Publication | Closed Access
Examining How the Great Firewall Discovers Hidden Circumvention Servers
103
Citations
16
References
2015
Year
Unknown Venue
EngineeringInformation SecurityNext-generation FirewallInformation ForensicsCyber CrimeCommunicationCensorshipActive ProbingNational Censorship InfrastructureNetwork SecurityInternet SecurityData PrivacyFirewall (Computing)Computer ScienceNetwork ForensicsData SecurityCryptographyCyberweaponSecuritySuspicious TrafficArts
Recently, the operators of the national censorship infrastructure of China began to employ "active probing" to detect and block the use of privacy tools. This probing works by passively monitoring the network for suspicious traffic, then actively probing the corresponding servers, and blocking any that are determined to run circumvention servers such as Tor.
| Year | Citations | |
|---|---|---|
Page 1
Page 1