{"id":1571,"date":"2012-03-28T13:08:28","date_gmt":"2012-03-28T20:08:28","guid":{"rendered":"http:\/\/blog.caida.org\/best_available_data\/?p=1571"},"modified":"2017-08-21T12:47:34","modified_gmt":"2017-08-21T19:47:34","slug":"internet-censorship-revealed-through-the-haze-of-malware-pollution","status":"publish","type":"post","link":"https:\/\/blog.caida.org\/best_available_data\/2012\/03\/28\/internet-censorship-revealed-through-the-haze-of-malware-pollution\/","title":{"rendered":"Internet Censorship Revealed Through the Haze of Malware Pollution"},"content":{"rendered":"<p>We were happy to see the coverage of UCSD&#8217;s <a href=\"http:\/\/ucsdnews.ucsd.edu\/pressreleases\/internet_censorship_revealed_through_the_haze_of_malware_pollution\/\" target=\"_blank\">press release<\/a> describing two papers we recently published, introducing new methods and applications for analyzing dark net data (aka &#8220;Internet background radiation&#8221; or IBR).\u00a0 The first paper, <a title=\"Analysis of Country-wide Internet Outages Caused by Censorship\" href=\"http:\/\/conferences.sigcomm.org\/imc\/2011\/program.htm\" target=\"_blank\">&#8220;Analysis of Country-wide Internet Outages Caused by Censorship&#8221;<\/a>, presented by author Alberto Dainotti last November at IMC 2011, focused on using IBR in conjunction with other data sources to reveal previously unreported aspects of the disruptions seen during the uprisings of early 2011 in Egypt and Libya. The second paper, <a title=\"Extracting benefit from harm: using malware pollution to analyze the impact of political and geophysical events on the Internet\" href=\"http:\/\/www.sigcomm.org\/ccr\/papers\/2012\/January\/2096149.2096154\" target=\"_blank\">&#8220;Extracting benefit from harm: using malware pollution to analyze the impact of political and geophysical events on the Internet&#8221;<\/a>, published in ACM SIGCOMM CCR (January 12), used IBR data observed by UCSD&#8217;s network telescope to characterize Internet outages caused by natural disasters. In both cases\u00a0the analysis of this (mostly malware-generated) background traffic contributed to our understanding of events unrelated to the malware itself. Our press release was picked up by\u00a0several online publications, including\u00a0<a href=\"http:\/\/blogs.wsj.com\/tech-europe\/2012\/03\/12\/internet-background-radiation-reveals-disasters-and-censorship\/\" target=\"_blank\">The Wall Street Journal Blog<\/a>, <a href=\"http:\/\/technews.acm.org\/archives.cfm?fo=2012-03-mar\/mar-12-2012.html#571312\">ACM Technews<\/a>,\u00a0<a href=\"http:\/\/cacm.acm.org\/news\/146966-internet-censorship-revealed-through-the-haze-of-malware-pollution\/fulltext\">Communications of the ACM\u00a0Web site<\/a>,\u00a0<a href=\"http:\/\/www.spacedaily.com\/reports\/Internet_Censorship_Revealed_Through_the_Haze_of_Malware_Pollution_999.html\">Spacedaily<\/a>,\u00a0<a href=\"http:\/\/www.physorg.com\/news\/2012-03-internet-censorship-revealed-haze-malware.html\">Physorg<\/a>,\u00a0<a href=\"http:\/\/www.tomsguide.com\/us\/ibr-Internet-junk-traffic-censorship,news-14416.html\">Tom&#8217;s Guide<\/a>,\u00a0<a href=\"http:\/\/www.pddnet.com\/news-internet-censorship-revealed-through-the-haze-of-malware-pollution-030712\/\">Product Design &amp; Development<\/a>,\u00a0<a href=\"http:\/\/www.newswise.com\/articles\/internet-censorship-revealed-through-the-haze-of-malware-pollution\">Newswise<\/a>,\u00a0<a href=\"http:\/\/www.domain-b.com\/technology\/20120309_malware_pollution.html\">Domain-b<\/a>,\u00a0<a href=\"http:\/\/www.eurekalert.org\/pub_releases\/2012-03\/uoc--icr030712.php\">EurekAlert<\/a>,\u00a0<a href=\"http:\/\/www.eurasiareview.com\/07032012-internet-censorship-revealed-through-haze-of-malware-pollution\/\">Eurasia review<\/a>,\u00a0<a href=\"http:\/\/security-today.com\/articles\/2012\/03\/12\/internet-censosrship-revealed-through-haze-of-malware-pollution.aspx?admgarea=ht.networkcentric\">Security-today.com<\/a>,\u00a0<a href=\"http:\/\/www.everythingsandiego.net\/15064-web-censorship-revealed-through-malware-pollution\/\">Everything San Diego<\/a>,\u00a0<a href=\"http:\/\/www.spacewar.com\/reports\/Internet_Censorship_Revealed_Through_the_Haze_of_Malware_Pollution_999.html\">Spacewar\u00a0Cyber War<\/a>.<\/p>\n<p>The papers are also available on CAIDA&#8217;s <a href=\"http:\/\/www.caida.org\/publications\/papers\/\">publications page<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>We were happy to see the coverage of UCSD&#8217;s press release describing two papers we recently published, introducing new methods and applications for analyzing dark net data (aka &#8220;Internet background radiation&#8221; or IBR).\u00a0 The first paper, &#8220;Analysis of Country-wide Internet Outages Caused by Censorship&#8221;, presented by author Alberto Dainotti last November at IMC 2011, focused [&hellip;]<\/p>\n","protected":false},"author":6,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":[],"categories":[1,5,10],"tags":[],"coauthors":[28],"_links":{"self":[{"href":"https:\/\/blog.caida.org\/best_available_data\/wp-json\/wp\/v2\/posts\/1571"}],"collection":[{"href":"https:\/\/blog.caida.org\/best_available_data\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.caida.org\/best_available_data\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.caida.org\/best_available_data\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.caida.org\/best_available_data\/wp-json\/wp\/v2\/comments?post=1571"}],"version-history":[{"count":46,"href":"https:\/\/blog.caida.org\/best_available_data\/wp-json\/wp\/v2\/posts\/1571\/revisions"}],"predecessor-version":[{"id":4158,"href":"https:\/\/blog.caida.org\/best_available_data\/wp-json\/wp\/v2\/posts\/1571\/revisions\/4158"}],"wp:attachment":[{"href":"https:\/\/blog.caida.org\/best_available_data\/wp-json\/wp\/v2\/media?parent=1571"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.caida.org\/best_available_data\/wp-json\/wp\/v2\/categories?post=1571"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.caida.org\/best_available_data\/wp-json\/wp\/v2\/tags?post=1571"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/blog.caida.org\/best_available_data\/wp-json\/wp\/v2\/coauthors?post=1571"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}