Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/3559613.3563203acmconferencesArticle/Chapter ViewAbstractPublication PagesccsConference Proceedingsconference-collections
short-paper
Public Access

Adversarial Detection of Censorship Measurements

Published: 07 November 2022 Publication History
  • Get Citation Alerts
  • Abstract

    The arms race between Internet freedom technologists and censoring regimes has catalyzed the deployment of more sophisticated censoring techniques and directed significant research emphasis toward the development of automated tools for censorship measurement and evasion. We highlight Geneva as one of the recent advances in this area. By training a genetic algorithm such as Geneva inside a censored region, we can automatically find novel packet-manipulation-based censorship evasion strategies. In this paper, we explore the resilience of Geneva in the face of censors that actively detect and react to Geneva's measurements. Specifically, we develop machine learning (ML)-based classifiers and leverage a popular hypothesis-testing algorithm that can be deployed at the censor to detect Geneva clients within two to seven flows, i.e., far before Geneva finds any working evasion strategy. We further use public packet-capture traces to show that Geneva flows can be easily distinguished from normal flows and other malicious flows (e.g., network forensics, malware). Finally, we discuss some potential research directions to mitigate Geneva's detection.

    References

    [1]
    X. Xu, Z. M. Mao, and J. A. Halderman, "Internet censorship in china: Where does the filtering occur?" in PAM, 2011.
    [2]
    Z. Nabi, "The anatomy of web censorship in pakistan," in 3rd USENIX Workshop on Free and Open Communications on the Internet (FOCI 13). Washington, D.C.: USENIX Association, Aug. 2013. [Online]. Available: https://www.usenix.org/conference/foci13/workshop-program/presentation/nabi
    [3]
    T. K. Yadav, A. Sinha, D. Gosain, P. K. Sharma, and S. Chakravarty, "Where the light gets in: Analyzing web censorship mechanisms in india," in Proceedings of the Internet Measurement Conference 2018, ser. IMC '18. New York, NY, USA: Association for Computing Machinery, 2018, p. 252--264. [Online]. Available: https://doi.org/10.1145/3278532.3278555
    [4]
    S. Khattak, M. Javed, P. D. Anderson, and V. Paxson, "Towards illuminating a censorship monitor's model to facilitate evasion," in 3rd USENIX Workshop on Free and Open Communications on the Internet (FOCI 13). Washington, D.C.: USENIX Association, Aug. 2013. [Online]. Available: https://www.usenix.org/conference/foci13/workshop-program/presentation/khattak
    [5]
    F. Li, A. Razaghpanah, A. M. Kakhki, A. A. Niaki, D. Choffnes, P. Gill, and A. Mislove, "Liberate, (n): A library for exposing (traffic-classification) rules and avoiding them efficiently," in Proceedings of the 2017 Internet Measurement Conference, ser. IMC '17. New York, NY, USA: Association for Computing Machinery, 2017, p. 128--141. [Online]. Available: https: //doi.org/10.1145/3131365.3131376
    [6]
    Z. Wang, Y. Cao, Z. Qian, C. Song, and S. V. Krishnamurthy, "Your state is not mine: A closer look at evading stateful internet censorship," in Proceedings of the 2017 Internet Measurement Conference, ser. IMC '17. New York, NY, USA: Association for Computing Machinery, 2017, p. 114--127. [Online]. Available: https://doi.org/10.1145/3131365.3131374
    [7]
    "Signal. 2017. egypt keeps trying to block signal, inadvertently blocking all of google, and having to stop as a result. we'll also expand domain fronts." 2017.
    [8]
    . Available: https://twitter.com/signalapp/status/817062093094604800
    [9]
    "Moxie marlinspike. 2017. doodles, stickers, and censorship circumvention for signal android." 2017. [Online]. Available: https://signal.org/blog/doodlesstickers- censorship/
    [10]
    K. Bock, G. Hughey, X. Qiang, and D. Levin, "Geneva: Evolving Censorship Evasion," 2019.
    [11]
    J. Jung, V. Paxson, A. Berger, and H. Balakrishnan, "Fast portscan detection using sequential hypothesis testing," in IEEE Symposium on Security and Privacy, 2004. Proceedings. 2004, 2004, pp. 211--225.
    [12]
    P. Winter and S. Lindskog, "How the Great Firewall of China is blocking Tor," in Free and Open Communications on the Internet. USENIX, 2012.

    Cited By

    View all
    • (2023)DeResistorProceedings of the 32nd USENIX Conference on Security Symposium10.5555/3620237.3620384(2617-2633)Online publication date: 9-Aug-2023

    Index Terms

    1. Adversarial Detection of Censorship Measurements

      Recommendations

      Comments

      Information & Contributors

      Information

      Published In

      cover image ACM Conferences
      WPES'22: Proceedings of the 21st Workshop on Privacy in the Electronic Society
      November 2022
      227 pages
      ISBN:9781450398732
      DOI:10.1145/3559613
      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Sponsors

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      Published: 07 November 2022

      Permissions

      Request permissions for this article.

      Check for updates

      Author Tags

      1. censorship measurements
      2. internet freedom

      Qualifiers

      • Short-paper

      Funding Sources

      Conference

      CCS '22
      Sponsor:

      Acceptance Rates

      Overall Acceptance Rate 106 of 355 submissions, 30%

      Upcoming Conference

      CCS '24
      ACM SIGSAC Conference on Computer and Communications Security
      October 14 - 18, 2024
      Salt Lake City , UT , USA

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)55
      • Downloads (Last 6 weeks)7

      Other Metrics

      Citations

      Cited By

      View all
      • (2023)DeResistorProceedings of the 32nd USENIX Conference on Security Symposium10.5555/3620237.3620384(2617-2633)Online publication date: 9-Aug-2023

      View Options

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Get Access

      Login options

      Media

      Figures

      Other

      Tables

      Share

      Share

      Share this Publication link

      Share on social media