期刊文献+

Internet服务可访问性技术综述 被引量:2

Survey of Internet service accessibility
下载PDF
导出
摘要 越来越多的国家和组织应用互联网审查技术监视和阻断互联网用户的流量。互联网审查和抗审查技术已经极大地影响了互联网基础设施架构、通信协议以及用户行为。以匿名网络持久访问性技术为基础,调研网络审查和抗审查相关概念,探讨抗审查技术特点。基于当前文献的调研,深入分析和探讨互联网抗审查技术和架构。最后比较不同的抗审查技术、架构和系统,提出当前互联网抗审查技术面临的挑战。 More and more governments and organizations employ Internet censorship in order to monitor and filter the Internet flows. Internet censorship and anti-censorship techniques have impact on Internet infrastructure,protocols and users' behaviors. In this paper,we present a survey on Internet anti-censorship,which define related concepts and discusses a characterization of anti-censorship. Then we investigate the anti-censorship techniques and architectures,including available tools and systems. Finally,we compare and discuss anti-censorship techniques,architectures and systems,and propose current challenges in the field of Internet anti-censorship.
作者 谭庆丰 时金桥 王学宾 顾钊全 崔翔 Tan Qingteng1 , Shi Jinqiao 2, Wang Xuebin 2, Gu Zhaoquan 1, Cui Xiang3(1. Cyberspace Institute of Advanced Technology, Guangzhou University, Guanzhou 510006, China; 2. Institute of Intormation Engineering, Chinese Academy of Sciences, Beijing 100093, China; 3. National Engineering Laboratory for Information Security Technologies, Beijing 100093, Chin)
出处 《信息技术与网络安全》 2018年第6期18-27,共10页 Information Technology and Network Security
基金 国家自然科学基金(61572153)
关键词 抗审查技术 匿名通信 互联网审查 流分析 anti-censorship techniques anonymous communications internet censorship traffic analysis
  • 相关文献

参考文献3

二级参考文献40

  • 1Piatek M, Kohno T, Krishnamurthy A. Challenges and directions for monitoring P2P file sharing networks-or: Why my printer received a DMCA takedown notice [C] //Proc of USENIX Association HOTSEC'08. Berkeley, CA: USENIX Association, 2008:1-7.
  • 2Siganos G, Pujol J M, Rodriguez P. Monitoring the bittorrentmonitors: A bird's eye view [C] //Proc of the 10th Int Conf on Passive and Active Network Measurement. Berlin: Springer, 2009:175-184.
  • 3Piatek M, Isdal T, Krishnamurthy A, et al. One hop reputations for peer to peer file sharing workloads [C]//Proc of the 5th USENIX Symp on Networked Systems Design and Implementation. Berkeley, CA: USENIX Association, 2008, 1-14.
  • 4Clarke I, Sandberg O, Wiley B, et al. Freenet: A distributed anonymous information storage and retrieval system [C]//Proc of Int Workshop on Designing Privacy Enhancing Technologies : Design Issues in Anonymity and Unobservability. Berlin: Springer, 2001:46-66.
  • 5Isdal T, Piatek M, Krishnamurthy A, et al. Privacy- preserving P2P data sharing with OneSwarm [C] //Proe of ACM SIGCOMM'10. New York: ACM, 2010:111-122.
  • 6Cabuk S. Network covert channels: Design, analysis, detection, and elimination [D]. West Lafayette, IN: Purdue University, 2006.
  • 7Shah G, Molina A, Blaze M. Keyboards and covert channels [C] //Proc of the 15th Conf on USENIX Security Symp. Berkeley, CA: USENIX Association, 2006:59-75.
  • 8Cabuk S, Brodley C E, Shields C. IP covert timing channels: Design and detection [C] //Proc of ACM CCS'04. New York: ACM, 2004:178-187.
  • 9Gianvecchio S, Wang H. Detecting covert timing channels: An entropy-based approach [C]//Proc of ACM CCS'07. New York: ACM, 2007:307-316.
  • 10Berk V, Giani A, Cyhenko G. Detection of covert channel encoding in network packet delays, TR536 [R]. Hanover, NH: Department of Computer Science, Dartmouth College, 2005.

共引文献49

同被引文献9

引证文献2

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部