File Download
There are no files associated with this item.
Links for fulltext
(May Require Subscription)
- Publisher Website: 10.1109/SRDS.2017.30
- Scopus: eid_2-s2.0-85038071693
- WOS: WOS:000425924600022
- Find via
Supplementary
- Citations:
- Appears in Collections:
Conference Paper: AutoFlowLeaker: Circumventing web censorship through automation services
Title | AutoFlowLeaker: Circumventing web censorship through automation services |
---|---|
Authors | |
Issue Date | 2017 |
Citation | Proceedings of the IEEE Symposium on Reliable Distributed Systems, 2017, v. 2017-September, p. 214-223 How to Cite? |
Abstract | © 2017 IEEE. By hiding messages inside existing network protocols, anti-censorship tools could empower censored users to visit blocked websites. However, existing solutions generally suffer from two limitations. First, they usually need the support of ISP or the deployment of many customized hosts to conceal the communication between censored users and blocked websites. Second, their manipulations of normal network traffic may result in detectable features, which could be captured by the censorship system. In this paper, to tackle these limitations, we propose a novel framework that exploits the publicly available automation services and the plenty of web services and contents to circumvent web censorship, and realize it in a practical tool named AutoFlowLeaker. Moreover, we conduct extensive experiments to evaluate AutoFlowLeaker, and the results show that it has promising performance and can effectively evade realworld web censorship. |
Persistent Identifier | http://hdl.handle.net/10722/280645 |
ISSN | 2023 SCImago Journal Rankings: 0.717 |
ISI Accession Number ID |
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Hu, Shengtuo | - |
dc.contributor.author | Ma, Xiaobo | - |
dc.contributor.author | Jiang, Muhui | - |
dc.contributor.author | Luo, Xiapu | - |
dc.contributor.author | Au, Man Ho | - |
dc.date.accessioned | 2020-02-17T14:34:34Z | - |
dc.date.available | 2020-02-17T14:34:34Z | - |
dc.date.issued | 2017 | - |
dc.identifier.citation | Proceedings of the IEEE Symposium on Reliable Distributed Systems, 2017, v. 2017-September, p. 214-223 | - |
dc.identifier.issn | 1060-9857 | - |
dc.identifier.uri | http://hdl.handle.net/10722/280645 | - |
dc.description.abstract | © 2017 IEEE. By hiding messages inside existing network protocols, anti-censorship tools could empower censored users to visit blocked websites. However, existing solutions generally suffer from two limitations. First, they usually need the support of ISP or the deployment of many customized hosts to conceal the communication between censored users and blocked websites. Second, their manipulations of normal network traffic may result in detectable features, which could be captured by the censorship system. In this paper, to tackle these limitations, we propose a novel framework that exploits the publicly available automation services and the plenty of web services and contents to circumvent web censorship, and realize it in a practical tool named AutoFlowLeaker. Moreover, we conduct extensive experiments to evaluate AutoFlowLeaker, and the results show that it has promising performance and can effectively evade realworld web censorship. | - |
dc.language | eng | - |
dc.relation.ispartof | Proceedings of the IEEE Symposium on Reliable Distributed Systems | - |
dc.title | AutoFlowLeaker: Circumventing web censorship through automation services | - |
dc.type | Conference_Paper | - |
dc.description.nature | link_to_subscribed_fulltext | - |
dc.identifier.doi | 10.1109/SRDS.2017.30 | - |
dc.identifier.scopus | eid_2-s2.0-85038071693 | - |
dc.identifier.volume | 2017-September | - |
dc.identifier.spage | 214 | - |
dc.identifier.epage | 223 | - |
dc.identifier.isi | WOS:000425924600022 | - |
dc.identifier.issnl | 1060-9857 | - |