Abstract
Surfing the web without anonymity in Syria has risked many activists and journalists’ lives. Furthermore, using the available anti-censorship techniques is challenging in such country due to Internet bandwidth limitations and the extensive filtering performed by Syria‘s licensed Internet service providers. In this paper, we highlight the Internet censorship in Syria. We propose a solution that provides suitable anti-censorship for Syrian activists based on TOR. We shift most of the heavy computational tasks from the client to our network nodes. The cryptography tasks are chosen lightweight to suit the bandwidth limitations. We show that our solution can provide safe web surfing in Syria.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Reporters Without Borders (2012) Enemies of the Internet. http://En.Rsf.Org/Beset-By-Online-Surveillance-and-12-03-2012,42061.html. 19 March 2012
Reporters Without Borders (2011) Press freedom index 2011/2012. http://En.Rsf.Org/Press-Freedom-Index-2011-2012,1043.Html
Dingledine R, Mathewson N, Syverson P (2004) Tor: the second generation onion router. In: Proceedings on USENIX security ‘04, Aug 2004
Citizen Lab And Canada Centre For Global Security Studies (2011) The Canadian connection: an investigation of Syrian Government and Hezbullah Web hosting in Canada, 16 Nov 2011
Ancillotti E, Bruno R, Conti M (2011) An efficient routing protocol for point-to-point elastic traffic in wireless mesh networks. In: Proceeings on WOWMOM ‘11, 2011
Mingming H, Qin Z, Kuramoto M, Cho F, Zhang L (2011) Research and implementation of layer two tunneling protocol (L2TP) on carrier network. In: Proceedings on IC-BNMT, pp 80–83
Deibert R, Palfrey J, Rohozinski R, Zittrain J (2008) Access denied: the practice and policy of global Internet filtering. Information revolution and global politics. MIT Press, Cambridge
Freedom House Report (2012) http://www.Freedomhouse.Org/Report/Freedom-World/2012/
Liao M, Luo M, Yang C, Chen C, Wu P, Chen Y (2012) Design and evaluation of deep packet inspection system: a case study. Netw IET 1(1):2–9
Newswire PR (2004) Blue coat delivers high-performance Web filtering using ISS Proventia WEB Filter Technology. 26 Oct 2004, Source: Proquest Central
Roberts P (2010) Chinese DNS tampering a big threat to Internet security. https://Threatpost.Com/En%5Fus/Blogs/Chinese-Dns-Tampering-Bigthreat-Internet-Security-112410
Du G, Zhang Z, X. Wu. “HTTP Proxy Server Based on Real-Time Link,” in Proc. on 2010 MINES, pp 169–173, 4–6 Nov 2010
Sinnreich H, Johnston AB (2006) Internet communications using SIP: delivering VoIP and multimedia services with session initiation protocol (networking council). Wiley, New York
Blaze M, Bleumer G, Strauss M (1998) Divertible protocols and atomic proxy cryptography. In: Proceedings on advances in cryptology—eurocrypt’98, 1998
Ultrasurf—Free Proxy-Based Internet Privacy and Security Tools. http://Ultrasurf.Us/Securitykiss—Free VPN Service; http://www.Securitykiss.Com/
Surf Anonymously. http://Cyberghostvpn.Com/
Anchorfree hotspot shield | hotspotshield.com. www.Hotspotshield.com/Free-Elite-Trial/?Gclid=Ckqelqpbvbicfutt4god4ioazg
Expat shield. http://www.Expatshield.Com/
Tor project: anonymity online. https://www.Torproject.org/
Freegate | Global Internet freedom consortium. http://www.Internetfreedom.Org/Freegate
Your freedom—bypass firewalls and proxies, stay anonymous. https://www.Your-Freedom.Net
Acknowledgments
This research was supported by Basic Science Research Program through the National Research Foundation of Korea (KRF) funded by the Ministry of Education, Science and Technology (2012R1A1A2042035)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2013 Springer Science+Business Media Dordrecht
About this paper
Cite this paper
Eissa, T., Cho, Gh. (2013). Internet Anonymity in Syria, Challenges and Solution. In: Kim, K., Chung, KY. (eds) IT Convergence and Security 2012. Lecture Notes in Electrical Engineering, vol 215. Springer, Dordrecht. https://doi.org/10.1007/978-94-007-5860-5_21
Download citation
DOI: https://doi.org/10.1007/978-94-007-5860-5_21
Published:
Publisher Name: Springer, Dordrecht
Print ISBN: 978-94-007-5859-9
Online ISBN: 978-94-007-5860-5
eBook Packages: EngineeringEngineering (R0)