Repository logo

Infoscience

  • English
  • French
Log In
Logo EPFL, École polytechnique fédérale de Lausanne

Infoscience

  • English
  • French
Log In
  1. Home
  2. Academic and Research Output
  3. Conferences, Workshops, Symposiums, and Seminars
  4. Global, Passive Detection of Connection Tampering
 
conference paper

Global, Passive Detection of Connection Tampering

Raman, Ram Sundara
•
Merino, Louis-Henri Manuel Jakob  
•
Bock, Kevin
Show more
January 1, 2023
Proceedings Of The 2023 Acm Sigcomm 2023 Conference, Sigcomm 2023
ACM SIGCOMM Conference (SIGCOMM)

In-network devices around the world monitor and tamper with connections for many reasons, including intrusion prevention, combating spam or phishing, and country-level censorship. Connection tampering seeks to block access to specific domain names or keywords, and it affects billions of users worldwide with little-to-no transparency. To detect, diagnose, and measure connection-level blocking, "active" measurement techniques originate queries with domains or keywords believed to be blocked and send them from vantage points within networks of interest. Active measurement efforts have been critical to understanding how traffic tampering occurs, but they inherently are unable to capture critical parts of the picture. For instance, knowing the set of domains in a block-list (i.e., what could get blocked) is not the same as knowing what real users are actively experiencing (i.e., what is actively getting blocked).|We present the first global study of connection tampering through a passive analysis of traffic received at a global CDN, Cloudflare. We analyze a sample of traffic to all of Cloudflare's servers to construct the first comprehensive list of tampering signatures: sequences of packet headers that are indicative of connection tampering. We then apply these tampering signatures to analyze our global dataset of real user traffic, yielding a more comprehensive view of connection tampering than has been possible with active measurements alone. In particular, our passive analysis allows us to report on how connection tampering is actively affecting users and clients from virtually every network, without active probes, vantage points in difficult-to-reach networks and regions, or test lists (which we analyze for completeness against our results). Our study shows that passive measurement can be a powerful complement to active measurement in understanding connection tampering and improving transparency.

  • Details
  • Metrics
Type
conference paper
DOI
10.1145/3603269.3604875
Web of Science ID

WOS:001116971100042

Author(s)
Raman, Ram Sundara
Merino, Louis-Henri Manuel Jakob  
Bock, Kevin
Fayed, Marwan
Levin, Dave
Sullivan, Nick
Valenta, Luke
Corporate authors
ACM
Date Issued

2023-01-01

Publisher

Assoc Computing Machinery

Publisher place

New York

Published in
Proceedings Of The 2023 Acm Sigcomm 2023 Conference, Sigcomm 2023
ISBN of the book

979-8-4007-0236-5

Start page

622

End page

636

Subjects

Technology

•

Connection Tampering

•

Censorship

•

Measurement

Editorial or Peer reviewed

REVIEWED

Written at

EPFL

EPFL units
DEDIS  
Event nameEvent placeEvent date
ACM SIGCOMM Conference (SIGCOMM)

New York, NY

SEP 10-14, 2023

FunderGrant Number

NSF

CNS-1943240

Available on Infoscience
February 20, 2024
Use this identifier to reference this record
https://infoscience.epfl.ch/handle/20.500.14299/204719
Logo EPFL, École polytechnique fédérale de Lausanne
  • Contact
  • infoscience@epfl.ch

  • Follow us on Facebook
  • Follow us on Instagram
  • Follow us on LinkedIn
  • Follow us on X
  • Follow us on Youtube
AccessibilityLegal noticePrivacy policyCookie settingsEnd User AgreementGet helpFeedback

Infoscience is a service managed and provided by the Library and IT Services of EPFL. © EPFL, tous droits réservés