skip to main content
10.1145/3278532.3278555acmconferencesArticle/Chapter ViewAbstractPublication PagesimcConference Proceedingsconference-collections
research-article

Where The Light Gets In: Analyzing Web Censorship Mechanisms in India

Published:31 October 2018Publication History

ABSTRACT

In this work we present a detailed study of the Internet censorship mechanism in India. We consolidated a list of potentially blocked websites from various public sources to assess censorship mechanisms used by nine major ISPs. To begin with, we demonstrate that existing censorship detection tools like OONI are grossly inaccurate. We thus developed various techniques and heuristics to correctly assess censorship and study the underlying mechanism used by these ISPs. At every step we corroborated our finding manually to test the efficacy of our approach, an exercise largely ignored by several others. We fortify our findings by adjudging the coverage and consistency of censorship infrastructure, broadly in terms of average number of network paths and requested domains the infrastructure censors. Our results indicate a clear disparity among the ISPs, on how they install censorship infrastructure. For instance, in Idea network we observed the censorious middleboxes in over 90% of our tested intra-AS paths, whereas for Vodafone, it is as low as 2.5%. We conclude our research by devising our own novel anti-censorship strategies, that does not depend on third party tools (like proxies, Tor and VPNs etc.). We managed to access all blocked websites in all ISPs under test.

References

  1. Bogon ip addresses. https://ipinfo.io/bogon.Google ScholarGoogle Scholar
  2. Cidr report. https://www.cidr-report.org/as2.0/.Google ScholarGoogle Scholar
  3. Dna india. http://www.dnaindia.com/india/report-government-orders-blocking-of\-857-pornographic-websites-2110545.Google ScholarGoogle Scholar
  4. Facebook transparency report 2017. https://transparency.facebook.com/country/India/2017-H1/.Google ScholarGoogle Scholar
  5. Google transparency report 2017. https://transparencyreport.google.com/government-removals/by-country/IN.Google ScholarGoogle Scholar
  6. Herdict:Help Spot Web Blockages. http://herdict.org/.Google ScholarGoogle Scholar
  7. How ooni detects http filtering? https://ooni.torproject.org/nettest/web-connectivity/.Google ScholarGoogle Scholar
  8. Http 1.1 rfc 2616. https://tools.ietf.org/html/rfc2616.Google ScholarGoogle Scholar
  9. Instances of internet censorship in india. https://opennet.net/research/profiles/india.Google ScholarGoogle Scholar
  10. List of potentially blocked websites in india --- citizen labs. https://github.com/citizenlab/test-lists/blob/master/lists/in.csv.Google ScholarGoogle Scholar
  11. Ministry of it orders isp to ban sexual abuse material. http://www.meity.gov.in/content/order-issued-meity-isps-adopt-and-implement\-iwf-resources-prevent-distribution-and.Google ScholarGoogle Scholar
  12. Ooni source code. https://github.com/TheTorProject/ooni-probe/blob/master/ooni/nettests/blocking/web_connectivity.py.Google ScholarGoogle Scholar
  13. Porn websites blocked in india: Government plans ombudsman for online content. http://gadgets.ndtv.com/internet/news/porn-websites-blocked-in-india-government\-plans-ombudsman-for-online-content-723485.Google ScholarGoogle Scholar
  14. Rediff. http://www.rediff.com/computer/1999/jul05dawn.htm.Google ScholarGoogle Scholar
  15. Right to information, a citizen gateway. http://rti.gov.in/.Google ScholarGoogle Scholar
  16. Shodan-search engine for internet-connected devices. https://www.shodan.io/.Google ScholarGoogle Scholar
  17. How the great firewall of china is blocking tor. In Presented as part of the 2nd USENIX Workshop on Free and Open Communications on the Internet (Berkeley, CA, 2012), USENIX.Google ScholarGoogle Scholar
  18. Ooni: Open observatory of network interference. In Presented as part of the 2nd USENIX Workshop on Free and Open Communications on the Internet (Berkeley, CA, 2012), USENIX.Google ScholarGoogle Scholar
  19. Aceto, G., Montieri, A., and Pescapé, A. Internet censorship in italy: An analysis of 3g/4g networks. In Communications (ICC), 2017 IEEE International Conference on (2017), IEEE, pp. 1--6.Google ScholarGoogle ScholarCross RefCross Ref
  20. Acharya, H., Chakravarty, S., and Gosain, D. Few throats to choke: On the current structure of the internet. In Local Computer Networks (LCN), 2017 IEEE 42nd Conference on (2017), IEEE, pp. 339--346.Google ScholarGoogle ScholarCross RefCross Ref
  21. Acharya, H., Chakravarty, S., and Gosain, D. Mending wall: On the implementation of censorship in india. In SecureComm 2018 - 13th EAI International Conference on Security and Privacy in Communication Networks (2017), Springer.Google ScholarGoogle Scholar
  22. Anonymous. The collateral damage of internet censorship by dns injection. SIGCOMM Comput. Commun. Rev. 42, 3 (June 2012), 21--27. Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. Aryan, S., Aryan, H., and Halderman, J. A. Internet censorship in iran: A first look. In FOCI (2013).Google ScholarGoogle Scholar
  24. Burnett, S., and Feamster, N. Encore: Lightweight measurement of web censorship with cross-origin requests. ACM SIGCOMM Computer Communication Review 45, 4 (2015), 653--667. Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. Chaabane, A., Chen, T., Cunche, M., De Cristofaro, E., Friedman, A., and Kaafar, M. A. Censorship in the wild: Analyzing internet filtering in syria. In Proceedings of the 2014 Conference on Internet Measurement Conference (2014), ACM, pp. 285--298. Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. Clayton, R., Murdoch, S. J., and Watson, R. N. Ignoring the great firewall of china. In International Workshop on Privacy Enhancing Technologies (2006), Springer, pp. 20--35. Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. Crandall, J. R., Zinn, D., Byrd, M., Barr, E. T., and East, R. Conceptdoppler: a weather tracker for internet censorship. In ACM Conference on Computer and Communications Security (2007), pp. 352--365. Google ScholarGoogle ScholarDigital LibraryDigital Library
  28. Dainotti, A., Squarcella, C., Aben, E., Claffy, K. C., Chiesa, M., Russo, M., and Pescapé, A. Analysis of country-wide internet outages caused by censorship. In Proceedings of the 2011 ACM SIGCOMM conference on Internet measurement conference (2011), ACM, pp. 1--18. Google ScholarGoogle ScholarDigital LibraryDigital Library
  29. Dalek, J., Haselton, B., Noman, H., Senft, A., Crete-Nishihata, M., Gill, P., and Deibert, R. J. A method for identifying and confirming the use of url filtering products for censorship. In Proceedings of the 2013 conference on Internet measurement conference (2013), ACM, pp. 23--30. Google ScholarGoogle ScholarDigital LibraryDigital Library
  30. Ensafi, R., Fifield, D., Winter, P., Feamster, N., Weaver, N., and Paxson, V. Examining how the great firewall discovers hidden circumvention servers. In Proceedings of the 2015 Internet Measurement Conference (2015), ACM, pp. 445--458. Google ScholarGoogle ScholarDigital LibraryDigital Library
  31. Ensafi, R., Winter, P., Mueen, A., and Crandall, J. R. Analyzing the great firewall of china over space and time. Proceedings on privacy enhancing technologies 2015, 1 (2015), 61--76.Google ScholarGoogle ScholarCross RefCross Ref
  32. Gao, L., and Wang, F. The extent of as path inflation by routing policies. In Global Telecommunications Conference, 2002. GLOBECOM'02. IEEE (2002), vol. 3, IEEE, pp. 2180--2184.Google ScholarGoogle Scholar
  33. Gill, P., Crete-Nishihata, M., Dalek, J., Goldberg, S., Senft, A., and Wiseman, G. Characterizing web censorship worldwide: Another look at the opennet initiative data. ACM Transactions on the Web (TWEB) 9, 1 (2015), 4. Google ScholarGoogle ScholarDigital LibraryDigital Library
  34. Guo, S., and Feng, G. Understanding support for internet censorship in china: An elaboration of the theory of reasoned action. Journal of Chinese Political Science 17, 1 (2012), 33--52.Google ScholarGoogle ScholarCross RefCross Ref
  35. Internet censorship in iran.Google ScholarGoogle Scholar
  36. Jermyn, J., and Weaver, N. Autosonda: Discovering rules and triggers of censorship devices. In 7th USENIX Workshop on Free and Open Communications on the Internet (FOCI 17). USENIX Association, Vancouver, BC. https://www.usenix.org/conference/foci17/workshop-program/presentation/jermyn (2017).Google ScholarGoogle Scholar
  37. Khattak, S., Jayed, M., Anderson, P. D., and Paxson, V. Towards illuminating a censorship monitor's model to facilitate evasion. In FOCI (2013).Google ScholarGoogle Scholar
  38. Knockel, J., Ruan, L., and Crete-Nishihata, M. Measuring decentralization of chinese keyword censorship via mobile games. In 7th {USENIX} Workshop on Free and Open Communications on the Internet ({FOCI} 17) (2017), USENIX Association.Google ScholarGoogle Scholar
  39. Levis, P. The collateral damage of internet censorship by dns injection. ACM SIGCOMM CCR 42, 3 (2012). Google ScholarGoogle ScholarDigital LibraryDigital Library
  40. MacKinnon, R. Flatter world and thicker walls? blogs, censorship and civic discourse in china. Public Choice 134, 1--2 (2008), 31--46.Google ScholarGoogle Scholar
  41. Marczak, B., Weaver, N., Dalek, J., Ensafi, R., Fifield, D., McKune, S., Rey, A., Scott-Railton, J., Deibert, R., and Paxson, V. ChinaâĂŹs great cannon. Citizen Lab 10 (2015).Google ScholarGoogle Scholar
  42. Nabi, Z. The anatomy of web censorship in pakistan. In FOCI (2013).Google ScholarGoogle Scholar
  43. Pearce, P., Ensafi, R., Li, F., Feamster, N., and Paxson, V. Augur: Internet-wide detection of connectivity disruptions. In Security and Privacy (SP), 2017 IEEE Symposium on (2017), IEEE, pp. 427--443.Google ScholarGoogle ScholarCross RefCross Ref
  44. Pearce, P., Jones, B., Li, F., Ensafi, R., Feamster, N., Weaver, N., and Paxson, V. Global measurement of dns manipulation. In Proceedings of the 26th USENIX Security Symposium (SecurityâĂŹ17) (2017). Google ScholarGoogle ScholarDigital LibraryDigital Library
  45. Sfakianakis, A., Athanasopoulos, E., and Ioannidis, S. Censmon: A web censorship monitor. In USENIX Workshop on Free and Open Communication on the Internet (FOCI) (2011).Google ScholarGoogle Scholar
  46. Son, S., and Shmatikov, V. The hitchhikerâĂŹs guide to dns cache poisoning. In International Conference on Security and Privacy in Communication Systems (2010), Springer, pp. 466--483.Google ScholarGoogle Scholar
  47. Verkamp, J.-P., and Gupta, M. Inferring mechanics of web censorship around the world. In FOCI (2012).Google ScholarGoogle Scholar
  48. Ververis, V., Kargiotakis, G., Filasto, A., Fabian, B., and Alexandros, A. Understanding internet censorship policy: The case of greece. In 5th USENIX Workshop on Free and Open Communications on the Internet (FOCI) (2015).Google ScholarGoogle Scholar
  49. Wang, Z., Cao, Y., Qian, Z., Song, C., and Krishnamurthy, S. V. Your state is not mine: a closer look at evading stateful internet censorship. In Proceedings of the 2017 Internet Measurement Conference (2017), ACM, pp. 114--127. Google ScholarGoogle ScholarDigital LibraryDigital Library
  50. West, D. M. Internet shutdowns cost countries $2.4 billion last year. Center for Technological Innovation at Brookings, Washington, DC (2016).Google ScholarGoogle Scholar
  51. Wright, J. Regional variation in chinese internet filtering. Information, Communication & Society 17, 1 (2014), 121--141.Google ScholarGoogle Scholar
  52. Xu, X., Mao, Z. M., and Halderman, J. A. Internet censorship in china: Where does the filtering occur? In International Conference on Passive and Active Network Measurement (2011), Springer, pp. 133--142. Google ScholarGoogle ScholarDigital LibraryDigital Library
  53. Yang, Q., and Liu, Y. WhatâĂŹs on the other side of the great firewall? chinese web usersâĂŹ motivations for bypassing the internet censorship. Computers in human behavior 37 (2014), 249--257. Google ScholarGoogle ScholarDigital LibraryDigital Library
  54. Zittrain, J., Budish, R., and Faris, R. Herdict: Help spot web blockages, 2014.Google ScholarGoogle Scholar
  55. Zittrain, J., and Edelman, B. Internet filtering in china. IEEE Internet Computing 7, 2 (2003), 70--77. Google ScholarGoogle ScholarDigital LibraryDigital Library

Recommendations

Comments

Login options

Check if you have access through your login credentials or your institution to get full access on this article.

Sign in
  • Published in

    cover image ACM Conferences
    IMC '18: Proceedings of the Internet Measurement Conference 2018
    October 2018
    507 pages
    ISBN:9781450356190
    DOI:10.1145/3278532

    Copyright © 2018 ACM

    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    • Published: 31 October 2018

    Permissions

    Request permissions about this article.

    Request Permissions

    Check for updates

    Qualifiers

    • research-article
    • Research
    • Refereed limited

    Acceptance Rates

    Overall Acceptance Rate277of1,083submissions,26%

    Upcoming Conference

    IMC '24
    ACM Internet Measurement Conference
    November 4 - 6, 2024
    Madrid , AA , Spain

PDF Format

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader