The Dark Side of the China: The Government, Society and the Great Cannon
The main purpose of this research is to understand the concept of one of the main firewall technology developed within the scope of Golden Shield Project called Great Cannon and Great Firewall and elaborates the details of this tool in China. The proposed technology deployed in China has claimed to enhance the public safety and country wide national cyber security however there were many other circumstances raised from the legal, ethical and moral issues due to censorship and surveillance of this deployment. The research also elaborates and outlines the effects and technical issues of this deployment since this paper highlights the existing research trends in network security and exposing the current state of the Golden Shield project for the China with its censorship policy.
(1) Mizokami, K., (November 9, 2014). The 5 Most Powerful Armies on Planet Earth. Retrieved from http://nationalinterest.org/feature/the-5-most-powerful-armies-planet-earth-11632?page=show
(2) Hagestad, W. T. (2012). 21st Century Chinese Cyberwarfare : An Examination of the Chinese Cyberthreat From Fundamentals of Communist Policy Regarding Information Warfare Through the Broad Range of Military, Civilian and Commercially Supported Cyberattack Threat Vectors. Ely, Cambridgeshire, United Kingdom: IT Governance Publishing.
(3) Evolution of Internet in China. (January 1, 2001). Retrieved from http://www.edu.cn/introduction_1378/20060323/t20060323_4285.shtml
(4) The Golden Shield Project. Retrieved from: http://gutenberg.us/articles/golden_shield_project
(5) Ensafi, R., Winter P., Mueen A., and Crandall R. A. (2015). Analyzing the Great Firewall of China Over Space and Time. Proceedings on Privacy Enhancing Technologies. Volume (1), pp. 6176
(6) Carson, B. (July 23, 2015).9 incredibly popular websites that are still blocked in China. Retrieved from http://www.businessinsider.com/websites-blocked-in-china-2015-7/#google-including-gmail-1 An Analysis of Chinas Great Cannon.
(7) Khattak, S., Javed, M., Anderson, P.D., Paxson, V. (2013) Towards Illuminating a Censorship Monitors Model to Facilitate Evasion. Retrieved from https://www.usenix.org/conference/foci13/workshop-program/presentation/Khattak
(8) Anonymous. Towards a Comprehensive Picture of the Great Firewall's DNS Censorship. In 4th USENIX Workshop on Free and Open Communications on the Internet (FOCI 14) (San Diego, CA, Aug. 2014), USENIX Association.
(9) Fan, L. (December 12, 2012). Understanding and Circumventing The Great Firewall of China. Retrieved from http://www.cs.tufts.edu/comp/116/archive/fall2015/lfan.pdf
(10) Anderson, D., (November 30, 2012). Splinternet Behind the Great Firewall of China. Retrieved from http://queue.acm.org/detail.cfm?id=2405036
(11) Farnan, O., Darer, A., Wright, J. (October 24, 2016). Poisoning the Well: Exploring the Great Firewall's Poisoned DNS Responses. Proceedings of the 2016 ACM on Workshop on Privacy in the Electronic Socie. Vienna, Austria
(12) Xu, X., Mao Z. M., and Halderman A. J (2011).Internet Censorship in China: Where Does the Filtering Occur? Retrieved from http://web.eecs.umich.edu/~zmao/Papers/china-censorship-pam11.pdf
(13) G. Lowe, P. Winters, and M. L. Marcus. The great DNS wall of China. MS, New York University. Accessed December, 21, 2007.
(14) Anonymous (2012). The Collateral Damage of Internet Censorship by DNS Injection. ACM SIGCOMM Computer Communication Review. Volume 42, Number 3
(15) Clayton, R., Murdoch, S., Watson, R.: Ignoring the Great Firewall of China. In: Danezis, G., Golle, P. (eds.) PET 2006. LNCS, vol. 4258, pp. 2035. Springer, Heidelberg (2006)
(16) Xu, Y. (March 8, 2016) Deconstructing the Great Firewall of China. Retrieved from https://blog.thousandeyes.com/deconstructing-great-firewall-china/
(17) Verkamp, J.P. and Gupt, M, (2012). Inferring Mechanics of Web Censorship Around the World. Retrieved from https://www.usenix.org/conference/foci12/workshop-program/presentation/Verkamp  Marczak, B., Weaver, N., Dalek, J. (April 10, 2015). Chinas Great Cannon. Retrieved from https://citizenlab.org/2015/04/chinas-great-cannon/
(18) Using Baidu ?? to steer millions of computers to launch denial of service attacks, (March 25, 2015). Retrieved from https://drive.google.com/file/d/0ByrxblDXR_yqeUNZYU5WcjFCbXM/view?pli=1
(19) Xu, Y. (March 14, 2016). The Emergence of Chinas New Weapon: the Great Cannon. Retrieved from https://blog.thousandeyes.com/chinas-new-weapon-great-cannon/
(20) Lee, M. (January 25, 2016 ). China's Nearly 700 Million Internet Users Are Hot For Online Finance. Retrieved from http://www.forbes.com/sites/melanieleest/2016/01/25/chinas-nearly-700-million-internet-users-are-hot-for-online-finance/#100192b01391
(21) The Chian Great War, http://edition.cnn.com/2015/10/25/asia/china-war-internet-great-firewall/
(22) Xu, Y. ( May 11, 2016). The Ongoing War Between Chinas Great Firewall and Circumvention Tools Retrieved from https://blog.thousandeyes.com/the-war-between-chinas-great-firewall-and-circumvention-tools/
(23) Tor: Overview. Retrieved from https://www.torproject.org/about/overview
(24) Ensafi, R., Winter P., Mueen A., and Crandall R. A. (2015). Examining How the Great Firewall Discovers Hidden Circumvention Servers. Proceedings of the 2015 ACM Conference on Internet Measurement Conference
(25) Sari, A. (2016); "E-Government Attempts in Small Island Developing States: The Rate of Corruption with Virtualization, Science and Engineering Ethcis, Springer , pp.XX. ISSN-O: 1353-3452, DOI: 10.1007/s11948-016-9848-0.
(26) Sari, A., Akkaya, M., Abdalla B., (2017) Assessing e-Government systems success in Jordan (e-JC): A validation of TAM and IS Success model. International Journal of Computer Science and Information Security, Vol.15, No.2, pp.277-304, ISSN:1947-5500.
(27) Alzubi, A., Sari, A., (2016) Deployment of Elliptic Curve Cryptography (ECC) to Enhance Message Integrity in Wireless Body Area Network. International Journal of Computer Science and Information Security, Vol.14, No.11, pp.1146-1153, ISSN:1947-5500.
(28) Alzubi, A. and Sari, A. (2016) Deployment of Hash Function to Enhance Message Integrity in Wireless Body Area Network (WBAN). Int. J. Communications, Network and System Sciences, Vol.9,No.12, pp. 613-621. http://dx.doi.org/10.4236/ijcns.2016.912047
(29) Sari, A., Rahnama, B., Eweoya, I., Agdelen, Z. (2016) Energizing the Advanced Encryption Standard (AES) for Better Performance. International Journal of Scientific & Engineering Research, Vol.7, No.4, pp.992-1000, ISSN 2229-5518.
(30) Rahnama, B., Sari, A., & Ghafour, M. Y. (2016). Countering RSA Vulnerabilities and Its Replacement by ECC: Elliptic Curve Cryptographic Scheme for Key Generation. In D. G., M. Singh, & M. Jayanthi (Eds.) Network Security Attacks and Countermeasures (pp. 270-312). Hershey, PA: Information Science Reference. doi:10.4018/978-1-4666-8761-5.ch012
(31) Sari, A. and Karay, M. (2015) Reactive Data Security Approach and Review of Data Security Techniques in Wireless Networks. Int. J. Communications, Network and System Sciences, Vol.8, No.13, pp. 567-577. Doi: http://dx.doi.org/10.4236/ijcns.2015.813051.
(32) Sari, A. and Karay, M. (2015) Comparative Analysis of Wireless Security Protocols: WEP vs WPA. International Journal of Communications, Network and System Sciences, Vol. 8, No.12, pp. 483-491. doi: http://10.4236/ijcns.2015.812043.
(33) Sari, A., Onursal, O. and Akkaya, M. (2015) Review of the Security Issues in Vehicular Ad Hoc Net-works (VANET). Int. J. Communications, Network and System Sciences, Vol. 8, No.13, pp. 552-566. http://dx.doi.org/10.4236/ijcns.2015.813050 .
(34) Cambazoglu, ?. and Sari, A. (2015) Collision Avoidance in Mobile Wireless Ad-Hoc Networks with Enhanced MACAW Protocol Suite. Int. J. Communications, Network and System Sciences, Vol.8, No.13, pp. 533-542. http://dx.doi.org/10.4236/ijcns.2015.813048.
(35) Kirencigil, B.Z., Yilmaz, O., Sari, A., (2016) Unified 3-tier Security Mechanism to Enhance Data Security in Mobile Wireless Networks. International Journal of Scientific & Engineering Research, Vol.7, No.4, pp. 1001-1011, ISSN 2229-5518.
(36) Sari, A. (2015) Two-Tier Hierarchical Cluster Based Topology in Wireless Sensor Networks for Contention Based Protocol Suite. International Journal of Communications", Network and System Sciences, Vol.8, No.3, pp. 29-42. doi: http://dx.doi.org/10.4236/ijcns.2015.83004.
(37) Yilmaz, O., Kirencigil, B.Z., Sari, A., (2016) VAN Based theoretical EDI Framework to enhance organizational data security for B2B transactions and comparison of B2B cryptographic application models.International Journal of Scientific & Engineering Research, Vol.7, No.4, pp. 1012-1020,
(38) Sari, A., (2015), Security Issues in Mobile Wireless Ad Hoc Networks: A Comparative Survey of Methods and Techniques to Provide Security in Wireless Ad Hoc Networks, New Threats and Countermeasures in Digital Crime and Cyber Terrorism, (pp. 66-94). Hershey, PA: IGI Global. doi:10.4018/978-1-4666-8345-7. April 2015.
(39) Sari, A. (2015) Lightweight Robust Forwarding Scheme for Multi-Hop Wireless Networks. International Journal of Communications, Network and System Sciences, Vol. 8, No.3, pp. 19-28. doi: http://dx.doi.org/10.4236/ijcns.2015.83003.
(40) Sari, A. and Akkaya, M. (2015) Fault Tolerance Mechanisms in Distributed Systems. International Journal of Communications, Network and System Sciences, Vol.8, No.12, pp. 471-482. doi: http://10.4236/ijcns.2015.812042.
(41) Sari, A. (2015) A Review of Anomaly Detection Systems in Cloud Networks and Survey of Cloud Security Measures in Cloud Storage Applications. Journal of Information Security, Vol.6, No.2, pp. 142-154. doi: http://dx.doi.org/10.4236/jis.2015.62015.
(42) Sari, A. (2014); Security Approaches in IEEE 802.11 MANET Performance Evaluation of USM and RAS, International Journal of Communications, Network, and System Sciences, Vol.7, No.9, pp. 365-372, ISSN: 1913-3723; ISSN-P: 1913-3715, DOI: http://dx.doi.org/10.4236/ijcns.2014.79038.
(43) Rahnama, B.; Sari, A.; Makvandi, R., "Countering PCIe Gen. 3 data transfer rate imperfection using serial data interconnect," Technological Advances in Electrical, Electronics and Computer Engineering (TAEECE), 2013 International Conference on , vol., no., pp.579,582, 9-11 May 2013 doi: http://doi.acm.org/10.1109/TAEECE.2013.6557339.
(44) Sari, A.; Rahnama, B., (2013) "Simulation of 802.11 Physical Layer Attacks in MANET," Computational Intelligence, Communication Systems and Networks (CICSyN), 2013 Fifth International Conference on , vol., no., pp.334,337, 5-7 June 2013, http://dx.doi.org/10.1109/CICSYN.2013.79 .
(45) Sari, A., Rahnama, B (2013). Addressing security challenges in WiMAX environment. In Proceedings of the 6th International Conference on Security of Information and Networks (SIN '13). ACM, New York, NY, USA, 454-456. DOI=10.1145/2523514.2523586 http://doi.acm.org/10.1145/2523514.2523586
(46) Sari, A. (2014); Security Issues in RFID Middleware Systems: A Case of Network Layer Attacks: Proposed EPC Implementation for Network Layer Attacks, Transactions on Networks & Communications, Society for Science and Education, United Kingdom, Vol.2, No.5, pp. 1-6, ISSN: 2054-7420, DOI: http://dx.doi.org/10.14738/tnc.25.431.
Copyright (c) 2017 Transactions on Networks and Communications
This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors wishing to include figures, tables, or text passages that have already been published elsewhere are required to obtain permission from the copyright owner(s) for both the print and online format and to include evidence that such permission has been granted when submitting their papers. Any material received without such evidence will be assumed to originate from the authors.
All authors of manuscripts accepted for publication in the journal Transactions on Networks and Communications are required to license the Scholar Publishing to publish the manuscript. Each author should sign one of the following forms, as appropriate:
License to publish; to be used by most authors. This grants the publisher a license of copyright. Download forms (MS Word formats) - (doc)
Publication agreement — Crown copyright; to be used by authors who are public servants in a Commonwealth country, such as Canada, U.K., Australia. Download forms (Adobe or MS Word formats) - (doc)
License to publish — U.S. official; to be used by authors who are officials of the U.S. government. Download forms (Adobe or MS Word formats) – (doc)
The preferred method to submit a completed, signed copyright form is to upload it within the task assigned to you in the Manuscript submission system, after the submission of your manuscript. Alternatively, you can submit it by email email@example.com