SWEET: Serving the Web by Exploiting Email Tunnels
Open communications over the Internet pose serious threats to countries with repressive regimes, leading them to develop and deploy censorship mechanisms within their networks. Unfortunately, existing censorship circumvention systems do not provide high availability guarantees to their users, as cen...
Gespeichert in:
Veröffentlicht in: | IEEE/ACM transactions on networking 2017-06, Vol.25 (3), p.1517-1527 |
---|---|
Hauptverfasser: | , , , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 1527 |
---|---|
container_issue | 3 |
container_start_page | 1517 |
container_title | IEEE/ACM transactions on networking |
container_volume | 25 |
creator | Houmansadr, Amir Wenxuan Zhou Caesar, Matthew Borisov, Nikita |
description | Open communications over the Internet pose serious threats to countries with repressive regimes, leading them to develop and deploy censorship mechanisms within their networks. Unfortunately, existing censorship circumvention systems do not provide high availability guarantees to their users, as censors can easily identify, hence disrupt, the traffic belonging to these systems using today's advanced censorship technologies. In this paper, we propose Serving the Web by Exploiting Email Tunnels (SWEET), a highly available censorship-resistant infrastructure. SWEET works by encapsulating a censored user's traffic inside email messages that are carried over public email services like Gmail and Yahoo Mail. As the operation of SWEET is not bound to any specific email provider, we argue that a censor will need to block email communications all together in order to disrupt SWEET, which is unlikely as email constitutes an important part of today's Internet. Through experiments with a prototype of our system, we find that SWEET's performance is sufficient for Web browsing. In particular, regular Websites are downloaded within couple of seconds. |
doi_str_mv | 10.1109/TNET.2016.2640238 |
format | Article |
fullrecord | <record><control><sourceid>proquest_RIE</sourceid><recordid>TN_cdi_ieee_primary_7819465</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>7819465</ieee_id><sourcerecordid>2174474839</sourcerecordid><originalsourceid>FETCH-LOGICAL-c336t-1545ffdcb3e85e5a1836f9128f33d64355ba44d10aaebfff67fc05e054e9d9bc3</originalsourceid><addsrcrecordid>eNo9kE1Lw0AQhhdRsFZ_gHgJeE7d2a_sepOSqlD00EiPSz5mNSVN6m4q9t-b0OJpXobnnYGHkFugMwBqHrK3NJsxCmrGlKCM6zMyASl1zKRS50OmisdKGXZJrkLYUAqcMjUhbLVO0-wxWqH_qdvPqP_CaI1FVByi9HfXdHU_btNtXjdRtm9bbMI1uXB5E_DmNKfkY5Fm85d4-f78On9axiXnqo9BCulcVRYctUSZg-bKGWDacV4pwaUsciEqoHmOhXNOJa6kEqkUaCpTlHxK7o93d7773mPo7abb-3Z4aRkkQiRCczNQcKRK34Xg0dmdr7e5P1igdlRjRzV2VGNPaobO3bFTI-I_n2gwQkn-B1jSXgA</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2174474839</pqid></control><display><type>article</type><title>SWEET: Serving the Web by Exploiting Email Tunnels</title><source>IEEE Electronic Library (IEL)</source><creator>Houmansadr, Amir ; Wenxuan Zhou ; Caesar, Matthew ; Borisov, Nikita</creator><creatorcontrib>Houmansadr, Amir ; Wenxuan Zhou ; Caesar, Matthew ; Borisov, Nikita</creatorcontrib><description>Open communications over the Internet pose serious threats to countries with repressive regimes, leading them to develop and deploy censorship mechanisms within their networks. Unfortunately, existing censorship circumvention systems do not provide high availability guarantees to their users, as censors can easily identify, hence disrupt, the traffic belonging to these systems using today's advanced censorship technologies. In this paper, we propose Serving the Web by Exploiting Email Tunnels (SWEET), a highly available censorship-resistant infrastructure. SWEET works by encapsulating a censored user's traffic inside email messages that are carried over public email services like Gmail and Yahoo Mail. As the operation of SWEET is not bound to any specific email provider, we argue that a censor will need to block email communications all together in order to disrupt SWEET, which is unlikely as email constitutes an important part of today's Internet. Through experiments with a prototype of our system, we find that SWEET's performance is sufficient for Web browsing. In particular, regular Websites are downloaded within couple of seconds.</description><identifier>ISSN: 1063-6692</identifier><identifier>EISSN: 1558-2566</identifier><identifier>DOI: 10.1109/TNET.2016.2640238</identifier><identifier>CODEN: IEANEP</identifier><language>eng</language><publisher>New York: IEEE</publisher><subject>Browsing ; Censorship ; Censorship circumvention ; Electronic mail ; email communications ; Internet ; IP (Internet Protocol) ; IP networks ; Protocols ; Prototypes ; Servers ; traffic encapsulation ; Websites</subject><ispartof>IEEE/ACM transactions on networking, 2017-06, Vol.25 (3), p.1517-1527</ispartof><rights>Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2017</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c336t-1545ffdcb3e85e5a1836f9128f33d64355ba44d10aaebfff67fc05e054e9d9bc3</citedby><cites>FETCH-LOGICAL-c336t-1545ffdcb3e85e5a1836f9128f33d64355ba44d10aaebfff67fc05e054e9d9bc3</cites><orcidid>0000-0002-7553-6657</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/7819465$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>314,780,784,796,27924,27925,54758</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/7819465$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Houmansadr, Amir</creatorcontrib><creatorcontrib>Wenxuan Zhou</creatorcontrib><creatorcontrib>Caesar, Matthew</creatorcontrib><creatorcontrib>Borisov, Nikita</creatorcontrib><title>SWEET: Serving the Web by Exploiting Email Tunnels</title><title>IEEE/ACM transactions on networking</title><addtitle>TNET</addtitle><description>Open communications over the Internet pose serious threats to countries with repressive regimes, leading them to develop and deploy censorship mechanisms within their networks. Unfortunately, existing censorship circumvention systems do not provide high availability guarantees to their users, as censors can easily identify, hence disrupt, the traffic belonging to these systems using today's advanced censorship technologies. In this paper, we propose Serving the Web by Exploiting Email Tunnels (SWEET), a highly available censorship-resistant infrastructure. SWEET works by encapsulating a censored user's traffic inside email messages that are carried over public email services like Gmail and Yahoo Mail. As the operation of SWEET is not bound to any specific email provider, we argue that a censor will need to block email communications all together in order to disrupt SWEET, which is unlikely as email constitutes an important part of today's Internet. Through experiments with a prototype of our system, we find that SWEET's performance is sufficient for Web browsing. In particular, regular Websites are downloaded within couple of seconds.</description><subject>Browsing</subject><subject>Censorship</subject><subject>Censorship circumvention</subject><subject>Electronic mail</subject><subject>email communications</subject><subject>Internet</subject><subject>IP (Internet Protocol)</subject><subject>IP networks</subject><subject>Protocols</subject><subject>Prototypes</subject><subject>Servers</subject><subject>traffic encapsulation</subject><subject>Websites</subject><issn>1063-6692</issn><issn>1558-2566</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2017</creationdate><recordtype>article</recordtype><sourceid>RIE</sourceid><recordid>eNo9kE1Lw0AQhhdRsFZ_gHgJeE7d2a_sepOSqlD00EiPSz5mNSVN6m4q9t-b0OJpXobnnYGHkFugMwBqHrK3NJsxCmrGlKCM6zMyASl1zKRS50OmisdKGXZJrkLYUAqcMjUhbLVO0-wxWqH_qdvPqP_CaI1FVByi9HfXdHU_btNtXjdRtm9bbMI1uXB5E_DmNKfkY5Fm85d4-f78On9axiXnqo9BCulcVRYctUSZg-bKGWDacV4pwaUsciEqoHmOhXNOJa6kEqkUaCpTlHxK7o93d7773mPo7abb-3Z4aRkkQiRCczNQcKRK34Xg0dmdr7e5P1igdlRjRzV2VGNPaobO3bFTI-I_n2gwQkn-B1jSXgA</recordid><startdate>201706</startdate><enddate>201706</enddate><creator>Houmansadr, Amir</creator><creator>Wenxuan Zhou</creator><creator>Caesar, Matthew</creator><creator>Borisov, Nikita</creator><general>IEEE</general><general>The Institute of Electrical and Electronics Engineers, Inc. (IEEE)</general><scope>97E</scope><scope>RIA</scope><scope>RIE</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>7SP</scope><scope>8FD</scope><scope>JQ2</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><orcidid>https://orcid.org/0000-0002-7553-6657</orcidid></search><sort><creationdate>201706</creationdate><title>SWEET: Serving the Web by Exploiting Email Tunnels</title><author>Houmansadr, Amir ; Wenxuan Zhou ; Caesar, Matthew ; Borisov, Nikita</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c336t-1545ffdcb3e85e5a1836f9128f33d64355ba44d10aaebfff67fc05e054e9d9bc3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2017</creationdate><topic>Browsing</topic><topic>Censorship</topic><topic>Censorship circumvention</topic><topic>Electronic mail</topic><topic>email communications</topic><topic>Internet</topic><topic>IP (Internet Protocol)</topic><topic>IP networks</topic><topic>Protocols</topic><topic>Prototypes</topic><topic>Servers</topic><topic>traffic encapsulation</topic><topic>Websites</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Houmansadr, Amir</creatorcontrib><creatorcontrib>Wenxuan Zhou</creatorcontrib><creatorcontrib>Caesar, Matthew</creatorcontrib><creatorcontrib>Borisov, Nikita</creatorcontrib><collection>IEEE All-Society Periodicals Package (ASPP) 2005-present</collection><collection>IEEE All-Society Periodicals Package (ASPP) 1998-Present</collection><collection>IEEE Electronic Library (IEL)</collection><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Electronics & Communications Abstracts</collection><collection>Technology Research Database</collection><collection>ProQuest Computer Science Collection</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><jtitle>IEEE/ACM transactions on networking</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Houmansadr, Amir</au><au>Wenxuan Zhou</au><au>Caesar, Matthew</au><au>Borisov, Nikita</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>SWEET: Serving the Web by Exploiting Email Tunnels</atitle><jtitle>IEEE/ACM transactions on networking</jtitle><stitle>TNET</stitle><date>2017-06</date><risdate>2017</risdate><volume>25</volume><issue>3</issue><spage>1517</spage><epage>1527</epage><pages>1517-1527</pages><issn>1063-6692</issn><eissn>1558-2566</eissn><coden>IEANEP</coden><abstract>Open communications over the Internet pose serious threats to countries with repressive regimes, leading them to develop and deploy censorship mechanisms within their networks. Unfortunately, existing censorship circumvention systems do not provide high availability guarantees to their users, as censors can easily identify, hence disrupt, the traffic belonging to these systems using today's advanced censorship technologies. In this paper, we propose Serving the Web by Exploiting Email Tunnels (SWEET), a highly available censorship-resistant infrastructure. SWEET works by encapsulating a censored user's traffic inside email messages that are carried over public email services like Gmail and Yahoo Mail. As the operation of SWEET is not bound to any specific email provider, we argue that a censor will need to block email communications all together in order to disrupt SWEET, which is unlikely as email constitutes an important part of today's Internet. Through experiments with a prototype of our system, we find that SWEET's performance is sufficient for Web browsing. In particular, regular Websites are downloaded within couple of seconds.</abstract><cop>New York</cop><pub>IEEE</pub><doi>10.1109/TNET.2016.2640238</doi><tpages>11</tpages><orcidid>https://orcid.org/0000-0002-7553-6657</orcidid><oa>free_for_read</oa></addata></record> |
fulltext | fulltext_linktorsrc |
identifier | ISSN: 1063-6692 |
ispartof | IEEE/ACM transactions on networking, 2017-06, Vol.25 (3), p.1517-1527 |
issn | 1063-6692 1558-2566 |
language | eng |
recordid | cdi_ieee_primary_7819465 |
source | IEEE Electronic Library (IEL) |
subjects | Browsing Censorship Censorship circumvention Electronic mail email communications Internet IP (Internet Protocol) IP networks Protocols Prototypes Servers traffic encapsulation Websites |
title | SWEET: Serving the Web by Exploiting Email Tunnels |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-19T14%3A04%3A01IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_RIE&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=SWEET:%20Serving%20the%20Web%20by%20Exploiting%20Email%20Tunnels&rft.jtitle=IEEE/ACM%20transactions%20on%20networking&rft.au=Houmansadr,%20Amir&rft.date=2017-06&rft.volume=25&rft.issue=3&rft.spage=1517&rft.epage=1527&rft.pages=1517-1527&rft.issn=1063-6692&rft.eissn=1558-2566&rft.coden=IEANEP&rft_id=info:doi/10.1109/TNET.2016.2640238&rft_dat=%3Cproquest_RIE%3E2174474839%3C/proquest_RIE%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2174474839&rft_id=info:pmid/&rft_ieee_id=7819465&rfr_iscdi=true |