Module 10: AI Flashcards

(23 cards)

1
Q

What is DNS censorship?

A

Blocking or manipulating DNS queries to prevent users from resolving certain domain names.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the properties of GFW (Great Firewall of China)?

A

Large-scale, centralized, multi-layered filtering system using DNS injection, blocking, content inspection, and active probing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

How does DNS injection work?

A

A censor inserts spoofed or no response for a given domain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are the three steps involved in DNS injection?

A
  1. DNS probe sent to open DNS resolver
  2. Probe is checked against blocklist of domains or keywords
  3. Blocked domains/keywords return fake DNS A record
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

List five DNS censorship techniques and briefly describe their working principles.

A
  1. Packet dropping (drop DNS queries)
  2. DNS poisoning (inject forged responses)
  3. content inspection (block based on payload)
  4. blocking with resets (reset TCP connections)
  5. immediate reset of connections (terminate sessions quickly).
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which DNS censorship technique is susceptible to overblocking?

A

Packet dropping.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are the strengths and weaknesses of the ‘packet dropping’ technique?

A

Strong: simple and hard to bypass; Weak: causes collateral damage and overblocking.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are the strengths and weaknesses of the ‘DNS poisoning’ technique?

A

Strong: precise and persistent manipulation; Weak: block entire domain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are the strengths and weaknesses of the ‘content inspection’ technique?

A

Strong: precise, flexible
Weak: scalability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are the strengths and weaknesses of the ‘blocking with resets’ technique?

A

Strong: immediate stopping of connections
Weak: detectable and sometimes disrupts benign traffic.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are the strengths and weaknesses of the ‘immediate reset of connections’ technique?

A

Strong: fast and effective
Weak: easily identified and can be circumvented using encryption or retries.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Why is our understanding of censorship around the world limited?

A

Because of lack of transparency, regional variation, measurement difficulty, and political sensitivity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are the limitations of main censorship detection systems?

A
  • Diverse Measurements
  • Need for scale
  • Identifying the intent to restrict content access
  • Ethics and minimizing risks
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What kind of disruptions does Augur focus on identifying?

A

Routing-based connectivity disruptions across Autonomous Systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

How does Iris counter the issue of lack of diversity while studying DNS manipulation?

A

By using a global pool of DNS resolvers and comparing responses across regions via annotation and clustering.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are the steps involved in the global measurement process using DNS resolvers?

A
  1. Scan IPv4 space for open DNS resolvers
  2. Identifying infrastructure DNS resolvers
    1. Global DNS queries
    2. Annotate responses with auxillary information
    3. Additional PTR and TLS scanning
17
Q

What metrics does Iris use to identify DNS manipulation?

A
  • Consistency
    • IP
    • AS
    • HTTP Content
    • HTTPS Certificate
    • PTRs for CDN
  • Independent verifiability
    • SSL certificates
18
Q

How to identify DNS manipulation via machine learning with Iris?

A

Train classifiers on labeled resolver responses using extracted features to detect abnormal patterns.

19
Q

How is connectivity disruption achieved via routing disruption?

A
  • withdrawing prefixes
    • re-advertising
20
Q

How is connectivity disruption achieved via packet filtering?

A
  • Typically in firewalls and switches
  • Harder to detect
21
Q

Explain a scenario of disruption detection when no filtering occurs.

A

Traffic flows normally; traceroute paths appear intact without anomalies. IP ID increments by 2

22
Q

Explain a scenario of disruption detection in the case of inbound blocking.

A

Probes to the target fail because inbound packets are dropped before reaching the destination. IP ID increments by 1

23
Q

Explain a scenario of disruption detection in the case of outbound blocking.

A

Probes leave the source but responses never return due to outbound filtering at the target’s network. IP ID increments my multiple sets of 2.