The Dark Side of the China: The Government, Society and the Great Cannon
The main purpose of this research is to understand the concept of one of the main firewall technology developed within the scope of Golden Shield Project called Great Cannon and Great Firewall and elaborates the details of this tool in China. The proposed technology deployed in China has claimed to enhance the public safety and country wide national cyber security however there were many other circumstances raised from the legal, ethical and moral issues due to censorship and surveillance of this deployment. The research also elaborates and outlines the effects and technical issues of this deployment since this paper highlights the existing research trends in network security and exposing the current state of the Golden Shield project for the China with its censorship policy.
(1) Mizokami, K., (November 9, 2014). The 5 Most Powerful Armies on Planet Earth. Retrieved from http://nationalinterest.org/feature/the-5-most-powerful-armies-planet-earth-11632?page=show
(2) Hagestad, W. T. (2012). 21st Century Chinese Cyberwarfare : An Examination of the Chinese Cyberthreat From Fundamentals of Communist Policy Regarding Information Warfare Through the Broad Range of Military, Civilian and Commercially Supported Cyberattack Threat Vectors. Ely, Cambridgeshire, United Kingdom: IT Governance Publishing.
(3) Evolution of Internet in China. (January 1, 2001). Retrieved from http://www.edu.cn/introduction_1378/20060323/t20060323_4285.shtml
(4) The Golden Shield Project. Retrieved from: http://gutenberg.us/articles/golden_shield_project
(8) Anonymous. Towards a Comprehensive Picture of the Great Firewall's DNS Censorship. In 4th USENIX Workshop on Free and Open Communications on the Internet (FOCI 14) (San Diego, CA, Aug. 2014), USENIX Association.
(9) Fan, L. (December 12, 2012). Understanding and Circumventing The Great Firewall of China. Retrieved from http://www.cs.tufts.edu/comp/116/archive/fall2015/lfan.pdf
(10) Anderson, D., (November 30, 2012). Splinternet Behind the Great Firewall of China. Retrieved from http://queue.acm.org/detail.cfm?id=2405036
(11) Farnan, O., Darer, A., Wright, J. (October 24, 2016). Poisoning the Well: Exploring the Great Firewall's Poisoned DNS Responses. Proceedings of the 2016 ACM on Workshop on Privacy in the Electronic Socie. Vienna, Austria
(12) Xu, X., Mao Z. M., and Halderman A. J (2011).Internet Censorship in China: Where Does the Filtering Occur? Retrieved from http://web.eecs.umich.edu/~zmao/Papers/china-censorship-pam11.pdf
(13) G. Lowe, P. Winters, and M. L. Marcus. The great DNS wall of China. MS, New York University. Accessed December, 21, 2007.
(14) Anonymous (2012). The Collateral Damage of Internet Censorship by DNS Injection. ACM SIGCOMM Computer Communication Review. Volume 42, Number 3
(16) Xu, Y. (March 8, 2016) Deconstructing the Great Firewall of China. Retrieved from https://blog.thousandeyes.com/deconstructing-great-firewall-china/
(18) Using Baidu ?? to steer millions of computers to launch denial of service attacks, (March 25, 2015). Retrieved from https://drive.google.com/file/d/0ByrxblDXR_yqeUNZYU5WcjFCbXM/view?pli=1
(20) Lee, M. (January 25, 2016 ). China's Nearly 700 Million Internet Users Are Hot For Online Finance. Retrieved from http://www.forbes.com/sites/melanieleest/2016/01/25/chinas-nearly-700-million-internet-users-are-hot-for-online-finance/#100192b01391
(21) The Chian Great War, http://edition.cnn.com/2015/10/25/asia/china-war-internet-great-firewall/
(23) Tor: Overview. Retrieved from https://www.torproject.org/about/overview
(24) Ensafi, R., Winter P., Mueen A., and Crandall R. A. (2015). Examining How the Great Firewall Discovers Hidden Circumvention Servers. Proceedings of the 2015 ACM Conference on Internet Measurement Conference
(28) Alzubi, A. and Sari, A. (2016) Deployment of Hash Function to Enhance Message Integrity in Wireless Body Area Network (WBAN). Int. J. Communications, Network and System Sciences, Vol.9,No.12, pp. 613-621. http://dx.doi.org/10.4236/ijcns.2016.912047
(29) Sari, A., Rahnama, B., Eweoya, I., Agdelen, Z. (2016) Energizing the Advanced Encryption Standard (AES) for Better Performance. International Journal of Scientific & Engineering Research, Vol.7, No.4, pp.992-1000, ISSN 2229-5518.
(30) Rahnama, B., Sari, A., & Ghafour, M. Y. (2016). Countering RSA Vulnerabilities and Its Replacement by ECC: Elliptic Curve Cryptographic Scheme for Key Generation. In D. G., M. Singh, & M. Jayanthi (Eds.) Network Security Attacks and Countermeasures (pp. 270-312). Hershey, PA: Information Science Reference. doi:10.4018/978-1-4666-8761-5.ch012
(31) Sari, A. and Karay, M. (2015) Reactive Data Security Approach and Review of Data Security Techniques in Wireless Networks. Int. J. Communications, Network and System Sciences, Vol.8, No.13, pp. 567-577. Doi: http://dx.doi.org/10.4236/ijcns.2015.813051.
(32) Sari, A. and Karay, M. (2015) Comparative Analysis of Wireless Security Protocols: WEP vs WPA. International Journal of Communications, Network and System Sciences, Vol. 8, No.12, pp. 483-491. doi: http://10.4236/ijcns.2015.812043.
(33) Sari, A., Onursal, O. and Akkaya, M. (2015) Review of the Security Issues in Vehicular Ad Hoc Net-works (VANET). Int. J. Communications, Network and System Sciences, Vol. 8, No.13, pp. 552-566. http://dx.doi.org/10.4236/ijcns.2015.813050 .
(34) Cambazoglu, ?. and Sari, A. (2015) Collision Avoidance in Mobile Wireless Ad-Hoc Networks with Enhanced MACAW Protocol Suite. Int. J. Communications, Network and System Sciences, Vol.8, No.13, pp. 533-542. http://dx.doi.org/10.4236/ijcns.2015.813048.
(35) Kirencigil, B.Z., Yilmaz, O., Sari, A., (2016) Unified 3-tier Security Mechanism to Enhance Data Security in Mobile Wireless Networks. International Journal of Scientific & Engineering Research, Vol.7, No.4, pp. 1001-1011, ISSN 2229-5518.
(37) Yilmaz, O., Kirencigil, B.Z., Sari, A., (2016) VAN Based theoretical EDI Framework to enhance organizational data security for B2B transactions and comparison of B2B cryptographic application models.International Journal of Scientific & Engineering Research, Vol.7, No.4, pp. 1012-1020,
(40) Sari, A. and Akkaya, M. (2015) Fault Tolerance Mechanisms in Distributed Systems. International Journal of Communications, Network and System Sciences, Vol.8, No.12, pp. 471-482. doi: http://10.4236/ijcns.2015.812042.
(43) Rahnama, B.; Sari, A.; Makvandi, R., "Countering PCIe Gen. 3 data transfer rate imperfection using serial data interconnect," Technological Advances in Electrical, Electronics and Computer Engineering (TAEECE), 2013 International Conference on , vol., no., pp.579,582, 9-11 May 2013 doi: http://doi.acm.org/10.1109/TAEECE.2013.6557339.
(44) Sari, A.; Rahnama, B., (2013) "Simulation of 802.11 Physical Layer Attacks in MANET," Computational Intelligence, Communication Systems and Networks (CICSyN), 2013 Fifth International Conference on , vol., no., pp.334,337, 5-7 June 2013, http://dx.doi.org/10.1109/CICSYN.2013.79 .
Copyright (c) 2017 Transactions on Networks and Communications
This work is licensed under a Creative Commons Attribution 4.0 International License.