ترغب بنشر مسار تعليمي؟ اضغط هنا

Balboa: Bobbing and Weaving around Network Censorship

59   0   0.0 ( 0 )
 نشر من قبل Alex Malozemoff
 تاريخ النشر 2021
  مجال البحث الهندسة المعلوماتية
والبحث باللغة English




اسأل ChatGPT حول البحث

We introduce Balboa, a link obfuscation framework for censorship circumvention. Balboa provides a general framework for tunneling data through existing applications. Balboa sits between an application and the operating system, intercepting outgoing network traffic and rewriting it to embed data. To avoid introducing any distinguishable divergence from the expected application behavior, Balboa only rewrites traffic that matches an externally specified emph{traffic model} pre-shared between the communicating parties. The traffic model captures some subset of the network traffic (e.g., some subset of music an audio streaming server streams). The sender uses this model to replace outgoing data with a pointer to the associated location in the model and embed data in the freed up space. The receiver then extracts the data, replacing the pointer with the original data from the model before passing the data on to the application. When using TLS, this approach means that application behavior with Balboa is emph{equivalent}, modulo small (protocol-dependent) timing differences, to if the application was running without Balboa. Balboa differs from prior approaches in that it (1) provides a framework for tunneling data through arbitrary (TLS-protected) protocols/applications, and (2) runs the unaltered application binaries on standard inputs, as opposed to most prior tunneling approaches which run the application on non-standard -- and thus potentially distinguishable -- inputs. We present two instantiations of Balboa -- one for audio streaming and one for web browsing -- and demonstrate the difficulty of identifying Balboa by a machine learning classifier.



قيم البحث

اقرأ أيضاً

We argue that the evaluation of censorship evasion tools should depend upon economic models of censorship. We illustrate our position with a simple model of the costs of censorship. We show how this model makes suggestions for how to evade censorship . In particular, from it, we develop evaluation criteria. We examine how our criteria compare to the traditional methods of evaluation employed in prior works.
This paper presents a study of the Internet infrastructure in India from the point of view of censorship. First, we show that the current state of affairs---where each ISP implements its own content filters (nominally as per a governmental blacklist) ---results in dramatic differences in the censorship experienced by customers. In practice, a well-informed Indian citizen can escape censorship through a judicious choice of service provider. We then consider the question of whether India might potentially follow the Chinese model and institute a single, government-controlled filter. This would not be difficult, as the Indian Internet is quite centralized already. A few key ASes (approx 1% of Indian ASes) collectively intercept approx 95% of paths to the censored sites we sample in our study, and also to all publicly-visible DNS servers. 5,000 routers spanning these key ASes would suffice to carry out IP or DNS filtering for the entire country; approx 70% of these routers belong to only two private ISPs. If the government is willing to employ more powerful measures, such as an IP Prefix Hijacking attack, any one of several key ASes can censor traffic for nearly all Indian users. Finally, we demonstrate that such federated censorship by India would cause substantial collateral damage to non-Indian ASes whose traffic passes through Indian cyberspace (which do not legally come under Indian jurisdiction at all).
85 - R. Folk , Yu. Holovatch 2020
Scientific research is and was at all times a transnational (global) activity. In this respect, it crosses several borders: national, cultural, and ideological. Even in times when physical borders separated the scientific community, scientists kept t heir minds open to the ideas created beyond the walls and tried to communicate despite all the obstacles. An example of such activities in the field of physics is the travel in the year 1838 of a group of three scientists through the Western Europe: Andreas Ettingshausen (professor at the University of Vienna), August Kunzek (professor at the University of Lviv) and P. Marian Koller (director of the observatory in Chremsminster, Upper Austria). 155 years later a vivid scientific exchange began between physicists from Austria and Ukraine, in particular, between the Institute for Condensed Matter Physics of the National Academy of Sciences of Ukraine in Lviv and the Institute for Theoretical Physics of Johannes Kepler University Linz. This became possible due to the programs financed by national institutions, but it had its scientific background in already knotted historic scientific networks, when Lviv was an international center of mathematics and in Vienna the School of Statistical Thought arose. Due to the new collaboration, after the breakup of the Soviet Union, Ukraine became the first country to join the Middle European Cooperation in Statistical Physics (MECO) founded in the early 1970s with the aim of bridging the gap between scientists from the Eastern and Western parts of Europe separated by the iron curtain.
Network Forensics (NFs) is a branch of digital forensics which used to detect and capture potential digital crimes over computer networked environments crime. Network Forensic Tools (NFTs) and Network Forensic Processes (NFPs) have abilities to exami ne networks, collect all normal and abnormal traffic/data, help in network incident analysis, and assist in creating an appropriate incident detection and reaction and also create a forensic hypothesis that can be used in a court of law. Also, it assists in examining the internal incidents and exploitation of assets, attack goals, executes threat evaluation, also by evaluating network performance. According to existing literature, there exist quite a number of NFTs and NTPs that are used for identification, collection, reconstruction, and analysing the chain of incidents that happen on networks. However, they were vary and differ in their roles and functionalities. The main objective of this paper, therefore, is to assess and see the distinction that exist between Network Forensic Tools (NFTs) and Network Forensic Processes (NFPs). Precisely, this paper focuses on comparing among four famous NFTs: Xplico, OmniPeek, NetDetector, and NetIetercept. The outputs of this paper show that the Xplico tool has abilities to identify, collect, reconstruct, and analyse the chain of incidents that happen on networks than other NF tools.
73 - Valerio Faraoni 2021
Although the idea that there is a maximum force in nature seems untenable, we explore whether this concept can make sense in the restricted context of black holes. We discuss uniformly accelerated and cosmological black holes and we find that, althou gh a maximum force acting on these black holes can in principle be introduced, this concept is rather tautological.
التعليقات
جاري جلب التعليقات جاري جلب التعليقات
سجل دخول لتتمكن من متابعة معايير البحث التي قمت باختيارها
mircosoft-partner

هل ترغب بارسال اشعارات عن اخر التحديثات في شمرا-اكاديميا