{"title":"规避互联网审查的有效方法","authors":"Feng Ding, Zhiqing Yang, Xuelong Chen, Jianfeng Guo","doi":"10.1109/PAAP.2011.54","DOIUrl":null,"url":null,"abstract":"We speculated the techniques used by Internet censorship and compared the general methods to break through, including VPN, SSH, IPV6, proxy tools, hosts file modify and web proxy. A new method we called Proxy Pool was put forward in this paper. All our experiments were done under Internet censorship.","PeriodicalId":213010,"journal":{"name":"2011 Fourth International Symposium on Parallel Architectures, Algorithms and Programming","volume":"19 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2011-12-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"Effective Methods to Avoid the Internet Censorship\",\"authors\":\"Feng Ding, Zhiqing Yang, Xuelong Chen, Jianfeng Guo\",\"doi\":\"10.1109/PAAP.2011.54\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"We speculated the techniques used by Internet censorship and compared the general methods to break through, including VPN, SSH, IPV6, proxy tools, hosts file modify and web proxy. A new method we called Proxy Pool was put forward in this paper. All our experiments were done under Internet censorship.\",\"PeriodicalId\":213010,\"journal\":{\"name\":\"2011 Fourth International Symposium on Parallel Architectures, Algorithms and Programming\",\"volume\":\"19 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2011-12-09\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2011 Fourth International Symposium on Parallel Architectures, Algorithms and Programming\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/PAAP.2011.54\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2011 Fourth International Symposium on Parallel Architectures, Algorithms and Programming","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/PAAP.2011.54","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Effective Methods to Avoid the Internet Censorship
We speculated the techniques used by Internet censorship and compared the general methods to break through, including VPN, SSH, IPV6, proxy tools, hosts file modify and web proxy. A new method we called Proxy Pool was put forward in this paper. All our experiments were done under Internet censorship.