DOI QR코드

DOI QR Code

Anti-Censorship and Anonymous Web-Browsing System

차단우회 및 익명성보장 웹브라우징 시스템

  • Lee, Eunsu (Department of Computer Science and Engineering, Hanyang University) ;
  • Lee, Suk-bok (Department of Computer Science and Engineering, Hanyang University)
  • 이은수 (한양대학교 컴퓨터공학과) ;
  • 이석복 (한양대학교 컴퓨터공학과)
  • Received : 2015.09.07
  • Accepted : 2015.11.04
  • Published : 2015.11.25

Abstract

Internet censorship-circumvention and anonymizing services are becoming important with an increase in Internet population. Existing circumvention/anonymizing systems, however, have their own limitations, and they mainly suffer from the shortage of volunteers who relay others' traffic to bypass censors. In this paper, we present a new way of achieving censorship-circumvention while guaranteeing anonymity through the cooperation between censored and uncensored users.

인터넷 사용 인구의 증가함에 따라 인터넷 차단우회 및 익명성 서비스에 대한 필요성은 해마다 증가하고 있다. 기존의 차단우회 및 익명성 서비스를 제공하는 시스템들은 각자의 기술적인 문제점들로 인하여 현실적으로 사용이 어려운 경우가 많다. 본 논문은 검열 ISP 안의 사용자와 자유 ISP 안의 사용자가 상호 협력을 통하여 차단 우회 및 익명성을 획득할 수 있는 방법에 대하여 제안한다.

Keywords

References

  1. S. Kelly, M. Earp, L. Reed, A. Shahbaz, and M. Truong. Freedom on the Net 2014. Freedom House, pp. 1-22. 2014, December.
  2. Tor Porject: Anonymity Online, https://www.torproject.org
  3. M. Graham, S.D. Sabbath. The anonymous Internet. Information Geographies at the Oxford Internet Institute, 2014
  4. P Winter, S Lindskog. How the great firewall of china is blocking tor. USENIX FOCI, pp. 1-9, Bellevue, WA.2012, August.
  5. VPN Gate, http://www.vpngate.net/en/
  6. ZenMate, https:/zenmate.com
  7. H. M. Moghaddam, B. Li, M. Derakshani, and I. Goldberg. SkypeMorph: Protocol obfuscation for Tor bridges. ACM CCS, pp. 97-108. NC, USA. 2012, October.
  8. A. Houmansadr, T. Riedl, N. Borisov, and A. Singer. I want my voice to be heard: IP over Voice-over-IP for unobservable censorship circumvention. NDSS Symposium. San Diego, CA United States. 2013, February.
  9. Q. Wang et al. Censorspoofer: Asymmetric communication using IP spoofing for censorship-resistant web browsing. ACM CCS, pp. 121-132. NC, USA. 2012, October.
  10. J. Geddes, M. Schuchard, and N. Hopper. Cover your ACKs: Pitfalls of covert channel censorship circumvention. ACM CCS, pp. 361-372. Berlin, Germany, 2013, November.
  11. E. Wustrow, S. Wolchok, I. Goldberg, and J. A. Halderman. Telex: Anticensorship in the network infrastructure. USENIX Security Symposium. San Francisco, CA. 2011, August.
  12. J. Karlin et al. Decoy routing: Toward unblockable Internet communication. USENIX FOCI. San Francisco, CA. 2011, August.
  13. A. Houmansadr et al. Cirripede: Circumvention infrastructure using router redirection with plausible deniability. ACM CCS, pp. 187-200. Chicago, IL. 2011, October.
  14. E. Androulaki, M. Raykova, S. Srivatsan, A. Stavrou, and S. M. Bellovin. PAR: Payment for anonymous routing. PETS, pp. 219-236. Leuven, Belgium. 2008, July.
  15. R. Jansen, A. Johnson, and P. Syverson. LIRA: Lightweight incentivized routing for anonymity. NDSS Symposium. San Diego, CA United States. 2013, February.
  16. R. Jansen et al. Recruiting new Tor relays with BRAIDS. ACM CCS, pp. 319-328. Chicago, IL. 2010, October.
  17. The CMAND Spoofer project. http://spoofer.cmand.org.