DocumentCode
680883
Title
On Combinatoric Approach to Circumvent Internet Censorship Using Decoy Routers
Author
Donghyun Kim ; Frye, Glenn R. ; Sung-Sik Kwon ; Hyung Jae Chang ; Tokuta, Alade O.
Author_Institution
Dept. of Math. & Phys., North Carolina Central Univ., Durham, NC, USA
fYear
2013
fDate
18-20 Nov. 2013
Firstpage
593
Lastpage
598
Abstract
The Internet is often referred to as an information highway since it offers a great mean for the general public to access the almost unlimited amount of information. At the same time, this communication technology poses a great threat to the system in those countries that wish to control the information flow. As a result, the Internet is subject to be under censorship, which is, however, a great privacy issue. Deploying decoy routers is one emerging approach to tackle this issue, since it helps each packet whose destination is a prohibited server to hide its ultimate destination from the censorship authority also known as warden. The recent report by Schuchard et al. shows an existence of an efficient approach to detect and isolate active decoy routers from the public. As a countermeasure, they propose to deploy decoy routers surrounding a target country such that isolating the decoy routers will result in isolating the the country from the rest of the Internet. Based on our observation that this problem in fact is with two opposite optimization goals, minimizing the number of decoy routers and maximizing the confinement rate, we introduce two polynomial time algorithms which handle this deployment problem under the presence of uncooperative ASes. We also conduct simulations to compare and analyze the performance of our algorithms.
Keywords
Internet; combinatorial mathematics; data privacy; telecommunication network routing; Internet censorship; combinatoric methods; decoy router deployment; deployment problem; information flow; optimization goal; polynomial time algorithms; privacy issue; uncooperative autonomous system; Bipartite graph; Internet; Particle separators; Polynomials; Privacy; Routing; Servers; BGP; Cirripede; Internet censorship; Internet privacy; Internet routing; Telex; decoy router deployment; decoy routing;
fLanguage
English
Publisher
ieee
Conference_Titel
Military Communications Conference, MILCOM 2013 - 2013 IEEE
Conference_Location
San Diego, CA
Type
conf
DOI
10.1109/MILCOM.2013.107
Filename
6735687
Link To Document