首页> 外文会议>Internet Measurement Conference >Examining How the Great Firewall Discovers Hidden Circumvention Servers
【24h】

Examining How the Great Firewall Discovers Hidden Circumvention Servers

机译:检查伟大的防火墙如何发现隐藏的规避服务器

获取原文
获取外文期刊封面目录资料

摘要

Recently, the operators of the national censorship infrastructure of China began to employ "active probing" to detect and block the use of privacy tools. This probing works by passively monitoring the network for suspicious traffic, then actively probing the corresponding servers, and blocking any that are determined to run circumvention servers such as Tor. We draw upon multiple forms of measurements, some spanning years, to illuminate the nature of this probing. We identify the different types of probing, develop fingerprinting techniques to infer the physical structure of the system, localize the sensors that trigger probing-showing that they differ from the "Great Firewall" infrastructure-and assess probing's efficacy in blocking different versions of Tor. We conclude with a discussion of the implications for designing circumvention servers that resist such probing mechanisms.
机译:最近,中国国家审查基础设施的运营商开始采用“积极探索”来检测和阻止使用隐私工具。该探测通过被动地监视网络以进行可疑流量,然后主动探测相应的服务器,并阻止确定以确定运行诸如TOR的规避服务器的任何方式。我们借鉴了多种形式的测量,一些跨越年,以照亮这种探测的性质。我们识别不同类型的探测,开发指纹技术来推断系统的物理结构,本地化触发探测的传感器,表明它们与“伟大的防火墙”基础设施不同 - 并评估阻止不同版本的探测的验证。我们得出结论,讨论了设计抵抗这种探测机制的规避服务器的影响。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号