Infranet: Circumventing Web Censorship and Surveillance
by Nick Feamster, Hari Balakrishnan, Magdalena Balazinska, David Karger, Greg Harfst
url show details
Details
year: | 2002 | annote: | Nick Feamster (MIT Laboratory for Computer Science); Magdalena Balazinska (MIT Laboratory for Computer Science); Greg Harfst (MIT Laboratory for Computer Science); Hari Balakrishnan (MIT Laboratory for Computer Science); David Karger (MIT Laboratory for Computer Science); | month: | jul # "~26 | publisher: | USENIX | pages: | 247--262 | editor: | {USENIX} | url: | http://pages.cs.wisc.edu/~akella/CS740/S10/740-Papers/F+02.pdf | type: | inproceedings | booktitle: | Proceedings of the 11th {USENIX} Security Symposium 2002, August 5--9, 2002, San Francisco, {CA} | address: | pub-USENIX:adr | abstract: | An increasing number of countries and companies routinely block or monitor access to parts of the Internet. To counteract these measures, we propose Infranet, a system that enables clients to surreptitiously retrieve sensitive content via cooperating Web servers distributed across the global Internet. These Infranet servers provide clients access to censored sites while continuing to host normal uncensored content. Infranet uses a tunnel protocol that provides a covert communication channel between its clients and servers, modulated over standard HTTP transactions that resemble innocuous Web browsing. In the upstream direction, Infranet clients send covert messages to Infranet servers by associating meaning to the sequence of HTTP requests being made. In the downstream direction, Infranet servers return content by hiding censored data in uncensored images using steganographic techniques. We describe the design, a prototype implementation, security properties, and performance of Infranet. Our security analysis shows that Infranet can successfully circumvent several sophisticated censoring techniques. |
|
|
You need to log in to add tags and post comments.