Proceedings 2020 Network and Distributed System Security Symposium 2020
DOI: 10.14722/ndss.2020.23098
|View full text |Cite
|
Sign up to set email alerts
|

Decentralized Control: A Case Study of Russia

Abstract: Until now, censorship research has largely focused on highly centralized networks that rely on government-run technical choke-points, such as the Great Firewall of China. Although it was previously thought to be prohibitively difficult, large-scale censorship in decentralized networks are on the rise. Our in-depth investigation of the mechanisms underlying decentralized information control in Russia shows that such large-scale censorship can be achieved in decentralized networks through inexpensive commodity e… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

1
17
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 36 publications
(25 citation statements)
references
References 26 publications
1
17
0
Order By: Relevance
“…The Russian government has tightened its control and supervision of cyberspace significantly in the last decade. The academic literature often sees this process in the context of containing opposition and political protest (Maréchal 2017;Ramesh et al 2020). However, at the same time cyberspace faces challenges on its own and provides new opportunities for criminal or civil misbehavior, including the following: spreading of computer worms, viruses, bots, as well as other malware and spyware; illicitly accessing computers; exceeding authorized access; trafficking in information; enabling or facilitating unauthorized activities in cyberspace; and using information, communications systems, and networks to embezzle, commit fraud, stalk and harass, or invade the privacy of others (Ryan et al 2011).…”
Section: Cyberlaw and Regulation Of Runetmentioning
confidence: 99%
See 1 more Smart Citation
“…The Russian government has tightened its control and supervision of cyberspace significantly in the last decade. The academic literature often sees this process in the context of containing opposition and political protest (Maréchal 2017;Ramesh et al 2020). However, at the same time cyberspace faces challenges on its own and provides new opportunities for criminal or civil misbehavior, including the following: spreading of computer worms, viruses, bots, as well as other malware and spyware; illicitly accessing computers; exceeding authorized access; trafficking in information; enabling or facilitating unauthorized activities in cyberspace; and using information, communications systems, and networks to embezzle, commit fraud, stalk and harass, or invade the privacy of others (Ryan et al 2011).…”
Section: Cyberlaw and Regulation Of Runetmentioning
confidence: 99%
“…Other scholars identify Russian policies as "decentralized control" due to the lack of direct ownership of Internet Service Providers (ISP) by government authorities. This lowers their ability to unilaterally roll out technical censorship measures, instead pushing the state to enact controls via law and policy, compelling their network owners to comply, which subsequently significantly increases censorship (Ramesh et al 2020).…”
Section: Cyberlaw and Regulation Of Runetmentioning
confidence: 99%
“…To this end, we define online censorship as any form of network interference that disrupts the normal operation of services or content in the World Wide Web to prohibit access to a specific audience. Previous research examined the presence of censorship in various countries such as China [19,31], Thailand [23], Bangladesh [33], Pakistan [1,34], India [24,57], Iran [5,9], Syria [4,15], Turkey [50,51], Russia [44], and Mexico [28]. There is almost no previous research about the topic of censorship in Spain, except for some clues [3,6,11,29,40].…”
Section: Introductionmentioning
confidence: 99%
“…Significant research efforts [8,13,18,32,34,36,39,44,45,49,51,56] have been devoted to measuring Internet censorship. Specifically, to detect censorship activities in a region, the basic idea is to send a request from a vantage point within the region and then compare the response with a valid response from a legitimate server.…”
Section: Introductionmentioning
confidence: 99%
“…However, the dilemma here is that if the request is blocked, the vantage point has no ground truth to identify the valid response. To tackle this issue, existing studies [18,32,36,39,45] collect the valid responses from nodes deployed in multiple countries. However, this approach inevitably reduces the detection reliability due to the diversity and flexibility of Internet services.…”
Section: Introductionmentioning
confidence: 99%