[ Pobierz całość w formacie PDF ]
(aka trackers) to retrieve a list of IP addresses from which the requested content can be downloaded. socks proxies, and Tor. 15 9. CONCLUSION [10] R. Dingledine, N. Mathewson, and P. Syverson. TOR: The second-generation onion router. In USENIX Security, 2004. This paper presented a large-scale measurement analysis [11] S. Egelman, J. Bonneau, S. Chiasson, D. Dittrich, and S. E. Schechter. of Internet censorship in Syria. We analyzed 600GB worth It s Not Stealing If You Need It: A Panel on the Ethics of Performing Research Using Public Data of Illicit Origin. In Financial of logs extracted from 7 Blue Coat SG-9000 filtering proxies, Cryptography, 2012. which are deployed to monitor, filter, and block traffic of [12] T. A. N. for Human Rights Information. Online Syria,Offline Syrians. Syrian users. By analyzing these logs, we provided a detailed http://old.openarab.net/en/node/1625, 2013. [13] G. King, J. Pan, and M. Roberts. How censorship in China allows analysis of how censorship was operated in Syria in 2011, a government criticism but silences collective expression. In APSA country that has been classified for several years as Enemy Annual Meeting, 2012. of Internet by Reporters Without Borders [20]. [14] J. Knockel, J. R. Crandall, and J. Saia. Three Researchers, Five Conjectures: An Empirical Analysis of TOM-Skype Censorship and Our large-scale analysis of real-world logs allowed us to ex- Surveillance. In FOCI, 2011. tract information about processed requests for both censored [15] C. S. Leberknight, M. Chiang, H. V. Poor, and F. Wong. A taxonomy and allowed traffic and provide a detailed, first-of-a-kind of Internet censorship and anti-censorship. http://www.princeton.edu/ snapshot of Syrian censorship practices. We uncovered the [16] M. Marquis-Boire et al. Planet Blue Coat: Mapping Global presence of a relatively stealthy yet quite targeted filtering, Censorship and Surveillance Tools. https://citizenlab.org/wp- which operates, at the same time, relying on IP addresses content/uploads/2013/01/Planet-Blue-Coat.pdf, 2013. [17] Z. Nabi. The Anatomy of Web Censorship in Pakistan. In FOCI, 2013. to block access to entire subnets, on domains to block spe- [18] Open Net Initiative. Internet Filtering in Syria. cific websites, and on keywords to target specific content. https://opennet.net/research/profiles/syria, 2009. Instant Messaging software is heavily censored while filter- [19] J. C. Park and J. R. Crandall. Empirical Study of a National-Scale Distributed Intrusion Detection System: Backbone-level Filtering of ing of social media is limited to specific pages. Finally, we HTML Responses in China. In ICDCS, pages 315 326, 2010. showed that Syrian users try to evade censorship by using [20] Reporters Without Borders. Syria. several tools, including web/socks proxies, Tor, VPNs, and http://en.rsf.org/syria-syria-12-03-2012,42053.html, 2012. BitTorrent. [21] V. Silver. H-P Computers Underpin Syria Surveillance. http://www.bloomberg.com/news/2011-11-18/hewlett-packard- computers-underpin-syria-electonic-surveillance-project.html, 2011. 10. REFERENCES [1] C. Anderson. The Hidden Internet of Iran: Private Address Allocations [22] Telecomix. #OpSyria: Syrian Censorship Logs (Season 3). on a National Network. arXiv preprint arXiv:1209.6398, 2012. http://reflets.info/opsyria-syrian-censoship-log/, 2011. [2] S. Aryan, H. Aryan, and J. A. Halderman. Internet Censorship in Iran: [23] The Tor Project. Tor s censorshipwiki Syria. A First Look. In FOCI, 2013. https://trac.torproject.org/projects/tor/wiki/doc/OONI/ [3] D. Bamman, B. O Connor, and N. Smith. Censorship and deletion censorshipwiki/CensorshipByCountry/Syria, 2013. practices in Chinese social media. First Monday, 17(3), 2012. [24] J. Valentino-Devries, P. Sonne, and N. Malas. U.S. Firm [4] BBC News. Syrian jailed for internet usage. Acknowledges Syria Uses Its Gear to Block Web. http://news.bbc.co.uk/1/hi/world/middle east/3824595.stm, 2004. http://online.wsj.com/news/articles/ [5] BlueCoat. Blue Coat Systems ProxySG Configuration and SB10001424052970203687504577001911398596328, 2011. Management Guide. [25] J.-P. Verkamp and M. Gupta. Inferring Mechanics of Web Censorship http://wikileaks.org/spyfiles/files/0/226 BLUECOAT- Around the World. In FOCI, 2012. SGOS CMG 4.1.4.pdf, 2013. [26] VFM Systems & Services Ltd. Blue coat ProxySG Solution with Web [6] J. R. Crandall, D. Zinn, M. Byrd, E. T. Barr, and R. East. Filter and Reporter. http://www.slideshare.net/vfmindia/vfm-bluecoat- ConceptDoppler: A Weather Tracker for Internet Censorship. In CCS, proxy-sg-solution-with-web-filter-and-reporter, 2013. 2007. [27] P. Winter. Towards a Censorship Analyser for Tor. In FOCI, 2013. [7] A. Dainotti, C. Squarcella, E. Aben, K. C. Claffy, M. Chiesa, [28] P. Winter and S. Lindskog. How the Great Firewall of China is M. Russo, and A. Pescapé. Analysis of country-wide internet outages Blocking Tor. In FOCI, 2012. caused by censorship. In IMC, 2011. [29] X. Xu, Z. M. Mao, and J. A. Halderman. Internet censorship in China: [8] J. Dalek, B. Haselton, H. Noman, A. Senft, M. Crete-Nishihata, P. Gill, Where does the filtering occur? In PAM, pages 133 142, 2011. [ Pobierz caÅ‚ość w formacie PDF ] |