Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/2934872.2959081acmconferencesArticle/Chapter ViewAbstractPublication PagescommConference Proceedingsconference-collections
short-paper
Free access

A First Look into Transnational Routing Detours

Published: 22 August 2016 Publication History

Abstract

An increasing number of countries are passing laws that facilitate the mass surveillance of their citizens. In response, governments and citizens are increasingly paying attention to the countries that their Internet traffic traverses. In some cases, countries are taking extreme steps, such as building new IXPs and encouraging local interconnection to keep local traffic local. We find that although many of these efforts are extensive, they are often futile, due to the inherent lack of hosting and route diversity for many popular sites. We investigate how the use of overlay network relays and the DNS open resolver infrastructure can prevent traffic from traversing certain jurisdictions.

References

[1]
Brazil Builds Internet Cable To Portugal To Avoid NSA Surveillance. http://www.ibtimes.com/brazil-builds-internet-cable-portugal-avoid-nsa-surveillance-1717417.
[2]
Netherlands New Proposal for Dragnet Surveillance Underway. https://edri.org/netherlands-new-proposals-for-dragnet-surveillance-underway/.
[3]
B. Huffaker, M. Fomenkov, and K. Claffy. Geocompare: a comparison of public and commercial geolocation databases. Proc. NMMC, pages 1–12, 2011.
[4]
J. Karlin, S. Forrest, and J. Rexford. Nation-state routing: Censorship, wiretapping, and bgp. arXiv preprint arXiv:0903.3218, 2009.

Cited By

View all
  • (2024)Charting Censorship Resilience and Global Internet Reachability: A Quantitative Approach2024 IFIP Networking Conference (IFIP Networking)10.23919/IFIPNetworking62109.2024.10619834(529-535)Online publication date: 3-Jun-2024
  • (2024)Trinity: High-Performance and Reliable Mobile Emulation through Graphics ProjectionACM Transactions on Computer Systems10.1145/364302942:3-4(1-33)Online publication date: 20-Sep-2024
  • (2024)Barrier Penetration Routing Against Wireless Spy SensorsIEEE Transactions on Mobile Computing10.1109/TMC.2023.3294415(1-14)Online publication date: 2024
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
SIGCOMM '16: Proceedings of the 2016 ACM SIGCOMM Conference
August 2016
645 pages
ISBN:9781450341936
DOI:10.1145/2934872
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 22 August 2016

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. routing
  2. surveillance

Qualifiers

  • Short-paper

Conference

SIGCOMM '16
Sponsor:
SIGCOMM '16: ACM SIGCOMM 2016 Conference
August 22 - 26, 2016
Florianopolis, Brazil

Acceptance Rates

SIGCOMM '16 Paper Acceptance Rate 39 of 231 submissions, 17%;
Overall Acceptance Rate 462 of 3,389 submissions, 14%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)60
  • Downloads (Last 6 weeks)20
Reflects downloads up to 03 Oct 2024

Other Metrics

Citations

Cited By

View all
  • (2024)Charting Censorship Resilience and Global Internet Reachability: A Quantitative Approach2024 IFIP Networking Conference (IFIP Networking)10.23919/IFIPNetworking62109.2024.10619834(529-535)Online publication date: 3-Jun-2024
  • (2024)Trinity: High-Performance and Reliable Mobile Emulation through Graphics ProjectionACM Transactions on Computer Systems10.1145/364302942:3-4(1-33)Online publication date: 20-Sep-2024
  • (2024)Barrier Penetration Routing Against Wireless Spy SensorsIEEE Transactions on Mobile Computing10.1109/TMC.2023.3294415(1-14)Online publication date: 2024
  • (2021)DNSWeight: Quantifying Country-Wise Importance of Domain Name SystemIEEE Access10.1109/ACCESS.2021.31129269(133240-133257)Online publication date: 2021
  • (2018)Exploring “Mass Surveillance” Through Computational Linguistic Analysis of Five Text CorporaTechniques for Coding Imagery and Multimedia10.4018/978-1-5225-2679-7.ch004(212-286)Online publication date: 2018
  • (2017)The hidden mailman and his mailbag: Routing path analysis from a European perspective2017 IEEE International Conference on Communications (ICC)10.1109/ICC.2017.7996683(1-7)Online publication date: May-2017

View Options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Get Access

Login options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media