• DocumentCode
    680883
  • Title

    On Combinatoric Approach to Circumvent Internet Censorship Using Decoy Routers

  • Author

    Donghyun Kim ; Frye, Glenn R. ; Sung-Sik Kwon ; Hyung Jae Chang ; Tokuta, Alade O.

  • Author_Institution
    Dept. of Math. & Phys., North Carolina Central Univ., Durham, NC, USA
  • fYear
    2013
  • fDate
    18-20 Nov. 2013
  • Firstpage
    593
  • Lastpage
    598
  • Abstract
    The Internet is often referred to as an information highway since it offers a great mean for the general public to access the almost unlimited amount of information. At the same time, this communication technology poses a great threat to the system in those countries that wish to control the information flow. As a result, the Internet is subject to be under censorship, which is, however, a great privacy issue. Deploying decoy routers is one emerging approach to tackle this issue, since it helps each packet whose destination is a prohibited server to hide its ultimate destination from the censorship authority also known as warden. The recent report by Schuchard et al. shows an existence of an efficient approach to detect and isolate active decoy routers from the public. As a countermeasure, they propose to deploy decoy routers surrounding a target country such that isolating the decoy routers will result in isolating the the country from the rest of the Internet. Based on our observation that this problem in fact is with two opposite optimization goals, minimizing the number of decoy routers and maximizing the confinement rate, we introduce two polynomial time algorithms which handle this deployment problem under the presence of uncooperative ASes. We also conduct simulations to compare and analyze the performance of our algorithms.
  • Keywords
    Internet; combinatorial mathematics; data privacy; telecommunication network routing; Internet censorship; combinatoric methods; decoy router deployment; deployment problem; information flow; optimization goal; polynomial time algorithms; privacy issue; uncooperative autonomous system; Bipartite graph; Internet; Particle separators; Polynomials; Privacy; Routing; Servers; BGP; Cirripede; Internet censorship; Internet privacy; Internet routing; Telex; decoy router deployment; decoy routing;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Military Communications Conference, MILCOM 2013 - 2013 IEEE
  • Conference_Location
    San Diego, CA
  • Type

    conf

  • DOI
    10.1109/MILCOM.2013.107
  • Filename
    6735687