2021
DOI: 10.1145/3491055
|View full text |Cite
|
Sign up to set email alerts
|

Understanding the Practices of Global Censorship through Accurate, End-to-End Measurements

Abstract: It is challenging to conduct a large scale Internet censorship measurement, as it involves triggering censors through artificial requests and identifying abnormalities from corresponding responses. Due to the lack of ground truth on the expected responses from legitimate services, previous studies typically require a heavy, unscalable manual inspection to identify false positives while still leaving false negatives undetected. In this paper, we propose Disguiser, a novel framework that enables end-to-end measu… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
2
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(2 citation statements)
references
References 24 publications
0
2
0
Order By: Relevance
“…However, many methods cause DNS facilities to respond to incorrect results. For example, as studied in this paper, DNS filtering, also known as DNS redirection or poisoning, causes the DNS resolvers to return incorrect domain records (e.g., IP addresses) to the clients [1][2][3][4][5]. This method may be used for malicious purposes such as phishing, for security and business purposes by a company [6,7] (providing parental control or antivirus filtering services), for advertising purposes of Internet service providers (ISPs), or for the governments to block access to specific domains [8][9][10].…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…However, many methods cause DNS facilities to respond to incorrect results. For example, as studied in this paper, DNS filtering, also known as DNS redirection or poisoning, causes the DNS resolvers to return incorrect domain records (e.g., IP addresses) to the clients [1][2][3][4][5]. This method may be used for malicious purposes such as phishing, for security and business purposes by a company [6,7] (providing parental control or antivirus filtering services), for advertising purposes of Internet service providers (ISPs), or for the governments to block access to specific domains [8][9][10].…”
Section: Introductionmentioning
confidence: 99%
“…Many previous studies [8,9,27] focused on discovering the location of DNS filtering devices in cyberspace and collecting the set of keywords that trigger filtering. Jin et al [3,28] proposed a novel framework that enables end-to-end measurement to detect censorship activities accurately (e.g., DNS filtering) and revealed the censor deployment without manual efforts. To discover DNS tampering, their control server will reply to the requests with a static and reserved IP address that has never been used in manipulated DNS responses by any censors in different countries.…”
mentioning
confidence: 99%