16th International Conference on Advanced Communication Technology 2014
DOI: 10.1109/icact.2014.6778916
|View full text |Cite
|
Sign up to set email alerts
|

GoHop: Personal VPN to defend from censorship

Abstract: Abstract-Internet censorship threatens people's online privacy, and in recent years, new technologies such as high-speed Deep Packet Inspection (DPI) and statistical traffic analysis methods had been applied in country scale censorship and surveillance projects. Traditional encryption protocols cannot hide statistical flow properties and new censoring systems can easily detect and block them "in the dark". Recent work showed that traffic morphing and protocol obfuscation are effective ways to defend from stati… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
7
0

Year Published

2016
2016
2021
2021

Publication Types

Select...
2
2
1

Relationship

0
5

Authors

Journals

citations
Cited by 6 publications
(7 citation statements)
references
References 10 publications
0
7
0
Order By: Relevance
“…e network topology of the experimental environment is shown in Fig- ure 3. e attack can be launched by the following steps: (1) installing SoftEther server software on the malicious server, (2) on the user interface of the SoftEther server software, enabling the VPN Gate option, so that the malicious server now becomes a volunteer node of the VPN Gate relay system, and (3) adding DNAT rules in the malicious OpenWrt router to redirect all VPN traffics to the malicious server. To add the DNAT rules, we use the following Linux Shell commands: iptables -t nat -A PREROUTING -d 219.100.37.X --dport 443 -p tcp -m tcp -j DNAT --to-destination 47.242.230.X:443…”
Section: Scenario 1: Vpn Session Hijackingmentioning
confidence: 99%
See 2 more Smart Citations
“…e network topology of the experimental environment is shown in Fig- ure 3. e attack can be launched by the following steps: (1) installing SoftEther server software on the malicious server, (2) on the user interface of the SoftEther server software, enabling the VPN Gate option, so that the malicious server now becomes a volunteer node of the VPN Gate relay system, and (3) adding DNAT rules in the malicious OpenWrt router to redirect all VPN traffics to the malicious server. To add the DNAT rules, we use the following Linux Shell commands: iptables -t nat -A PREROUTING -d 219.100.37.X --dport 443 -p tcp -m tcp -j DNAT --to-destination 47.242.230.X:443…”
Section: Scenario 1: Vpn Session Hijackingmentioning
confidence: 99%
“…Users use this to access services or resources in the remote networks. Either to circumvent censorship [1] or for privacy purpose [2], many users use VPN to obtain network services. However, VPN still faces some privacy and security risks [3].…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…Open HTTP Proxies: Users also resort to Open HTTP proxies and other censorship resistance systems to anonymize their traffic [16,42]. One of these services is VPN Gate, an open and free service analyzed by Nobori et al [23].…”
Section: Vpn-based Measurementsmentioning
confidence: 99%
“…GoHop [85] breaks the notion of 'flow' used by Deep Packet Inspection (DPI) boxes by sending traffic over a set of randomized ports. Clayton et al [86] note that the GFW terminates offending connections through injection of TCP reset packets.…”
Section: Miscellaneousmentioning
confidence: 99%