FINDING · DETECTION

Of 19,493,925 TCP packet injection events ICLab detected, only 0.7% (143,225) could be definitively attributed to censorship after multi-heuristic filtering; a further 58% (15,589,882) were RST-or-ICMP-unreachable events classified only as 'probable censorship' because ordinary network failure could not be excluded. Block pages appeared in just 3.4% of definitively-censored injections, meaning the vast majority of censor-side TCP disruption is covert. DNS manipulation detection achieved a false positive rate of approximately 10⁻⁴ using a threshold of θ=11 autonomous systems, cross-checked against block page observations.

From 2020-niaki-iclabICLab: A Global, Longitudinal Internet Censorship Measurement Platform · §IV-B, §V-A · 2020 · Symposium on Security \& Privacy

Implications

Tags

techniques
packet-injectionrst-injectiondns-poisoning

Extracted by claude-sonnet-4-6 — review before relying.