Monitoring Internet Censorship with UBICA

  • Giuseppe AcetoEmail author
  • Alessio Botta
  • Antonio Pescapè
  • Nick Feamster
  • M. Faheem Awan
  • Tahir Ahmad
  • Saad Qaisar
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 9053)


Censorship is becoming increasingly pervasive on the Internet, with the Open Net Initiative reporting nearly 50 countries practicing some form of censorship. Previous work has reported the existence of many forms of Internet censorship (e.g., DNS tampering, packet filtering, connection reset, content filtering), each of which may be composed to build a more comprehensive censorship system. Automated monitoring of censorship represents an important and challenging research problem, due to the continually evolving nature of the content that is censored and the means by which censorship is implemented. UBICA, User-based Internet Censorship Analysis, is a platform we implemented to solve this task leveraging crowdsourced data collection. By adopting an integrated and multi-step analysis, UBICA provides simple but effective means of revealing censorship events over time. UBICA has revealed the effect of several censorship techniques including DNS tampering and content filtering. Using UBICA, we demonstrate evidence of censorship in several selected countries (Italy, Pakistan, and South Korea), for which we obtained help from local users and manually validated the automated analysis.


Online Gaming Content Size Censorship Technique Internet Censorship Challenging Research Problem 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


  1. 1.
    Herdict Project.
  2. 2.
    Anderson, C.: Dimming the internet: Detecting throttling as a mechanism of censorship in iran. arXiv preprint arXiv:1306.4361
  3. 3.
    Chaabane, A., Chen, T., Cunche, M., Decristofaro, E., Friedman, A., Kaafar, M.A., et al.: Censorship in the wild: Analyzing internet filtering in syria. In: ACM SIGCOMM IMC (2014)Google Scholar
  4. 4.
    Chun, B., Culler, D., Roscoe, T., Bavier, A., Peterson, L., Wawrzoniak, M., Bowman, M.: Planetlab: an overlay testbed for broad-coverage services. ACM SIGCOMM Computer Communication Review 33(3), 3–12 (2003)CrossRefGoogle Scholar
  5. 5.
    Clayton, R.C., Murdoch, S.J., Watson, R.N.M.: Ignoring the great firewall of China. In: Danezis, G., Golle, P. (eds.) PET 2006. LNCS, vol. 4258, pp. 20–35. Springer, Heidelberg (2006) CrossRefGoogle Scholar
  6. 6.
    Cotton, M., Vegoda, L., Bonica, R., Haberman, B.: Special-Purpose IP Address Registries. RFC 6890 (Best Current Practice), April 2013Google Scholar
  7. 7.
    Dainotti, A., Squarcella, C., Aben, E., Claffy, K.C., Chiesa, M., Russo, M., Pescapé, A.: Analysis of country-wide internet outages caused by censorship. In: SIGCOMM, pp. 1–18. ACM (2011)Google Scholar
  8. 8.
    Dornseif, M.: Government mandated blocking of foreign web content (2003).
  9. 9.
    Eckersley, P.: How unique is your web browser? In: Atallah, M.J., Hopper, N.J. (eds.) PETS 2010. LNCS, vol. 6205, pp. 1–18. Springer, Heidelberg (2010) CrossRefGoogle Scholar
  10. 10.
    Filastò, A., Appelbaum, J.: Ooni: Open observatory of network interference. In: USENIX FOCI 2012 (2012)Google Scholar
  11. 11.
    Jones, B., Lee, T.W., Feamster, N., Gill, P.: Automated detection and fingerprinting of censorship block pages. In: ACM SIGCOMM IMC (2014)Google Scholar
  12. 12.
    Khattak, S., Javed, M., Khayam, S.A., Uzmi, Z.A., Paxson, V.: A look at the consequences of internet censorship through an ISP lens. In: ACM SIGCOMM IMC (2014)Google Scholar
  13. 13.
    Md Fudzee, M.F., Abawajy, J.: A classification for content adaptation system. In: iiWAS, pp. 426–429. ACM (2008)Google Scholar
  14. 14.
    Nabi, Z.: The anatomy of web censorship in pakistan. In: USENIX FOCI 2013 (2013)Google Scholar
  15. 15.
    Park, J.C., Crandall, J.R.: Empirical study of a national-scale distributed intrusion detection system: Backbone-level filtering of HTML responses in China. In: ICDCS, pp. 315–326. IEEE (2010)Google Scholar
  16. 16.
    Sfakianakis, A., Athanasopoulos, E., Ioannidis, S.: Censmon: A web censorship monitor. In: USENIX FOCI 2011 (2011)Google Scholar
  17. 17.
    Sundaresan, S., De Donato, W., Feamster, N., Teixeira, R., Crawford, S., Pescapè, A.: Measuring home broadband performance. CACM 55(11), 100–109 (2012)CrossRefGoogle Scholar
  18. 18.
    Verkamp, J.P., Gupta, M.: Inferring Mechanics of Web Censorship Around the World. In: FOCI. USENIX (2012)Google Scholar
  19. 19.
    Xu, X., Mao, Z.M., Halderman, J.A.: Internet censorship in china: where does the filtering occur? In: Spring, N., Riley, G.F. (eds.) PAM 2011. LNCS, vol. 6579, pp. 133–142. Springer, Heidelberg (2011) CrossRefGoogle Scholar

Copyright information

© IFIP International Federation for Information Processing 2015

Authors and Affiliations

  • Giuseppe Aceto
    • 1
    Email author
  • Alessio Botta
    • 1
  • Antonio Pescapè
    • 1
  • Nick Feamster
    • 2
  • M. Faheem Awan
    • 3
  • Tahir Ahmad
    • 3
  • Saad Qaisar
    • 3
  1. 1.University of Napoli Federico IINapoliItaly
  2. 2.Georgia Institute of TechnologyGAUSA
  3. 3.NUST SEECSIslamabadPakistan

Personalised recommendations