[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
research-article

Characterizing Web Censorship Worldwide: Another Look at the OpenNet Initiative Data

Published: 23 January 2015 Publication History

Abstract

In this study, we take another look at 5 years of web censorship data gathered by the OpenNet Initiative in 77 countries using user-based testing with locally relevant content. Prior to our work, this data had been analyzed with little automation, focusing on what content had been blocked, rather than how blocking was carried out. In this study, we use more rigorous automation to obtain a longitudinal, global view of the technical means used for web censorship. We also identify blocking that had been missed in prior analyses. Our results point to considerable variability in the technologies used for web censorship, across countries, time, and types of content, and even across ISPs in the same country. In addition to characterizing web censorship in countries that, thus far, have eluded technical analysis, we also discuss the implications of our observations on the design of future network measurement platforms and circumvention technologies.

References

[1]
D. Anderson. 2012. Splinternet behind the great firewall of China. Queue 10, 11 (2012), 40.
[2]
Anonymous. 2012. The collateral damage of internet censorship by DNS injection. ACM SIGCOMM Computer Communication Review 42, 3 (2012), 21--27.
[3]
M. Arlitt and C. Williamson. 2005. An analysis of TCP reset behavior on the Internet. ACM SIGCOMM Computer Communication Review 35, 1 (2005), 37--44.
[4]
D. Bu. 2010. Indonesia Internet Censorship. ONI Global Summit. Retrieved from http://www.slideshare.net/donnybu/indonesian-internetcensorshipreport2010.
[5]
S. Burnett and N. Feamster. 2013. Making sense of internet censorship: A new frontier for Internet measurement. ACM SIGCOMM Computer Communication Review 43, 3 (2013), 84--89.
[6]
R. Clayton. 2006. Failures in a hybrid content blocking system. In Privacy Enhancing Technologies.
[7]
R. Clayton, S. Murdoch, and R. Watson. 2006. Ignoring the great firewall of China. In Privacy Enhancing Technologies.
[8]
J. Cowie. 2011a. Egypt leaves the Internet. Renesys Blog (2011). Retrieved from http://research.dyn.com/2011/01/egypt-leaves-the-internet/.
[9]
J. Cowie. 2011b. Libyan disconnect. Renesys Blog (2011). Retrieved from http://research.dyn.com/2011/02/libyan-disconnect-1/.
[10]
J. Cowie. 2012. Syrian Internet is off the air. Renesys Blog (2012). Retrieved from http://research.dyn.com/2012/11/syria-off-the-air/.
[11]
J. R. Crandall, D. Zinn, M. Byrd, E. Barr, and R. East. 2007. ConceptDoppler: A weather tracker for Internet censorship. In 14th ACM Conference on Computer and Communications Security. 1--4.
[12]
A. Dainotti, C. Squarcella, E. Aben, K. C. Claffy, M. Chiesa, M. Russo, and A. Pescapé. 2011. Analysis of country-wide internet outages caused by censorship. In Proceedings of the 2011 ACM SIGCOMM Conference on Internet Measurement Conference. ACM, 1--18.
[13]
J. Dalek, B. Haselton, H. Noman, A. Senft, M. Crete-Nishihata, P. Gill, and R. J. Deibert. 2013. A method for identifying and confirming the use of URL filtering products for censorship. In ACM IMC 2013.
[14]
R. J. Deibert, J. G. Palfrey, R. Rohozinski, and J. Zittrain. 2008. Access Denied: The Practice and Policy of Global Internet Filtering. MIT Press.
[15]
R. J. Deibert, J. G. Palfrey, R. Rohozinski, and J. Zittrain. 2010. Access Controlled: The Shaping of Power, Rights, and Rule in Cyberspace. MIT Press.
[16]
DNSnawala. 2014. DNS Nawala. Retrieved from http://www.nawala.org/.
[17]
Maximillian Dornseif. 2004. Government mandated blocking of foreign Web content. CoRR cs.CY/0404005.
[18]
T. Elahi and I. Goldberg. 2012. CORDON--A Taxonomy of Internet Censorship Resistance Strategies. CACR Tech Report 2012-33, December 2012.
[19]
J. Fallows. 2008. The connection has been reset. The Atlantic (March 2008).
[20]
R. Fielding, J. Gettys, J. Mogul, H. Frystyk, L. Masinter, P. Leach, and T. Berners-Lee. 1999. Hypertext Transfer Protocol -- HTTP/1.1. RFC 2616 (Draft Standard). Retrieved from http://www.ietf.org/rfc/rfc2616.txt Updated by RFCs 2817, 5785, 6266, 6585.
[21]
A. Filasto and J. Appelbaum. 2012. OONI: Open observatory of network interference. In USENIX FOCI.
[22]
Google. 2014. Transparency Report. Retrieved from http://www.google.com/transparencyreport/.
[23]
GreatFire.org. 2012. Homepage. Retrieved from https://twitter.com/GreatFireChina/status/266898482298773505.
[24]
ICANN Security and Stability Advisory Committee (SSAC). 2012. SSAC Advisory on Impacts of Content Blocking via the Domain Name System. Technical Report. ICANN Security and Stability Advisory Committee (SSAC).
[25]
ICLab. 2014. Homepage. Retrieved from http://iclab.org.
[26]
C. Kreibich, N. Weaver, B. Nechaev, and V. Paxson. 2010. Netalyzr: Illuminating the edge network. In Proc. of the Internet Measurement Conference.
[27]
C. S. Leberknight, M. Chiang, and F. M. F. Wong. 2012a. A taxonomy of censors and anti-censors: Part I-impacts of internet censorship. International Journal of E-Politics (IJEP) 3, 2 (2012), 52--64.
[28]
C. S. Leberknight, M. Chiang, and F. M. F. Wong. 2012b. A taxonomy of censors and anti-censors: Part II: Anti-censorship technologies. International Journal of E-Politics (IJEP) 3, 4 (2012), 20--35.
[29]
G. Lowe, P. Winters, and M. L. Marcus. 2007. The great DNS wall of China. MS, New York University 21 (2007).
[30]
S. Murdoch and R. Anderson. 2008. Tools and technology of Internet filtering. In Access Denied: The Practice and Policy of Global Internet Filtering.
[31]
H. Noman. 2008. Dubai Free Zone No Longer Has Filter-free Internet Access. Retrieved from http://opennet.net/blog/2008/04/dubai-free-zone-no-longer-has-filter-free-internet-access.
[32]
H. Noman. 2009. Middle East Censors Use Western Technologies to Block Viruses and Free Speech. http://opennet.net/blog/2009/07/middle-east-censors-use-western-technologies-block-viruses-and-free-speech.
[33]
ONI Research Profile: Burma. 2012. Homepage. Retrieved from http://opennet.net/research/profiles/burma. (2012).
[34]
ONI Research Profile: Indonesia. 2012. Homepage. Retrieved from http://opennet.net/research/profiles/indonesia.
[35]
ONI Research Profile: Iran. 2009. Homepage. Retrieved from http://opennet.net/research/profiles/iran.
[36]
ONI Research Profile: Yemen 2009. Homepage. Retrieved from http://opennet.net/research/profiles/yemen.
[37]
OpenNet Initiative. 2014. Homepage. Retrieved from https://opennet.net/.
[38]
J. Otto, M. Sanchez, T. Stein J. Rula, and F. Bustamante. 2012. namehelp: Intelligent client-side DNS resolution. In SIGCOMM 2012 Poster.
[39]
J. C. Park and J. R. Crandall. 2010. Empirical study of a national-scale distributed intrusion detection system: Backbone-level filtering of html responses in China. In ICDCS.
[40]
PlanetLab. 2013. PlanetLab: An Open Platform for Developing, Deploying, and Accessing Planetary-scale Services. Retrieved from http://www.planet-lab.org.
[41]
Renesys Blog. 2008. Pakistan Hijacks YouTube. Retrieved from http://www.renesys.com/blog/2008/02/pakistan_hijacks_youtube_1. shtml.
[42]
RIPE Atlas. 2014. Homepage. Retrieved from https://atlas.ripe.net/.
[43]
RIPE Network Coordination Center. 2014. RIPE Routing Information Service. Retrieved from http://www.ripe.net/data-tools/stats/ris/routing-information-service.
[44]
M. Sanchez, J. Otto, Z. Bischof, D. Choffnes, F. Bustamante, B. Krishnamurthy, and W. Willinger. 2013. Dasu: Pushing experiments to the internet’s edge, in network systems design and implementation (NSDI). In Proc. 10th USENIXSymposium on Network Systems Design and Implementation.
[45]
A. Sfakianakis, E. Athanasopoulos, and S. Ioannidis. 2011. CensMon: A web censorship monitor. In USENIX FOCI.
[46]
S. Sundaresan, W. de Donato, N. Feamster, R. Teixeira, S. Crawford, and A. Pescape. 2011. Broadband internet performance: A view from the gateway. In Proc. ACM SIGCOMM.
[47]
W. Sutrisno. 2010. Indonesia Internet Censorship. Retrieved from http://www.sutrisno.me/2010/05/indonesia-internet-censorship.html.
[48]
Team Cymru IP to ASN Lookup v1.0. 2013. Homepage. Retrieved from http://asn.cymru.com/cgi-bin/whois.cgi.
[49]
The ICSI Netalyzr. 2014. Homepage. Retrieved from http://netalyzr.icsi.berkeley.edu/.
[50]
TorProject. 2014. Tor Metrics Portal: Users. Retrieved from https://metrics.torproject.org/users.html?graph=direct-users&country=sy&events=ondirect-users.
[51]
trustpositive. 2013. Trust+ Positif. http://trustpositif.kominfo.go.id/?lang=en. (2013).
[52]
J. P. Verkamp and M. Gupta. 2012. Inferring mechanics of web censorship around the world. In Usenix FOCI.
[53]
ViewDNS.info. 2011. DNS Cache Poisoning in the People’s Republic of China. Retrieved from http://viewdns.info/research/dns-cache-poisoning-in-the-peoples-republic-of-china/.
[54]
N. Weaver, R. Sommer, and V. Paxson. 2009. Detecting forged TCP reset packets. In Proc. of NDSS. Citeseer.
[55]
S. Wolfgarten. 2006. Investigating Large-Scale Internet Content Filtering. Ph.D. Dissertation. Security & Forensic Computing, Dublin City University, Ireland.
[56]
J. Wright, T. de Souza, and I. Brown. 2011. Fine-grained censorship mapping: information sources, legality and ethics. In Proc. of the USENIX Workshop on Free and Open Communication on the Internet.
[57]
X. Xu, Z. Mao, and J. Halderman. 2011. Internet censorship in China: Where does the filtering occur? In Passive and Active Measurement.
[58]
A. A. Zain. 2008. Internet users stumble across “adult” content. Khaleej Times (April 11, 2008).
[59]
J. Zittrain, R. Budish, and R. Faris. 2014. Herdict: Help Spot Web Blockages. Retrieved from http://www.herdict.org/.
[60]
J. Zittrain and B. Edelman. 2003. Internet filtering in China. IEEE Internet Computing 7, 2 (2003), 70--77.
[61]
E. Zmijewski. 2010. Accidentally Importing Censorship. Renesys Blog. Retrieved from http://www.renesys.com/blog/2010/03/fouling-the-global-nest.shtml.

Cited By

View all
  • (2024)Charting Censorship Resilience and Global Internet Reachability: A Quantitative Approach2024 IFIP Networking Conference (IFIP Networking)10.23919/IFIPNetworking62109.2024.10619834(529-535)Online publication date: 3-Jun-2024
  • (2024)Understanding Routing-Induced Censorship Changes GloballyProceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security10.1145/3658644.3670336(437-451)Online publication date: 2-Dec-2024
  • (2024)Look What’s There! Utilizing the Internet’s Existing Data for Censorship Circumvention with OPPRESSIONProceedings of the 19th ACM Asia Conference on Computer and Communications Security10.1145/3634737.3637676(80-95)Online publication date: 1-Jul-2024
  • Show More Cited By

Index Terms

  1. Characterizing Web Censorship Worldwide: Another Look at the OpenNet Initiative Data

    Recommendations

    Comments

    Please enable JavaScript to view thecomments powered by Disqus.

    Information & Contributors

    Information

    Published In

    cover image ACM Transactions on the Web
    ACM Transactions on the Web  Volume 9, Issue 1
    January 2015
    178 pages
    ISSN:1559-1131
    EISSN:1559-114X
    DOI:10.1145/2726021
    Issue’s Table of Contents
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 23 January 2015
    Accepted: 01 September 2014
    Revised: 01 July 2014
    Received: 01 March 2014
    Published in TWEB Volume 9, Issue 1

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. Censorship
    2. network measurement

    Qualifiers

    • Research-article
    • Research
    • Refereed

    Funding Sources

    • The OpenNet Initiative

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)56
    • Downloads (Last 6 weeks)6
    Reflects downloads up to 15 Jan 2025

    Other Metrics

    Citations

    Cited By

    View all
    • (2024)Charting Censorship Resilience and Global Internet Reachability: A Quantitative Approach2024 IFIP Networking Conference (IFIP Networking)10.23919/IFIPNetworking62109.2024.10619834(529-535)Online publication date: 3-Jun-2024
    • (2024)Understanding Routing-Induced Censorship Changes GloballyProceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security10.1145/3658644.3670336(437-451)Online publication date: 2-Dec-2024
    • (2024)Look What’s There! Utilizing the Internet’s Existing Data for Censorship Circumvention with OPPRESSIONProceedings of the 19th ACM Asia Conference on Computer and Communications Security10.1145/3634737.3637676(80-95)Online publication date: 1-Jul-2024
    • (2024)Provably Secure Public-Key Steganography Based on Elliptic Curve CryptographyIEEE Transactions on Information Forensics and Security10.1109/TIFS.2024.336121919(3148-3163)Online publication date: 1-Jan-2024
    • (2024)Rise of Digital Authoritarianism? Exploring Global Motivations Behind Governmental Social Media CensorshipJavnost - The Public10.1080/13183222.2024.239621131:4(529-544)Online publication date: 22-Oct-2024
    • (2024)Do the Reasons for Social Media Censorship Vary Across Political Regimes and Social Media Platforms?Communication Reports10.1080/08934215.2024.2432320(1-14)Online publication date: 26-Nov-2024
    • (2024)Individual differences in knowledge network navigationScientific Reports10.1038/s41598-024-58305-214:1Online publication date: 9-Apr-2024
    • (2023)Discop: Provably Secure Steganography in Practice Based on "Distribution Copies"2023 IEEE Symposium on Security and Privacy (SP)10.1109/SP46215.2023.10179287(2238-2255)Online publication date: May-2023
    • (2023)Intercept and Inject: DNS Response Manipulation in the WildPassive and Active Measurement10.1007/978-3-031-28486-1_19(461-478)Online publication date: 21-Mar-2023
    • (2021)Defensive Technology Use by Political Activists During the Sudanese Revolution2021 IEEE Symposium on Security and Privacy (SP)10.1109/SP40001.2021.00055(372-390)Online publication date: May-2021
    • Show More Cited By

    View Options

    Login options

    Full Access

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media