[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1145/2663716.2663750acmconferencesArticle/Chapter ViewAbstractPublication PagesimcConference Proceedingsconference-collections
research-article

A Look at the Consequences of Internet Censorship Through an ISP Lens

Published: 05 November 2014 Publication History

Abstract

Internet censorship artificially changes the dynamics of resource production and consumption, affecting a range of stakeholders that include end users, service providers, and content providers. We analyze two large-scale censorship events in Pakistan: blocking of pornographic content in 2011 and of YouTube in 2012. Using traffic datasets collected at home and SOHO networks before and after the censorship events, we: a) quantify the demand for blocked content, b) illuminate challenges encountered by service providers in implementing the censorship policies, c) investigate changes in user behavior (e.g., with respect to circumvention) after censorship, and d) assess benefits extracted by competing content providers of blocked content.

References

[1]
S. Alcock and R. Nelson. Measuring the impact of the copyright amendment act on New Zealand residential DSL users. In Proc. ACM Internet Measurement Conference, 2012.
[2]
Alexa. http://www.alexa.com/topsites. Online. April, 2014.
[3]
Anonymous. The Collateral Damage of Internet Censorship by DNS Injection. SIGCOMM Comput. Commun. Rev., 42(3):21--27, June 2012.
[4]
S. Aryan, H. Aryan, and J. A. Halderman. Internet Censorship in Iran: A First Look. In Free and Open Communications on the Internet, Washington, DC, USA, 2013. USENIX.
[5]
A. Attaa. http://tinyurl.com/mnw9olp. Online. Feb, 2014.
[6]
Bro. http://www.bro.org/. Online. April, 2014.
[7]
A. Chaabane, M. Cunche, T. Chen, A. Friedman, E. D. Cristofaro, and M.-A. Kaafar. Censorship in the Wild: Analyzing Web Filtering in Syria. Technical report, Cornell University Library, Feb. 2014.
[8]
Cisco. http://tinyurl.com/mev32z8. Online. Apr, 2014.
[9]
Citizen Lab. O Pakistan, We Stand on Guard for Thee: An Analysis of Canada-based Netsweeper's Role in Pakistan's Censorship Regime. http://tinyurl.com/oxxap8t, June 2013.
[10]
M. Cooper. http://tinyurl.com/p7ck76f. Online. Feb, 2014.
[11]
J. R. Crandall, D. Zinn, M. Byrd, E. Barr, and R. East. ConceptDoppler: A Weather Tracker for Internet Censorship. In Computer and Communications Security. ACM, 2007.
[12]
S. Crocker, D. Dagon, D. Kaminsky, D. McPherson, and P. Vixie. Security and Other Technical Concerns Raised by the DNS Filtering Requirements in the PROTECT IP Bill. http://domainincite.com/docs/PROTECT-IP-Technical-Whitepaper-Final. pdf, May 2011.
[13]
A. Dainotti, C. Squarcella, E. Aben, K. C. Claffy, M. Chiesa, M. Russo, and A. Pescapé. Analysis of country-wide internet outages caused by censorship. In Proceedings of the 2011 ACM SIGCOMM Conference on Internet Measurement Conference, IMC '11, pages 1--18, New York, NY, USA, 2011. ACM.
[14]
J. Dalek, B. Haselton, H. Noman, A. Senft, M. Crete-Nishihata, P. Gill, and R. J. Deibert. A Method for Identifying and Confirming the Use of URL Filtering Products for Censorship. In Proc. ACM Internet Measurement Conference, 2013.
[15]
Dawn. http://tinyurl.com/n3j22gy. Online. April, 2014.
[16]
Dawn News. http://tinyurl.com/m7vhg7u. Online. Apr, 2014.
[17]
H. Duan, N. Weaver, Z. Zhao, M. Hu, J. Liang, J. Jiang, K. Li, and V. Paxson. Hold-On: Protecting Against On-Path DNS Poisoning. In Proc. Workshop on Securing and Trusting Internet Names, SATIN 2012.
[18]
Electronic Frontier Foundation (EFF). http://tinyurl.com/oklfy29. Online. Apr, 2014.
[19]
ElectronicFrontierFoundation. Switzerland. http://tinyurl.com/d22vbbq.
[20]
A. M. Espinoza and J. R. Crandall. Automated Named Entity Extraction for Tracking Censorship of Current Events. In USENIX Workshop on Free and Open Communications on the Internet, 2011.
[21]
ExtremeTech. http://tinyurl.com/6nabr85. Online. Apr, 2014.
[22]
R. Farahbakhsh, Ã. Cuevas, R. Cuevas, R. Rejaie, M. Kryczka, R. Gonzalez, and N. Crespi. Investigating the reaction of BitTorrent content publishers to antipiracy actions. In P2P, pages 1--10. IEEE, 2013.
[23]
A. Filastò and J. Appelbaum. OONI: Open Observatory of Network Interference. In Free and Open Communications on the Internet. USENIX Association, 2012.
[24]
P. Gill, M. Arlitt, Z. Li, and A. Mahanti. Youtube traffic characterization: A view from the edge. In Proceedings of the 7th ACM SIGCOMM Conference on Internet Measurement, IMC '07, pages 15--28, New York, NY, USA, 2007. ACM.
[25]
Internet Service Providers Association of Pakistan (ISPAK). http://www.ispak.pk. Online. Apr, 2014.
[26]
C. Kreibich, N. Weaver, B. Nechaev, and V. Paxson. Netalyzr: illuminating the edge network. In Proc. ACM Internet Measurement Conference, 2010.
[27]
C. Lab. Routing Gone Wild: Documenting upstream filtering in Oman via India. Technical report, Citizen Lab, 2012.
[28]
C. Labovitz. The Other 50% of the Internet. North American Network Operators' Group (NANOG) presentation, February 2012.
[29]
G. Maier, F. Schneider, and A. Feldmann. NAT Usage in Residential Broadband Networks. In Proc. Passive and Active Measurement, 2011.
[30]
McAfee. http://www.trustedsource.org. Online. Apr, 2014.
[31]
Mozilla. https://wiki.mozilla.org/Public_Suffix_List. Online. Apr, 2014.
[32]
Z. Nabi. The Anatomy of Web Censorship in Pakistan. In Proc. USENIX Workshop on Free and Open Communications on the Internet, 2013.
[33]
F. News. http://tinyurl.com/22me5e7. Online. Feb, 2014.
[34]
OpenNet Initiative. Pakistan. Online. April, 2014.
[35]
OpenNet Initiative. https://opennet.net. Online. Apr, 2014.
[36]
P. Reidy. US court orders Google to remove Innocence of Muslims film from YouTube. http://tinyurl.com/mjd9sjk. Feb, 2014.
[37]
Renesys. Turkish Internet Censorship Takes a New Turn. http://www.renesys.com/2014/03/turkish-internet-censorship/, 2014.
[38]
Security Information Exchange. https://www.dnsdb.info/. Online. Apr, 2014.
[39]
A. Sfakianakis, E. Athanasopoulos, and S. Ioannidis. CensMon: A Web Censorship Monitor. In USENIX Workshop on Free and Open Communications on the Internet, 2011.
[40]
TeamCymru. IP to ASN Mapping. http://tinyurl.com/5dtp78. Apr, 2014.
[41]
Techniasia. Tune.pk comes up with a way to bypass Pakistan's YouTube block. http://tinyurl.com/mdgb2ke. Apr, 2014.
[42]
G. Tyson, Y. Elkhatib, N. Sastry, and S. Uhlig. Demystifying porn 2.0: A look into a major adult video streaming website. In Proceedings of the 2013 Internet Measurement Conference, IMC '13, pages 417--426, New York, NY, USA, 2013. ACM.
[43]
J.-P. Verkamp and M. Gupta. Inferring Mechanics of Web Censorship Around the World. In Free and Open Communications on the Internet, Bellevue, WA, USA, 2012. USENIX.
[44]
N. Weaver, R. Sommer, and V. Paxson. Detecting Forged TCP Reset Packets. In Proc. NDSS, 2009.
[45]
YouTube and Blocking in Pakistan. Has it affected you? http://tinyurl.com/kcvj325. Online. April, 2014.

Cited By

View all
  • (2024)Understanding Routing-Induced Censorship Changes GloballyProceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security10.1145/3658644.3670336(437-451)Online publication date: 2-Dec-2024
  • (2024)Quantum Secure Anonymous Communication Networks2024 International Conference on Quantum Communications, Networking, and Computing (QCNC)10.1109/QCNC62729.2024.00060(346-351)Online publication date: 1-Jul-2024
  • (2023)MVDroid: an android malicious VPN detector using neural networksNeural Computing and Applications10.1007/s00521-023-08512-135:29(21555-21565)Online publication date: 3-Apr-2023
  • Show More Cited By

Index Terms

  1. A Look at the Consequences of Internet Censorship Through an ISP Lens

    Recommendations

    Comments

    Please enable JavaScript to view thecomments powered by Disqus.

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    IMC '14: Proceedings of the 2014 Conference on Internet Measurement Conference
    November 2014
    524 pages
    ISBN:9781450332132
    DOI:10.1145/2663716
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

    Sponsors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 05 November 2014

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. censorship
    2. content blocking
    3. isp traffic
    4. porn
    5. video streaming

    Qualifiers

    • Research-article

    Conference

    IMC '14
    Sponsor:
    IMC '14: Internet Measurement Conference
    November 5 - 7, 2014
    BC, Vancouver, Canada

    Acceptance Rates

    IMC '14 Paper Acceptance Rate 32 of 103 submissions, 31%;
    Overall Acceptance Rate 277 of 1,083 submissions, 26%

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)56
    • Downloads (Last 6 weeks)4
    Reflects downloads up to 31 Dec 2024

    Other Metrics

    Citations

    Cited By

    View all
    • (2024)Understanding Routing-Induced Censorship Changes GloballyProceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security10.1145/3658644.3670336(437-451)Online publication date: 2-Dec-2024
    • (2024)Quantum Secure Anonymous Communication Networks2024 International Conference on Quantum Communications, Networking, and Computing (QCNC)10.1109/QCNC62729.2024.00060(346-351)Online publication date: 1-Jul-2024
    • (2023)MVDroid: an android malicious VPN detector using neural networksNeural Computing and Applications10.1007/s00521-023-08512-135:29(21555-21565)Online publication date: 3-Apr-2023
    • (2022)Understanding the Practices of Global Censorship through Accurate, End-to-End MeasurementsACM SIGMETRICS Performance Evaluation Review10.1145/3547353.352264050:1(17-18)Online publication date: 7-Jul-2022
    • (2022)Understanding the Practices of Global Censorship through Accurate, End-to-End MeasurementsAbstract Proceedings of the 2022 ACM SIGMETRICS/IFIP PERFORMANCE Joint International Conference on Measurement and Modeling of Computer Systems10.1145/3489048.3522640(17-18)Online publication date: 6-Jun-2022
    • (2022)Leaky Blinders: Information Leakage in Mobile VPNsApplied Cryptography and Network Security Workshops10.1007/978-3-031-16815-4_26(481-494)Online publication date: 24-Sep-2022
    • (2021)Understanding the Practices of Global Censorship through Accurate, End-to-End MeasurementsProceedings of the ACM on Measurement and Analysis of Computing Systems10.1145/34910555:3(1-25)Online publication date: 15-Dec-2021
    • (2020)How India Censors the WebProceedings of the 12th ACM Conference on Web Science10.1145/3394231.3397891(21-28)Online publication date: 6-Jul-2020
    • (2020)MissIt: Using Missed Calls for Free, Extremely Low Bit-Rate Communication in Developing RegionsProceedings of the 2020 CHI Conference on Human Factors in Computing Systems10.1145/3313831.3376259(1-12)Online publication date: 21-Apr-2020
    • (2020)ICLab: A Global, Longitudinal Internet Censorship Measurement Platform2020 IEEE Symposium on Security and Privacy (SP)10.1109/SP40000.2020.00014(135-151)Online publication date: May-2020
    • Show More Cited By

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media