Abstract
Free and uncensored access to the Internet is an important right nowadays. Repressive regimes, however, prevent their citizens from freely using the Internet and utilize censorship to suppress unwanted content. To overcome such filtering, researchers introduced circumvention systems that avoid censorship by cloaking and redirecting the censored traffic through a legitimate channel. Sadly, this solution can raise alerts to censors, especially when it is mistakenly used. In this paper, we argue that relying on a single channel is not sufficient to evade censorship since the usage pattern of a circumvention system differs compared to a legitimate use of a service. To address this limitation of state-of-the-art systems, we introduce Camouflage, an approach to combine multiple non-blocked communication protocols and dynamically switch among these tunnels. Each protocol is only used for a limited amount of time and the Internet connection is transparently routed through instances of different censorship circumvention systems. We prototype Camouflage by using applications which are based on these protocols and also offer end-to-end encryption to prevent censors from distinguishing circumvention systems from regular services. We evaluate Camouflage in countries that impose censorship and demonstrate that our approach can successfully bypass existing censorship systems while remaining undetected.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
MailMyWeb, June 2013. http://www.mailmyweb.com
The Foe Project, November 2013. https://code.google.com/p/foe-project
Berthold, O., Federrath, H., Köpsell, S.: Web MIXes: a system for anonymous and unobservable internet access. In: Federrath, H. (ed.) Designing Privacy Enhancing Technologies. LNCS, vol. 2009, pp. 115–129. Springer, Heidelberg (2001)
Boyan, J.: The anonymizer - protecting user privacy on the web. Comput. Mediated Commun. Mag. 4(9) (1997)
Burnett, S., Feamster, N., Vempala, S.: Chipping away at censorship firewalls with user-generated content. In: USENIX Security Symposium (2010)
Castelluccia, C., De Cristofaro, E., Francillon, A., Kaafar, M.-A.: EphPub: toward robust Ephemeral Publishing. In: IEEE International Conference on Network Protocols (2011)
Chaum, D.L.: Untraceable electronic mail, return addresses, and digital pseudonyms. Commun. ACM 24(2), 84–90 (1981)
Chui, M., Manyika, J., Bughin, J., Dobbs, R., Roxburgh, C., Sarrazin, H., Westergren, M.: The Social Economy: Unlocking Value and Productivity Through Social Technologies. McKinsey, New York (2012)
Crandall, J.R., Zinn, D., Byrd, M., Barr, E.T., East, R.: ConceptDoppler: a weather tracker for internet censorship. In: ACM Conference on Computer and Communications Security, CCS (2007)
Crispin, J.: The importance of VoIP and a business continuity plan for business survival, June 2011. http://www.tech2date.com/the-importance-of-voip-and-a-business-continuity-plan-for-business-survival.html
Dai, W.: Pipenet 1.1. Usenet post (1996)
Dainotti, A., Squarcella, C., Aben, E., Claffy, K.C., Chiesa, M., Russo, M., Pescapé, A.: Analysis of country-wide internet outages caused by censorship. In: ACM SIGCOMM Conference on Internet Measurement, IMC (2011)
Danezis, G., Dingledine, R., Mathewson, N.: Mixminion: design of a type III anonymous remailer protocol. In: IEEE Symposium on Security and Privacy (2003)
Dingledine, R.: Tor and circumvention: lessons learned. In: Rogaway, P. (ed.) CRYPTO 2011. LNCS, vol. 6841, pp. 485–486. Springer, Heidelberg (2011)
Dingledine, R., Mathewson, N.: Design of a blocking-resistant anonymity system. The Tor Project, Technical report, 11:15–16 (2006)
Dingledine, R., Mathewson, N., Syverson, P.: Tor: the second-generation onion router. In: USENIX Security Symposium (2004)
Douglas, T.L.: The importance of VoIP, May 2010. http://ezinearticles.com/?The-Importance-of-VoIP&id=4278231
Dynamic Internet Technology: Dynaweb, November 2013. http://www.dit-inc.us/dynaweb
Feamster, N., Balazinska, M., Harfst, G., Balakrishnan, H., Karger, D.R.: Infranet: circumventing web censorship and surveillance. In: USENIX Security Symposium (2002)
Feamster, N., Balazinska, M., Wang, W., Balakrishnan, H., Karger, D.R.: Thwarting web censorship with untrusted messenger discovery. In: Dingledine, R. (ed.) PET 2003. LNCS, vol. 2760, pp. 125–140. Springer, Heidelberg (2003)
Geambasu, R., Kohno, T., Levy, A.A., Levy, H.M.: Vanish: increasing data privacy with self-destructing data. In: USENIX Security Symposium (2009)
Geddes, J., Schuchard, M., Hopper, N.: Cover your ACKs: pitfalls of covert channel censorship circumvention. In: ACM Conference on Computer and Communications Security, CCS (2013)
Global Internet Freedom Consortium (GIFC): The great firewall revealed, December 2002. http://www.internetfreedom.org/files/WhitePaper/ChinaGreatFirewallRevealed.pdf
Gulcu, C., Tsudik, G.: Mixing e-mail with Babel. In: ISOC Network and Distributed System Security Symposium, NDSS (1996)
Houmansadr, A., Brubaker, C., Shmatikov, V.: The parrot is dead: observing unobservable network communications. In: IEEE Symposium on Security and Privacy (2013)
Houmansadr, A., Riedl, T., Borisov, N., Singer, A.: I want my voice to be heard: IP over Voice-over-IP for unobservable censorship circumvention. In: ISOC Network and Distributed System Security Symposium, NDSS (2013)
Leberknight, C.S., Chiang, M., Poor, H.V., Wong, F.: A taxonomy of internet censorship and anti-censorship, December 2012. http://www.princeton.edu/chiangm/anticensorship.pdf
Leiba, B.: RFC 2177: IMAp. 4 IDLE Command, June 1997
Leskovec, J., Horvitz, E.: Planetary-scale views on a large instant-messaging network. In: International Conference on World Wide Web, WWW (2008)
Levine, B.N., Shields, C.: Hordes: a multicast based protocol for anonymity. J. Comput. Secur. 10(3), 213–240 (2002)
MacKinnon, R.: Race to the bottom-corporate complicity in Chinese internet censorship. In: Human Rights Watch, HRW (2009)
Mathewson, N.: The Tor project - a simple obfuscating proxy, November 2013. https://gitweb.torproject.org/obfsproxy.git
McCoy, D., Morales, J.A., Levchenko, K.: Proximax: a measurement based system for proxies dissemination. In: International Conference on Financial Cryptography and Data Security, FC (2011)
McMillan, R.: China’s great firewall spreads overseas, March 2010. http://www.networkworld.com/news/2010/032510-chinas-great-firewall-spreads.html
Moghaddam, H.M., Li, B., Derakhshani, M., Goldberg, I.: SkypeMorph: protocol obfuscation for Tor bridges. In: ACM Conference on Computer and Communications Security, CCS (2012)
Papadopoulos, P., Papadogiannakis, A., Polychronakis, M., Zarras, A., Holz, T., Markatos, E.P.: K-subscription: privacy-preserving microblogging browsing through obfuscation. In: Annual Computer Security Applications Conference, ACSAC (2013)
Perlman, R.: The ephemerizer: making data disappear. J. Inf. Syst. Secur. (JISSec) 1, 51–68 (2005)
Serjantov, A., Sewell, P.: Passive attack analysis for connection-based anonymity systems. In: Snekkenes, E., Gollmann, D. (eds.) ESORICS 2003. LNCS, vol. 2808, pp. 116–131. Springer, Heidelberg (2003)
Sherwood, R., Bhattacharjee, B., Srinivasan, A.: \(P^5\): a protocol for scalable anonymous communication. In: IEEE Symposium on Security and Privacy (2002)
Statista: Daily time spent playing video games per capita in the United States, September 2014. http://www.statista.com/statistics/186960/time-spent-with-videogames-in-the-us-since-2002
Statistic Brain: Skype statistics, September 2012. http://www.statisticbrain.com/skype-statistics
Ultrareach Internet Corporation: Ultrasurf, November 2013. http://www.ultrasurf.us
Walsh, K., Sirer, E.G.: Experience with an object reputation system for peer-to-peer filesharing. In: USENIX Symposium on Networked Systems Design and Implementation, NSDI (2006)
Wang, Q., Gong, X., Nguyen, G.T., Houmansadr, A., Borisov, N.: CensorSpoofer: asymmetric communication using IP spoofing for censorship-resistant web browsing. In: ACM Conference on Computer and Communications Security, CCS (2012)
Weinberg, Z., Wang, J., Yegneswaran, V., Briesemeister, L., Cheung, S., Wang, F., Boneh, D.: StegoTorus: a camouflage proxy for the Tor anonymity system. In: ACM Conference on Computer and Communications Security, CCS (2012)
Wilkins, B.: 25 shocking facts about Chinese censorship, July 2009. http://www.onlinecollege.org/2009/07/05/25-shocking-facts-about-chinese-censorship
Zander, S., Armitage, G., Branch, P.: Covert channels in multiplayer first person shooter online games. In: IEEE Conference on Local Computer Networks, LCN (2008)
Zander, S., Armitage, G., Branch, P.: Reliable transmission over covert channels in first person shooter multiplayer games. In: IEEE Conference on Local Computer Networks, LCN (2009)
Zarras, A., Kohls, K., Dürmuth, M., Pöpper, C.: Neuralyzer: flexible expiration times for the revocation of online data. In: ACM Conference on Data and Application Security and Privacy, CODASPY (2016)
Zhou, W., Houmansadr, A., Caesar, M., Borisov, N.: SWEET: serving the web by exploiting email tunnels. In: Privacy Enhancing Technologies Symposium, PETS (2013)
Zhu, T., Bronk, C., Wallach, D.S.: An analysis of Chinese search engine filtering. arXiv preprint arXiv:1107.3794 (2011)
Zhu, T., Phipps, D., Pridgen, A., Crandall, J.R., Wallach, D.S.: The velocity of censorship: high-fidelity detection of microblog post deletions. In: USENIX Security Symposium (2013)
Acknowledgments
The research was supported by the German Federal Ministry of Education and Research under grant 16KIS0328 (IUNO).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2016 Springer International Publishing Switzerland
About this paper
Cite this paper
Zarras, A. (2016). Leveraging Internet Services to Evade Censorship. In: Bishop, M., Nascimento, A. (eds) Information Security. ISC 2016. Lecture Notes in Computer Science(), vol 9866. Springer, Cham. https://doi.org/10.1007/978-3-319-45871-7_16
Download citation
DOI: https://doi.org/10.1007/978-3-319-45871-7_16
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-45870-0
Online ISBN: 978-3-319-45871-7
eBook Packages: Computer ScienceComputer Science (R0)