Infranet: Circumventing Web Censorship and Surveillance

作者: Nick Feamster , Hari Balakrishnan , David Karger , Magdalena Balazinska , Greg Harfst

DOI:

关键词:

摘要: An increasing number of countries and companies routinely block or monitor access to parts the Internet. To counteract these measures, we propose Infranet, a system that enables clients surreptitiously retrieve sensitive content via cooperating Web servers distributed across global These Infranet provide censored sites while continuing host normal uncensored content. uses tunnel protocol provides covert communication channel between its servers, modulated over standard HTTP transactions resemble innocuous browsing. In upstream direction, send messages by associating meaning sequence requests being made. downstream return hiding data in images using steganographic techniques. We describe design, prototype implementation, security properties, performance Infranet. Our analysis shows can successfully circumvent several sophisticated censoring

参考文章(17)
David Martin, Andrew Schulman, Deanonymizing Users of the SafeWeb Anonymizing Service usenix security symposium. pp. 123- 137 ,(2002)
Roger Dingledine, Michael J. Freedman, David Molnar, The free haven project: distributed anonymous storage service privacy enhancing technologies. pp. 67- 95 ,(2001) , 10.1007/3-540-44702-4_5
M. Adler, B.M. Maggs, Protocols for asymmetric communication channels foundations of computer science. pp. 522- 533 ,(1998) , 10.1109/SFCS.1998.743503
Niels Provos, Defending against statistical steganalysis usenix security symposium. ,vol. 10, pp. 24- 24 ,(2001)
P.F. Syverson, M.G. Reed, D.M. Goldschlag, Onion routing access configurations darpa information survivability conference and exposition. ,vol. 1, pp. 34- 40 ,(2000) , 10.1109/DISCEX.2000.824941
Andrew Hintz, Fingerprinting websites using traffic analysis privacy enhancing technologies. pp. 171- 178 ,(2002) , 10.1007/3-540-36467-6_13
Frank H. Hartung, Bernd Girod, Digital watermarking of raw and compressed video Digital Compression Technologies and Systems for Video Communications. ,vol. 2952, pp. 205- 213 ,(1996) , 10.1117/12.251278
Michael K. Reiter, Aviel D. Rubin, Crowds: anonymity for Web transactions ACM Transactions on Information and System Security. ,vol. 1, pp. 66- 92 ,(1998) , 10.1145/290163.290168
Leonard J. Schulman, David Zuckerman, Asymptotically good codes correcting insertions, deletions, and transpositions symposium on discrete algorithms. pp. 669- 674 ,(1997) , 10.5555/314161.314412
Butler W. Lampson, A note on the confinement problem Communications of the ACM. ,vol. 16, pp. 613- 615 ,(1973) , 10.1145/362375.362389