Title
Routing around decoys
Abstract
Decoy Routing is a new approach to Internet censorship circumvention that was recently and independently proposed at FOCI'11, USENIX Security'11 and CCS'11. Decoy routing aims to hamper nation-state level Internet censorship by having routers, rather than end hosts, relay traffic to blocked destinations. We analyze the security of these schemes against a routing capable adversary, a censoring authority that is willing to make routing decisions in response to decoy routing systems. We explore China, Syria, Iran, and Egypt as routing capable adversaries, and evaluate several attacks that defeat the security goals of existing decoy routing proposals. In particular, we show that a routing capable adversary can enumerate the participating routers implementing these protocols; can successfully avoid sending traffic along routes containing these routers with little or no adverse effects; can identify users of these schemes through active and passive attacks; and in some cases can probabilistically identify connections to targeted destinations.
Year
DOI
Venue
2012
10.1145/2382196.2382209
ACM Conference on Computer and Communications Security
Keywords
Field
DocType
decoy routing,nation-state level internet censorship,decoy routing proposal,security goal,internet censorship circumvention,end host,adverse effect,usenix security,capable adversary,censoring authority,telex,censorship,bgp
Internet privacy,Link-state routing protocol,Hierarchical routing,Enhanced Interior Gateway Routing Protocol,Static routing,Computer science,Computer security,Policy-based routing,Routing domain,Routing table,Routing protocol
Conference
Citations 
PageRank 
References 
14
0.67
19
Authors
4
Name
Order
Citations
PageRank
Max Schuchard1898.67
John Geddes2140.67
Christopher Thompson3624.31
Nicholas Hopper4146995.76