Skip to content

e2ecensor/newDisguiser

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

73 Commits
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

newDisguiser

The newDisguiser is an extensive measurement build atop of Disguiser, an end-to-end, ground truth based framework for measuring Internet censorship.

To conduct the new experiments, the Disguiser is deployed and tested with multiple geo-distributed backend control servers. As such, within a country, the packets that carry the same test domain but with different destination IPs may be forced to traverse different border networks to identify the censorship activity on each path for one vantage point, thereby quantifying the censorship diversity caused by the different paths and ISP networks in one country.

Data

  • The explortary data includes identified results of censorship activities for the paths from one vantage points to each of multiple backend control servers. The proxy field specifies detailed information of vantage points who perform the tests (from ProxyRack's platform), including country, geolocation, ISP/ASN, etc. Each item also specifies the test domain and corresponding responses that are retrived from diverse destinations and thus routing pathes.
  • The collected raw data by this enhanced setting can be downloaded at here. The raw data is also processed data, but only with collected responses (e.g., static payload or manipulated responses) without the identification of censorship activities/types.

Analysis Code

The analysis scripts aim to identify the inconsistency experiened by different paths toward different backend control servers from one vantage point.

Code repository:

  • http_censorship.py: this code is for analyzing the total detected censorship and categorize by countries.
  • http_server_censorship.py: this code is utilized in the experiment for censorship measurements from distributed vantage points to control servers from different cloud services.
  • http_suspicious_server.py: this code is for analyzing censorship diversity in different paths from various vantage points towards control servers that belongs to different cloud services.
  • pinpoint_censor_auto.py: this code is for performing application traceroute and exhausting the sensitive domain list in every vantage point.

About

The newDisguiser is an extensive measurement build atop of Disguiser, an end-to-end, ground truth based framework for measuring Internet censorship.

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages