Defend Against Internet Censorship in Named Data Networking

Defend Against Internet Censorship in Named Data Networking

Defend against Internet Censorship in Named Data Networking Xingmin Cui∗, Yu Hin Tsang∗, Lucas C.K.Hui∗, S.M.Yiu∗, Bo Luoy ∗The University of Hong Kong, Hong Kong fxmcui, yhtsang, hui, [email protected] yBeijing University of Posts and Telecommunications, China [email protected] Abstract—Named Data Networking (NDN), as a promising anti-censorship techniques proposed in NDN either disables next generation network, has several advantages in scalability, the functionality of content store [2] or reduces NDN to IP- mobility and network efficiency compared with IP-based Inter- based network [8]. net. These advantages come with the usage of named content, powerful routers and intermediate cache. These, however, make In this paper we aim to construct an anti-censorship system censorship in NDN more easily to deploy. In this paper we give which defends against Internet censorship and at the same an analysis of the possible censorship techniques in NDN and come up with two most effective attacks: name-watchlist attack time preserves the advantages of NDN (eg. content store). and deep packet inspection. Existing solutions against censorship We consider the scenario of state-level censorship [15] where in IP-based network and NDN either cannot defend against data producers and certain part of the network are not under both attacks or disable the cache mechanism, thus decrease the control of the censor. We first analyze the feasibility of existing network efficiency. We propose a scheme which adopts the idea Internet censorship techniques in NDN and find out that among of proxy web servers and brings in the concept of smart routers to partially persevere the functionality of intermediate cache others, two censorship techniques are most effective: name- and improve network performance. Security analysis shows that watchlist attack and deep packet inspection (DPI). In name- as long as the consumer can connect to a smart router which watchlist attack, the censor has a list of censored names. He performs a second-time disguise of the requested name without inspects the names of each packet passing by and once he finds going through a compromised smart router, he can retrieve his out that the name is a censored name or the transformation interested Data packet. Simulation result shows that the usage of smart routers helps mitigate the performance overhead to of a censored name, he will suppress or delete this packet. disguise Interest names and Data content. In deep packet inspection, the censor installs DPI devices to Index Terms—Named Data Networking, Internet censorship, compromised nodes to inspect the packets passing by and anti-censorship, proxy server, smart router check whether they contain sensitive data [11]. Our scheme disguises the censored name into valid names to I. INTRODUCTION defend against name-watchlist attack and encrypts the replied Named data networking (NDN) [16] is one promising next data packets to defend against deep packet inspection. It adopts generation network candidate to deal with the scalability, mo- the idea of proxy web server and brings in smart routers bility and security issues of today’s Internet. NDN uses names to partially preserve the functionality of intermediate routers’ instead of IP addresses to identify packets in the network, content store. The contributions of this paper are as follows: including Interest packets and Data packets. NDN packets • We propose an anti-censorship scheme which defends are valid no matter where they come from or where they are against the two most effective censorship techniques forwarded to. Therefore NDN uses content store(CS) to cache in NDN while partially preserves the functionality of received Data packets to satisfy future Interests requesting the intermediate content store. same name. This increases network efficiency since Interest • We give security analysis of the system indicating the packets do not need to be forwarded to the producer. However, condition on which consumers succeed in getting their re- as pointed out in [6], the named content and intermediate quested data. Simulation shows that smart routers enables routers with bigger computational and memory resources the usage of intermediate content store and mitigates the makes Internet censorship more easily to deploy in NDN. overhead to disguise Interest names and Data content. Internet censorship and anti-censorship techniques have been well studied in IP-based network[10], [11], [15]. But The rest of the paper is organized as follows: In section these solutions are not readily applied to NDN because of the II, we will discuss the feasibility of existing censorship tech- different design paradigm of NDN and IP. For example, some niques in NDN. We give our system model and security model anti-censorship solutions in IP-based network [10] propose in section III. In section IV, we introduce our anti-censorship to let the requesters and responders communicate over a system. Security analysis and performance evaluation will be covert channel. But NDN lays emphasis on the distribution given in section V. Related work is listed in section VI and of content rather than host-to-host communication. Existing section VII concludes the paper. ISBN 978-89-968650-7-0 300 Jan. 31 ~ Feb. 3, 2016 ICACT2016 II. INTERNET CENSORSHIP request for Data packets. Intermediate routers forward Interests Internet censorship is used to control and suppress the towards the producer. Producers, after receiving the Interest, access to, or the publishing of certain information on the reply it with the corresponding Data packet. Then the Data Internet [11]. It is often used to prevent censored users packet is routed back to the consumer by intermediate routers, from accessing sensitive content, which resides in the un- taking the reverse way of the Interest packet. Among all the censored Internet. Censorship and anti-censorship techniques routers, we assume the existence of a certain amount of smart have been well-studied in IP-based network [11], [10], [5], routers (SR). The motivation to bring in smart routers and their [15]. Censorship policies need to enforce censorship without capabilities will be given in section IV. causing performance degradation of the network. Software- B. Security Model based censorship technologies include IP blocking, DNS tam- The censor can carry out the following actions: pering, keyword filtering, monitoring the usage of specific • Control a subset of network entities: The censor can con- protocols, etc. Hardware-based measures include using Deep trol a subset of routers and consumers in his network and Packet Inspection(DPI) devices to inspect the packets passing perform any actions allowed to these entities. Censored by [11]. The objective of an anti-censorship system is to entities can communicate with each other and exchange connect censored users to the uncensored Internet securely information to strengthen the censorship. and anonymously [11]. • Compromise existing routers: The censor can select any Since NDN packets are identified by names instead of router in his network and compromise it. Then the censor IP addresses, the counterpart of IP blocking in NDN would learns all the private information (eg. private key, cache be name-watchlist attack[2]. In a name-watchlist attack, the content) of this router. But we assume the censor does censor has a list L, which contains the names he wishes to not have the power to control all routers in the network. block or eliminate. We call these names censored names. The • Compromise existing consumers: In this case, the censor sensor inspects the names of each packet passing by and once can act as a normal consumer to request interested data. he finds out that the name is a censored name or transformation We assume compromised routers can launch name-watchlist of a censored name, he will suppress or delete this packet. attack and DPI to prevent consumers from retrieving sensitive The counterpart of DNS tampering in NDN would be name information from producers. Besides, we assume the existence tampering, that is, to modify the name of a packet. However of a Public Key Infrastructure (PKI) in the system. This name tampering would be much more difficult to employ due assumption is reasonable since NDN requires producers to to the following reasons: Firstly, there doesn’t exist a central sign on the fname,datag tuple to ensure the integrity of name resolution server in NDN. Secondly, data consumers can Data packets which implies the existence of a PKI. Besides, easily check whether the received Data packet is in reply to the censorship should NOT violate the availability of legitimate name he has requested since NDN requires the Data packet to data [13]. For example, a censor cannot simply delete all the enclose producer’s signature on the packet name and content. packets since he may delete legitimate packets as well. Deep packet inspection and keyword filtering are still ap- plicable in NDN. In fact, intermediate cache and routers with IV. A CENSORSHIP RESISTANT SYSTEM bigger computational and memory resources make them more A. Design Goals easily to deploy. Keyword filtering can be achieved through deep packet inspection. Our proposed censorship resistant system aims to achieve From the above discussion we can see that in NDN, the most the following goals: promising censorship techniques are name-watchlist attack • Against name-watchlist attack: Censored names need to and deep packet inspection(DPI). This paper aims to come be disguised into random-look patterns to escape this up with an anti-censorship scheme to defend against these two attack. attacks. Here notice that name-watchlist attack violates name • Against DPI: It should be difficult for a censor to claim privacy and DPI violates content privacy. Simply encrypting that a Data packet contains censored content. data packets only protects content privacy but cannot protect • Performance Requirement: The system should not dis- name privacy.

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    6 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us