DOI QR코드

DOI QR Code

차단우회 및 익명성보장 웹브라우징 시스템

Anti-Censorship and Anonymous Web-Browsing System

  • 이은수 (한양대학교 컴퓨터공학과) ;
  • 이석복 (한양대학교 컴퓨터공학과)
  • Lee, Eunsu (Department of Computer Science and Engineering, Hanyang University) ;
  • Lee, Suk-bok (Department of Computer Science and Engineering, Hanyang University)
  • 투고 : 2015.09.07
  • 심사 : 2015.11.04
  • 발행 : 2015.11.25

초록

인터넷 사용 인구의 증가함에 따라 인터넷 차단우회 및 익명성 서비스에 대한 필요성은 해마다 증가하고 있다. 기존의 차단우회 및 익명성 서비스를 제공하는 시스템들은 각자의 기술적인 문제점들로 인하여 현실적으로 사용이 어려운 경우가 많다. 본 논문은 검열 ISP 안의 사용자와 자유 ISP 안의 사용자가 상호 협력을 통하여 차단 우회 및 익명성을 획득할 수 있는 방법에 대하여 제안한다.

Internet censorship-circumvention and anonymizing services are becoming important with an increase in Internet population. Existing circumvention/anonymizing systems, however, have their own limitations, and they mainly suffer from the shortage of volunteers who relay others' traffic to bypass censors. In this paper, we present a new way of achieving censorship-circumvention while guaranteeing anonymity through the cooperation between censored and uncensored users.

키워드

참고문헌

  1. S. Kelly, M. Earp, L. Reed, A. Shahbaz, and M. Truong. Freedom on the Net 2014. Freedom House, pp. 1-22. 2014, December.
  2. Tor Porject: Anonymity Online, https://www.torproject.org
  3. M. Graham, S.D. Sabbath. The anonymous Internet. Information Geographies at the Oxford Internet Institute, 2014
  4. P Winter, S Lindskog. How the great firewall of china is blocking tor. USENIX FOCI, pp. 1-9, Bellevue, WA.2012, August.
  5. VPN Gate, http://www.vpngate.net/en/
  6. ZenMate, https:/zenmate.com
  7. H. M. Moghaddam, B. Li, M. Derakshani, and I. Goldberg. SkypeMorph: Protocol obfuscation for Tor bridges. ACM CCS, pp. 97-108. NC, USA. 2012, October.
  8. A. Houmansadr, T. Riedl, N. Borisov, and A. Singer. I want my voice to be heard: IP over Voice-over-IP for unobservable censorship circumvention. NDSS Symposium. San Diego, CA United States. 2013, February.
  9. Q. Wang et al. Censorspoofer: Asymmetric communication using IP spoofing for censorship-resistant web browsing. ACM CCS, pp. 121-132. NC, USA. 2012, October.
  10. J. Geddes, M. Schuchard, and N. Hopper. Cover your ACKs: Pitfalls of covert channel censorship circumvention. ACM CCS, pp. 361-372. Berlin, Germany, 2013, November.
  11. E. Wustrow, S. Wolchok, I. Goldberg, and J. A. Halderman. Telex: Anticensorship in the network infrastructure. USENIX Security Symposium. San Francisco, CA. 2011, August.
  12. J. Karlin et al. Decoy routing: Toward unblockable Internet communication. USENIX FOCI. San Francisco, CA. 2011, August.
  13. A. Houmansadr et al. Cirripede: Circumvention infrastructure using router redirection with plausible deniability. ACM CCS, pp. 187-200. Chicago, IL. 2011, October.
  14. E. Androulaki, M. Raykova, S. Srivatsan, A. Stavrou, and S. M. Bellovin. PAR: Payment for anonymous routing. PETS, pp. 219-236. Leuven, Belgium. 2008, July.
  15. R. Jansen, A. Johnson, and P. Syverson. LIRA: Lightweight incentivized routing for anonymity. NDSS Symposium. San Diego, CA United States. 2013, February.
  16. R. Jansen et al. Recruiting new Tor relays with BRAIDS. ACM CCS, pp. 319-328. Chicago, IL. 2010, October.
  17. The CMAND Spoofer project. http://spoofer.cmand.org.