Subscribe free to our newsletters via your
. 24/7 Space News .




CYBER WARS
How to avoid data going through undesired countries
by Staff Writers
College Park MD (SPX) Aug 20, 2015


Information transmitted over the Internet, such as website requests or email content, is broken into packets and sent through a series of routers on the way to its destination. However, users have very little control over what parts of the world these packets traverse.

Censorship is one of the greatest threats to open communication on the Internet. Information may be censored by a user's country of residence or the information's desired destination. But recent studies show that censorship by countries through which the data travels along its route is also a danger.

Now, computer scientists at the University of Maryland have developed a method for providing concrete proof to Internet users that their information did not cross through certain geographic areas. The new system offers advantages over existing systems: it is immediately deployable and does not require knowledge of--or modifications to--the Internet's routing hardware or policies.

"With recent events, such as censorship of Internet traffic, suspicious 'boomerang routing' where data leaves a region only to come back again, and monitoring of users' data, we became increasingly interested in this notion of empowering users to have more control over what happens with their data," says project lead Dave Levin, an assistant research scientist in the University of Maryland Institute for Advanced Computer Studies (UMIACS).

This new system, called Alibi Routing, will be presented on August 20, 2015, at the Association for Computing Machinery Special Interest Group on Data Communication (ACM SIGCOMM) conference in London. Levin teamed with associate professor Neil Spring and professor Bobby Bhattacharjee, who have appointments in UMD's Department of Computer Science and UMIACS, on the paper.

Information transmitted over the Internet, such as website requests or email content, is broken into packets and sent through a series of routers on the way to its destination. However, users have very little control over what parts of the world these packets traverse.

Some parts of the world have been known to modify data returned to users, thus censoring content. In 2012, researchers demonstrated that Domain Name System (DNS) queries that merely pass through China's borders are subject to the same risk as if the requests came from one of the country's own residents.

To evaluate their Alibi Routing method, the researchers simulated a network with 20,000 participants and selected forbidden regions from the 2012 "Enemies of the Internet" report published by Reporters Without Borders--China, Syria, North Korea and Saudi Arabia--as well as the three other countries with the highest number of Internet users at the time of the study--the United States, China and Japan.

Alibi Routing works by searching a peer-to-peer network to locate "peers"--other users running the alibi routing software--that can relay a user's packets to its ultimate destination while avoiding specified forbidden regions. The peer is called an "alibi." The alibi provides proof--calculations that exploit the fact that information cannot travel faster than the speed of light--that at a particular time, a packet was at a specific geographic location sufficiently far enough away from the forbidden areas that the data could not have entered them.

If successful, users receive proof that their information reached its desired destination and that it did not traverse the forbidden regions. Alternatively, the response could indicate that the packets may have traversed forbidden areas.

Levin says the success rate for Alibi Routing depends on a few things, including how close the source and destination are to the forbidden region and how central the forbidden region is to Internet routing.

"There's also a safety parameter that we use. Basically, it's a way for users to select a desired level of confidence that the packet absolutely does not traverse the forbidden region," Levin says. "The larger the safety parameter, the harder it is to find an alibi. The smaller the safety parameter, the easier it is to find an alibi."

Based on simulated deployments, the system successfully found an alibi more than 85 percent of the time. With a small safety parameter, the success rate rose to 95 percent. The results suggest that users can typically avoid the part of the world they wish to route around, according to Levin.

Users do not always need an alibi, though. If two users are in the same room in Maryland and they want their information to avoid China, they don't need an alibi to help them; they can just send the data directly to one another and measure the time it takes to do so.

"For some of the countries we tested, we only needed an alibi about one-third of the time" says Levin.

The team plans to release a version of Alibi Routing--likely as an Internet browser plug-in--for users to test by the end of 2015.

"The more participants this type of peer-to-peer system has in different geographical locations, the more useful it will be," says Levin.

The conference paper, "Alibi Routing," Dave Levin, Youndo Lee, Luke Valenta, Zhihao Li, Victoria Lai, Cristian Lumezanu, Neil Spring, Bobby Bhattacharjee, was presented August 20, 2015 at ACM SIGCOMM in London


Thanks for being here;
We need your help. The SpaceDaily news network continues to grow but revenues have never been harder to maintain.

With the rise of Ad Blockers, and Facebook - our traditional revenue sources via quality network advertising continues to decline. And unlike so many other news sites, we don't have a paywall - with those annoying usernames and passwords.

Our news coverage takes time and effort to publish 365 days a year.

If you find our news sites informative and useful then please consider becoming a regular supporter or for now make a one off contribution.
SpaceDaily Contributor
$5 Billed Once


credit card or paypal
SpaceDaily Monthly Supporter
$5 Billed Monthly


paypal only


.


Related Links
University of Maryland
Cyberwar - Internet Security News - Systems and Policy Issues






Comment on this article via your Facebook, Yahoo, AOL, Hotmail login.

Share this article via these popular social media networks
del.icio.usdel.icio.us DiggDigg RedditReddit GoogleGoogle




Memory Foam Mattress Review
Newsletters :: SpaceDaily :: SpaceWar :: TerraDaily :: Energy Daily
XML Feeds :: Space News :: Earth News :: War News :: Solar Energy News





CYBER WARS
Kerry says China and Russia 'very likely' reading his emails
Washington (AFP) Aug 12, 2015
US Secretary of State John Kerry accused China and Russia of "very likely" reading his emails Tuesday, adding that the US has and will continue to discuss cyber attacks with China. "The answer is it is very likely. It is not ... outside the realm of possibility, and we know that they have attacked a number of American interests over the course of the last days," Kerry said on the TV show CBS ... read more


CYBER WARS
From a million miles away, NASA camera shows moon crossing face of Earth

Russia to conduct simulated flight program to Moon, Mars over 4 years

NASA Could Return Humans to the Moon by 2021

Smithsonian embraces crowdfunding to preserve lunar spacesuit

CYBER WARS
One Decade after Launch, Mars Orbiter Still Going Strong

One Decade after Launch, Mars Orbiter Still Going Strong

Salt flat indicates some of the last vestiges of surface water on Mars

Mars Rovers and the Last Moonwalker to Invade Poland in September

CYBER WARS
First Time Ever: ISS Crew Eats Food Grown in Outer Space

Gecko Grippers Moving On Up

US, Russia, China to Explore Benefits of Outer Space for ASEAN

First bite of space-grown lettuce is 'awesome'

CYBER WARS
China's space exploration potential has US chasing its own tail

China to deploy space-air-ground sensors for environment protection

Chinese earth station is for exclusively scientific and civilian purposes

Cooperation in satellite technology put Belgium, China to forefront

CYBER WARS
Electrical Glitch in US Sector of ISS Fixed

First Use of ISS Astronaut Pictures for Light Pollution Studies

ISS to Open Research Facility for Materials Science Research by 2017

NASA renews $490M contract with Russian Space Agency

CYBER WARS
NASA selects contractor to prepare launch structure for SLS

ILS concludes Proton launch failure investigation

Intelsat 34 fueled for heavy-lift mission with Ariane 5

India to launch 9 US satellites in 2015, 2016

CYBER WARS
Astronomers discover 'young Jupiter' exoplanet

Tenth transiting 'Tatooine'

Astronomers discover new planet orbiting two stars

Scientists solve planetary ring riddle

CYBER WARS
Gaming fans resurrect beloved 1980s ZX Spectrum in UK

Surprising discoveries about 2-D molybdenum disulfide

Advancing the Next Revolution of "Stuff"

Snake scales protect steel against friction




The content herein, unless otherwise known to be public domain, are Copyright 1995-2014 - Space Media Network. All websites are published in Australia and are solely subject to Australian law and governed by Fair Use principals for news reporting and research purposes. AFP, UPI and IANS news wire stories are copyright Agence France-Presse, United Press International and Indo-Asia News Service. ESA news reports are copyright European Space Agency. All NASA sourced material is public domain. Additional copyrights may apply in whole or part to other bona fide parties. Advertising does not imply endorsement, agreement or approval of any opinions, statements or information provided by Space Media Network on any Web page published or hosted by Space Media Network. Privacy Statement All images and articles appearing on Space Media Network have been edited or digitally altered in some way. Any requests to remove copyright material will be acted upon in a timely and appropriate manner. Any attempt to extort money from Space Media Network will be ignored and reported to Australian Law Enforcement Agencies as a potential case of financial fraud involving the use of a telephonic carriage device or postal service.