SWEET: Serving the Web by Exploiting Email Tunnels

Open communications over the Internet pose serious threats to countries with repressive regimes, leading them to develop and deploy censorship mechanisms within their networks. Unfortunately, existing censorship circumvention systems do not provide high availability guarantees to their users, as cen...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:IEEE/ACM transactions on networking 2017-06, Vol.25 (3), p.1517-1527
Hauptverfasser: Houmansadr, Amir, Wenxuan Zhou, Caesar, Matthew, Borisov, Nikita
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 1527
container_issue 3
container_start_page 1517
container_title IEEE/ACM transactions on networking
container_volume 25
creator Houmansadr, Amir
Wenxuan Zhou
Caesar, Matthew
Borisov, Nikita
description Open communications over the Internet pose serious threats to countries with repressive regimes, leading them to develop and deploy censorship mechanisms within their networks. Unfortunately, existing censorship circumvention systems do not provide high availability guarantees to their users, as censors can easily identify, hence disrupt, the traffic belonging to these systems using today's advanced censorship technologies. In this paper, we propose Serving the Web by Exploiting Email Tunnels (SWEET), a highly available censorship-resistant infrastructure. SWEET works by encapsulating a censored user's traffic inside email messages that are carried over public email services like Gmail and Yahoo Mail. As the operation of SWEET is not bound to any specific email provider, we argue that a censor will need to block email communications all together in order to disrupt SWEET, which is unlikely as email constitutes an important part of today's Internet. Through experiments with a prototype of our system, we find that SWEET's performance is sufficient for Web browsing. In particular, regular Websites are downloaded within couple of seconds.
doi_str_mv 10.1109/TNET.2016.2640238
format Article
fullrecord <record><control><sourceid>proquest_RIE</sourceid><recordid>TN_cdi_ieee_primary_7819465</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>7819465</ieee_id><sourcerecordid>2174474839</sourcerecordid><originalsourceid>FETCH-LOGICAL-c336t-1545ffdcb3e85e5a1836f9128f33d64355ba44d10aaebfff67fc05e054e9d9bc3</originalsourceid><addsrcrecordid>eNo9kE1Lw0AQhhdRsFZ_gHgJeE7d2a_sepOSqlD00EiPSz5mNSVN6m4q9t-b0OJpXobnnYGHkFugMwBqHrK3NJsxCmrGlKCM6zMyASl1zKRS50OmisdKGXZJrkLYUAqcMjUhbLVO0-wxWqH_qdvPqP_CaI1FVByi9HfXdHU_btNtXjdRtm9bbMI1uXB5E_DmNKfkY5Fm85d4-f78On9axiXnqo9BCulcVRYctUSZg-bKGWDacV4pwaUsciEqoHmOhXNOJa6kEqkUaCpTlHxK7o93d7773mPo7abb-3Z4aRkkQiRCczNQcKRK34Xg0dmdr7e5P1igdlRjRzV2VGNPaobO3bFTI-I_n2gwQkn-B1jSXgA</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2174474839</pqid></control><display><type>article</type><title>SWEET: Serving the Web by Exploiting Email Tunnels</title><source>IEEE Electronic Library (IEL)</source><creator>Houmansadr, Amir ; Wenxuan Zhou ; Caesar, Matthew ; Borisov, Nikita</creator><creatorcontrib>Houmansadr, Amir ; Wenxuan Zhou ; Caesar, Matthew ; Borisov, Nikita</creatorcontrib><description>Open communications over the Internet pose serious threats to countries with repressive regimes, leading them to develop and deploy censorship mechanisms within their networks. Unfortunately, existing censorship circumvention systems do not provide high availability guarantees to their users, as censors can easily identify, hence disrupt, the traffic belonging to these systems using today's advanced censorship technologies. In this paper, we propose Serving the Web by Exploiting Email Tunnels (SWEET), a highly available censorship-resistant infrastructure. SWEET works by encapsulating a censored user's traffic inside email messages that are carried over public email services like Gmail and Yahoo Mail. As the operation of SWEET is not bound to any specific email provider, we argue that a censor will need to block email communications all together in order to disrupt SWEET, which is unlikely as email constitutes an important part of today's Internet. Through experiments with a prototype of our system, we find that SWEET's performance is sufficient for Web browsing. In particular, regular Websites are downloaded within couple of seconds.</description><identifier>ISSN: 1063-6692</identifier><identifier>EISSN: 1558-2566</identifier><identifier>DOI: 10.1109/TNET.2016.2640238</identifier><identifier>CODEN: IEANEP</identifier><language>eng</language><publisher>New York: IEEE</publisher><subject>Browsing ; Censorship ; Censorship circumvention ; Electronic mail ; email communications ; Internet ; IP (Internet Protocol) ; IP networks ; Protocols ; Prototypes ; Servers ; traffic encapsulation ; Websites</subject><ispartof>IEEE/ACM transactions on networking, 2017-06, Vol.25 (3), p.1517-1527</ispartof><rights>Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2017</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c336t-1545ffdcb3e85e5a1836f9128f33d64355ba44d10aaebfff67fc05e054e9d9bc3</citedby><cites>FETCH-LOGICAL-c336t-1545ffdcb3e85e5a1836f9128f33d64355ba44d10aaebfff67fc05e054e9d9bc3</cites><orcidid>0000-0002-7553-6657</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/7819465$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>314,780,784,796,27924,27925,54758</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/7819465$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Houmansadr, Amir</creatorcontrib><creatorcontrib>Wenxuan Zhou</creatorcontrib><creatorcontrib>Caesar, Matthew</creatorcontrib><creatorcontrib>Borisov, Nikita</creatorcontrib><title>SWEET: Serving the Web by Exploiting Email Tunnels</title><title>IEEE/ACM transactions on networking</title><addtitle>TNET</addtitle><description>Open communications over the Internet pose serious threats to countries with repressive regimes, leading them to develop and deploy censorship mechanisms within their networks. Unfortunately, existing censorship circumvention systems do not provide high availability guarantees to their users, as censors can easily identify, hence disrupt, the traffic belonging to these systems using today's advanced censorship technologies. In this paper, we propose Serving the Web by Exploiting Email Tunnels (SWEET), a highly available censorship-resistant infrastructure. SWEET works by encapsulating a censored user's traffic inside email messages that are carried over public email services like Gmail and Yahoo Mail. As the operation of SWEET is not bound to any specific email provider, we argue that a censor will need to block email communications all together in order to disrupt SWEET, which is unlikely as email constitutes an important part of today's Internet. Through experiments with a prototype of our system, we find that SWEET's performance is sufficient for Web browsing. In particular, regular Websites are downloaded within couple of seconds.</description><subject>Browsing</subject><subject>Censorship</subject><subject>Censorship circumvention</subject><subject>Electronic mail</subject><subject>email communications</subject><subject>Internet</subject><subject>IP (Internet Protocol)</subject><subject>IP networks</subject><subject>Protocols</subject><subject>Prototypes</subject><subject>Servers</subject><subject>traffic encapsulation</subject><subject>Websites</subject><issn>1063-6692</issn><issn>1558-2566</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2017</creationdate><recordtype>article</recordtype><sourceid>RIE</sourceid><recordid>eNo9kE1Lw0AQhhdRsFZ_gHgJeE7d2a_sepOSqlD00EiPSz5mNSVN6m4q9t-b0OJpXobnnYGHkFugMwBqHrK3NJsxCmrGlKCM6zMyASl1zKRS50OmisdKGXZJrkLYUAqcMjUhbLVO0-wxWqH_qdvPqP_CaI1FVByi9HfXdHU_btNtXjdRtm9bbMI1uXB5E_DmNKfkY5Fm85d4-f78On9axiXnqo9BCulcVRYctUSZg-bKGWDacV4pwaUsciEqoHmOhXNOJa6kEqkUaCpTlHxK7o93d7773mPo7abb-3Z4aRkkQiRCczNQcKRK34Xg0dmdr7e5P1igdlRjRzV2VGNPaobO3bFTI-I_n2gwQkn-B1jSXgA</recordid><startdate>201706</startdate><enddate>201706</enddate><creator>Houmansadr, Amir</creator><creator>Wenxuan Zhou</creator><creator>Caesar, Matthew</creator><creator>Borisov, Nikita</creator><general>IEEE</general><general>The Institute of Electrical and Electronics Engineers, Inc. (IEEE)</general><scope>97E</scope><scope>RIA</scope><scope>RIE</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>7SP</scope><scope>8FD</scope><scope>JQ2</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><orcidid>https://orcid.org/0000-0002-7553-6657</orcidid></search><sort><creationdate>201706</creationdate><title>SWEET: Serving the Web by Exploiting Email Tunnels</title><author>Houmansadr, Amir ; Wenxuan Zhou ; Caesar, Matthew ; Borisov, Nikita</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c336t-1545ffdcb3e85e5a1836f9128f33d64355ba44d10aaebfff67fc05e054e9d9bc3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2017</creationdate><topic>Browsing</topic><topic>Censorship</topic><topic>Censorship circumvention</topic><topic>Electronic mail</topic><topic>email communications</topic><topic>Internet</topic><topic>IP (Internet Protocol)</topic><topic>IP networks</topic><topic>Protocols</topic><topic>Prototypes</topic><topic>Servers</topic><topic>traffic encapsulation</topic><topic>Websites</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Houmansadr, Amir</creatorcontrib><creatorcontrib>Wenxuan Zhou</creatorcontrib><creatorcontrib>Caesar, Matthew</creatorcontrib><creatorcontrib>Borisov, Nikita</creatorcontrib><collection>IEEE All-Society Periodicals Package (ASPP) 2005-present</collection><collection>IEEE All-Society Periodicals Package (ASPP) 1998-Present</collection><collection>IEEE Electronic Library (IEL)</collection><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Electronics &amp; Communications Abstracts</collection><collection>Technology Research Database</collection><collection>ProQuest Computer Science Collection</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts – Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><jtitle>IEEE/ACM transactions on networking</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Houmansadr, Amir</au><au>Wenxuan Zhou</au><au>Caesar, Matthew</au><au>Borisov, Nikita</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>SWEET: Serving the Web by Exploiting Email Tunnels</atitle><jtitle>IEEE/ACM transactions on networking</jtitle><stitle>TNET</stitle><date>2017-06</date><risdate>2017</risdate><volume>25</volume><issue>3</issue><spage>1517</spage><epage>1527</epage><pages>1517-1527</pages><issn>1063-6692</issn><eissn>1558-2566</eissn><coden>IEANEP</coden><abstract>Open communications over the Internet pose serious threats to countries with repressive regimes, leading them to develop and deploy censorship mechanisms within their networks. Unfortunately, existing censorship circumvention systems do not provide high availability guarantees to their users, as censors can easily identify, hence disrupt, the traffic belonging to these systems using today's advanced censorship technologies. In this paper, we propose Serving the Web by Exploiting Email Tunnels (SWEET), a highly available censorship-resistant infrastructure. SWEET works by encapsulating a censored user's traffic inside email messages that are carried over public email services like Gmail and Yahoo Mail. As the operation of SWEET is not bound to any specific email provider, we argue that a censor will need to block email communications all together in order to disrupt SWEET, which is unlikely as email constitutes an important part of today's Internet. Through experiments with a prototype of our system, we find that SWEET's performance is sufficient for Web browsing. In particular, regular Websites are downloaded within couple of seconds.</abstract><cop>New York</cop><pub>IEEE</pub><doi>10.1109/TNET.2016.2640238</doi><tpages>11</tpages><orcidid>https://orcid.org/0000-0002-7553-6657</orcidid><oa>free_for_read</oa></addata></record>
fulltext fulltext_linktorsrc
identifier ISSN: 1063-6692
ispartof IEEE/ACM transactions on networking, 2017-06, Vol.25 (3), p.1517-1527
issn 1063-6692
1558-2566
language eng
recordid cdi_ieee_primary_7819465
source IEEE Electronic Library (IEL)
subjects Browsing
Censorship
Censorship circumvention
Electronic mail
email communications
Internet
IP (Internet Protocol)
IP networks
Protocols
Prototypes
Servers
traffic encapsulation
Websites
title SWEET: Serving the Web by Exploiting Email Tunnels
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-19T14%3A04%3A01IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_RIE&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=SWEET:%20Serving%20the%20Web%20by%20Exploiting%20Email%20Tunnels&rft.jtitle=IEEE/ACM%20transactions%20on%20networking&rft.au=Houmansadr,%20Amir&rft.date=2017-06&rft.volume=25&rft.issue=3&rft.spage=1517&rft.epage=1527&rft.pages=1517-1527&rft.issn=1063-6692&rft.eissn=1558-2566&rft.coden=IEANEP&rft_id=info:doi/10.1109/TNET.2016.2640238&rft_dat=%3Cproquest_RIE%3E2174474839%3C/proquest_RIE%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2174474839&rft_id=info:pmid/&rft_ieee_id=7819465&rfr_iscdi=true