A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit <a rel="external noopener" href="http://wpage.unina.it/giuseppe.aceto/pub/aceto2015internet_censorship_detection__a_survey.pdf">the original URL</a>. The file type is <code>application/pdf</code>.
<i title="Elsevier BV">
<a target="_blank" rel="noopener" href="https://fatcat.wiki/container/blfmvfslmbggxhopuigjdb3jma" style="color: black;">Computer Networks</a>
Internet Censorship is a phenomenon that crosses several study fields, from computer networking and computer security to social sciences; together with censorship detection and censorship circumvention it has impact on Internet infrastructure, protocols and user behaviors. Detection of Internet Censorship is the basis for the study of this phenomenon, and recently it has received focus from a technical point of view. Due to the heterogeneity of study fields and approaches, the scientific corpus<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1016/j.comnet.2015.03.008">doi:10.1016/j.comnet.2015.03.008</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/hfobj6upjjhyzdh2joujhtiziu">fatcat:hfobj6upjjhyzdh2joujhtiziu</a> </span>
more »... on these topics is still in need of an overall analysis, based on coherent framework and lexicon to describe the experimented approaches and findings. In this paper we present a survey on Internet Censorship detection. We propose a reference for censoring techniques and a characterization of censoring systems, with definitions of related concepts. Based on the censoring techniques investigated in literature, we propose an analysis and discussion of censorship detection techniques and architectures and we present a chronological synopsis of the literature adopting or introducing them. Then we collect, study, and discuss available tools and platforms for censorship detection, and propose a characterization scheme to analyze and compare them. Finally, we compare and discuss detection architectures, tools and platforms, and we use the results to infer current challenges and for proposing new directions in the field of censorship detection. 4 by the surveillance device or by countering the effects of the action. Client-based Censorship We consider client-based censorship as the blocking of access to online content by means of applications running on the same system of the network application client. It can be implemented by different means, such as an independent application, akin to a keylogger, that terminates the applications whose keyboard input matches a blacklisted keyword-such apparently is the technology employed in Cuba, as reported in  . 2 Another form for this kind of censorship is a network filter like parental control or company policy control enforcement filters, running as a personal firewall (see  for a recent survey, and  for a list of websites of parental control software). Finally, it can be enforced as a modified version of the network application client itself, added with surveillance
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20170808101652/http://wpage.unina.it/giuseppe.aceto/pub/aceto2015internet_censorship_detection__a_survey.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/5e/45/5e4510e4f452d518a150ce1c8fd0ddaf29314f47.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1016/j.comnet.2015.03.008"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> elsevier.com </button> </a>