[go: up one dir, main page]

Skip to main content

Internet Anonymity in Syria, Challenges and Solution

  • Conference paper
  • First Online:
IT Convergence and Security 2012

Part of the book series: Lecture Notes in Electrical Engineering ((LNEE,volume 215))

Abstract

Surfing the web without anonymity in Syria has risked many activists and journalists’ lives. Furthermore, using the available anti-censorship techniques is challenging in such country due to Internet bandwidth limitations and the extensive filtering performed by Syria‘s licensed Internet service providers. In this paper, we highlight the Internet censorship in Syria. We propose a solution that provides suitable anti-censorship for Syrian activists based on TOR. We shift most of the heavy computational tasks from the client to our network nodes. The cryptography tasks are chosen lightweight to suit the bandwidth limitations. We show that our solution can provide safe web surfing in Syria.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 169.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Reporters Without Borders (2012) Enemies of the Internet. http://En.Rsf.Org/Beset-By-Online-Surveillance-and-12-03-2012,42061.html. 19 March 2012

  2. Reporters Without Borders (2011) Press freedom index 2011/2012. http://En.Rsf.Org/Press-Freedom-Index-2011-2012,1043.Html

  3. Dingledine R, Mathewson N, Syverson P (2004) Tor: the second generation onion router. In: Proceedings on USENIX security ‘04, Aug 2004

    Google Scholar 

  4. Citizen Lab And Canada Centre For Global Security Studies (2011) The Canadian connection: an investigation of Syrian Government and Hezbullah Web hosting in Canada, 16 Nov 2011

    Google Scholar 

  5. Ancillotti E, Bruno R, Conti M (2011) An efficient routing protocol for point-to-point elastic traffic in wireless mesh networks. In: Proceeings on WOWMOM ‘11, 2011

    Google Scholar 

  6. Mingming H, Qin Z, Kuramoto M, Cho F, Zhang L (2011) Research and implementation of layer two tunneling protocol (L2TP) on carrier network. In: Proceedings on IC-BNMT, pp 80–83

    Google Scholar 

  7. Deibert R, Palfrey J, Rohozinski R, Zittrain J (2008) Access denied: the practice and policy of global Internet filtering. Information revolution and global politics. MIT Press, Cambridge

    Google Scholar 

  8. Freedom House Report (2012) http://www.Freedomhouse.Org/Report/Freedom-World/2012/

  9. Liao M, Luo M, Yang C, Chen C, Wu P, Chen Y (2012) Design and evaluation of deep packet inspection system: a case study. Netw IET 1(1):2–9

    Article  Google Scholar 

  10. http://Telecomix.Org/

  11. Newswire PR (2004) Blue coat delivers high-performance Web filtering using ISS Proventia WEB Filter Technology. 26 Oct 2004, Source: Proquest Central

    Google Scholar 

  12. Roberts P (2010) Chinese DNS tampering a big threat to Internet security. https://Threatpost.Com/En%5Fus/Blogs/Chinese-Dns-Tampering-Bigthreat-Internet-Security-112410

  13. Du G, Zhang Z, X. Wu. “HTTP Proxy Server Based on Real-Time Link,” in Proc. on 2010 MINES, pp 169–173, 4–6 Nov 2010

    Google Scholar 

  14. Sinnreich H, Johnston AB (2006) Internet communications using SIP: delivering VoIP and multimedia services with session initiation protocol (networking council). Wiley, New York

    Google Scholar 

  15. Blaze M, Bleumer G, Strauss M (1998) Divertible protocols and atomic proxy cryptography. In: Proceedings on advances in cryptology—eurocrypt’98, 1998

    Google Scholar 

  16. Ultrasurf—Free Proxy-Based Internet Privacy and Security Tools. http://Ultrasurf.Us/Securitykiss—Free VPN Service; http://www.Securitykiss.Com/

  17. Surf Anonymously. http://Cyberghostvpn.Com/

  18. Anchorfree hotspot shield | hotspotshield.com. www.Hotspotshield.com/Free-Elite-Trial/?Gclid=Ckqelqpbvbicfutt4god4ioazg

  19. Expat shield. http://www.Expatshield.Com/

  20. Tor project: anonymity online. https://www.Torproject.org/

  21. Freegate | Global Internet freedom consortium. http://www.Internetfreedom.Org/Freegate

  22. Your freedom—bypass firewalls and proxies, stay anonymous. https://www.Your-Freedom.Net

Download references

Acknowledgments

This research was supported by Basic Science Research Program through the National Research Foundation of Korea (KRF) funded by the Ministry of Education, Science and Technology (2012R1A1A2042035)

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to T. Eissa .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2013 Springer Science+Business Media Dordrecht

About this paper

Cite this paper

Eissa, T., Cho, Gh. (2013). Internet Anonymity in Syria, Challenges and Solution. In: Kim, K., Chung, KY. (eds) IT Convergence and Security 2012. Lecture Notes in Electrical Engineering, vol 215. Springer, Dordrecht. https://doi.org/10.1007/978-94-007-5860-5_21

Download citation

  • DOI: https://doi.org/10.1007/978-94-007-5860-5_21

  • Published:

  • Publisher Name: Springer, Dordrecht

  • Print ISBN: 978-94-007-5859-9

  • Online ISBN: 978-94-007-5860-5

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics