[ Pobierz całość w formacie PDF ]

(aka trackers) to retrieve a list of IP addresses from which the
requested content can be downloaded. socks proxies, and Tor.
15
9. CONCLUSION [10] R. Dingledine, N. Mathewson, and P. Syverson. TOR: The
second-generation onion router. In USENIX Security, 2004.
This paper presented a large-scale measurement analysis
[11] S. Egelman, J. Bonneau, S. Chiasson, D. Dittrich, and S. E. Schechter.
of Internet censorship in Syria. We analyzed 600GB worth It s Not Stealing If You Need It: A Panel on the Ethics of Performing
Research Using Public Data of Illicit Origin. In Financial
of logs extracted from 7 Blue Coat SG-9000 filtering proxies,
Cryptography, 2012.
which are deployed to monitor, filter, and block traffic of
[12] T. A. N. for Human Rights Information. Online Syria,Offline Syrians.
Syrian users. By analyzing these logs, we provided a detailed http://old.openarab.net/en/node/1625, 2013.
[13] G. King, J. Pan, and M. Roberts. How censorship in China allows
analysis of how censorship was operated in Syria in 2011, a
government criticism but silences collective expression. In APSA
country that has been classified for several years as  Enemy
Annual Meeting, 2012.
of Internet by Reporters Without Borders [20].
[14] J. Knockel, J. R. Crandall, and J. Saia. Three Researchers, Five
Conjectures: An Empirical Analysis of TOM-Skype Censorship and
Our large-scale analysis of real-world logs allowed us to ex-
Surveillance. In FOCI, 2011.
tract information about processed requests for both censored
[15] C. S. Leberknight, M. Chiang, H. V. Poor, and F. Wong. A taxonomy
and allowed traffic and provide a detailed, first-of-a-kind
of Internet censorship and anti-censorship.
http://www.princeton.edu/
snapshot of Syrian censorship practices. We uncovered the
[16] M. Marquis-Boire et al. Planet Blue Coat: Mapping Global
presence of a relatively stealthy yet quite targeted filtering,
Censorship and Surveillance Tools. https://citizenlab.org/wp-
which operates, at the same time, relying on IP addresses
content/uploads/2013/01/Planet-Blue-Coat.pdf, 2013.
[17] Z. Nabi. The Anatomy of Web Censorship in Pakistan. In FOCI, 2013.
to block access to entire subnets, on domains to block spe-
[18] Open Net Initiative. Internet Filtering in Syria.
cific websites, and on keywords to target specific content.
https://opennet.net/research/profiles/syria, 2009.
Instant Messaging software is heavily censored while filter-
[19] J. C. Park and J. R. Crandall. Empirical Study of a National-Scale
Distributed Intrusion Detection System: Backbone-level Filtering of
ing of social media is limited to specific pages. Finally, we
HTML Responses in China. In ICDCS, pages 315 326, 2010.
showed that Syrian users try to evade censorship by using
[20] Reporters Without Borders. Syria.
several tools, including web/socks proxies, Tor, VPNs, and
http://en.rsf.org/syria-syria-12-03-2012,42053.html, 2012.
BitTorrent. [21] V. Silver. H-P Computers Underpin Syria Surveillance.
http://www.bloomberg.com/news/2011-11-18/hewlett-packard-
computers-underpin-syria-electonic-surveillance-project.html, 2011.
10. REFERENCES
[1] C. Anderson. The Hidden Internet of Iran: Private Address Allocations
[22] Telecomix. #OpSyria: Syrian Censorship Logs (Season 3).
on a National Network. arXiv preprint arXiv:1209.6398, 2012.
http://reflets.info/opsyria-syrian-censoship-log/, 2011.
[2] S. Aryan, H. Aryan, and J. A. Halderman. Internet Censorship in Iran:
[23] The Tor Project. Tor s censorshipwiki  Syria.
A First Look. In FOCI, 2013.
https://trac.torproject.org/projects/tor/wiki/doc/OONI/
[3] D. Bamman, B. O Connor, and N. Smith. Censorship and deletion
censorshipwiki/CensorshipByCountry/Syria, 2013.
practices in Chinese social media. First Monday, 17(3), 2012.
[24] J. Valentino-Devries, P. Sonne, and N. Malas. U.S. Firm
[4] BBC News. Syrian jailed for internet usage.
Acknowledges Syria Uses Its Gear to Block Web.
http://news.bbc.co.uk/1/hi/world/middle east/3824595.stm, 2004.
http://online.wsj.com/news/articles/
[5] BlueCoat. Blue Coat Systems ProxySG  Configuration and
SB10001424052970203687504577001911398596328, 2011.
Management Guide.
[25] J.-P. Verkamp and M. Gupta. Inferring Mechanics of Web Censorship
http://wikileaks.org/spyfiles/files/0/226 BLUECOAT-
Around the World. In FOCI, 2012.
SGOS CMG 4.1.4.pdf, 2013.
[26] VFM Systems & Services Ltd. Blue coat ProxySG Solution with Web
[6] J. R. Crandall, D. Zinn, M. Byrd, E. T. Barr, and R. East.
Filter and Reporter. http://www.slideshare.net/vfmindia/vfm-bluecoat-
ConceptDoppler: A Weather Tracker for Internet Censorship. In CCS,
proxy-sg-solution-with-web-filter-and-reporter, 2013.
2007.
[27] P. Winter. Towards a Censorship Analyser for Tor. In FOCI, 2013.
[7] A. Dainotti, C. Squarcella, E. Aben, K. C. Claffy, M. Chiesa,
[28] P. Winter and S. Lindskog. How the Great Firewall of China is
M. Russo, and A. Pescapé. Analysis of country-wide internet outages
Blocking Tor. In FOCI, 2012.
caused by censorship. In IMC, 2011.
[29] X. Xu, Z. M. Mao, and J. A. Halderman. Internet censorship in China:
[8] J. Dalek, B. Haselton, H. Noman, A. Senft, M. Crete-Nishihata, P. Gill,
Where does the filtering occur? In PAM, pages 133 142, 2011. [ Pobierz całość w formacie PDF ]
  • zanotowane.pl
  • doc.pisz.pl
  • pdf.pisz.pl
  • mons45.htw.pl
  • WÄ…tki
    Powered by wordpress | Theme: simpletex | © (...) lepiej tracić niż nigdy nie spotkać.