{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,15]],"date-time":"2025-12-15T17:28:02Z","timestamp":1765819682873,"version":"3.48.0"},"publisher-location":"New York, NY, USA","reference-count":59,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,11,2]],"date-time":"2021-11-02T00:00:00Z","timestamp":1635811200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,11,2]]},"DOI":"10.1145\/3487552.3487858","type":"proceedings-article","created":{"date-parts":[[2021,11,1]],"date-time":"2021-11-01T17:35:11Z","timestamp":1635788111000},"page":"435-443","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":14,"title":["Throttling Twitter"],"prefix":"10.1145","author":[{"given":"Diwen","family":"Xue","sequence":"first","affiliation":[{"name":"University of Michigan"}]},{"given":"Reethika","family":"Ramesh","sequence":"additional","affiliation":[{"name":"University of Michigan"}]},{"given":"Valdik S","family":"S","sequence":"additional","affiliation":[{"name":"Independent"}]},{"given":"Leonid","family":"Evdokimov","sequence":"additional","affiliation":[{"name":"Independent"}]},{"given":"Andrey","family":"Viktorov","sequence":"additional","affiliation":[{"name":"Independent"}]},{"given":"Arham","family":"Jain","sequence":"additional","affiliation":[{"name":"University of Michigan"}]},{"given":"Eric","family":"Wustrow","sequence":"additional","affiliation":[{"name":"University of Colorado Boulder"}]},{"given":"Simone","family":"Basso","sequence":"additional","affiliation":[{"name":"OONI"}]},{"given":"Roya","family":"Ensafi","sequence":"additional","affiliation":[{"name":"University of Michigan"}]}],"member":"320","published-online":{"date-parts":[[2021,11,2]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Verification of users on the Internet is a matter of time","author":"Khinshtein Alexander","year":"2021","unstructured":"Alexander Khinshtein: Verification of users on the Internet is a matter of time, 2021. https:\/\/tass.ru\/interviews\/11032409."},{"key":"e_1_3_2_1_2_1","unstructured":"Alexa top 1 000 000 sites 2019. http:\/\/s3.amazonaws.com\/alexa-static\/top-1m.csv.zip."},{"volume-title":"Proceedings of the ACM Internet Measurement Conference. Association for Computing Machinery.","author":"Beznazwy J.","key":"e_1_3_2_1_3_1","unstructured":"Alice, Bob, Carol, J. Beznazwy, and A. Houmansadr. How china detects and blocks shadowsocks. In Proceedings of the ACM Internet Measurement Conference. Association for Computing Machinery."},{"key":"e_1_3_2_1_4_1","volume-title":"Dimming the internet: Detecting throttling as a mechanism of censorship in iran","author":"Anderson C.","year":"2013","unstructured":"C. Anderson. Dimming the internet: Detecting throttling as a mechanism of censorship in iran, 2013."},{"key":"e_1_3_2_1_5_1","volume-title":"Russia twitter throttle dataset, 03","author":"Andrey Viktorov L. E.","year":"2021","unstructured":"L. E. Andrey Viktorov. Russia twitter throttle dataset, 03 2021. https:\/\/github.com\/4ndv\/russia-twitter-throttle."},{"key":"e_1_3_2_1_6_1","author":"Anonymous","year":"2012","unstructured":"Anonymous. The collateral damage of internet censorship by dns injection. SIGCOMM Comput. Commun. Rev., 2012.","journal-title":"Comput. Commun. Rev."},{"volume-title":"Workshop on Free and Open Communications on the Internet. USENIX Association.","author":"Bock K.","key":"e_1_3_2_1_7_1","unstructured":"K. Bock, Y. Fax, K. Reese, J. Singh, and D. Levin. Detecting and evading censorship-in-depth: A case study of iran's protocol whitelister. In Workshop on Free and Open Communications on the Internet. USENIX Association."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/2663716.2663720"},{"key":"e_1_3_2_1_9_1","unstructured":"Comparing traffic policing and traffic shaping for bandwidth limiting 2019. https:\/\/www.cisco.com\/c\/en\/us\/support\/docs\/quality-of-service-qos\/qos-policing\/19645-policevsshape.html."},{"key":"e_1_3_2_1_10_1","volume-title":"USENIX Symposium on Networked Systems Design and Implementation. USENIX Association","author":"Dischinger M.","year":"2010","unstructured":"M. Dischinger, M. Marcon, S. Guha, K. P. Gummadi, R. Mahajan, and S. Saroiu. Glasnost: Enabling end users to detect traffic differentiation. In USENIX Symposium on Networked Systems Design and Implementation. USENIX Association, Apr. 2010."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/2815675.2815690"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-04918-2_11"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1515\/popets-2015-0005"},{"key":"e_1_3_2_1_14_1","volume-title":"Iran admits throttling internet to 'preserve calm' during election","author":"Esfandiari G.","year":"2013","unstructured":"G. Esfandiari. Iran admits throttling internet to 'preserve calm' during election, 2013. https:\/\/www.rferl.org\/a\/iran-internet-disruptions-election\/25028696.html."},{"key":"e_1_3_2_1_15_1","volume-title":"Dpi blocking of instagram","author":"Evdokimov L.","year":"2018","unstructured":"L. Evdokimov. Iran protests: Dpi blocking of instagram, 2018. https:\/\/ooni.org\/post\/2018-iran-protests-pt2\/."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/2994620.2994636"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/2934872.2934873"},{"key":"e_1_3_2_1_18_1","volume-title":"Failures for independence - traffic got lost in the equipment of \"sovereign runet\", 04","author":"Gavrilyuk A.","year":"2021","unstructured":"A. Gavrilyuk. Failures for independence - traffic got lost in the equipment of \"sovereign runet\", 04 2021. https:\/\/www.kommersant.ru\/doc\/4763212."},{"key":"e_1_3_2_1_19_1","unstructured":"GoodbyeDPI GitHub Repository 2021. https:\/\/github.com\/ValdikSS\/GoodbyeDPI."},{"key":"e_1_3_2_1_20_1","unstructured":"hsto.org 2019. https:\/\/hsto.org\/webt\/wk\/tk\/ud\/wktkudgaf5uslgn-gzuj58p-xae.png."},{"key":"e_1_3_2_1_21_1","volume-title":"Iran: Internet deliberately shut down during november 2019 killings - new investigation","author":"International A.","year":"2020","unstructured":"A. International. Iran: Internet deliberately shut down during november 2019 killings - new investigation, 2020. https:\/\/www.amnesty.org\/en\/latest\/news\/2020\/11\/iran-internet-deliberately-shut-down-during-november-2019-killings-new-investigation\/."},{"key":"e_1_3_2_1_22_1","volume-title":"Myanmar's internet suppression","author":"Januta A.","year":"2021","unstructured":"A. Januta and M. Funakoshi. Myanmar's internet suppression, 2021. https:\/\/graphics.reuters.com\/MYANMAR-POLITICS\/INTERNET-RESTRICTION\/rlgpdbreepo\/."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/2815675.2815691"},{"key":"e_1_3_2_1_24_1","volume-title":"Workshop on Free and Open Communications on the Internet. USENIX Association","author":"Khattak S.","year":"2013","unstructured":"S. Khattak, M. Javed, P. D. Anderson, and V. Paxson. Towards illuminating a censorship monitor's model to facilitate evasion. In Workshop on Free and Open Communications on the Internet. USENIX Association, 2013."},{"key":"e_1_3_2_1_25_1","unstructured":"A. Langley. A Transport Layer Security (TLS) ClientHello Padding Extension. RFC 7685."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/2987443.2987464"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/3341302.3342092"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/3131365.3131376"},{"key":"e_1_3_2_1_29_1","unstructured":"libnetfilter queue documentation 2000. https:\/\/netfilter.org\/projects\/libnetfilter_queue\/doxygen\/html."},{"key":"e_1_3_2_1_30_1","unstructured":"G. Lowe P. Winters and M. L. Marcus. The great DNS wall of china. In Technical Report. New York University 2007."},{"key":"e_1_3_2_1_31_1","volume-title":"petersburg, participants of the torchlight procession were detained, who carried flags with the roskomnadzor logo","author":"Media Z.","year":"2021","unstructured":"Z. Media. In st. petersburg, participants of the torchlight procession were detained, who carried flags with the roskomnadzor logo, 2021. https:\/\/zona.media\/news\/2021\/03\/30\/unleash-twitter."},{"volume-title":"The menlo report","year":"2012","key":"e_1_3_2_1_32_1","unstructured":"menlo. The menlo report, 2012. https:\/\/www.dhs.gov\/sites\/default\/files\/publications\/CSD-MenloPrinciplesCORE-20120803_1.pdf."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP40000.2020.00014"},{"key":"e_1_3_2_1_34_1","unstructured":"Slowdown of twitter in russia 2021. https:\/\/ntc.party\/t\/twitter\/907."},{"key":"e_1_3_2_1_35_1","volume-title":"https:\/\/ooni.org\/","author":"Network Open Observatory","year":"2021","unstructured":"Open Observatory of Network Interference (OONI). OONI Website. https:\/\/ooni.org\/, 2021."},{"key":"e_1_3_2_1_36_1","volume-title":"Empirical study of a national-scale distributed intrusion detection system: Backbone-level filtering of html responses in china","author":"Park J.","year":"2010","unstructured":"J. Park and J. Crandall. Empirical study of a national-scale distributed intrusion detection system: Backbone-level filtering of html responses in china. IEEE, 2010."},{"key":"e_1_3_2_1_37_1","volume-title":"USENIX Security Symposium. USENIX Association","author":"Pearce P.","year":"2017","unstructured":"P. Pearce, B. Jones, F. Li, R. Ensafi, N. Feamster, N. Weaver, and V. Paxson. Global measurement of DNS manipulation. In USENIX Security Symposium. USENIX Association, 2017."},{"key":"e_1_3_2_1_38_1","volume-title":"USENIX Security Symposium. USENIX Association","author":"Pearce P.","year":"2017","unstructured":"P. Pearce, B. Jones, F. Li, R. Ensafi, N. Feamster, N. Weaver, and V. Paxson. Global measurement of DNS manipulation. In USENIX Security Symposium. USENIX Association, 2017."},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2020.23098"},{"volume-title":"Russia gives google 24 hours to delete banned content","year":"2021","key":"e_1_3_2_1_40_1","unstructured":"Reuters. Russia gives google 24 hours to delete banned content, 2021. https:\/\/www.reuters.com\/technology\/russia-gives-google-one-day-delete-banned-content-threatens-slowdown-2021-05-24\/."},{"key":"e_1_3_2_1_41_1","unstructured":"Report about Roskomnadzor's letter to ISPs 2019. https:\/\/habr.com\/ru\/post\/459894\/."},{"key":"e_1_3_2_1_42_1","unstructured":"Roskomnadzor takes measures to protect russian citizens from the influence of illegal content 2021. https:\/\/rkn.gov.ru\/news\/rsoc\/news73464.htm."},{"key":"e_1_3_2_1_43_1","unstructured":"Twitter is slowed down normally 2021. https:\/\/rkn.gov.ru\/news\/rsoc\/news73480.htm."},{"key":"e_1_3_2_1_44_1","unstructured":"Roskomnadzor announces its decision to extend measures to slow down Twitter traffic until May 15 this year 2021. https:\/\/rkn.gov.ru\/news\/rsoc\/news73536.htm."},{"key":"e_1_3_2_1_45_1","unstructured":"Twitter informed Roskomnadzor of the progress in removing prohibited materials 2021. https:\/\/rkn.gov.ru\/news\/rsoc\/news73620.htm."},{"key":"e_1_3_2_1_46_1","unstructured":"On the partial removal of measures to slow down twitter traffic 2021. https:\/\/rkn.gov.ru\/news\/rsoc\/news73632.htm."},{"key":"e_1_3_2_1_47_1","unstructured":"Russia says Twitter complying with demand to remove 'banned content' 2021. https:\/\/www.reuters.com\/technology\/russia-says-twitter-is-complying-with-demand-remove-banned-content-2021-04-30\/."},{"key":"e_1_3_2_1_48_1","volume-title":"USENIX Annual Technical Conference. USENIX Association","author":"Scott W.","year":"2016","unstructured":"W. Scott, T. Anderson, T. Kohno, and A. Krishnamurthy. Satellite: Joint analysis of CDNs and network-level interference. In USENIX Annual Technical Conference. USENIX Association, 2016."},{"key":"e_1_3_2_1_49_1","volume-title":"despite supreme court ruling","author":"Sherman J.","year":"2020","unstructured":"J. Sherman. Kashmir internet shutdown continues, despite supreme court ruling, 2020. https:\/\/thediplomat.com\/2020\/08\/kashmir-internet-shutdown-continues-despite-supreme-court-ruling\/."},{"key":"e_1_3_2_1_50_1","volume-title":"Longitudinal Censorship Observatory. In ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery","author":"Raman R. Sundara","year":"2020","unstructured":"R. Sundara Raman, P. Shenoy, K. Kohls, and R. Ensafi. Censored Planet: An Internet-wide, Longitudinal Censorship Observatory. In ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, 2020."},{"key":"e_1_3_2_1_51_1","unstructured":"Telegram 2021. https:\/\/t.me\/roskomsvoboda\/6619."},{"key":"e_1_3_2_1_52_1","volume-title":"USENIX Security Symposium. USENIX Association","author":"VanderSloot B.","year":"2018","unstructured":"B. VanderSloot, A. McDonald, W. Scott, J. A. Halderman, and R. Ensafi. Quack: Scalable remote measurement of application-layer censorship. In USENIX Security Symposium. USENIX Association, 2018."},{"key":"e_1_3_2_1_53_1","volume-title":"Is my Twitter slow or what?","author":"Viktorov A.","year":"2021","unstructured":"A. Viktorov. Is my Twitter slow or what?, 2021. https:\/\/lynx.pink\/is-my-twitter-slow-or-what\/."},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2020.24083"},{"key":"e_1_3_2_1_55_1","volume-title":"The internet in iran is crawling, conveniently, right before planned protests","author":"Wilhelm A.","year":"2010","unstructured":"A. Wilhelm. The internet in iran is crawling, conveniently, right before planned protests, 2010. https:\/\/thenextweb.com\/news\/internet-iran-crawling-conveniently-planned-protests."},{"key":"e_1_3_2_1_56_1","volume-title":"Workshop on Free and Open Communications on the Internet. USENIX Association","author":"Winter P.","year":"2012","unstructured":"P. Winter and S. Lindskog. How the great firewall of china is blocking tor. In Workshop on Free and Open Communications on the Internet. USENIX Association, 2012."},{"key":"e_1_3_2_1_57_1","volume-title":"Internet censorship in china: Where does the filtering occur? In N","author":"Xu X.","year":"2011","unstructured":"X. Xu, Z. M. Mao, and J. A. Halderman. Internet censorship in china: Where does the filtering occur? In N. Spring and G. F. Riley, editors, Passive and Active Measurement. Springer Berlin Heidelberg, 2011."},{"key":"e_1_3_2_1_58_1","unstructured":"zapret v.39 2021. https:\/\/github.com\/bol-van\/zapret."},{"key":"e_1_3_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1145\/1644893.1644905"}],"event":{"name":"IMC '21: ACM Internet Measurement Conference","sponsor":["SIGCOMM ACM Special Interest Group on Data Communication","SIGMETRICS ACM Special Interest Group on Measurement and Evaluation","USENIX Assoc USENIX Assoc"],"location":"Virtual Event","acronym":"IMC '21"},"container-title":["Proceedings of the 21st ACM Internet Measurement Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3487552.3487858","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3487552.3487858","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,12,15]],"date-time":"2025-12-15T17:23:16Z","timestamp":1765819396000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3487552.3487858"}},"subtitle":["an emerging censorship technique in Russia"],"short-title":[],"issued":{"date-parts":[[2021,11,2]]},"references-count":59,"alternative-id":["10.1145\/3487552.3487858","10.1145\/3487552"],"URL":"https:\/\/doi.org\/10.1145\/3487552.3487858","relation":{},"subject":[],"published":{"date-parts":[[2021,11,2]]},"assertion":[{"value":"2021-11-02","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}