Internet Anonymity in Syria, Challenges and Solution

  • T. Eissa
  • Gi-hwan Cho
Conference paper
Part of the Lecture Notes in Electrical Engineering book series (LNEE, volume 215)


Surfing the web without anonymity in Syria has risked many activists and journalists’ lives. Furthermore, using the available anti-censorship techniques is challenging in such country due to Internet bandwidth limitations and the extensive filtering performed by Syria‘s licensed Internet service providers. In this paper, we highlight the Internet censorship in Syria. We propose a solution that provides suitable anti-censorship for Syrian activists based on TOR. We shift most of the heavy computational tasks from the client to our network nodes. The cryptography tasks are chosen lightweight to suit the bandwidth limitations. We show that our solution can provide safe web surfing in Syria.


Anonymity Censorship TOR Anti-censorship 



This research was supported by Basic Science Research Program through the National Research Foundation of Korea (KRF) funded by the Ministry of Education, Science and Technology (2012R1A1A2042035)


  1. 1.
    Reporters Without Borders (2012) Enemies of the Internet. http://En.Rsf.Org/Beset-By-Online-Surveillance-and-12-03-2012,42061.html. 19 March 2012
  2. 2.
    Reporters Without Borders (2011) Press freedom index 2011/2012. http://En.Rsf.Org/Press-Freedom-Index-2011-2012,1043.Html
  3. 3.
    Dingledine R, Mathewson N, Syverson P (2004) Tor: the second generation onion router. In: Proceedings on USENIX security ‘04, Aug 2004Google Scholar
  4. 4.
    Citizen Lab And Canada Centre For Global Security Studies (2011) The Canadian connection: an investigation of Syrian Government and Hezbullah Web hosting in Canada, 16 Nov 2011Google Scholar
  5. 5.
    Ancillotti E, Bruno R, Conti M (2011) An efficient routing protocol for point-to-point elastic traffic in wireless mesh networks. In: Proceeings on WOWMOM ‘11, 2011Google Scholar
  6. 6.
    Mingming H, Qin Z, Kuramoto M, Cho F, Zhang L (2011) Research and implementation of layer two tunneling protocol (L2TP) on carrier network. In: Proceedings on IC-BNMT, pp 80–83Google Scholar
  7. 7.
    Deibert R, Palfrey J, Rohozinski R, Zittrain J (2008) Access denied: the practice and policy of global Internet filtering. Information revolution and global politics. MIT Press, CambridgeGoogle Scholar
  8. 8.
  9. 9.
    Liao M, Luo M, Yang C, Chen C, Wu P, Chen Y (2012) Design and evaluation of deep packet inspection system: a case study. Netw IET 1(1):2–9CrossRefGoogle Scholar
  10. 10.
  11. 11.
    Newswire PR (2004) Blue coat delivers high-performance Web filtering using ISS Proventia WEB Filter Technology. 26 Oct 2004, Source: Proquest CentralGoogle Scholar
  12. 12.
    Roberts P (2010) Chinese DNS tampering a big threat to Internet security. https://Threatpost.Com/En%5Fus/Blogs/Chinese-Dns-Tampering-Bigthreat-Internet-Security-112410
  13. 13.
    Du G, Zhang Z, X. Wu. “HTTP Proxy Server Based on Real-Time Link,” in Proc. on 2010 MINES, pp 169–173, 4–6 Nov 2010Google Scholar
  14. 14.
    Sinnreich H, Johnston AB (2006) Internet communications using SIP: delivering VoIP and multimedia services with session initiation protocol (networking council). Wiley, New YorkGoogle Scholar
  15. 15.
    Blaze M, Bleumer G, Strauss M (1998) Divertible protocols and atomic proxy cryptography. In: Proceedings on advances in cryptology—eurocrypt’98, 1998Google Scholar
  16. 16.
    Ultrasurf—Free Proxy-Based Internet Privacy and Security Tools. http://Ultrasurf.Us/Securitykiss—Free VPN Service; http://www.Securitykiss.Com/
  17. 17.
    Surf Anonymously. http://Cyberghostvpn.Com/
  18. 18.
    Anchorfree hotspot shield |
  19. 19.
  20. 20.
    Tor project: anonymity online.
  21. 21.
    Freegate | Global Internet freedom consortium. http://www.Internetfreedom.Org/Freegate
  22. 22.
    Your freedom—bypass firewalls and proxies, stay anonymous. https://www.Your-Freedom.Net

Copyright information

© Springer Science+Business Media Dordrecht 2013

Authors and Affiliations

  1. 1.Division of CSEChonbuk National UniversityJeonjuRepublic of Korea

Personalised recommendations