Spooky Scan Analysis

Link to Code

  • Sanitize censorship traces collected using spooky scan.
  • Analyze traces based on tcp flags to conclude overall Internet censorship and the relationship between network traffic of different countries.
  • Use censorship ratios to predict outgoing or incoming censorship
Avatar
Sarthak Grover
Computer Networks Researcher

Network analysis researcher and security expert