Proceedings 2019 Network and Distributed System Security Symposium 2019
DOI: 10.14722/ndss.2019.23496
|View full text |Cite
|
Sign up to set email alerts
|

Enemy At the Gateways: Censorship-Resilient Proxy Distribution Using Game Theory

Abstract: A core technique used by popular proxy-based circumvention systems like Tor is to privately and selectively distribute the IP addresses of circumvention proxies among censored clients to keep them unknown to the censors. In Tor, for instance, such privately shared proxies are known as bridges. A key challenge to this mechanism is the insider attack problem: censoring agents can impersonate benign censored clients in order to learn (and then block) the privately shared circumvention proxies. To minimize the ris… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
13
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
4
2
1

Relationship

1
6

Authors

Journals

citations
Cited by 7 publications
(15 citation statements)
references
References 27 publications
0
13
0
Order By: Relevance
“…The bridge distribution problem, in its simplest construction, focuses on distributing viable network bridges to honest users in the presence of a censor that aspires to prevent bridge use. As explored in previous work [13,27,30,37], designing and implementing such a system for practical use requires an understanding of how censors operate in different regions. This includes the resources at a censor's disposal, the tools they are known to deploy and the known dangers to individuals who are discovered using censorship circumvention tools.…”
Section: Background 21 Bridge Distribution Problemmentioning
confidence: 99%
See 2 more Smart Citations
“…The bridge distribution problem, in its simplest construction, focuses on distributing viable network bridges to honest users in the presence of a censor that aspires to prevent bridge use. As explored in previous work [13,27,30,37], designing and implementing such a system for practical use requires an understanding of how censors operate in different regions. This includes the resources at a censor's disposal, the tools they are known to deploy and the known dangers to individuals who are discovered using censorship circumvention tools.…”
Section: Background 21 Bridge Distribution Problemmentioning
confidence: 99%
“…Nasr et al [30] take a game-theoretic approach to the bridge distribution problem, finding that a bootstrapping period, during which only trusted users are invited to use the system, is essential to counter the optimal censor strategy. In line with this finding, the systems we discussed above already involve restricting access to trusted groups of users or else verifying their accounts prior to registration [13,27,37].…”
Section: Bridge Enumeration Resistancementioning
confidence: 99%
See 1 more Smart Citation
“…Nonetheless, our Operator can deploy standard Sybil protection mechanisms against such an expensive DoS attack. We have particularly implemented the Sybil protection mechanism of Nasr et al [48], which uses a strategic reputation system to pair clients and proxies.…”
Section: Sybil Attack Protectionmentioning
confidence: 99%
“…Existing literature tries to solve the proxy distribution issue in the context of proxy based censorship circumvention systems by leveraging either heuristic-based methods [10][11][12][13][14] or gametheoretical approaches [15]. Additionally, several advanced approaches are provided in recent research to solve such kind of generic resources assignment problems in the wide field of networking and communications, such as clustering [16] and coalition formation [17].…”
Section: Introductionmentioning
confidence: 99%