc=CN.Google ScholarGoogle Scholar
  31. Zrtp: Media path key agreement for unicast secure rtp. http://www.ietf.org/rfc/rfc6189.txt.Google ScholarGoogle Scholar
  32. Defeat Internet Censorship: Overview of Advanced Technologies and Products, Nov. 2007. http://www.internetfreedom.org/archive/Defeat_Internet_Censorship_White_Paper.pdf.Google ScholarGoogle Scholar
  33. Iran reportedly blocking encrypted internet traffic, 2012. http://arstechnica.com/tech-policy/news/2012/02/iran-reportedly-blocking-encrypted-internet traffic.ars.Google ScholarGoogle Scholar
  34. New blocking activity from iran, June, 16, 2011. https://blog.torproject.org/blog/new-blocking-activity-iran.Google ScholarGoogle Scholar
  35. D. Barboza and C. C. Miller. Google accuses chinese of blocking gmail service. http://www.nytimes.com/2011/03/21/technology/21google.html?_r=2.Google ScholarGoogle Scholar
  36. S. Burnett, N. Feamster, and S. Vempal. Chipping away at censorship with user-generated content. In USENIX Security, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  37. Cisco. Voice over ip -- per call bandwidth consumption. http://www.cisco.com/application/pdf/paws/7934/bwidth_consume.pdf. Google ScholarGoogle ScholarDigital LibraryDigital Library
  38. I. Clarke, T. W. Hong, S. G. Miller, O. Sandberg, and B. Wiley. Protecting Free Expression Online with fFreenetg. IEEE Internet Computing, 6(1):40--49, 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  39. J. Cowie. Egypt leaves the internet, Jan. 2011. http://www.renesys.com/blog/2011/01/egypt-leaves-the-internet.shtml.Google ScholarGoogle Scholar
  40. R. Dingledine, N. Mathewson, and P. Syverson. Tor: The second-generation onion router. In USENIX Security Symposium, August 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  41. N. Feamster, M. Balazinska, G. Harfst, H. Balakrishnan, and D. Karger. Infranet: Circumventing Web Censorship and Surveillance. In USENIX Security, Aug. 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  42. N. Feamster, M. Balazinska, W. Wang, H. Balakrishnan, and D. Karger. Thwarting web censorship with untrusted messenger discovery. In Privacy Enhancing Technologies (PETS), 2003.Google ScholarGoogle ScholarCross RefCross Ref
  43. L. Gao. On inferring autonomous system relationships in the internet. IEEE/ACM Trans. Netw., 9:733--745, December 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  44. A. Houmansadr, G. T. K. Nguyen, M. Caesar, and N. Borisov. Cirripede : Circumvention infrastructure using router redirection with plausible deniability categories and subject descriptors. In ACM CCS'11, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  45. J. Jacob. How internet censorship works in china, 2011. http://www.ibtimes.com/articles/113590/20110217/.Google ScholarGoogle Scholar
  46. R. Jain, S. Member, Shawn, and A. Routhier. Packet trains measurements and a new model for computer network traffic. IEEE Journal on Selected Areas in Communications, 4:986--995, 1986. Google ScholarGoogle ScholarDigital LibraryDigital Library
  47. J. Jarvis. Facebook, twitter, and the egyptian revolution, Feb. 13. 2011. http://thefastertimes.com/mediaandtech/2011/02/13/facebook-twitter-and-the-egyptian-revolution/.Google ScholarGoogle Scholar
  48. J. Jia and P. Smith. Psiphon: Analysis and Estimation, 2004. http://www.cdf.toronto.edu/~csc494h/reports/2004-fall/psiphon_ae.html.Google ScholarGoogle Scholar
  49. J. Karlin, D. Ellard, A. W. Jackson, C. E. Jones, G. Lauer, D. P. Mankins, and W. T. Strayer. Decoy Routing : Toward Unblockable Internet Communication. In USENIX FOCI, 2011.Google ScholarGoogle Scholar
  50. C. S. Leberknight, M. Chiang, H. V. Poor, and F. Wong. A taxonomy of Internet censorship and anti-censorship. http://www.princeton.edu/~chiangm/anticensorship.pdf.Google ScholarGoogle Scholar
  51. M. Mahdian. Fighting censorship with algorithms. In Proceedings of FUN 2010, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  52. D. McCoy, J. A. Morales, and K. Levchenko. Proximax: A measurement based system for proxies dissemination. In Financial Cryptography and Data Security (FC'11), 2011.Google ScholarGoogle Scholar
  53. J. McLachlan and N. Hopper. On the risks of serving whenever you surf: Vulnerability of tor's blocking resistance design. In WPES'09, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  54. B. Popescu, B. Crispo, and A. S. Tanenbaum. Safe and private data sharing with turtle: Friends team-up and beat the system. In The 12th Cambridge International Workshop on Security Protocols, April 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  55. J. Qiu and L. Gao. Cam04-4: As path inference by exploiting known as paths. In GLOBECOM '06, 2006.Google ScholarGoogle ScholarCross RefCross Ref
  56. Y. Sovran, A. Libonati, and J. Li. Pass it on: Social networks stymie censors. In IPTPS'08, Feb 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  57. E. Y. Vasserman, R. Jansen, J. Tyra, N. Hopper, and Y. Kim. Membership-concealing overlay networks. In ACM CCS'09, Nov. 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  58. X. Wang, S. Chen, and S. Jajodia. Network flow watermarking attack on low-latency anonymous communication systems. In IEEE Oakland, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  59. E. Wustrow, S. Wolchok, I. Goldberg, and J. A. Halderman. Telex: Anticensorship in the Network Infrastructure. In 20th USENIX Security Symposium, Aug. 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  60. J. Zittrain and B. Edelman. Internet Filtering in China. IEEE Internet Computing, 7(2):70--77, 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. CensorSpoofer: asymmetric communication using IP spoofing for censorship-resistant web browsing

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Conferences
      CCS '12: Proceedings of the 2012 ACM conference on Computer and communications security
      October 2012
      1088 pages
      ISBN:9781450316514
      DOI:10.1145/2382196

      Copyright © 2012 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 16 October 2012

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article

      Acceptance Rates

      Overall Acceptance Rate1,261of6,999submissions,18%

      Upcoming Conference

      CCS '24
      ACM SIGSAC Conference on Computer and Communications Security
      October 14 - 18, 2024
      Salt Lake City , UT , USA

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader