Change search
ReferencesLink to record
Permanent link

Direct link
ScrambleSuit: A Polymorph Network Protocol to Circumvent Censorship
Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science. (PriSec)
Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Computer Science. (Human IT)
Upper Austria University of Applied Sciences.
2013 (English)Report (Other academic)
Abstract [en]

Deep packet inspection technology became a cornerstone of Internet censorship by facilitating cheap and effective filtering of what censors consider undesired information. Moreover, filtering is not limited to simple pattern matching but makes use of sophisticated techniques such as active probing and protocol classification to block access to popular circumvention tools such as Tor.

In this paper, we propose ScrambleSuit; a thin protocol layer above TCP whose purpose is to obfuscate the transported application data. By using morphing techniques and a secret exchanged out-of-band, we show that ScrambleSuit can defend against active probing and other fingerprinting techniques such as protocol classification and regular expressions.

We finally demonstrate that our prototype exhibits little overhead and enables effective and lightweight obfuscation for application layer protocols.

Place, publisher, year, edition, pages
2013. , 12 p.
Keyword [en]
Tor, bridge, pluggable transport, active probing, censorship, circumvention
National Category
Computer Systems
Research subject
Computer Science
Identifiers
URN: urn:nbn:se:kau:diva-27221OAI: oai:DiVA.org:kau-27221DiVA: diva2:621480
Available from: 2013-05-15 Created: 2013-05-15 Last updated: 2014-01-22Bibliographically approved
In thesis
1. Enhancing Censorship Resistance in the Tor Anonymity Network
Open this publication in new window or tab >>Enhancing Censorship Resistance in the Tor Anonymity Network
2014 (English)Licentiate thesis, comprehensive summary (Other academic)
Abstract [en]

Baksidestext

The Tor network was originally designed as low-latency anonymity network.However, as the years progressed, Tor earned a reputation as also being a useful tool to circumvent Internet censorship. At times, the network counted 30,000 users only from China. Censors reacted by tightening their grip on the national communication infrastructure. In particular, they developed techniques to prevent people from being able to access the Tor network. This arms race now counts several iterations and no end is in sight.

This thesis contributes to a censorship-resistant Tor network in two ways. First, it analyses how existing censorship systems work. In particular, the Great Firewall of China is analysed in order to obtain an understanding of its capabilities as well as to explore circumvention opportunities. Second, this thesis proposes practical countermeasures to circumvent Internet censorship. In particular, it presents a novel network protocol which is resistant to the Great Firewall's active probing attacks.

Place, publisher, year, edition, pages
Karlstad: Karlstads universitet, 2014
Series
Karlstad University Studies, ISSN 1403-8099 ; 2014:5
Keyword
tor, censorship, anonymity, network
National Category
Computer Systems
Research subject
Computer Science
Identifiers
urn:nbn:se:kau:diva-30752 (URN)978-91-7063-534-2 (ISBN)
Presentation
2014-02-27, 10:00 (English)
Opponent
Supervisors
Available from: 2014-01-22 Created: 2013-12-18 Last updated: 2014-01-22Bibliographically approved

Open Access in DiVA

No full text

Other links

http://www.cs.kau.se/philwint/pdf/scramblesuit2013.pdfArticle at arXiv

Search in DiVA

By author/editor
Winter, PhilippPulls, Tobias
By organisation
Department of Mathematics and Computer ScienceDepartment of Computer Science
Computer Systems

Search outside of DiVA

GoogleGoogle Scholar

Total: 83 hits
ReferencesLink to record
Permanent link

Direct link