Analysing Censorship Circumvention with VPNs via DNS Cache Snooping

07/09/2019
by   Oliver Farnan, et al.
0

Anecdotal evidence suggests an increasing number of people are turning to VPN services for the properties of privacy, anonymity and free communication over the internet. Despite this, there is little research into what these services are actually being used for. We use DNS cache snooping to determine what domains people are accessing through VPNs. This technique is used to discover whether certain queries have been made against a particular DNS server. Some VPNs operate their own DNS servers, ensuring that any cached queries were made by users of the VPN. We explore 3 methods of DNS cache snooping and briefly discuss their strengths and limitations. Using the most reliable of the methods, we perform a DNS cache snooping scan against the DNS servers of several major VPN providers. With this we discover which domains are actually accessed through VPNs. We run this technique against popular domains, as well as those known to be censored in certain countries; China, Indonesia, Iran, and Turkey. Our work gives a glimpse into what users use VPNs for, and provides a technique for discovering the frequency with which domain records are accessed on a DNS server.

READ FULL TEXT

page 4

page 5

research
12/02/2017

Coded Caching in a Multi-Server System with Random Topology

Cache-aided content delivery is studied in a multi-server system with K ...
research
09/19/2019

Cache Optimization for Sharing Intensive Workloads on Multi-socket Multi-core servers

Major chip manufacturers have all introduced multicore microprocessors. ...
research
03/09/2020

Coded Caching in Multi-server System with Random Topology

Cache-aided content delivery is studied in a multi-server system with P ...
research
01/27/2022

Multi-Access Cache-Aided Multi-User Private Information Retrieval

We consider the problem of multi-access cache-aided multi-user Private I...
research
06/03/2019

Cache Contention on Multicore Systems: An Ontology-based Approach

Multicore processors have proved to be the right choice for both desktop...
research
05/11/2022

Injection Attacks Reloaded: Tunnelling Malicious Payloads over DNS

The traditional design principle for Internet protocols indicates: "Be s...
research
05/21/2022

SERVFAIL: The Unintended Consequences of Algorithm Agility in DNSSEC

Cryptographic algorithm agility is an important property for DNSSEC: it ...

Please sign up or login with your details

Forgot password? Click here to reset