Subscribe free to our newsletters via your
. Military Space News .




CYBER WARS
How to avoid data going through undesired countries
by Staff Writers
College Park MD (SPX) Aug 20, 2015


Information transmitted over the Internet, such as website requests or email content, is broken into packets and sent through a series of routers on the way to its destination. However, users have very little control over what parts of the world these packets traverse.

Censorship is one of the greatest threats to open communication on the Internet. Information may be censored by a user's country of residence or the information's desired destination. But recent studies show that censorship by countries through which the data travels along its route is also a danger.

Now, computer scientists at the University of Maryland have developed a method for providing concrete proof to Internet users that their information did not cross through certain geographic areas. The new system offers advantages over existing systems: it is immediately deployable and does not require knowledge of--or modifications to--the Internet's routing hardware or policies.

"With recent events, such as censorship of Internet traffic, suspicious 'boomerang routing' where data leaves a region only to come back again, and monitoring of users' data, we became increasingly interested in this notion of empowering users to have more control over what happens with their data," says project lead Dave Levin, an assistant research scientist in the University of Maryland Institute for Advanced Computer Studies (UMIACS).

This new system, called Alibi Routing, will be presented on August 20, 2015, at the Association for Computing Machinery Special Interest Group on Data Communication (ACM SIGCOMM) conference in London. Levin teamed with associate professor Neil Spring and professor Bobby Bhattacharjee, who have appointments in UMD's Department of Computer Science and UMIACS, on the paper.

Information transmitted over the Internet, such as website requests or email content, is broken into packets and sent through a series of routers on the way to its destination. However, users have very little control over what parts of the world these packets traverse.

Some parts of the world have been known to modify data returned to users, thus censoring content. In 2012, researchers demonstrated that Domain Name System (DNS) queries that merely pass through China's borders are subject to the same risk as if the requests came from one of the country's own residents.

To evaluate their Alibi Routing method, the researchers simulated a network with 20,000 participants and selected forbidden regions from the 2012 "Enemies of the Internet" report published by Reporters Without Borders--China, Syria, North Korea and Saudi Arabia--as well as the three other countries with the highest number of Internet users at the time of the study--the United States, China and Japan.

Alibi Routing works by searching a peer-to-peer network to locate "peers"--other users running the alibi routing software--that can relay a user's packets to its ultimate destination while avoiding specified forbidden regions. The peer is called an "alibi." The alibi provides proof--calculations that exploit the fact that information cannot travel faster than the speed of light--that at a particular time, a packet was at a specific geographic location sufficiently far enough away from the forbidden areas that the data could not have entered them.

If successful, users receive proof that their information reached its desired destination and that it did not traverse the forbidden regions. Alternatively, the response could indicate that the packets may have traversed forbidden areas.

Levin says the success rate for Alibi Routing depends on a few things, including how close the source and destination are to the forbidden region and how central the forbidden region is to Internet routing.

"There's also a safety parameter that we use. Basically, it's a way for users to select a desired level of confidence that the packet absolutely does not traverse the forbidden region," Levin says. "The larger the safety parameter, the harder it is to find an alibi. The smaller the safety parameter, the easier it is to find an alibi."

Based on simulated deployments, the system successfully found an alibi more than 85 percent of the time. With a small safety parameter, the success rate rose to 95 percent. The results suggest that users can typically avoid the part of the world they wish to route around, according to Levin.

Users do not always need an alibi, though. If two users are in the same room in Maryland and they want their information to avoid China, they don't need an alibi to help them; they can just send the data directly to one another and measure the time it takes to do so.

"For some of the countries we tested, we only needed an alibi about one-third of the time" says Levin.

The team plans to release a version of Alibi Routing--likely as an Internet browser plug-in--for users to test by the end of 2015.

"The more participants this type of peer-to-peer system has in different geographical locations, the more useful it will be," says Levin.

The conference paper, "Alibi Routing," Dave Levin, Youndo Lee, Luke Valenta, Zhihao Li, Victoria Lai, Cristian Lumezanu, Neil Spring, Bobby Bhattacharjee, was presented August 20, 2015 at ACM SIGCOMM in London


Thanks for being here;
We need your help. The SpaceDaily news network continues to grow but revenues have never been harder to maintain.

With the rise of Ad Blockers, and Facebook - our traditional revenue sources via quality network advertising continues to decline. And unlike so many other news sites, we don't have a paywall - with those annoying usernames and passwords.

Our news coverage takes time and effort to publish 365 days a year.

If you find our news sites informative and useful then please consider becoming a regular supporter or for now make a one off contribution.
SpaceDaily Contributor
$5 Billed Once


credit card or paypal
SpaceDaily Monthly Supporter
$5 Billed Monthly


paypal only


.


Related Links
University of Maryland
Cyberwar - Internet Security News - Systems and Policy Issues






Comment on this article via your Facebook, Yahoo, AOL, Hotmail login.

Share this article via these popular social media networks
del.icio.usdel.icio.us DiggDigg RedditReddit GoogleGoogle




Memory Foam Mattress Review
Newsletters :: SpaceDaily :: SpaceWar :: TerraDaily :: Energy Daily
XML Feeds :: Space News :: Earth News :: War News :: Solar Energy News





CYBER WARS
Kerry says China and Russia 'very likely' reading his emails
Washington (AFP) Aug 12, 2015
US Secretary of State John Kerry accused China and Russia of "very likely" reading his emails Tuesday, adding that the US has and will continue to discuss cyber attacks with China. "The answer is it is very likely. It is not ... outside the realm of possibility, and we know that they have attacked a number of American interests over the course of the last days," Kerry said on the TV show CBS ... read more


CYBER WARS
Japan requests Aegis systems for new destroyers

US to withdraw Patriot missiles from Turkey in October

Canada to Buy Israeli Iron Dome Technology

Saudis to acquire hundreds of advanced Patriot missiles

CYBER WARS
Lockheed Martin expands cruise missile production plant

Almaz-Antey Launches Next Generation Buk Missile Into Development

Modified SM-6 missile demos new capability

Latvia to buy Stinger ground-to-air missiles from US

CYBER WARS
Google Drone Project Skirts US Regulations With a Little Help From NASA

Aerial Assault drone is armed with hacking weapons

Russian recon-strike drone to be unveiled at MAKS Airshow

Brand New Russian, Chinese Hypersonic Weapons Unnerve US

CYBER WARS
Army funds testing of upgrade to communications system

General Dynamics delivering more digital modular radios to Navy

Navy gives Serco task order for installation of C4ISR systems

Communications satellite system ready for military use

CYBER WARS
Australian troops getting new field gear

European Defense Agency orders counter-IED facility from Indra

Meggitt to upgrade British military training systems

Harris to support Navy efforts for counter-mine measures

CYBER WARS
Nigeria to step up local arms manufacture in Boko Haram fight

French defence minister visits Cairo after warplane deal

Britain extends Lockheed Martin military inventory contract

India clears $4.74 billion defence purchase

CYBER WARS
Three ex-Marines will raise US flag in Cuba, 54 years after lowering it

Finland triples training sessions for reservists

NATO denies it is making war more likely in Europe

Ukraine battles pro-Russian rebels for access to key port

CYBER WARS
Formation of swarms in nanosystems

High-precision control of nanoparticles for digital applications

Camera for the nano-cosmos

Growing graphene nanoribbons could enable fast efficient electronics




The content herein, unless otherwise known to be public domain, are Copyright 1995-2014 - Space Media Network. All websites are published in Australia and are solely subject to Australian law and governed by Fair Use principals for news reporting and research purposes. AFP, UPI and IANS news wire stories are copyright Agence France-Presse, United Press International and Indo-Asia News Service. ESA news reports are copyright European Space Agency. All NASA sourced material is public domain. Additional copyrights may apply in whole or part to other bona fide parties. Advertising does not imply endorsement, agreement or approval of any opinions, statements or information provided by Space Media Network on any Web page published or hosted by Space Media Network. Privacy Statement All images and articles appearing on Space Media Network have been edited or digitally altered in some way. Any requests to remove copyright material will be acted upon in a timely and appropriate manner. Any attempt to extort money from Space Media Network will be ignored and reported to Australian Law Enforcement Agencies as a potential case of financial fraud involving the use of a telephonic carriage device or postal service.