TY - GEN
T1 - Anti-censorship framework using mobile IPv6 based moving target defense
AU - Heydari, Vahid
AU - Kim, Sun Il
AU - Yoo, Seong Moo
N1 - Publisher Copyright:
© 2016 ACM.
PY - 2016/4/5
Y1 - 2016/4/5
N2 - Anti-censorship techniques are important as the ability to freely access information is key to a democratic society. This issue has become even more critical in the information age. In this paper, we present an anti-censorship scheme based on the use of moving target defense implemented with Mobile IPv6. Our approach leverages the participation of content providers (the servers) and relies on unmodified standard Mobile IPv6 protocol. We utilize multiple care-of-addresses to assign each user to access groups and rotate them in a random shuffing that occur at some parametized time interval. We present the various aspects of this approach (such as blocking probability) and reason about its efficacy using an analytical (probabilistic) model. We also present the results of our initial prototype implementation, which was used to look at practical parameters and to understand the implementation overhead. Our analysis shows that it would require a tremendous amount of effort and resources for the adversary to overcome our scheme and censor the end-users.
AB - Anti-censorship techniques are important as the ability to freely access information is key to a democratic society. This issue has become even more critical in the information age. In this paper, we present an anti-censorship scheme based on the use of moving target defense implemented with Mobile IPv6. Our approach leverages the participation of content providers (the servers) and relies on unmodified standard Mobile IPv6 protocol. We utilize multiple care-of-addresses to assign each user to access groups and rotate them in a random shuffing that occur at some parametized time interval. We present the various aspects of this approach (such as blocking probability) and reason about its efficacy using an analytical (probabilistic) model. We also present the results of our initial prototype implementation, which was used to look at practical parameters and to understand the implementation overhead. Our analysis shows that it would require a tremendous amount of effort and resources for the adversary to overcome our scheme and censor the end-users.
UR - http://www.scopus.com/inward/record.url?scp=84968542329&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=84968542329&partnerID=8YFLogxK
U2 - 10.1145/2897795.2897815
DO - 10.1145/2897795.2897815
M3 - Conference contribution
AN - SCOPUS:84968542329
T3 - Proceedings of the 11th Annual Cyber and Information Security Research Conference, CISRC 2016
BT - Proceedings of the 11th Annual Cyber and Information Security Research Conference, CISRC 2016
PB - Association for Computing Machinery, Inc
T2 - 11th Annual Cyber and Information Security Research Conference, CISRC 2016
Y2 - 5 April 2016 through 7 April 2016
ER -