Affiliation:
1. Indraprastha Institute of Information Technology (IIIT) Delhi , India
2. IIIT Delhi , India
3. IBM Research , Singapore
4. BITS Pilani , Goa , India
5. RIT , USA
Abstract
Abstract
Decoy Routing (DR), a promising approach to censorship circumvention, uses routers (rather than end hosts) as proxy servers. Users of censored networks, who wish to use DR, send specially crafted packets, nominally addressed to an uncensored website. Once safely out of the censored network, the packets encounter a special router (the Decoy Router) which identifies them using a secret handshake, and proxies them to their true destination (a censored site). However, DR has implementation problems: it is infeasible to reprogram routers for the complex operations required. Existing DR solutions fall back on using commodity servers as a Decoy Router. But as servers are not efficient at routing, most web applications show poor performance when accessed over DR. A further concern is that the Decoy Router has to inspect all flows in order to identify the ones that need DR. This may itself be a breach of privacy for other users (who neither require DR nor want to be monitored). In this paper, we present a novel DR system, Siege- Breaker (SB), which solves the aforementioned problems using an SDN-based architecture. Previous proposals involve a single unit which performs all major operations (inspecting all flows, identifying the DR requests and proxying them). In contrast, SB distributes the tasks for DR among three independent modules. (1) The SDN controller identifies DR requests via a covert, privacy preserving scheme, and does not need to inspect all flows. (2) The reconfigurable SDN switch intercepts packets, and forwards them to a secret proxy efficiently. (3) The secret proxy server proxies the client’s traffic to the censored site. Our modular, lightweight design achieves performance comparable to direct TCP downloads, for both in-lab setups, and Internet based tests involving commercial SDN switches.
Reference62 articles.
1. [1] Deterlab: Cyber-Defense Technology Experimental Research laboratory. https://www.isi.deterlab.net/index.php.
2. [2] Hp10500 series openflow enabled switches data sheet. http://www.hp.com/hpinfo/newsroom/press_kits/2011/InteropNY2011/HP_10500_Data-Sheet.pdf.
3. [3] Hp3500yl openflow enabled switch data sheet. http://www.curvesales.com/datasheets/switches/Campus-Access/HP-3500-3500-YL-Switch-Series-Datasheet.pdf.
4. [4] Imap library for python. https://docs.python.org/2/library/imaplib.html.
5. [5] List of hp sdn switches. https://techlibrary.hpe.com/ie/en/networking/solutions/technology/sdn/portfolio.aspx#.XjhyRtlS_CI.
Cited by
9 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献