SlideShare a Scribd company logo
1 of 55
Download to read offline
Monitoring Internet
Censorship
part 2
Linux Day 2013
Napoli, October 26 2013
Giuseppe Aceto, giuseppe.aceto@unina.it
Monitoring Internet Censorship- Linux Day Napoli Oct.20132
Premise – quick check
 We are going to see some “mechanics” of the Internet
to explain how censorship works
 The description will avoid technicisms when possible
 No deep knowledge of computer networks will be implied
but possibly a little introduction to “the Internet” basics
SO
– How many of you knows what the DNS is?
– … and IP?
– … and HTTP?
– … IDS?
Monitoring Internet Censorship- Linux Day Napoli Oct.20133
Premise – quick check
 We are going to see some “mechanics” of the Internet
to explain how censorship works
 The description will avoid technicisms when possible
 No deep knowledge of computer networks will be implied
but possibly a little introduction to “the Internet” basics
SO
– How many of you knows what the DNS is?
– … and IP?
– … and HTTP?
– … IDS?
Monitoring Internet Censorship- Linux Day Napoli Oct.2013
Basics about Internet: packets
4
 Information is divided in packets
 Packets are forwarded along a path SENDER-to-RECEIVER by
several (usually<30) intermediate devices “routers”
 Packets are “labeled” with SENDER and RECEIVER
addresses (sort of phone numbers, called “IP addresses”)
– plus other details useful for the service
Mumbo
jumbo
Mumbo
jumbo
Mumbo
jumbo
Monitoring Internet Censorship- Linux Day Napoli Oct.2013
Basics about Internet: protocols
5
 The rules to write, split, label, forward, reassemble, read the
messages are called protocols
– Each one has its own business, some work together:
often are wrapped in layers
 HyperText Trasfer Protocol is concerned with providing web
pages, identified by an Uniform Resource Locator (URL):
IP TCP HTTP Content
http://www.foo.org/abc/bar.html
protocol hostname path
Monitoring Internet Censorship- Linux Day Napoli Oct.2013
Basics about Internet: a lot happens
6
http://foo.org/bar.html
Browser Web Server
(4) HTTP GET bar.html
(1) Enter URL
(6) HTTP Response
(5) Locate the
resource
(7) Parse HTML
& display
(8) HTTP GET image1
(N) HTTP GET imageX
Potentially many
requests & responses
DNS
(2) “foo.org”(3) “1.2.3.4”
TCP
(connection setup)
Monitoring Internet Censorship- Linux Day Napoli Oct.2013
Access to content: an obstacle course
http://thenextweb.com/asia/2010/01/05/route-gfw-flow-chart/
7
Monitoring Internet Censorship- Linux Day Napoli Oct.2013
IP blocking
8
Monitoring Internet Censorship- Linux Day Napoli Oct.2013
Censored net Uncensored net
Bob
Firewall
Alice Block Traffic
Censor
Conventional Internet Censorship (1/2)
9
Monitoring Internet Censorship- Linux Day Napoli Oct.2013
Censored net Uncensored net
Bob
Firewall
Alice Block Traffic
Censor
Conventional Internet Censorship (2/2)
10
For the censor: easy, cheap,
but OVERBLOCKING issues
Monitoring Internet Censorship- Linux Day Napoli Oct.2013
Real deployment can be more complex
11
Monitoring Internet Censorship- Linux Day Napoli Oct.2013
DNS blocking (hijacking)
12
Monitoring Internet Censorship- Linux Day Napoli Oct.2013
Domain Name System :
normal behavior (and allowed hostnames)
13
1 2
3
4 Target
Service
DNS
Monitoring Internet Censorship- Linux Day Napoli Oct.2013
Domain Name System :
hijacking for blocked hostnames
14
1 2
3
4
DNS
Target
Service
Warning
page
DNS
Monitoring Internet Censorship- Linux Day Napoli Oct.2013
Domain Name System :
hijacking for blocked hostnames
15
1 2
3
4
DNS
Target
Service
Warning
page
DNS
For the censor: ~free, easy
but still OVERBLOCKING
Monitoring Internet Censorship- Linux Day Napoli Oct.2013
URL filtering
16
Monitoring Internet Censorship- Linux Day Napoli Oct.2013
URL filtering: URL is ok
17
1
2
3
4 Target
Service
Intermediate
device
Monitoring Internet Censorship- Linux Day Napoli Oct.2013
URL filtering: URL is blocked
18
1
2 Target
Service
Intermediate
device
Monitoring Internet Censorship- Linux Day Napoli Oct.2013
URL filtering: URL is blocked
19
1
2 Target
Service
Intermediate
device
For the censor: precise, but
expensive, performance issues
Monitoring Internet Censorship- Linux Day Napoli Oct.2013
URL filtering (with DNS hijacking)
20
Monitoring Internet Censorship- Linux Day Napoli Oct.201321
1 2
3
4 Target
Service
DNS
DNS hijacking + URL filtering:
hostname is ok
Monitoring Internet Censorship- Linux Day Napoli Oct.2013
DNS hijacking + URL filtering:
hostname with blocked pages – but ok
22
1 2 3
6
DNS
Target
Service
DNS
4
5
Monitoring Internet Censorship- Linux Day Napoli Oct.2013
DNS hijacking + URL filtering:
URL was censored
23
1 2 3
4
DNS
Target
Service
DNS
Monitoring Internet Censorship- Linux Day Napoli Oct.2013
DNS hijacking + URL filtering:
URL was censored
24
1 2 3
4
DNS
Target
Service
DNS
For the censor: precise,
less performance issues,
still expensive
Monitoring Internet Censorship- Linux Day Napoli Oct.2013
Content filtering
25
Monitoring Internet Censorship- Linux Day Napoli Oct.2013
Content filtering: content is ok
26
1
2
3
4 Target
Service
Intermediate
device
Monitoring Internet Censorship- Linux Day Napoli Oct.2013
Content filtering: sender content is blocked
27
1
Target
Service
Intermediate
device
2
Monitoring Internet Censorship- Linux Day Napoli Oct.2013
Content filtering: receiver content is blocked
28
1
2
3
4 Target
Service
Intermediate
device
For the censor: both very
precise or dramatic failure,
most expensive
Monitoring Internet Censorship- Linux Day Napoli Oct.2013
Detection challenges:
observing censorship is not easy
29
 Targets of censorship change from country to country
– … and sometimes in regions inside the country
– … and in time
 Censorship techniques change in time, too
 To observe censorship we need (usually) a vantage point
inside the censored network
 … but also other vantage points from outside the censored
network, to tell censorship from outages
 Some kinds of censorship are inherently hard to detect
– server-side self-censorship
– User client software censorship
– User self-censorship
Monitoring Internet Censorship- Linux Day Napoli Oct.2013
Detection challenges:
similar symptoms, same as outages
30
Monitoring Internet Censorship- Linux Day Napoli Oct.2013
“outside-the-Internet” blocking
Website manager
censors the service
Client SW
or other SW
on your
computer
31
Monitoring Internet Censorship- Linux Day Napoli Oct.2013
Detection importance:
awareness, circumvention
32
Monitoring Internet Censorship- Linux Day Napoli Oct.2013
Our client-based approach: UBICA
33
 Multi-platform application
Linux, Mac OSX, Windows
 Extensible measurement framework
any underlying measurement tool supported
flexible experiments
 Real-time reporting at different aggregation levels
Monitoring Internet Censorship- Linux Day Napoli Oct.201334
Control Protocol
Measurement
UBICA
Management
Server
(@UniNA)
DB
UBICA
daemonPossible
Censorship
targets
UBICA
Helper
Server
(@UniNA)
Globally
distributed
UBICA clients
Internet
UBICA architecture
Monitoring Internet Censorship- Linux Day Napoli Oct.201335
1. Collection of Targets
2. Scheduling of evidence collection
3. Evidence collection by probes
4. Evidence reporting and data export
5. Censorship Tests
6. Update Targets and Scheduling
UBICA monitoring cycle
Monitoring Internet Censorship- Linux Day Napoli Oct.201336
1. Collection of Targets
2. Scheduling of evidence collection
3. Evidence collection by probes
4. Evidence reporting and data export
5. Censorship Tests
6. Update Targets and Scheduling
UBICA monitoring cycle
Monitoring Internet Censorship- Linux Day Napoli Oct.201337
TCP connectivity
DNS lookup
HTTPscan (URL retrieval)
Keyword-based HTTP retrieval
Topology
Performance
Evidence collection
Monitoring Internet Censorship- Linux Day Napoli Oct.201338
1. Collection of Targets
2. Scheduling of evidence collection
3. Evidence collection by probes
4. Evidence reporting and data export
5. Censorship Tests
6. Update Targets and Scheduling
UBICA monitoring cycle
Monitoring Internet Censorship- Linux Day Napoli Oct.201339
IP / port filtering
DNS tampering
URL filtering
Localization
Content mangling
Censorship Checks
Monitoring Internet Censorship- Linux Day Napoli Oct.2013
Test: DNS censorship

DNS resolution
− Collection: an A query for the target hostname is
requested to the local default DNS server and to a small
number of open resolvers
− Check local: for each hostname compare the set of IP
addresses from the default resolver against the ones from
the open resolvers
− Check global: for each hostname compare the set of
resolved IP addresses inside a zone against other ones
− Check graph: considering the bipartite graph of
hostnames and their resolved IP addresses, with edges
representing the name resolution relation, compute the in-
degree and out-degree of nodes inside a zone and
compare with other ones
40
Evidences and visualization of DNS
hijacking in Italy
41
Evidences and visualization of DNS
hijacking in Italy
42
Evidences and visualization of DNS
hijacking in Italy
U.S.A.
Italy
43
Evidences and visualization of DNS
hijacking in Italy
U.S.A.
Italy
44
Monitoring Internet Censorship- Linux Day Napoli Oct.2013
Tests: TCP connection

TCP reachability
− Collection: a TCP handshake is initiated towards the
target IP address, timeout, reset response and network
errors are collected
− Check errors: compare percentage of unreachability
issues inside a country/ISP/AS against others
− Check RST: compare percentage of RST received
inside a country/ISP/AS against others
45
Monitoring Internet Censorship- Linux Day Napoli Oct.2013
Tests: HTTP evidence

HTTP content
− Collection: HTTP GET of the target URL is
requested to the target hostname (specifying the
IP too);
HTTP headers and downloaded content are saved
− Check errors: compare percentage of
unreachability issues (no content retrieved) inside
a country/ISP/AS against others
− Check size: compare average size inside a
country/ISP/AS against a Ground Truth (selected
reference country/ISP/AS)
46
Monitoring Internet Censorship- Linux Day Napoli Oct.201347
No response to HTTP request or response
empty, grouped by country
“Expected” (CN, BD) and unexpected (NZ)
countries
Currently under investigation!!!
Different html size retrieved for the same
site from different countries
Block page is typically small
The size ratio may be a good censorship
detector
Tests: HTTP evidence
Monitoring Internet Censorship- Linux Day Napoli Oct.2013
Tests: Tor censorship - collection

Integrated test
− Collection: DNS resolution of

Tor home page and mirrors

Tor-based circumvention techniques and tools pages

Tor overlay node list webpage
− Collection: HTTP GET of

Tor home page and mirrors

Tor-based circumvention techniques and tools pages

Tor overlay node list webpage
− Collection: TCP reachability of

Tor nodes (relays)

Tor indexing servers (Directory Authorities )
48
Monitoring Internet Censorship- Linux Day Napoli Oct.2013
Tests: Tor censorship - checks*

Integrated test Check:
DNS response for webpages is different from ground truth
OR
content of all webpages is unreachable
OR
X% of Directory Authorities is not TCP-reachable
OR
Y% of relays is not TCP-reachable
THEN Tor is censored
* variations of the method in: Philipp Winter, “Design Requirements for a
Tor Censorship Analysis Tool”, Tor Tech Report 2013-02-001 February 6, 2013
49
Monitoring Internet Censorship- Linux Day Napoli Oct.201350
UBICA monitoring interface (1/2)
Monitoring Internet Censorship- Linux Day Napoli Oct.201351
UBICA monitoring interface (2/2)
Monitoring Internet Censorship- Linux Day Napoli Oct.201352
UBICA at the moment (yesterday night)
 Just a prototype: few tests, few vantage points, but has
– Full-cycle automation
– Actual data
– Quasi-real-time reporting
… we are working to improve it!
...and yes, we seriously need
also a cool logo for the project.
Monitoring Internet Censorship- Linux Day Napoli Oct.2013
References, credits
"Measuring & Circumventing Internet Censorship" – Nick Feamster, talk @ ETH ZISC
Future Internet Security Workshop Oct 16th 2013 http://goo.gl/CHV5uJ
Philipp Winter, “Design Requirements for a Tor Censorship Analysis Tool “,Tor Tech Report
2013-02-001 February 6, 2013
Gill, Phillipa, et al. "Characterizing Censorship of Web Content Worldwide." 2013
Z. Nabi, "The anatomy of web censorship in pakistan," arXiv preprint arXiv:1307.1144,
2013.
Sfakianakis, Andreas, Elias Athanasopoulos, and Sotiris Ioannidis. "CensMon: A Web
censorship monitor." FOCI’11: USENIX Workshop on Free and Open Communications on
the Internet. 2011.
C. Anderson, "Dimming the internet: Detecting throttling as a mechanism of censorship in
iran," Jun. 2013. [Online]. Available: http://arxiv.org/abs/1306.4361
Philipp Winter – selection of papers on Internet censorship
http://www.cs.kau.se/philwint/censorbib/
53
Thanks for your attention!
54
Any Questions?
55

More Related Content

What's hot

Meet Remaiten : Malware Builds Botnet on Linux based routers and potentially ...
Meet Remaiten : Malware Builds Botnet on Linux based routers and potentially ...Meet Remaiten : Malware Builds Botnet on Linux based routers and potentially ...
Meet Remaiten : Malware Builds Botnet on Linux based routers and potentially ...APNIC
 
Nachos Theoretical assigment 3
Nachos Theoretical assigment 3Nachos Theoretical assigment 3
Nachos Theoretical assigment 3colli03
 
Jose Selvi - Side-Channels Uncovered [rootedvlc2018]
Jose Selvi - Side-Channels Uncovered [rootedvlc2018]Jose Selvi - Side-Channels Uncovered [rootedvlc2018]
Jose Selvi - Side-Channels Uncovered [rootedvlc2018]RootedCON
 
Malware Analysis Made Simple
Malware Analysis Made SimpleMalware Analysis Made Simple
Malware Analysis Made SimplePaul Melson
 
The Background Noise of the Internet
The Background Noise of the InternetThe Background Noise of the Internet
The Background Noise of the InternetAndrew Morris
 
DANE-based TLS verification in the SIP protocol (v 2)
DANE-based TLS verification in the SIP protocol (v 2)DANE-based TLS verification in the SIP protocol (v 2)
DANE-based TLS verification in the SIP protocol (v 2)Olle E Johansson
 
Forensic Analysis - Empower Tech Days 2013
Forensic Analysis - Empower Tech Days 2013Forensic Analysis - Empower Tech Days 2013
Forensic Analysis - Empower Tech Days 2013Islam Azeddine Mennouchi
 
Penetration Testing Services Technical Description Cyber51
Penetration Testing Services Technical Description Cyber51Penetration Testing Services Technical Description Cyber51
Penetration Testing Services Technical Description Cyber51martinvoelk
 
Vulnerability and Penetration Testing
Vulnerability and Penetration TestingVulnerability and Penetration Testing
Vulnerability and Penetration TestingJeffery Brown
 
Module 4 Enumeration
Module 4   EnumerationModule 4   Enumeration
Module 4 Enumerationleminhvuong
 
Introduction to foot printing
Introduction to foot printingIntroduction to foot printing
Introduction to foot printingCHETAN THAKRE
 
Solving HTTP Problems with Code and Protocols
Solving HTTP Problems with Code and ProtocolsSolving HTTP Problems with Code and Protocols
Solving HTTP Problems with Code and ProtocolsC4Media
 
Introduction to and survey of TLS Security
Introduction to and survey of TLS SecurityIntroduction to and survey of TLS Security
Introduction to and survey of TLS SecurityAaron Zauner
 
Cotopaxi - IoT testing toolkit (3rd release - Black Hat Europe 2019 Arsenal)
Cotopaxi - IoT testing toolkit (3rd release - Black Hat Europe 2019 Arsenal)Cotopaxi - IoT testing toolkit (3rd release - Black Hat Europe 2019 Arsenal)
Cotopaxi - IoT testing toolkit (3rd release - Black Hat Europe 2019 Arsenal)Jakub Botwicz
 
Hunting for the secrets in a cloud forest
Hunting for the secrets in a cloud forestHunting for the secrets in a cloud forest
Hunting for the secrets in a cloud forestSecuRing
 

What's hot (20)

Meet Remaiten : Malware Builds Botnet on Linux based routers and potentially ...
Meet Remaiten : Malware Builds Botnet on Linux based routers and potentially ...Meet Remaiten : Malware Builds Botnet on Linux based routers and potentially ...
Meet Remaiten : Malware Builds Botnet on Linux based routers and potentially ...
 
Nachos Theoretical assigment 3
Nachos Theoretical assigment 3Nachos Theoretical assigment 3
Nachos Theoretical assigment 3
 
Jose Selvi - Side-Channels Uncovered [rootedvlc2018]
Jose Selvi - Side-Channels Uncovered [rootedvlc2018]Jose Selvi - Side-Channels Uncovered [rootedvlc2018]
Jose Selvi - Side-Channels Uncovered [rootedvlc2018]
 
Malware Analysis Made Simple
Malware Analysis Made SimpleMalware Analysis Made Simple
Malware Analysis Made Simple
 
The Background Noise of the Internet
The Background Noise of the InternetThe Background Noise of the Internet
The Background Noise of the Internet
 
DANE-based TLS verification in the SIP protocol (v 2)
DANE-based TLS verification in the SIP protocol (v 2)DANE-based TLS verification in the SIP protocol (v 2)
DANE-based TLS verification in the SIP protocol (v 2)
 
IPv6 Security
IPv6 SecurityIPv6 Security
IPv6 Security
 
Forensic Analysis - Empower Tech Days 2013
Forensic Analysis - Empower Tech Days 2013Forensic Analysis - Empower Tech Days 2013
Forensic Analysis - Empower Tech Days 2013
 
Penetration Testing Services Technical Description Cyber51
Penetration Testing Services Technical Description Cyber51Penetration Testing Services Technical Description Cyber51
Penetration Testing Services Technical Description Cyber51
 
Vulnerability and Penetration Testing
Vulnerability and Penetration TestingVulnerability and Penetration Testing
Vulnerability and Penetration Testing
 
Defcon
DefconDefcon
Defcon
 
Module 4 Enumeration
Module 4   EnumerationModule 4   Enumeration
Module 4 Enumeration
 
Introduction to foot printing
Introduction to foot printingIntroduction to foot printing
Introduction to foot printing
 
Solving HTTP Problems with Code and Protocols
Solving HTTP Problems with Code and ProtocolsSolving HTTP Problems with Code and Protocols
Solving HTTP Problems with Code and Protocols
 
Death of Web App Firewall
Death of Web App FirewallDeath of Web App Firewall
Death of Web App Firewall
 
Introduction to and survey of TLS Security
Introduction to and survey of TLS SecurityIntroduction to and survey of TLS Security
Introduction to and survey of TLS Security
 
Death of WAF - GoSec '15
Death of WAF - GoSec '15Death of WAF - GoSec '15
Death of WAF - GoSec '15
 
Wireshark
WiresharkWireshark
Wireshark
 
Cotopaxi - IoT testing toolkit (3rd release - Black Hat Europe 2019 Arsenal)
Cotopaxi - IoT testing toolkit (3rd release - Black Hat Europe 2019 Arsenal)Cotopaxi - IoT testing toolkit (3rd release - Black Hat Europe 2019 Arsenal)
Cotopaxi - IoT testing toolkit (3rd release - Black Hat Europe 2019 Arsenal)
 
Hunting for the secrets in a cloud forest
Hunting for the secrets in a cloud forestHunting for the secrets in a cloud forest
Hunting for the secrets in a cloud forest
 

Similar to Monitoring Internet Censorship Techniques

Modul 2 - Footprinting Scanning Enumeration.ppt
Modul 2 - Footprinting Scanning Enumeration.pptModul 2 - Footprinting Scanning Enumeration.ppt
Modul 2 - Footprinting Scanning Enumeration.pptcemporku
 
modul2-footprintingscanningenumeration.pdf
modul2-footprintingscanningenumeration.pdfmodul2-footprintingscanningenumeration.pdf
modul2-footprintingscanningenumeration.pdftehkotak4
 
Open source network forensics and advanced pcap analysis
Open source network forensics and advanced pcap analysisOpen source network forensics and advanced pcap analysis
Open source network forensics and advanced pcap analysisGTKlondike
 
Troubleshooting Network and Network Utilities
Troubleshooting Network and Network UtilitiesTroubleshooting Network and Network Utilities
Troubleshooting Network and Network UtilitiesRubal Sagwal
 
PLNOG 5: Merike Kaeo - Something Old Is New Again
PLNOG 5: Merike Kaeo - Something Old Is New AgainPLNOG 5: Merike Kaeo - Something Old Is New Again
PLNOG 5: Merike Kaeo - Something Old Is New AgainPROIDEA
 
CONFidence 2018: Darknet traffic - what can we learn from nooks and crannies ...
CONFidence 2018: Darknet traffic - what can we learn from nooks and crannies ...CONFidence 2018: Darknet traffic - what can we learn from nooks and crannies ...
CONFidence 2018: Darknet traffic - what can we learn from nooks and crannies ...PROIDEA
 
Co se skrývá v datovém provozu? - Pavel Minařík
Co se skrývá v datovém provozu? - Pavel MinaříkCo se skrývá v datovém provozu? - Pavel Minařík
Co se skrývá v datovém provozu? - Pavel MinaříkSecurity Session
 
Henrik Strøm - IPv6 from the attacker's perspective
Henrik Strøm - IPv6 from the attacker's perspectiveHenrik Strøm - IPv6 from the attacker's perspective
Henrik Strøm - IPv6 from the attacker's perspectiveIKT-Norge
 
HSB - Secure DNS en BGP ontwikkelingen - Benno Overeinder
HSB - Secure DNS en BGP ontwikkelingen - Benno OvereinderHSB - Secure DNS en BGP ontwikkelingen - Benno Overeinder
HSB - Secure DNS en BGP ontwikkelingen - Benno OvereinderSplend
 
Cisco CSIRT Case Study: Forensic Investigations with NetFlow
Cisco CSIRT Case Study: Forensic Investigations with NetFlowCisco CSIRT Case Study: Forensic Investigations with NetFlow
Cisco CSIRT Case Study: Forensic Investigations with NetFlowLancope, Inc.
 
Network Security Forensics
Network Security ForensicsNetwork Security Forensics
Network Security Forensicsseniorsam
 
technical-information-gathering-slides.pdf
technical-information-gathering-slides.pdftechnical-information-gathering-slides.pdf
technical-information-gathering-slides.pdfMarceloCunha571649
 
Dafgjgghhghfhjgghjhgy06-Footprinting.pptx
Dafgjgghhghfhjgghjhgy06-Footprinting.pptxDafgjgghhghfhjgghjhgy06-Footprinting.pptx
Dafgjgghhghfhjgghjhgy06-Footprinting.pptxAlfredObia1
 
Hacking - penetration tools
Hacking - penetration toolsHacking - penetration tools
Hacking - penetration toolsJenishChauhan4
 
Hacking Fundamentals - Jen Johnson , Miria Grunick
Hacking Fundamentals - Jen Johnson , Miria GrunickHacking Fundamentals - Jen Johnson , Miria Grunick
Hacking Fundamentals - Jen Johnson , Miria Grunickamiable_indian
 
BlueHat v17 || Dyre to Trickbot: An Inside Look at TLS-Encrypted Command-And-...
BlueHat v17 || Dyre to Trickbot: An Inside Look at TLS-Encrypted Command-And-...BlueHat v17 || Dyre to Trickbot: An Inside Look at TLS-Encrypted Command-And-...
BlueHat v17 || Dyre to Trickbot: An Inside Look at TLS-Encrypted Command-And-...BlueHat Security Conference
 

Similar to Monitoring Internet Censorship Techniques (20)

Modul 2 - Footprinting Scanning Enumeration.ppt
Modul 2 - Footprinting Scanning Enumeration.pptModul 2 - Footprinting Scanning Enumeration.ppt
Modul 2 - Footprinting Scanning Enumeration.ppt
 
modul2-footprintingscanningenumeration.pdf
modul2-footprintingscanningenumeration.pdfmodul2-footprintingscanningenumeration.pdf
modul2-footprintingscanningenumeration.pdf
 
D4 Project Presentation
D4 Project PresentationD4 Project Presentation
D4 Project Presentation
 
Open source network forensics and advanced pcap analysis
Open source network forensics and advanced pcap analysisOpen source network forensics and advanced pcap analysis
Open source network forensics and advanced pcap analysis
 
Troubleshooting Network and Network Utilities
Troubleshooting Network and Network UtilitiesTroubleshooting Network and Network Utilities
Troubleshooting Network and Network Utilities
 
PLNOG 5: Merike Kaeo - Something Old Is New Again
PLNOG 5: Merike Kaeo - Something Old Is New AgainPLNOG 5: Merike Kaeo - Something Old Is New Again
PLNOG 5: Merike Kaeo - Something Old Is New Again
 
CONFidence 2018: Darknet traffic - what can we learn from nooks and crannies ...
CONFidence 2018: Darknet traffic - what can we learn from nooks and crannies ...CONFidence 2018: Darknet traffic - what can we learn from nooks and crannies ...
CONFidence 2018: Darknet traffic - what can we learn from nooks and crannies ...
 
Co se skrývá v datovém provozu? - Pavel Minařík
Co se skrývá v datovém provozu? - Pavel MinaříkCo se skrývá v datovém provozu? - Pavel Minařík
Co se skrývá v datovém provozu? - Pavel Minařík
 
Become a Cloud Security Ninja
Become a Cloud Security NinjaBecome a Cloud Security Ninja
Become a Cloud Security Ninja
 
Henrik Strøm - IPv6 from the attacker's perspective
Henrik Strøm - IPv6 from the attacker's perspectiveHenrik Strøm - IPv6 from the attacker's perspective
Henrik Strøm - IPv6 from the attacker's perspective
 
HSB - Secure DNS en BGP ontwikkelingen - Benno Overeinder
HSB - Secure DNS en BGP ontwikkelingen - Benno OvereinderHSB - Secure DNS en BGP ontwikkelingen - Benno Overeinder
HSB - Secure DNS en BGP ontwikkelingen - Benno Overeinder
 
Cisco CSIRT Case Study: Forensic Investigations with NetFlow
Cisco CSIRT Case Study: Forensic Investigations with NetFlowCisco CSIRT Case Study: Forensic Investigations with NetFlow
Cisco CSIRT Case Study: Forensic Investigations with NetFlow
 
Tunneling
TunnelingTunneling
Tunneling
 
Network Security Forensics
Network Security ForensicsNetwork Security Forensics
Network Security Forensics
 
technical-information-gathering-slides.pdf
technical-information-gathering-slides.pdftechnical-information-gathering-slides.pdf
technical-information-gathering-slides.pdf
 
Dafgjgghhghfhjgghjhgy06-Footprinting.pptx
Dafgjgghhghfhjgghjhgy06-Footprinting.pptxDafgjgghhghfhjgghjhgy06-Footprinting.pptx
Dafgjgghhghfhjgghjhgy06-Footprinting.pptx
 
Hacking - penetration tools
Hacking - penetration toolsHacking - penetration tools
Hacking - penetration tools
 
Hacking Fundamentals - Jen Johnson , Miria Grunick
Hacking Fundamentals - Jen Johnson , Miria GrunickHacking Fundamentals - Jen Johnson , Miria Grunick
Hacking Fundamentals - Jen Johnson , Miria Grunick
 
BlueHat v17 || Dyre to Trickbot: An Inside Look at TLS-Encrypted Command-And-...
BlueHat v17 || Dyre to Trickbot: An Inside Look at TLS-Encrypted Command-And-...BlueHat v17 || Dyre to Trickbot: An Inside Look at TLS-Encrypted Command-And-...
BlueHat v17 || Dyre to Trickbot: An Inside Look at TLS-Encrypted Command-And-...
 
Penetration Testing Boot CAMP
Penetration Testing Boot CAMPPenetration Testing Boot CAMP
Penetration Testing Boot CAMP
 

More from NaLUG

Grid System
Grid SystemGrid System
Grid SystemNaLUG
 
Cyber Forensic
Cyber ForensicCyber Forensic
Cyber ForensicNaLUG
 
Digital Divide
Digital DivideDigital Divide
Digital DivideNaLUG
 
Drupal
DrupalDrupal
DrupalNaLUG
 
Digital Forensic
Digital ForensicDigital Forensic
Digital ForensicNaLUG
 
Open Source: strumento per l'e-democracy
Open Source: strumento per l'e-democracyOpen Source: strumento per l'e-democracy
Open Source: strumento per l'e-democracyNaLUG
 
OpenHardware : Arduino
OpenHardware : ArduinoOpenHardware : Arduino
OpenHardware : ArduinoNaLUG
 
Understanding Linux
Understanding LinuxUnderstanding Linux
Understanding LinuxNaLUG
 
Net Neutrality: HoBBIT
Net Neutrality: HoBBITNet Neutrality: HoBBIT
Net Neutrality: HoBBITNaLUG
 
Opensource per un Sistema Informativo Territoriale
Opensource per un Sistema Informativo TerritorialeOpensource per un Sistema Informativo Territoriale
Opensource per un Sistema Informativo TerritorialeNaLUG
 
Knomos
Knomos Knomos
Knomos NaLUG
 
App comunicazione comune di Napoli
App comunicazione comune di NapoliApp comunicazione comune di Napoli
App comunicazione comune di NapoliNaLUG
 
BISmark : the broadband internet service benchmark
BISmark : the broadband internet service benchmarkBISmark : the broadband internet service benchmark
BISmark : the broadband internet service benchmarkNaLUG
 
ClearOS
ClearOSClearOS
ClearOSNaLUG
 
Security and hacking Engineering
Security and hacking EngineeringSecurity and hacking Engineering
Security and hacking EngineeringNaLUG
 
Software libero at ENEA
Software libero at ENEASoftware libero at ENEA
Software libero at ENEANaLUG
 
Una nuova crittografia frattale: Crypt fna
Una nuova crittografia frattale: Crypt fnaUna nuova crittografia frattale: Crypt fna
Una nuova crittografia frattale: Crypt fnaNaLUG
 
ROS@Unina
ROS@Unina   ROS@Unina
ROS@Unina NaLUG
 
Python@Unina - Exercises
Python@Unina - ExercisesPython@Unina - Exercises
Python@Unina - ExercisesNaLUG
 
Python@Unina - Theory
Python@Unina - TheoryPython@Unina - Theory
Python@Unina - TheoryNaLUG
 

More from NaLUG (20)

Grid System
Grid SystemGrid System
Grid System
 
Cyber Forensic
Cyber ForensicCyber Forensic
Cyber Forensic
 
Digital Divide
Digital DivideDigital Divide
Digital Divide
 
Drupal
DrupalDrupal
Drupal
 
Digital Forensic
Digital ForensicDigital Forensic
Digital Forensic
 
Open Source: strumento per l'e-democracy
Open Source: strumento per l'e-democracyOpen Source: strumento per l'e-democracy
Open Source: strumento per l'e-democracy
 
OpenHardware : Arduino
OpenHardware : ArduinoOpenHardware : Arduino
OpenHardware : Arduino
 
Understanding Linux
Understanding LinuxUnderstanding Linux
Understanding Linux
 
Net Neutrality: HoBBIT
Net Neutrality: HoBBITNet Neutrality: HoBBIT
Net Neutrality: HoBBIT
 
Opensource per un Sistema Informativo Territoriale
Opensource per un Sistema Informativo TerritorialeOpensource per un Sistema Informativo Territoriale
Opensource per un Sistema Informativo Territoriale
 
Knomos
Knomos Knomos
Knomos
 
App comunicazione comune di Napoli
App comunicazione comune di NapoliApp comunicazione comune di Napoli
App comunicazione comune di Napoli
 
BISmark : the broadband internet service benchmark
BISmark : the broadband internet service benchmarkBISmark : the broadband internet service benchmark
BISmark : the broadband internet service benchmark
 
ClearOS
ClearOSClearOS
ClearOS
 
Security and hacking Engineering
Security and hacking EngineeringSecurity and hacking Engineering
Security and hacking Engineering
 
Software libero at ENEA
Software libero at ENEASoftware libero at ENEA
Software libero at ENEA
 
Una nuova crittografia frattale: Crypt fna
Una nuova crittografia frattale: Crypt fnaUna nuova crittografia frattale: Crypt fna
Una nuova crittografia frattale: Crypt fna
 
ROS@Unina
ROS@Unina   ROS@Unina
ROS@Unina
 
Python@Unina - Exercises
Python@Unina - ExercisesPython@Unina - Exercises
Python@Unina - Exercises
 
Python@Unina - Theory
Python@Unina - TheoryPython@Unina - Theory
Python@Unina - Theory
 

Recently uploaded

VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call GirlVIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girladitipandeya
 
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort ServiceEnjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort ServiceDelhi Call girls
 
AlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with FlowsAlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with FlowsThierry TROUIN ☁
 
Pune Airport ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready...
Pune Airport ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready...Pune Airport ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready...
Pune Airport ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready...tanu pandey
 
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607dollysharma2066
 
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts servicesonalikaur4
 
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With RoomVIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Roomishabajaj13
 
Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.soniya singh
 
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779Delhi Call girls
 
Russian Call Girls in Kolkata Ishita 🤌 8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Ishita 🤌  8250192130 🚀 Vip Call Girls KolkataRussian Call Girls in Kolkata Ishita 🤌  8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Ishita 🤌 8250192130 🚀 Vip Call Girls Kolkataanamikaraghav4
 
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark WebGDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark WebJames Anderson
 
How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)Damian Radcliffe
 
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...SofiyaSharma5
 
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
VIP Kolkata Call Girl Dum Dum 👉 8250192130 Available With Room
VIP Kolkata Call Girl Dum Dum 👉 8250192130  Available With RoomVIP Kolkata Call Girl Dum Dum 👉 8250192130  Available With Room
VIP Kolkata Call Girl Dum Dum 👉 8250192130 Available With Roomdivyansh0kumar0
 
VIP Kolkata Call Girls Salt Lake 8250192130 Available With Room
VIP Kolkata Call Girls Salt Lake 8250192130 Available With RoomVIP Kolkata Call Girls Salt Lake 8250192130 Available With Room
VIP Kolkata Call Girls Salt Lake 8250192130 Available With Roomgirls4nights
 

Recently uploaded (20)

VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call GirlVIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
 
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort ServiceEnjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort Service
 
AlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with FlowsAlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with Flows
 
Pune Airport ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready...
Pune Airport ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready...Pune Airport ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready...
Pune Airport ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready...
 
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
 
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
 
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With RoomVIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Room
 
Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝
 
Rohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No AdvanceRohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
 
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
 
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
 
Rohini Sector 6 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 6 Call Girls Delhi 9999965857 @Sabina Saikh No AdvanceRohini Sector 6 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 6 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
 
Russian Call Girls in Kolkata Ishita 🤌 8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Ishita 🤌  8250192130 🚀 Vip Call Girls KolkataRussian Call Girls in Kolkata Ishita 🤌  8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Ishita 🤌 8250192130 🚀 Vip Call Girls Kolkata
 
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark WebGDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
 
How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)
 
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
 
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
 
VIP Kolkata Call Girl Dum Dum 👉 8250192130 Available With Room
VIP Kolkata Call Girl Dum Dum 👉 8250192130  Available With RoomVIP Kolkata Call Girl Dum Dum 👉 8250192130  Available With Room
VIP Kolkata Call Girl Dum Dum 👉 8250192130 Available With Room
 
VIP Kolkata Call Girls Salt Lake 8250192130 Available With Room
VIP Kolkata Call Girls Salt Lake 8250192130 Available With RoomVIP Kolkata Call Girls Salt Lake 8250192130 Available With Room
VIP Kolkata Call Girls Salt Lake 8250192130 Available With Room
 
Dwarka Sector 26 Call Girls | Delhi | 9999965857 🫦 Vanshika Verma More Our Se...
Dwarka Sector 26 Call Girls | Delhi | 9999965857 🫦 Vanshika Verma More Our Se...Dwarka Sector 26 Call Girls | Delhi | 9999965857 🫦 Vanshika Verma More Our Se...
Dwarka Sector 26 Call Girls | Delhi | 9999965857 🫦 Vanshika Verma More Our Se...
 

Monitoring Internet Censorship Techniques

  • 1. Monitoring Internet Censorship part 2 Linux Day 2013 Napoli, October 26 2013 Giuseppe Aceto, giuseppe.aceto@unina.it
  • 2. Monitoring Internet Censorship- Linux Day Napoli Oct.20132 Premise – quick check  We are going to see some “mechanics” of the Internet to explain how censorship works  The description will avoid technicisms when possible  No deep knowledge of computer networks will be implied but possibly a little introduction to “the Internet” basics SO – How many of you knows what the DNS is? – … and IP? – … and HTTP? – … IDS?
  • 3. Monitoring Internet Censorship- Linux Day Napoli Oct.20133 Premise – quick check  We are going to see some “mechanics” of the Internet to explain how censorship works  The description will avoid technicisms when possible  No deep knowledge of computer networks will be implied but possibly a little introduction to “the Internet” basics SO – How many of you knows what the DNS is? – … and IP? – … and HTTP? – … IDS?
  • 4. Monitoring Internet Censorship- Linux Day Napoli Oct.2013 Basics about Internet: packets 4  Information is divided in packets  Packets are forwarded along a path SENDER-to-RECEIVER by several (usually<30) intermediate devices “routers”  Packets are “labeled” with SENDER and RECEIVER addresses (sort of phone numbers, called “IP addresses”) – plus other details useful for the service Mumbo jumbo Mumbo jumbo Mumbo jumbo
  • 5. Monitoring Internet Censorship- Linux Day Napoli Oct.2013 Basics about Internet: protocols 5  The rules to write, split, label, forward, reassemble, read the messages are called protocols – Each one has its own business, some work together: often are wrapped in layers  HyperText Trasfer Protocol is concerned with providing web pages, identified by an Uniform Resource Locator (URL): IP TCP HTTP Content http://www.foo.org/abc/bar.html protocol hostname path
  • 6. Monitoring Internet Censorship- Linux Day Napoli Oct.2013 Basics about Internet: a lot happens 6 http://foo.org/bar.html Browser Web Server (4) HTTP GET bar.html (1) Enter URL (6) HTTP Response (5) Locate the resource (7) Parse HTML & display (8) HTTP GET image1 (N) HTTP GET imageX Potentially many requests & responses DNS (2) “foo.org”(3) “1.2.3.4” TCP (connection setup)
  • 7. Monitoring Internet Censorship- Linux Day Napoli Oct.2013 Access to content: an obstacle course http://thenextweb.com/asia/2010/01/05/route-gfw-flow-chart/ 7
  • 8. Monitoring Internet Censorship- Linux Day Napoli Oct.2013 IP blocking 8
  • 9. Monitoring Internet Censorship- Linux Day Napoli Oct.2013 Censored net Uncensored net Bob Firewall Alice Block Traffic Censor Conventional Internet Censorship (1/2) 9
  • 10. Monitoring Internet Censorship- Linux Day Napoli Oct.2013 Censored net Uncensored net Bob Firewall Alice Block Traffic Censor Conventional Internet Censorship (2/2) 10 For the censor: easy, cheap, but OVERBLOCKING issues
  • 11. Monitoring Internet Censorship- Linux Day Napoli Oct.2013 Real deployment can be more complex 11
  • 12. Monitoring Internet Censorship- Linux Day Napoli Oct.2013 DNS blocking (hijacking) 12
  • 13. Monitoring Internet Censorship- Linux Day Napoli Oct.2013 Domain Name System : normal behavior (and allowed hostnames) 13 1 2 3 4 Target Service DNS
  • 14. Monitoring Internet Censorship- Linux Day Napoli Oct.2013 Domain Name System : hijacking for blocked hostnames 14 1 2 3 4 DNS Target Service Warning page DNS
  • 15. Monitoring Internet Censorship- Linux Day Napoli Oct.2013 Domain Name System : hijacking for blocked hostnames 15 1 2 3 4 DNS Target Service Warning page DNS For the censor: ~free, easy but still OVERBLOCKING
  • 16. Monitoring Internet Censorship- Linux Day Napoli Oct.2013 URL filtering 16
  • 17. Monitoring Internet Censorship- Linux Day Napoli Oct.2013 URL filtering: URL is ok 17 1 2 3 4 Target Service Intermediate device
  • 18. Monitoring Internet Censorship- Linux Day Napoli Oct.2013 URL filtering: URL is blocked 18 1 2 Target Service Intermediate device
  • 19. Monitoring Internet Censorship- Linux Day Napoli Oct.2013 URL filtering: URL is blocked 19 1 2 Target Service Intermediate device For the censor: precise, but expensive, performance issues
  • 20. Monitoring Internet Censorship- Linux Day Napoli Oct.2013 URL filtering (with DNS hijacking) 20
  • 21. Monitoring Internet Censorship- Linux Day Napoli Oct.201321 1 2 3 4 Target Service DNS DNS hijacking + URL filtering: hostname is ok
  • 22. Monitoring Internet Censorship- Linux Day Napoli Oct.2013 DNS hijacking + URL filtering: hostname with blocked pages – but ok 22 1 2 3 6 DNS Target Service DNS 4 5
  • 23. Monitoring Internet Censorship- Linux Day Napoli Oct.2013 DNS hijacking + URL filtering: URL was censored 23 1 2 3 4 DNS Target Service DNS
  • 24. Monitoring Internet Censorship- Linux Day Napoli Oct.2013 DNS hijacking + URL filtering: URL was censored 24 1 2 3 4 DNS Target Service DNS For the censor: precise, less performance issues, still expensive
  • 25. Monitoring Internet Censorship- Linux Day Napoli Oct.2013 Content filtering 25
  • 26. Monitoring Internet Censorship- Linux Day Napoli Oct.2013 Content filtering: content is ok 26 1 2 3 4 Target Service Intermediate device
  • 27. Monitoring Internet Censorship- Linux Day Napoli Oct.2013 Content filtering: sender content is blocked 27 1 Target Service Intermediate device 2
  • 28. Monitoring Internet Censorship- Linux Day Napoli Oct.2013 Content filtering: receiver content is blocked 28 1 2 3 4 Target Service Intermediate device For the censor: both very precise or dramatic failure, most expensive
  • 29. Monitoring Internet Censorship- Linux Day Napoli Oct.2013 Detection challenges: observing censorship is not easy 29  Targets of censorship change from country to country – … and sometimes in regions inside the country – … and in time  Censorship techniques change in time, too  To observe censorship we need (usually) a vantage point inside the censored network  … but also other vantage points from outside the censored network, to tell censorship from outages  Some kinds of censorship are inherently hard to detect – server-side self-censorship – User client software censorship – User self-censorship
  • 30. Monitoring Internet Censorship- Linux Day Napoli Oct.2013 Detection challenges: similar symptoms, same as outages 30
  • 31. Monitoring Internet Censorship- Linux Day Napoli Oct.2013 “outside-the-Internet” blocking Website manager censors the service Client SW or other SW on your computer 31
  • 32. Monitoring Internet Censorship- Linux Day Napoli Oct.2013 Detection importance: awareness, circumvention 32
  • 33. Monitoring Internet Censorship- Linux Day Napoli Oct.2013 Our client-based approach: UBICA 33  Multi-platform application Linux, Mac OSX, Windows  Extensible measurement framework any underlying measurement tool supported flexible experiments  Real-time reporting at different aggregation levels
  • 34. Monitoring Internet Censorship- Linux Day Napoli Oct.201334 Control Protocol Measurement UBICA Management Server (@UniNA) DB UBICA daemonPossible Censorship targets UBICA Helper Server (@UniNA) Globally distributed UBICA clients Internet UBICA architecture
  • 35. Monitoring Internet Censorship- Linux Day Napoli Oct.201335 1. Collection of Targets 2. Scheduling of evidence collection 3. Evidence collection by probes 4. Evidence reporting and data export 5. Censorship Tests 6. Update Targets and Scheduling UBICA monitoring cycle
  • 36. Monitoring Internet Censorship- Linux Day Napoli Oct.201336 1. Collection of Targets 2. Scheduling of evidence collection 3. Evidence collection by probes 4. Evidence reporting and data export 5. Censorship Tests 6. Update Targets and Scheduling UBICA monitoring cycle
  • 37. Monitoring Internet Censorship- Linux Day Napoli Oct.201337 TCP connectivity DNS lookup HTTPscan (URL retrieval) Keyword-based HTTP retrieval Topology Performance Evidence collection
  • 38. Monitoring Internet Censorship- Linux Day Napoli Oct.201338 1. Collection of Targets 2. Scheduling of evidence collection 3. Evidence collection by probes 4. Evidence reporting and data export 5. Censorship Tests 6. Update Targets and Scheduling UBICA monitoring cycle
  • 39. Monitoring Internet Censorship- Linux Day Napoli Oct.201339 IP / port filtering DNS tampering URL filtering Localization Content mangling Censorship Checks
  • 40. Monitoring Internet Censorship- Linux Day Napoli Oct.2013 Test: DNS censorship  DNS resolution − Collection: an A query for the target hostname is requested to the local default DNS server and to a small number of open resolvers − Check local: for each hostname compare the set of IP addresses from the default resolver against the ones from the open resolvers − Check global: for each hostname compare the set of resolved IP addresses inside a zone against other ones − Check graph: considering the bipartite graph of hostnames and their resolved IP addresses, with edges representing the name resolution relation, compute the in- degree and out-degree of nodes inside a zone and compare with other ones 40
  • 41. Evidences and visualization of DNS hijacking in Italy 41
  • 42. Evidences and visualization of DNS hijacking in Italy 42
  • 43. Evidences and visualization of DNS hijacking in Italy U.S.A. Italy 43
  • 44. Evidences and visualization of DNS hijacking in Italy U.S.A. Italy 44
  • 45. Monitoring Internet Censorship- Linux Day Napoli Oct.2013 Tests: TCP connection  TCP reachability − Collection: a TCP handshake is initiated towards the target IP address, timeout, reset response and network errors are collected − Check errors: compare percentage of unreachability issues inside a country/ISP/AS against others − Check RST: compare percentage of RST received inside a country/ISP/AS against others 45
  • 46. Monitoring Internet Censorship- Linux Day Napoli Oct.2013 Tests: HTTP evidence  HTTP content − Collection: HTTP GET of the target URL is requested to the target hostname (specifying the IP too); HTTP headers and downloaded content are saved − Check errors: compare percentage of unreachability issues (no content retrieved) inside a country/ISP/AS against others − Check size: compare average size inside a country/ISP/AS against a Ground Truth (selected reference country/ISP/AS) 46
  • 47. Monitoring Internet Censorship- Linux Day Napoli Oct.201347 No response to HTTP request or response empty, grouped by country “Expected” (CN, BD) and unexpected (NZ) countries Currently under investigation!!! Different html size retrieved for the same site from different countries Block page is typically small The size ratio may be a good censorship detector Tests: HTTP evidence
  • 48. Monitoring Internet Censorship- Linux Day Napoli Oct.2013 Tests: Tor censorship - collection  Integrated test − Collection: DNS resolution of  Tor home page and mirrors  Tor-based circumvention techniques and tools pages  Tor overlay node list webpage − Collection: HTTP GET of  Tor home page and mirrors  Tor-based circumvention techniques and tools pages  Tor overlay node list webpage − Collection: TCP reachability of  Tor nodes (relays)  Tor indexing servers (Directory Authorities ) 48
  • 49. Monitoring Internet Censorship- Linux Day Napoli Oct.2013 Tests: Tor censorship - checks*  Integrated test Check: DNS response for webpages is different from ground truth OR content of all webpages is unreachable OR X% of Directory Authorities is not TCP-reachable OR Y% of relays is not TCP-reachable THEN Tor is censored * variations of the method in: Philipp Winter, “Design Requirements for a Tor Censorship Analysis Tool”, Tor Tech Report 2013-02-001 February 6, 2013 49
  • 50. Monitoring Internet Censorship- Linux Day Napoli Oct.201350 UBICA monitoring interface (1/2)
  • 51. Monitoring Internet Censorship- Linux Day Napoli Oct.201351 UBICA monitoring interface (2/2)
  • 52. Monitoring Internet Censorship- Linux Day Napoli Oct.201352 UBICA at the moment (yesterday night)  Just a prototype: few tests, few vantage points, but has – Full-cycle automation – Actual data – Quasi-real-time reporting … we are working to improve it! ...and yes, we seriously need also a cool logo for the project.
  • 53. Monitoring Internet Censorship- Linux Day Napoli Oct.2013 References, credits "Measuring & Circumventing Internet Censorship" – Nick Feamster, talk @ ETH ZISC Future Internet Security Workshop Oct 16th 2013 http://goo.gl/CHV5uJ Philipp Winter, “Design Requirements for a Tor Censorship Analysis Tool “,Tor Tech Report 2013-02-001 February 6, 2013 Gill, Phillipa, et al. "Characterizing Censorship of Web Content Worldwide." 2013 Z. Nabi, "The anatomy of web censorship in pakistan," arXiv preprint arXiv:1307.1144, 2013. Sfakianakis, Andreas, Elias Athanasopoulos, and Sotiris Ioannidis. "CensMon: A Web censorship monitor." FOCI’11: USENIX Workshop on Free and Open Communications on the Internet. 2011. C. Anderson, "Dimming the internet: Detecting throttling as a mechanism of censorship in iran," Jun. 2013. [Online]. Available: http://arxiv.org/abs/1306.4361 Philipp Winter – selection of papers on Internet censorship http://www.cs.kau.se/philwint/censorbib/ 53
  • 54. Thanks for your attention! 54