CensMon: A Web Censorship Monitor
|
|
|
- Tyrone Lambert
- 10 years ago
- Views:
Transcription
1 CensMon: A Web Censorship Monitor Andreas Sfakianakis, Elias Athanasopoulos, Sotiris Ioannidis Institute of Computer Science Foundation for Research and Technology, Hellas {sfakiana, elathan, sotiris}@ics.forth.gr Abstract The Internet has traditionally been the most free medium for publishing and accessing information. It is also quickly becoming the dominant medium for quick andeasyaccesstonews. Itisthereforenotsurprisingthat there are significant efforts to censor certain news articles or even entire web sites. For this reason, it is paramount to try to detect what is censored and by whom. In this paper we present the design and implemention of a web censorship monitor, called CensMon. CensMon is distributed in nature, operates automatically and does not rely on Internet users to report censored web sites, can differentiate access network failures from possible censorship, and uses multiple input streams to determine what kind of censored data to look for. Our evaluation shows that CensMon can successfully detect censored content and spot the filtering technique used by the censor. 1 Introduction Censorship on the world wide web appears to be taking place more than ever before. The OpenNet Initiative (ONI) reports that there are almost 60 countries that either filter or are suspected of filtering web content [7]. Furthermore, in 2011, the Freedom House released a report that examined Internet-freedom in 37 countries around the world, and found that there is a diverse and growing threat to Internet-freedom[2]. Also, from 2000 onwards, many web censorship-related stories can be found by performing a simple web search in Slashdot s Your Rights Online section(yro)[10]. Web users can learn about filtered content in countries from various articles on popular news websites. However, the information provided is usually very sparse and inmostcases,limitedtoafewfilteredurlspercountry. Thus,thereisaneedforaservicethatprovidesmoredetailed information about up-to-date web censorship, such as ONI s Herdict Web [8]. Censorship is a phenomenon that changes over time. The main criteria used for censorship-checking by all these web services is whether a specific web site is accessibleornot. ONI sherdictweb [8],whichisthemajor web censorship monitoring service, depends on usergenerated feeds to determine the accessibility or inaccessibility of a web site. This fact alone may result in false positives, since often users cannot differentiate network failures from actual censorship. Therefore, there is need foraservicethatdoesnotdependonuserinput,andruns transparently to track all the changes in the accessibility state of web pages. In this paper, we present the design and implementation of CensMon, a system that offers users real-time information about filtered web content, without actually depending on their experience. Specifically our systems has three design characteristics: (i) it uses Planet- Lab s [9] nodes, to create a worldwide web censorship monitor, (ii) it uses plug-in feed modules, that stream newly published, possibly sensitive, content to our system for censorship-checking, and (iii) we maintain historical data by continuously monitoring sites that have been censored. Our results, by using many different web sources, show that our system can exploit these sources to detect censored content and identify the filtering technique used. 2 Background and Related Work Background about internet filtering mechanisms is providedindetailbydeibertetal.[14]. Wolfgarten[21]and Dornseif[15], apart from describing filtering techniques, provide information concerning filtering circumvention. Zittrain and Edelman [23] have found a number of blocked websites in China associated with sensitive material. They used URLs from search results from web searches as input to test for blocking, making their probing more efficient and more targeted. In order to evaluate our system we used their methodology as one source of 1
2 our system s inputs. Clayton et al. [12] give a detailed presentation of how web content blocking works. The main focus of their work is to reveal the mechanisms behind the Great Firewall of China. Moreover, they propose a naive but effective way to circumvent the Chinese firewall by just ignoring the injected TCP RST packets that the firewall generates. This work further motivates our effort and provide us with information about characteristics of the specific content blocking mechanism. In 2007, Crandall et al. [13] proposed Conceptdoppler, an approach based on Latent Semantic Analysis(LSA)[17] to semi-automatically extract filtered keywords in China. In Conceptdoppler, words that were related to concepts that are deemed sensitive were extracted using LSA and then active measurements were conducted to evaluate their results. Moreover, Park and Crandall s latest work [19] is focusing on HTML response filtering and the discontinuation of this technique in China. Both these works influenced our methodology in order to spot URL keyword filtering and differentiate it from HTTP response keyword filtering and HTTP Header keyword filtering. Mathrani et al. [18] tried to get a snapshot of censorship in 10 countries. Their design methodology of their probing mechanism influenced us in enabling us to detect the root cause of the filtering that was reported. Xu et al. [22] use low-level network characteristics in ordertodetectthelocationofthefilteringdevices. Toaccomplish that, they use PlanetLab nodes for their probes, anapproachthatwe followaswell. The Open Net Initiative [7] is an organization that investigates and analyses Internet filtering. They provide country profiles that describe the social background and the reasons why censorship is employed, and release reports on different countries that censor the Internet. Moreover, they provide statistics about internet usage at each country, as well as a service called HerdictWeb [8] that informs web site visitors about what is censored in each one of these countries. Herdict Web allows one to see what is inaccessible, where it is inaccessible, and for how long. It uses crowd-sourcing to get information about censorship and present a real-time view of the experiences of users around the globe. Unfortunately, this service relies heavily on web users that can sometimes falsely report the inaccessibility of a site, raising a need for differentiation between censorship and network error. CensMondoesnothaveaccesstoasmanynodesasHerdict, but it can workin a complementaryfashionsince it uses an automated mechanism. Finally, there a few other existing applications that monitor Internet censorship events which are either focused on a specific country [5] or their agent network is still quite limited to have an accurate global view[6]. 3 CensMon Architecture CensMon is a system that conducts extensive accessibility tests, trying not only to detect the presence of filtering butalsotospottherootcauseofit,ifpossible. Itconsists of two basic building blocks: the central server and the network of sensing nodes. We refer to the sensing nodes as CensMon s agents. In this section, we describe the properties of CensMon s central server and demonstrate thedesignofoursystembyprovidingatest case. 3.1 Central Server The central server is the core of the entire system. The web front-end runs there as well as all the scripts handling CensMon s input. Also it runs the database that stores all probing information and the filtering history. 3.2 Filtering Detection Procedure We will now describe the methodology followed by our system. There are eight steps that take place in our system: 1. At the start, the central server receives as input a URL to test. It then forwards this URL to all alive agents in CensMon s network to be tested. To avoid a flood of messages to all agents, we have inserted a small time-out between messages that are sent to the agents. 2. Once an agent receives a URL from the server, its initial task is to make a DNS request for the domain of the URL so as to get the correspondingip address or addresses. If no IP address is returned from the DNS server then the agent reports to the central server the probable cause of the DNS failure (e.g. connection refused, connection timed out or non-existing domain) to take further action. 3. If the agent successfully resolves the IP address of the domainin question,it tries to connectto that IP address at port 80, in an attempt to detect whether IP address blacklisting takes place. Upon successful connecting to the remote port, the agent continues to thenextstep of ourprotocol,otherwiseit reports the connectivity problem to the central server. 4. Having determined there is no IP address blocking, the agent tries to find out if there is any kind of filtering at the application level (HTTP). The agent tries to detect URL keyword filtering. Inspired by Park s [19] approach, we have set up a seperate web server serving null (empty) content so as to avoid HTML response keyword filtering. The agent contacts our webserver requesting our 2
3 webserver s default URL concatenated with the URL requested from CensMon server. This is, if the requested URL is then our agent s HTTP request becomes This way the agent detects whether there is any kind of URL keyword filtering or the expected 404 Not Found Status Code is returned. Again, if the agent detects URL keyword filtering it reports it to the central server. 5. Finally, the agent attempts to access the initial URL (using HTTP 1.1) and sends the received status code, HTML code and information gathered from the previous steps to the central server. In case of redirection the agent additionally reports the final URL andthe finalip addressvisited. 6. Since all the agents have reported their findings for a specific probe, the central server starts its postmortem analysis of the agents reports. CensMon can detect filtering that uses DNS Name hijacking (probable redirection to a block-page) by using whois service and by correlating the resolved IP addresses (matching IP prefixes) returned by DNS servers to all our agents concerning a specific URL. Nevertheless, if a domain name has more than one associated IP addresses, then our data are not enough to determine DNS manilupation with precision. 7. Next, CensMon tries to identify censorship of partialcontentinawebpage. SincetheHTMLcodeof a web page that was successfully accessed by one ofouragentsis storedatthe server,censmonanalyses the HTML code of the web pages returned by all agents and are associated with the same URL. When the md5 hashingsof the URLs HTML code differ, CensMon uses Arc90 s Readability functionality [1] in order to extract the content that is most likely to be the stuff a user wants to read (and what the censor wants to filter). Python port of arc90 s readability traverses the DOM and uses a scoring function that rewards an element for containing text, punctuation, and class or id attributes typically associated with the main content of a site. This way CensMon deals with automatic changing/updated contents (such as news sites, e.g. nytimes.com) or contents that are localized(depending on where the user is coming from). CensMon uses fuzzy hashing [16] for comparing the URLs readable HTML code and detecting partial filtering. 8. Lastly, when an inaccessibility event is reported, CensMon marks it as suspicious for filtering and begins to track the specific URL with the agent that Figure 1: The CensMon Architecture. reported the inaccessibility. This tracking is mandatory for CensMon to be able to differentiate between filtering, in cases where inaccessibility is repeatedly reported, network errors, if the URL finally becomes accessible, or change in censor policy. The architecture of CensMon is illustrated in Figure 1. Figure 1 shows a user accessing CensMon s web front end, which is one of the possible systems inputs (in the upperrightpartoftherefigurearetheinputsusedduring the evaluation period). The user can choose if they want to forward the URL in question to a specific alive agent or to all of CensMon s agents. Then the central server will forwardthe queryand will try to detect possible filtering of the user request. Afterwards, server stores the results reported by the agents in the database. Finally, CensMon informs the user via web front-end, if a specific agent was chosen, or via , if the entire agent nework was selected. 4 Evaluation In this section we present the results of a preliminary evaluation of CensMon. First, we describe the experimental setup and then we present all the experimental results. 4.1 CensMon Agent Network For our testbed we used nodes from PlanetLab. We run CensMon agents on PlanetLab nodes forming the Cens- Mon network. More precisely, we have deployed 174 agents in 33 different countries (141 distinct ASes, 130 3
4 Country #Agent Country #Agent Country #Agent #ASes #ASes Code Nodes Code Nodes Code Nodes AR 1 1 GR 2 1 NZ 2 2 BE 1 1 HK 2 2 PL 5 3 BR 5 3 HU 1 1 PT 2 1 CA 7 7 IE 1 1 RU 2 2 CH 5 1 IL 3 1 SE 2 2 CN 1 1 IT 2 1 SG 2 2 DE 15 4 JO 1 1 SI 1 1 ES 4 3 JP 10 8 TR 1 1 FI 1 1 KR 3 3 TW 5 4 FR 7 4 NL 3 2 US GB 3 2 NO 1 1 UY 1 1 Table1: NumberofCensMonagentsandnumberofASespercountry. #ASes distinct cities) in PlanetLab. Table 1 shows the countries,thenumberofdeployedagentsineachoneofthem as well as the number of the corresponding ASes. In order to evaluate our system we used input from different sources. We now discuss how these sources provide CensMon with URLs to test. User Input. CensMon has a front-end which enables users to insert URLs in the system. Users should specify the URL as well as the agent they want the system to forward the request to. After a successful request, users get the respective response and the HTML code of the requested URL. Another option is to insert a URL to be forwarded to all the CensMon agent network. Google Alerts. Apart from user input, we use Google Alerts [4], a service provide by Google, for automatically inserting URLs of interest in our system. Google Alerts are updates of the latest relevant Google resultsbasedonatopicofchoice. Thecharacteristicsofan alert is the topic that we are interested, the frequencyof receiving alerts (we choose to receive web alerts as they happen) and finally the type of the alert. Google Alerts offerfive typesof alerts for a specific topic: News alerts (related URLs from news sites), Blog alerts(urls from Blogs), Real-time alerts (latest related Tweets), Discussion alerts (related threads from various fora) and Video alerts(newly published related videos). Using Google Alerts as an input source we can check web content that may be censored and test how Cens- Mon responds to this newly published content. We registered a Gmail account and added 4 topics to our alert services. These topics was internet censorship, net neutrality, freedom of speech and human rights. For each of these topics our account receives alerts for all four type of alerts presented above. Using an IMAP client we fetchandinsert allalertstocensmon. Internet Trends. In parallel, we want to test URLs that are associated with current trends discussed over the Internet. For this reason, we use the popular social network Twitter[11] and Google Hot Trends[3] for extracting periodically popular trends. Google Hot Trends[3] is a service provided by Google, where one can see a snapshot of people s interests. Nevertheless, since Twitter trends and Google Hot Trends do not include necessarily URLs, we extract characteristic keywords associated with these trendsand then, by using the GoogleSearch Engine,we feed CensMon with the top-10 URLs returned by Google foragiventrend. Herdict s Web Reported URLs. Since the OpenNet Initiative [7] is the best source of information for Internet censorship, we use as input the latest reported URLs by webusersfromtheherdictweb[8]sitetotestthemwith our infrastructure. We were periodically visiting Herdict Web site and automatically extracting the URLs that were reported by web users. ONI s Categories for Internet Censorship. ONI [7] has released a list of categories in the global URL list for Internet censorship research. We chose ten of them in order to find related URLs and insert them to Cens- Mon. Thetencategoriesthatweselectedare: newsoutlets, freedom of speech, entertainment, government, terrorism, porn, gambling, religion, net neutrality and human rights. We then proceed and search through Google Search Engine to find the top-100 results for each category. The resulting 1000 URLs of the above categories were inserted to CensMon so as to be tested throughthe agent network. 4.2 Experimental Results All evaluation measurements were conducted during a 14-day period in April At this period CensMon tested 4950 unique URLs from 2500 domains. Moreover, CensMon detected 951 unique URLs from 193 domains as filtered. Table 2 depicts the number of unique domains found as censored by CensMon during the evaluation period. 4
5 AR 0 GR 0 NZ 0 BE 0 HK 2 PL 0 BR 0 HU 1 PT 0 CA 0 IE 1 RU 0 CH 0 IL 0 SE 0 CN 176 IT 0 SG 0 DE 1 JO 5 SI 0 ES 0 JP 1 TR 6 FI 0 KR 0 TW 0 FR 0 NL 0 US 0 GB 0 NO 0 UY 0 Table 2: Censored domains found per country by Cens- Mon. DNS Manipulation (18.2%) IP Blocking(33.3%) HTTP Filtering(48.5%) Figure 2: Percentage breakup of the layer at which the filtering was detected during CensMon s evaluation period. In Figure 2 we can see the percentage of the filtering techniques concerning the censored URLs found during the evaluation period. Furthermore, CensMon reported that for the domains that was detected filtering at HTTP levelinchina,71%ofthesedomainswerecensoreddue to URL keyword filtering. Finally, throughout the evaluation period CensMon did not detect any partial filtering ofawebpage. Figure 3 shows the distribution of the unique domains that CensMon has detected as censored for all the agent nodes. Aswecansee,about86%oftheagentnodeshave not reported any filtering event to be categorized as censored by CensMon. Moreover, about 10% of the agent nodes have found 1 to 6 domainsas censored. The Chineseagentnodewasbyfartheonethatreportedfiltering in 176 domains marked as censored. CensMon can detect whether an inaccessibility was reported due to temporary failure or filtering after a number of tracking attempts. Whenever our system gets informationbyoneoftheagentsthataspecificurlisinaccessible, it tracks it in order to spot the differentiation between filtering and a possible network error events. As Figure4depicts,21%ofalltheURLsthatCensMonstarted to track were accessible after the first tracking attempt and during all the rest of the evaluation period, concluding that the initial inaccessibility had been caused due to network failure. Moreover, the decrease of the percentage after the first tracking attempt can be explained due to the fact that the very first attempt is done by all Cumulative Fraction of Agent Nodes Number of Domains Found as Censored Figure 3: Cumulative distribution of the unique censored domains found during evaluation period. Percentage (%) of temporary network failures detected Number of CensMon tracking attempts per URL Figure 4: Percentage of temporary network failures detected after a varying number of CensMon tracking attempts. agent nodes trying to reach the same web server, while tracking attempts are more lightweight. Therefore, after 3trackingtimeswecanbeconfidentthatwhatCensMon tracksisratherafilteringeventthananearlyandtemporary network failure. However, we have tested manually these 193 domains that were reported as censored in orderto checkforfalse positivesandwe havefoundthat3 of them were falsely marked. Finally, 123 distinct URLs that were inserted as input to CensMon through ONI s Herdict Web site. CensMon started to track 245 cases that an inaccessibility was reported coming from 75 agent nodes in 20 countries. At last, 192 of the 245 cases of reported inaccessibility were at least one time accessible from our system while the rest 53 cases were reported as inaccessible during all our evaluation period. 5
6 5 Discussion OnelimitationofourworkfornowisthefactthatCens- MoncanonlymonitortheextentofcensorshipofacountrywithinwhichweareabletoaccessaPlanetLabnode. However,wecanovercomethisissuebyusingwebproxies worldwide as agents conducting simple accessibility testsorbydevelopingasoftwareclientorevenafirefox add-onthat will actasacensmonagent. Another direction that we plan to explore further is monitoring specific news sites via RSS feeds, and measure Internet censorship concerning realtime news events. Moreover,wecanuseouragentnetworktomeasure filtering of non-http traffic and ports (e.g. P2P, SMTP, VPN etc.) or executenetworklevel probesin order to test network infrastructure in terms of censorship. AsRogersproposedin[20],wecanmakeuseofCens- Mon s infrastructure to find known blocked content on unblocked sites within a country. Finally, by conducting long-term measurements and since in CensMon each URL is forwarded to all its agents, we could detect common domains censored by different countries. As a result, we can extract information about common worldwide web filtering trends among countries. 6 Conclusion In this paper we presented CensMon, an Internet censorship monitoring infrastructure. The increase of global web censorship motivated us to design and build a system that can detect filtering characteristics and also be capable of differentiating between censorship and network failures. We implemented our design and evaluated it on the PlanetLab testbed using information streams automatically extracted from a plethora of sources. Based on our experience with using CensMon, as well as on the experimental results presented in this paper, we believe that CensMon can be a valuable resource for Internet censorship detection, and can provide useful information for both researchers and regular web users. Acknowledgements Thiswork was supportedin part bythe MarieCurie Actions Reintegration Grants project PASS. Elias Athanasopoulos is funded by the Microsoft Research PhD Scholarship project, which is provided by Microsoft Research Cambridge. References [1] Arc90 s Readability. com. [2] Freedom House. Freedom on the Net cfm?page=664. [3] Google Hot Trends. trends/hottrends. [4] Google Web Alerts. alerts. [5] GreatFirewall.biz. biz. [6] Net Neutrality Monitor. [7] Open Net Initiative. [8] OpenNet Initiative s Herdict Web. herdict.org/web/. [9] PlanetLab. [10] Slashdot. Your Rights Online. slashdot.org. [11] Twitter. [12] R. Clayton, S. Murdoch, and R. Watson. Ignoring the great firewall of china. In Privacy Enhancing Technologies, pages Springer, [13] J.R. Crandall, D. Zinn, M. Byrd, E. Barr, and R. East. Conceptdoppler: A weather tracker for internet censorship. In 14th ACM Conference on Computer and Communications Security, [14] R. Deibert. Access denied: the practice and policy of global Internet filtering. The MIT Press, [15] M. Dornseif. Government mandated blocking of foreign Web content. Arxiv preprint cs/ , [16] J. Kornblum. Identifying almost identical files using context triggered piecewise hashing. digital investigation, 3:91 97, [17] T.K. Landauer, P.W. Foltz, and D. Laham. An introduction to latent semantic analysis. Discourse processes, 25(2): , [18] A. Mathrani and M. Alipour. Website Blocking Across Ten Countries: A Snapshot [19] J.C. Park and J.R. Crandall. Empirical Study of a National-Scale Distributed Intrusion Detection System: Backbone-Level Filtering of HTML Responses in China. In 2010 International Conference on Distributed Computing Systems, pages IEEE, [20] R. Rogers. A New Media Approach to the Study of State Internet Censorship. org, [21] S. Wolfgarten. Investigating large-scale Internet content filtering. M. Sc. in Security and Forensic Computing, 2006, [22] X.Xu,Z.Mao, andj. Halderman. InternetCensorship in China: Where Does the Filtering Occur? In Passive and Active Measurement, pages Springer, [23] J. Zittrain and B. Edelman. Internet filtering in China. Internet Computing, IEEE, 7(2):70 77,
A Study of What Really Breaks SSL HITB Amsterdam 2011
A Study of What Really Breaks SSL HITB Amsterdam 2011 v1.0 Ivan Ristic Michael Small 20 May 2011 Agenda 1. State of SSL 2. Quick intro to SSL Labs 3. SSL Configuration Surveys 4. Survey of Actual SSL Usage
The Anatomy of Web Censorship in Pakistan
The Anatomy of Web Censorship in Pakistan Zubair Nabi [email protected] Information Technology University, Pakistan* Presented by: Mobin Javed UC Berkeley * Now at IBM Research, Dublin This website
Towards a Comprehensive Picture of the Great Firewall s DNS Censorship
Towards a Comprehensive Picture of the Great Firewall s DNS Censorship Anonymous [email protected] Abstract China s Great Firewall passively inspects network traffic and disrupts unwanted communication
A Prevention & Notification System By Using Firewall. Log Data. Pilan Lin
A Prevention & Notification System By Using Firewall Log Data By Pilan Lin 1 Table Of Content ABSTRACT... 3 1 INTRODUCTION... 4 2. Firewall Log data... 6 2.1 How to collect log data... 6 3. Prevention
Firewall Firewall August, 2003
Firewall August, 2003 1 Firewall and Access Control This product also serves as an Internet firewall, not only does it provide a natural firewall function (Network Address Translation, NAT), but it also
A Measurement of NAT & Firewall Characteristics in Peer to Peer Systems
A Measurement of NAT & Firewall Characteristics in Peer to Peer Systems L. D Acunto, J.A. Pouwelse, and H.J. Sips Department of Computer Science Delft University of Technology, The Netherlands [email protected]
Double guard: Detecting Interruptions in N- Tier Web Applications
Vol. 3, Issue. 4, Jul - Aug. 2013 pp-2014-2018 ISSN: 2249-6645 Double guard: Detecting Interruptions in N- Tier Web Applications P. Krishna Reddy 1, T. Manjula 2, D. Srujan Chandra Reddy 3, T. Dayakar
Ignoring the Great Firewall of China
An Overview of Ignoring the Great Firewall of China By: Matt Landau Original Paper: Ignoring the Great Firewall of China Richard Clayton, Steven J. Murdoch, and Robert N. M. Watson University of Cambridge,
The Collateral Damage of Internet Censorship by DNS Injection
The Collateral Damage of Internet Censorship by DNS Injection Anonymous presented by Philip Levis 1 Basic Summary Great Firewall of China injects DNS responses to restrict access
Web Traffic Capture. 5401 Butler Street, Suite 200 Pittsburgh, PA 15201 +1 (412) 408 3167 www.metronomelabs.com
Web Traffic Capture Capture your web traffic, filtered and transformed, ready for your applications without web logs or page tags and keep all your data inside your firewall. 5401 Butler Street, Suite
HONEYD (OPEN SOURCE HONEYPOT SOFTWARE)
HONEYD (OPEN SOURCE HONEYPOT SOFTWARE) Author: Avinash Singh Avinash Singh is a Technical Evangelist currently worksing at Appin Technology Lab, Noida. Educational Qualification: B.Tech from Punjab Technical
DDoS Vulnerability Analysis of Bittorrent Protocol
DDoS Vulnerability Analysis of Bittorrent Protocol Ka Cheung Sia [email protected] Abstract Bittorrent (BT) traffic had been reported to contribute to 3% of the Internet traffic nowadays and the number
HU CZ FI PL SI PT IT ES NO NL FR DK SE IE GB AT DE CH LU 0 10 20 30 40 Foreigners' share Source: Eurostat More trust 3 4 5 6 7 PL HU CZ SI PT GR ES DK FI SE
Web Analytics Understand your web visitors without web logs or page tags and keep all your data inside your firewall.
Web Analytics Understand your web visitors without web logs or page tags and keep all your data inside your firewall. 5401 Butler Street, Suite 200 Pittsburgh, PA 15201 +1 (412) 408 3167 www.metronomelabs.com
XPROBE. Building Efficient Network Discovery Tools. Fyodor Yarochkin
XPROBE Building Efficient Network Discovery Tools Fyodor Yarochkin Outline Introduction Some motivating stories: real-life attacks Efficient network mapping with Lazy Scan mode Layer 7 extensions Scripting
Flow Analysis Versus Packet Analysis. What Should You Choose?
Flow Analysis Versus Packet Analysis. What Should You Choose? www.netfort.com Flow analysis can help to determine traffic statistics overall, but it falls short when you need to analyse a specific conversation
Kids and the Internet - Parental Control made easy. Christian Donner
Kids and the Internet - Parental Control made easy Christian Donner Setting the bar What is your level of experience with computers and the internet? What are you expecting to take away from this class?
Cymon.io. Open Threat Intelligence. 29 October 2015 Copyright 2015 esentire, Inc. 1
Cymon.io Open Threat Intelligence 29 October 2015 Copyright 2015 esentire, Inc. 1 #> whoami» Roy Firestein» Senior Consultant» Doing Research & Development» Other work include:» docping.me» threatlab.io
Annex A to the MPEG Audio Patent License Agreement Essential Philips, France Telecom and IRT Patents relevant to DVD-Video Player - MPEG Audio
Annex A to the MPEG Audio Patent License Agreement Essential Philips, France Telecom and IRT Patents relevant to DVD-Video Player - MPEG Audio PUBLICATION AR N 015678 - P970100444 05-Feb-97 17-Oct-05 AR006969
Advanced Administration for Citrix NetScaler 9.0 Platinum Edition
Advanced Administration for Citrix NetScaler 9.0 Platinum Edition Course Length: 5 Days Course Code: CNS-300 Course Description This course provides the foundation to manage, configure and monitor advanced
XPROBE-NG. What s new with upcoming version of the tool. Fyodor Yarochkin Armorize Technologies
XPROBE-NG What s new with upcoming version of the tool Fyodor Yarochkin Armorize Technologies Abstract Attacks trends analysis and network modern discovery requirements lazy scanning, application level
Load Balancing Security Gateways WHITE PAPER
Load Balancing Security Gateways WHITE PAPER Table of Contents Acceleration and Optimization... 4 High Performance DDoS Protection... 4 Web Application Firewall... 5 DNS Application Firewall... 5 SSL Insight...
Second-generation (GenII) honeypots
Second-generation (GenII) honeypots Bojan Zdrnja CompSci 725, University of Auckland, Oct 2004. [email protected] Abstract Honeypots are security resources which trap malicious activities, so they
CS 558 Internet Systems and Technologies
CS 558 Internet Systems and Technologies Dimitris Deyannis [email protected] 881 Heat seeking Honeypots: Design and Experience Abstract Compromised Web servers are used to perform many malicious activities.
Countermeasure for Detection of Honeypot Deployment
Proceedings of the International Conference on Computer and Communication Engineering 2008 May 13-15, 2008 Kuala Lumpur, Malaysia Countermeasure for Detection of Honeypot Deployment Lai-Ming Shiue 1, Shang-Juh
Globule: a Platform for Self-Replicating Web Documents
Globule: a Platform for Self-Replicating Web Documents Guillaume Pierre Maarten van Steen Vrije Universiteit, Amsterdam Internal report IR-483 January 2001 Abstract Replicating Web documents at a worldwide
Chapter 15. Firewalls, IDS and IPS
Chapter 15 Firewalls, IDS and IPS Basic Firewall Operation The firewall is a border firewall. It sits at the boundary between the corporate site and the external Internet. A firewall examines each packet
How To Protect Your Data From Being Hacked On Security Cloud
F-SECURE SECURITY CLOUD Purpose, function and benefits October 2015 CONTENTS F-Secure Security Cloud in brief 2 Security Cloud benefits 3 How does Security Cloud work? 4 Security Cloud metrics 4 Security
SonicWALL Clean VPN. Protect applications with granular access control based on user identity and device identity/integrity
SSL-VPN Combined With Network Security Introducing A popular feature of the SonicWALL Aventail SSL VPN appliances is called End Point Control (EPC). This allows the administrator to define specific criteria
APPLICATION PROGRAMMING INTERFACE
DATA SHEET Advanced Threat Protection INTRODUCTION Customers can use Seculert s Application Programming Interface (API) to integrate their existing security devices and applications with Seculert. With
The Impact of DNSSEC. Matthäus Wander. on the Internet Landscape. <[email protected]> Duisburg, June 19, 2015
The Impact of DNSSEC on the Internet Landscape Matthäus Wander Duisburg, June 19, 2015 Outline Domain Name System Security problems Attacks in practice DNS Security Extensions
SECURE APPLICATION DEVELOPMENT CODING POLICY OCIO-6013-09 TABLE OF CONTENTS
OFFICE OF THE CHIEF INFORMATION OFFICER OCIO-6013-09 Date of Issuance: May 22, 2009 Effective Date: May 22, 2009 Review Date: TABLE OF CONTENTS Section I. PURPOSE II. AUTHORITY III. SCOPE IV. DEFINITIONS
Architecture Overview
Architecture Overview Design Fundamentals The networks discussed in this paper have some common design fundamentals, including segmentation into modules, which enables network traffic to be isolated and
Network Security Forensics
Network Security Forensics As hacking and security threats grow in complexity and organizations face stringent requirements to document access to private data on the network, organizations require a new
Firewalls, IDS and IPS
Session 9 Firewalls, IDS and IPS Prepared By: Dr. Mohamed Abd-Eldayem Ref.: Corporate Computer and Network Security By: Raymond Panko Basic Firewall Operation 2. Internet Border Firewall 1. Internet (Not
https://elearn.zdresearch.com https://training.zdresearch.com/course/pentesting
https://elearn.zdresearch.com https://training.zdresearch.com/course/pentesting Chapter 1 1. Introducing Penetration Testing 1.1 What is penetration testing 1.2 Different types of test 1.2.1 External Tests
Network Configuration Settings
Network Configuration Settings Many small businesses already have an existing firewall device for their local network when they purchase Microsoft Windows Small Business Server 2003. Often, these devices
Using the Intrusion Prevention System in MultiNet V5.3
Using the Intrusion Prevention System in MultiNet V5.3 Jeremy Begg VSM Software Services Pty Ltd March 2009 Introduction One of the interesting new features in MultiNet V5.3 is a security mechanism called
Multifaceted Approach to Understanding the Botnet Phenomenon
Multifaceted Approach to Understanding the Botnet Phenomenon Christos P. Margiolas University of Crete A brief presentation for the paper: Multifaceted Approach to Understanding the Botnet Phenomenon Basic
How the Great Firewall discovers hidden circumvention servers. Roya Ensafi David Fifield Philipp Winter Nick Weaver Nick Feamster Vern Paxson
How the Great Firewall discovers hidden circumvention servers Roya Ensafi David Fifield Philipp Winter Nick Weaver Nick Feamster Vern Paxson Much already known about GFW Numerous research papers and blog
The Great DNS Wall of China
The Great DNS Wall of China Graham Lowe, Patrick Winters, Michael L. Marcus December 21, 2007 1 INTRODUCTION Repressive governments censor websites that they deem socially controversial. Subjects that
Basic & Advanced Administration for Citrix NetScaler 9.2
Basic & Advanced Administration for Citrix NetScaler 9.2 Day One Introducing and deploying Citrix NetScaler Key - Brief Introduction to the NetScaler system Planning a NetScaler deployment Deployment scenarios
Intrusion Detection Systems (IDS)
Intrusion Detection Systems (IDS) What are They and How do They Work? By Wayne T Work Security Gauntlet Consulting 56 Applewood Lane Naugatuck, CT 06770 203.217.5004 Page 1 6/12/2003 1. Introduction Intrusion
74% 96 Action Items. Compliance
Compliance Report PCI DSS 2.0 Generated by Check Point Compliance Blade, on July 02, 2013 11:12 AM 1 74% Compliance 96 Action Items Upcoming 0 items About PCI DSS 2.0 PCI-DSS is a legal obligation mandated
PROFESSIONAL SECURITY SYSTEMS
PROFESSIONAL SECURITY SYSTEMS Security policy, active protection against network attacks and management of IDP Introduction Intrusion Detection and Prevention (IDP ) is a new generation of network security
The Collateral Damage of Internet Censorship by DNS Injection
The Collateral Damage of Internet Censorship by DNS Injection Sparks Neo Tank Smith Dozer ABSTRACT Some ISPs and governments (most notably the Great Firewall of China) use DNS injection to block access
Penetration Testing with Kali Linux
Penetration Testing with Kali Linux PWK Copyright 2014 Offensive Security Ltd. All rights reserved. Page 1 of 11 All rights reserved to Offensive Security, 2014 No part of this publication, in whole or
Get Started Guide - PC Tools Internet Security
Get Started Guide - PC Tools Internet Security Table of Contents PC Tools Internet Security... 1 Getting Started with PC Tools Internet Security... 1 Installing... 1 Getting Started... 2 iii PC Tools
Combining Global Load Balancing and Geo-location with Emissary TM
Combining Global Load Balancing and Geo-location with Emissary TM A New Kind of Global Internet Traffic Management Appliance from Coyote Point Systems and Digital Envoy Establishing a Geo-Sensitive, Highly
A SURVEY OF CLOUD COMPUTING: NETWORK BASED ISSUES PERFORMANCE AND ANALYSIS
A SURVEY OF CLOUD COMPUTING: NETWORK BASED ISSUES PERFORMANCE AND ANALYSIS *Dr Umesh Sehgal, #Shalini Guleria *Associate Professor,ARNI School of Computer Science,Arni University,[email protected]
A Look at the Consequences of Internet Censorship through an ISP Lens
A Look at the Consequences of Internet Censorship through an ISP Lens Sheharbano Khattak (University of Cambridge)! Mobin Javed (UC Berkeley) Syed Ali Khayam (PLUMgrid) Zartash Afzal Uzmi (LUMS SBASSE,
Internet Security and Acceleration Server 2000 with Service Pack 1 Audit. An analysis by Foundstone, Inc.
Internet Security and Acceleration Server 2000 with Service Pack 1 Audit An analysis by Foundstone, Inc. Internet Security and Acceleration Server 2000 with Service Pack 1 Audit This paper presents an
Internet Content Distribution
Internet Content Distribution Chapter 4: Content Distribution Networks (TUD Student Use Only) Chapter Outline Basics of content distribution networks (CDN) Why CDN? How do they work? Client redirection
A host-based firewall can be used in addition to a network-based firewall to provide multiple layers of protection.
A firewall is a software- or hardware-based network security system that allows or denies network traffic according to a set of rules. Firewalls can be categorized by their location on the network: A network-based
Firewalls and VPNs. Principles of Information Security, 5th Edition 1
Firewalls and VPNs Principles of Information Security, 5th Edition 1 Learning Objectives Upon completion of this material, you should be able to: Understand firewall technology and the various approaches
The Great Firewall of China
The Great Firewall of China How It Blocks Tor and Why It Is Hard to Pinpoint Philipp Winter and Jedidiah R. Crandall Philipp Winter is a PhD student in the PriSec group at Karlstad University in Sweden.
Tunisia s experience in building an ISAC. Haythem EL MIR Technical Manager NACS Head of the Incident Response Team cert-tcc
Tunisia s experience in building an ISAC Haythem EL MIR Technical Manager NACS Head of the Incident Response Team cert-tcc 1 Agenda Introduction ISAC objectives and benefits Tunisian approach SAHER system
Networking for Caribbean Development
Networking for Caribbean Development BELIZE NOV 2 NOV 6, 2015 w w w. c a r i b n o g. o r g N E T W O R K I N G F O R C A R I B B E A N D E V E L O P M E N T BELIZE NOV 2 NOV 6, 2015 w w w. c a r i b n
The SIEM Evaluator s Guide
Using SIEM for Compliance, Threat Management, & Incident Response Security information and event management (SIEM) tools are designed to collect, store, analyze, and report on log data for threat detection,
Introduction: 1. Daily 360 Website Scanning for Malware
Introduction: SiteLock scans your website to find and fix any existing malware and vulnerabilities followed by using the protective TrueShield firewall to keep the harmful traffic away for good. Moreover
The following multiple-choice post-course assessment will evaluate your knowledge of the skills and concepts taught in Internet Business Associate.
Course Assessment Answers-1 Course Assessment The following multiple-choice post-course assessment will evaluate your knowledge of the skills and concepts taught in Internet Business Associate. 1. A person
Parallels Plesk Automation. Customer s Guide. Parallels Plesk Automation 11.5
Parallels Plesk Automation Customer s Guide Parallels Plesk Automation 11.5 Last updated: 17 March 2015 Contents Quick Start with Hosting Panel 4 Set Up Your First Website... 4 1. Create Your Site... 5
An Intrusion Detection System for Kaminsky DNS Cache poisoning
An Intrusion Detection System for Kaminsky DNS Cache poisoning Dhrubajyoti Pathak, Kaushik Baruah Departement of CSE, IIT Guwahati [email protected], [email protected] Abstract : Domain
Make search become the internal function of Internet
Make search become the internal function of Internet Wang Liang 1, Guo Yi-Ping 2, Fang Ming 3 1, 3 (Department of Control Science and Control Engineer, Huazhong University of Science and Technology, WuHan,
Sonian Getting Started Guide October 2008
Sonian Getting Started Guide October 2008 Sonian, Inc. For Authorized Use Only 1 Create your new archiving account 3 Configure your firewall for IMAP collections 4 (Skip this step if you will be using
Preventing your Network from Being Abused by Spammers
Preventing your Network from Being Abused by Spammers Marcelo H. P. C. Chaves [email protected] CERT.br Computer Emergency Response Team Brazil NIC.br - Network Information Center Brazil CGI.br - Brazilian Internet
White Paper. The Ten Features Your Web Application Monitoring Software Must Have. Executive Summary
White Paper The Ten Features Your Web Application Monitoring Software Must Have Executive Summary It s hard to find an important business application that doesn t have a web-based version available and
Concierge SIEM Reporting Overview
Concierge SIEM Reporting Overview Table of Contents Introduction... 2 Inventory View... 3 Internal Traffic View (IP Flow Data)... 4 External Traffic View (HTTP, SSL and DNS)... 5 Risk View (IPS Alerts
Pwning Intranets with HTML5
Javier Marcos de Prado Juan Galiana Lara Pwning Intranets with HTML5 2009 IBM Corporation Agenda How our attack works? How we discover what is in your network? What does your infrastructure tell us for
Penetration Testing. NTS330 Unit 1 Penetration V1.0. February 20, 2011. Juan Ortega. Juan Ortega, [email protected]. 1 Juan Ortega, juaorteg@uat.
1 Penetration Testing NTS330 Unit 1 Penetration V1.0 February 20, 2011 Juan Ortega Juan Ortega, [email protected] 1 Juan Ortega, [email protected] 2 Document Properties Title Version V1.0 Author Pen-testers
LifeSize Transit Deployment Guide June 2011
LifeSize Transit Deployment Guide June 2011 LifeSize Tranist Server LifeSize Transit Client LifeSize Transit Deployment Guide 2 Firewall and NAT Traversal with LifeSize Transit Firewalls and Network Address
Index Terms Domain name, Firewall, Packet, Phishing, URL.
BDD for Implementation of Packet Filter Firewall and Detecting Phishing Websites Naresh Shende Vidyalankar Institute of Technology Prof. S. K. Shinde Lokmanya Tilak College of Engineering Abstract Packet
Are Second Generation Firewalls Good for Industrial Control Systems?
Are Second Generation Firewalls Good for Industrial Control Systems? Bernie Pella, CISSP Schneider Electric Cyber Security Services [email protected] Firewall Overview Firewalls provide
Measurement of the Usage of Several Secure Internet Protocols from Internet Traces
Measurement of the Usage of Several Secure Internet Protocols from Internet Traces Yunfeng Fei, John Jones, Kyriakos Lakkas, Yuhong Zheng Abstract: In recent years many common applications have been modified
User Identification (User-ID) Tips and Best Practices
User Identification (User-ID) Tips and Best Practices Nick Piagentini Palo Alto Networks www.paloaltonetworks.com Table of Contents PAN-OS 4.0 User ID Functions... 3 User / Group Enumeration... 3 Using
What is Web Security? Motivation
[email protected] http://www.brucker.ch/ Information Security ETH Zürich Zürich, Switzerland Information Security Fundamentals March 23, 2004 The End Users View The Server Providers View What is Web
Automating Linux Malware Analysis Using Limon Sandbox Monnappa K A [email protected]
Automating Linux Malware Analysis Using Limon Sandbox Monnappa K A [email protected] A number of devices are running Linux due to its flexibility and open source nature. This has made Linux platform
[state of the internet] / SEO Attacks. Threat Advisory: Continuous Uptick in SEO Attacks
TLP: GREEN Issue Date: 1.12.16 Threat Advisory: Continuous Uptick in SEO Attacks Risk Factor High The Akamai Threat Research Team has identified a highly sophisticated Search Engine Optimization (SEO)
Installation and configuration guide
Installation and Configuration Guide Installation and configuration guide Adding X-Username support to Forward and Reverse Proxy TMG Servers Published: December 2010 Applies to: Winfrasoft X-Username for
White Paper How to Remotely Access Ethernet I/O Over the Internet
White Paper How to Remotely Access Ethernet I/O Over the Internet ACROMAG INCORPORATED Tel: (248) 295-0880 30765 South Wixom Road Fax: (248) 624-9234 P.O. BOX 437 Wixom, MI 48393-7037 U.S.A. Copyright
Attacks from the Inside
Attacks from the Inside Eddy Willems, G Data Righard J. Zwienenberg, Norman Attacks from the Inside. Agenda - Social Networking / Engineering - Where are the threats coming from - Infection vectors - The
Bypassing Internet Censorship for News Broadcasters
Bypassing Internet Censorship for News Broadcasters Karl Kathuria British Broadcasting Corporation and Canada Centre for Global Security Studies Munk School of Global Affairs, University of Toronto Abstract
Web Application Vulnerability Testing with Nessus
The OWASP Foundation http://www.owasp.org Web Application Vulnerability Testing with Nessus Rïk A. Jones, CISSP [email protected] Rïk A. Jones Web developer since 1995 (16+ years) Involved with information
NSFOCUS Web Application Firewall White Paper
White Paper NSFOCUS Web Application Firewall White Paper By NSFOCUS White Paper - 2014 NSFOCUS NSFOCUS is the trademark of NSFOCUS Information Technology Co., Ltd. NSFOCUS enjoys all copyrights with respect
Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs
Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs Why Network Security? Keep the bad guys out. (1) Closed networks
AlienVault Unified Security Management (USM) 4.x-5.x. Deployment Planning Guide
AlienVault Unified Security Management (USM) 4.x-5.x Deployment Planning Guide USM 4.x-5.x Deployment Planning Guide, rev. 1 Copyright AlienVault, Inc. All rights reserved. The AlienVault Logo, AlienVault,
VMware vcenter Log Insight Getting Started Guide
VMware vcenter Log Insight Getting Started Guide vcenter Log Insight 1.5 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by
A Study on the Live Forensic Techniques for Anomaly Detection in User Terminals
A Study on the Live Forensic Techniques for Anomaly Detection in User Terminals Ae Chan Kim 1, Won Hyung Park 2 and Dong Hoon Lee 3 1 Dept. of Financial Security, Graduate School of Information Security,
The server will respond to the client with a list of instances. One such attack was analyzed by an information security researcher in January 2015.
1 TLP: GREEN 02.11.15 GSI ID: 1086 SECURITY BULLETIN: MS SQL REFLECTION DDOS RISK FACTOR - MEDIUM 1.1 / OVERVIEW / Beginning in October 2014, PLXsert observed the use of a new type of reflection-based
HTTPS Inspection with Cisco CWS
White Paper HTTPS Inspection with Cisco CWS What is HTTPS? Hyper Text Transfer Protocol Secure (HTTPS) is a secure version of the Hyper Text Transfer Protocol (HTTP). It is a combination of HTTP and a
Controlling Risk, Conserving Bandwidth, and Monitoring Productivity with Websense Web Security and Websense Content Gateway
Controlling Risk, Conserving Bandwidth, and Monitoring Productivity with Websense Web Security and Websense Content Gateway Websense Support Webinar January 2010 web security data security email security
INTRUSION PROTECTION AGAINST SQL INJECTION ATTACKS USING REVERSE PROXY
INTRUSION PROTECTION AGAINST SQL INJECTION ATTACKS USING REVERSE PROXY Asst.Prof. S.N.Wandre Computer Engg. Dept. SIT,Lonavala University of Pune, [email protected] Gitanjali Dabhade Monika Ghodake Gayatri
Installation and configuration guide
Installation and Configuration Guide Installation and configuration guide Adding X-Forwarded-For support to Forward and Reverse Proxy TMG Servers Published: May 2010 Applies to: Winfrasoft X-Forwarded-For
Hillstone T-Series Intelligent Next-Generation Firewall Whitepaper: Abnormal Behavior Analysis
Hillstone T-Series Intelligent Next-Generation Firewall Whitepaper: Abnormal Behavior Analysis Keywords: Intelligent Next-Generation Firewall (ingfw), Unknown Threat, Abnormal Parameter, Abnormal Behavior,
Divide and Conquer Real World Distributed Port Scanning
Divide and Conquer Real World Distributed Port Scanning Ofer Maor CTO Hacktics 16 Feb 2006 Hackers & Threats I, 3:25PM (HT1-302) Introduction Divide and Conquer: Real World Distributed Port Scanning reviews
