2019 IEEE Security and Privacy Workshops (SPW) 2019
DOI: 10.1109/spw.2019.00046
|View full text |Cite
|
Sign up to set email alerts
|

Analysing Censorship Circumvention with VPNs Via DNS Cache Snooping

Abstract: Anecdotal evidence suggests an increasing number of people are turning to VPN services for the properties of privacy, anonymity and free communication over the internet. Despite this, there is little research into what these services are actually being used for. We use DNS cache snooping to determine what domains people are accessing through VPNs. This technique is used to discover whether certain queries have been made against a particular DNS server. Some VPNs operate their own DNS servers, ensuring that any… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
2
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(3 citation statements)
references
References 12 publications
0
2
0
Order By: Relevance
“…In 2019, Farnan, et al, [11] have applied DNS cache snooping to determine the domains people were accessing through VPNs. They explore 3 methods of DNS cache snooping and briefly discuss their strengths and limitations.…”
Section: Literature Reviewmentioning
confidence: 99%
“…In 2019, Farnan, et al, [11] have applied DNS cache snooping to determine the domains people were accessing through VPNs. They explore 3 methods of DNS cache snooping and briefly discuss their strengths and limitations.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Only the last category is relevant to this paper, and this seems to be the topic of only a few papers. Three of these focus on the use of specific tools or apps like TOR [19], an app for changing DNS resolver [10], and on the use of DNS servers owned by VPN providers [8]. Our focus is only on circumvention that involves the use of 3rd party resolvers, not on specific tools.…”
Section: Censorship and Circumvention Detectionmentioning
confidence: 99%
“…China is perhaps the most widely discussed, famously constructing her 'Great Firewall of China' to advance the country's comprehensive censorship system. 52 The manner in which China was able to vanquish Google and now appears to be able to defeat even complex anonymising software for browsing the web underlines the degree of control. Recent revelations of possible connections between Huawei and the Chinese Government are seen by some as the latest in a series of efforts to control and influence this so-called 'fluid' space.…”
Section: State Sovereignty and National Boundednessmentioning
confidence: 99%