SlideShare a Scribd company logo
1 of 14
Web Filtering
Table of Contents
 Need of Filtering
 Content Filtering
 Basic Model
 Filtering Techniques
 Email Filtering
 Circumvent Filtering
 Problems with Filtering
 Conclusion
Review About Web Filter
Content Filtering
 Analysis of Email and Web content
 Prevent malware and spam from
entering the network
 Determine whether incoming data
is harmful to the network or
outgoing data includes intellectual
property
 Such data is then blocked from
entering or leaving the network
 Simple network layout
 Network with traffic proxy
Web Security and Anti-Virus
Network Layout
Connection is made by forwarding the uninspected traffic
straight to the destination.
Network with Traffic Proxied
Traffic is received by an application which alters the traffic
in both the directions before sending to the destination.
Web Filtering Techniques
 Firewalls
 URL Based Filtering
 Content Analysis
Firewalls
 Basic level of web filtering
 Inspects traffic to identify requested site
to make decision (allow or block)
 Black Lists: Undesirable Web addresses
 White Lists: Desirable Web addresses
URL Based Filtering
 Database of web addresses
 Database loaded onto proxy
servers, firewalls and other
network infrastructure devices
 Supports granular blocking
Content Analysis
 Keyword Scanning
 Image Scanning
Keywords Scanning
 Tag words: Positive or Negative
score
 Block:
Sum (score) > Threshold
Image Scanning
Content Analysis
Email Filtering
 Primary communication
channel
 Need to control SPAM and virus
mails
Filtering Techniques
 Channel/Response:
Sender perform task
 Heuristic Filters: Score words
or phrases
 Bayesian Filters: Mathematical
Probability
Circumventing Web Filtering Getting around them:
Traffic is not passed through the filter.
 Getting through them:
Traffic is passed through the filter by obscuring
the address of content and/or the content
itself.
Type of Content Tested Accuracy Percentage
Content of an Adult Nature – direct URL access 87%
Content of an Adult Nature – keyword searches 81%
Content not of an Adult Nature – direct URL access 86%
Content not of an Adult Nature – keyword searches 69%
Image Searches 44%
Email Attachments 25%
RSS Feeds 48%
Catalog Searches 75%
Database Searches 88%
Internet Filtering Test
Problem with filtering
"It could be expected that allowed
content would be blocked. If all
pornographic content is to be
blocked, other content with a
resemblance in features will also be
blocked; e.g. Adult education,
medical information, erotic content
etc."
“All filters over block. All filters under block.
No filter is 100% accurate because no
one agrees on what being 100%
accurate is.”
Conclusion
1.DansGuardian (Cross Platform, Free)
2.K9 (Windows/Mac, Free)
3.OpenDNS (Cross Platform, Free)
4.SquidGuard/Squid (Linux, Free)
5.Hosts File (Cross Platform, Free)
Five Best Content Filtering Tools
Use Of DansGuardian
Reference
1) http://dansguardian.org/?page=whatisdg
2) http://www1.k9webprotection.com/aboutk9/overview
3) https://www.opendns.com/about/
4) https://www.opendns.com/about/
5) http://en.wikipedia.org/wiki/Hosts_%28file%29
6) http://en.wikipedia.org/wiki/Internet_security

More Related Content

What's hot

Network security (vulnerabilities, threats, and attacks)
Network security (vulnerabilities, threats, and attacks)Network security (vulnerabilities, threats, and attacks)
Network security (vulnerabilities, threats, and attacks)Fabiha Shahzad
 
Types of firewall
Types of firewallTypes of firewall
Types of firewallPina Parmar
 
Overview of the Cyber Kill Chain [TM]
Overview of the Cyber Kill Chain [TM]Overview of the Cyber Kill Chain [TM]
Overview of the Cyber Kill Chain [TM]David Sweigert
 
Spoofing
SpoofingSpoofing
SpoofingSanjeev
 
Introduction to Cyber Security
Introduction to Cyber SecurityIntroduction to Cyber Security
Introduction to Cyber SecurityStephen Lahanas
 
Basics of Denial of Service Attacks
Basics of Denial of Service AttacksBasics of Denial of Service Attacks
Basics of Denial of Service AttacksHansa Nidushan
 
Firewall and Types of firewall
Firewall and Types of firewallFirewall and Types of firewall
Firewall and Types of firewallCoder Tech
 
Intrusion detection and prevention system
Intrusion detection and prevention systemIntrusion detection and prevention system
Intrusion detection and prevention systemNikhil Raj
 
Cyber security
Cyber securityCyber security
Cyber securityPrem Raval
 
Network security - Defense in Depth
Network security - Defense in DepthNetwork security - Defense in Depth
Network security - Defense in DepthDilum Bandara
 
Intrusion Detection Systems and Intrusion Prevention Systems
Intrusion Detection Systems  and Intrusion Prevention Systems Intrusion Detection Systems  and Intrusion Prevention Systems
Intrusion Detection Systems and Intrusion Prevention Systems Cleverence Kombe
 
Web application attacks
Web application attacksWeb application attacks
Web application attackshruth
 
Network Security Fundamentals
Network Security FundamentalsNetwork Security Fundamentals
Network Security FundamentalsRahmat Suhatman
 
Cyber crime and cyber security
Cyber crime and cyber securityCyber crime and cyber security
Cyber crime and cyber securityjyoti_lakhani
 
Password Cracking
Password CrackingPassword Cracking
Password CrackingSagar Verma
 

What's hot (20)

Network security (vulnerabilities, threats, and attacks)
Network security (vulnerabilities, threats, and attacks)Network security (vulnerabilities, threats, and attacks)
Network security (vulnerabilities, threats, and attacks)
 
Network security
Network securityNetwork security
Network security
 
Types of firewall
Types of firewallTypes of firewall
Types of firewall
 
Overview of the Cyber Kill Chain [TM]
Overview of the Cyber Kill Chain [TM]Overview of the Cyber Kill Chain [TM]
Overview of the Cyber Kill Chain [TM]
 
Spoofing
SpoofingSpoofing
Spoofing
 
Introduction to Cyber Security
Introduction to Cyber SecurityIntroduction to Cyber Security
Introduction to Cyber Security
 
Cryptography.ppt
Cryptography.pptCryptography.ppt
Cryptography.ppt
 
Basics of Denial of Service Attacks
Basics of Denial of Service AttacksBasics of Denial of Service Attacks
Basics of Denial of Service Attacks
 
Firewall and Types of firewall
Firewall and Types of firewallFirewall and Types of firewall
Firewall and Types of firewall
 
Intrusion detection and prevention system
Intrusion detection and prevention systemIntrusion detection and prevention system
Intrusion detection and prevention system
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber Security Layers - Defense in Depth
Cyber Security Layers - Defense in DepthCyber Security Layers - Defense in Depth
Cyber Security Layers - Defense in Depth
 
Web Security
Web SecurityWeb Security
Web Security
 
Network security - Defense in Depth
Network security - Defense in DepthNetwork security - Defense in Depth
Network security - Defense in Depth
 
Intrusion Detection Systems and Intrusion Prevention Systems
Intrusion Detection Systems  and Intrusion Prevention Systems Intrusion Detection Systems  and Intrusion Prevention Systems
Intrusion Detection Systems and Intrusion Prevention Systems
 
Web application attacks
Web application attacksWeb application attacks
Web application attacks
 
Network Security Fundamentals
Network Security FundamentalsNetwork Security Fundamentals
Network Security Fundamentals
 
Cyber crime and cyber security
Cyber crime and cyber securityCyber crime and cyber security
Cyber crime and cyber security
 
Denial of service
Denial of serviceDenial of service
Denial of service
 
Password Cracking
Password CrackingPassword Cracking
Password Cracking
 

Viewers also liked

Internet Filtering and Blocking
Internet Filtering and BlockingInternet Filtering and Blocking
Internet Filtering and BlockingJoshua Sparks
 
Internet Filtering, Intellectual Freedom, & Your School Librarian
Internet Filtering, Intellectual Freedom, & Your School LibrarianInternet Filtering, Intellectual Freedom, & Your School Librarian
Internet Filtering, Intellectual Freedom, & Your School LibrarianKate Gukeisen
 
Web Content Filtering for Education and Schools - Webtitan Cloud Reseller Pre...
Web Content Filtering for Education and Schools - Webtitan Cloud Reseller Pre...Web Content Filtering for Education and Schools - Webtitan Cloud Reseller Pre...
Web Content Filtering for Education and Schools - Webtitan Cloud Reseller Pre...Dryden Geary
 
Entity Relationship Model
Entity Relationship ModelEntity Relationship Model
Entity Relationship ModelSlideshare
 
Web Mining Presentation Final
Web Mining Presentation FinalWeb Mining Presentation Final
Web Mining Presentation FinalEr. Jagrat Gupta
 
Web mining slides
Web mining slidesWeb mining slides
Web mining slidesmahavir_a
 

Viewers also liked (12)

Internet Filtering and Blocking
Internet Filtering and BlockingInternet Filtering and Blocking
Internet Filtering and Blocking
 
Internet Filtering, Intellectual Freedom, & Your School Librarian
Internet Filtering, Intellectual Freedom, & Your School LibrarianInternet Filtering, Intellectual Freedom, & Your School Librarian
Internet Filtering, Intellectual Freedom, & Your School Librarian
 
Web Content Filtering for Education and Schools - Webtitan Cloud Reseller Pre...
Web Content Filtering for Education and Schools - Webtitan Cloud Reseller Pre...Web Content Filtering for Education and Schools - Webtitan Cloud Reseller Pre...
Web Content Filtering for Education and Schools - Webtitan Cloud Reseller Pre...
 
Web mining
Web miningWeb mining
Web mining
 
Web mining
Web miningWeb mining
Web mining
 
Entity Relationship Model
Entity Relationship ModelEntity Relationship Model
Entity Relationship Model
 
Web content mining
Web content miningWeb content mining
Web content mining
 
WEB MINING.
WEB MINING.WEB MINING.
WEB MINING.
 
Web Mining Presentation Final
Web Mining Presentation FinalWeb Mining Presentation Final
Web Mining Presentation Final
 
Web mining slides
Web mining slidesWeb mining slides
Web mining slides
 
Filters
FiltersFilters
Filters
 
Web Mining
Web Mining Web Mining
Web Mining
 

Similar to Web filtering through Software

Trying Not to Filter: Internet Filtering Technologies in Libraries
Trying Not to Filter: Internet Filtering Technologies in LibrariesTrying Not to Filter: Internet Filtering Technologies in Libraries
Trying Not to Filter: Internet Filtering Technologies in LibrariesSarah Houghton
 
Netsentron Content Filter
Netsentron Content FilterNetsentron Content Filter
Netsentron Content FilterTom Kobelt
 
Barracuda Web Filter Cipa Presentation
Barracuda Web Filter Cipa PresentationBarracuda Web Filter Cipa Presentation
Barracuda Web Filter Cipa PresentationCarolynrahn
 
Binance Supports Number
Binance Supports NumberBinance Supports Number
Binance Supports Numberkanha lal
 
1629885596 seoppt1 130303013241-phpapp02
1629885596 seoppt1 130303013241-phpapp021629885596 seoppt1 130303013241-phpapp02
1629885596 seoppt1 130303013241-phpapp02DpSaini1
 
Proxy log review and use cases
Proxy log review and use casesProxy log review and use cases
Proxy log review and use casesMostafa Yahia
 
OWASP Secure Coding
OWASP Secure CodingOWASP Secure Coding
OWASP Secure Codingbilcorry
 
data mining for security application
data mining for security applicationdata mining for security application
data mining for security applicationbharatsvnit
 
data mining for security application
data mining for security applicationdata mining for security application
data mining for security applicationbharatsvnit
 
Module 13 (web based password cracking techniques)
Module 13 (web based password cracking techniques)Module 13 (web based password cracking techniques)
Module 13 (web based password cracking techniques)Wail Hassan
 
Fear of Filtering: The Reality of Internet Content Management (Soreide DOC)
Fear of Filtering: The Reality of Internet Content Management (Soreide DOC)Fear of Filtering: The Reality of Internet Content Management (Soreide DOC)
Fear of Filtering: The Reality of Internet Content Management (Soreide DOC)Nebraska Library Commission
 
Principles Of Searching Reading Discussion
Principles Of Searching Reading DiscussionPrinciples Of Searching Reading Discussion
Principles Of Searching Reading Discussionscaines
 

Similar to Web filtering through Software (20)

Trying Not to Filter: Internet Filtering Technologies in Libraries
Trying Not to Filter: Internet Filtering Technologies in LibrariesTrying Not to Filter: Internet Filtering Technologies in Libraries
Trying Not to Filter: Internet Filtering Technologies in Libraries
 
Netsentron Content Filter
Netsentron Content FilterNetsentron Content Filter
Netsentron Content Filter
 
Barracuda Web Filter Cipa Presentation
Barracuda Web Filter Cipa PresentationBarracuda Web Filter Cipa Presentation
Barracuda Web Filter Cipa Presentation
 
Watch guard reputation enabled defense
Watch guard reputation enabled defenseWatch guard reputation enabled defense
Watch guard reputation enabled defense
 
Seo
SeoSeo
Seo
 
Binance Supports Number
Binance Supports NumberBinance Supports Number
Binance Supports Number
 
SEO PPT
SEO PPTSEO PPT
SEO PPT
 
Seo
SeoSeo
Seo
 
1629885596 seoppt1 130303013241-phpapp02
1629885596 seoppt1 130303013241-phpapp021629885596 seoppt1 130303013241-phpapp02
1629885596 seoppt1 130303013241-phpapp02
 
Proxy log review and use cases
Proxy log review and use casesProxy log review and use cases
Proxy log review and use cases
 
2 . web app s canners
2 . web app s canners2 . web app s canners
2 . web app s canners
 
Web mining
Web miningWeb mining
Web mining
 
OWASP Secure Coding
OWASP Secure CodingOWASP Secure Coding
OWASP Secure Coding
 
data mining for security application
data mining for security applicationdata mining for security application
data mining for security application
 
data mining for security application
data mining for security applicationdata mining for security application
data mining for security application
 
Module 13 (web based password cracking techniques)
Module 13 (web based password cracking techniques)Module 13 (web based password cracking techniques)
Module 13 (web based password cracking techniques)
 
Fear of Filtering: The Reality of Internet Content Management (Soreide DOC)
Fear of Filtering: The Reality of Internet Content Management (Soreide DOC)Fear of Filtering: The Reality of Internet Content Management (Soreide DOC)
Fear of Filtering: The Reality of Internet Content Management (Soreide DOC)
 
Internet Research
Internet ResearchInternet Research
Internet Research
 
Web Mining
Web MiningWeb Mining
Web Mining
 
Principles Of Searching Reading Discussion
Principles Of Searching Reading DiscussionPrinciples Of Searching Reading Discussion
Principles Of Searching Reading Discussion
 

More from university of education,Lahore

More from university of education,Lahore (20)

Activites and Time Planning
 Activites and Time Planning Activites and Time Planning
Activites and Time Planning
 
Steganography
SteganographySteganography
Steganography
 
Classical Encryption Techniques
Classical Encryption TechniquesClassical Encryption Techniques
Classical Encryption Techniques
 
Activites and Time Planning
Activites and Time PlanningActivites and Time Planning
Activites and Time Planning
 
OSI Security Architecture
OSI Security ArchitectureOSI Security Architecture
OSI Security Architecture
 
Network Security Terminologies
Network Security TerminologiesNetwork Security Terminologies
Network Security Terminologies
 
Project Scheduling, Planning and Risk Management
Project Scheduling, Planning and Risk ManagementProject Scheduling, Planning and Risk Management
Project Scheduling, Planning and Risk Management
 
Software Testing and Debugging
Software Testing and DebuggingSoftware Testing and Debugging
Software Testing and Debugging
 
ePayment Methods
ePayment MethodsePayment Methods
ePayment Methods
 
SEO
SEOSEO
SEO
 
A Star Search
A Star SearchA Star Search
A Star Search
 
Enterprise Application Integration
Enterprise Application IntegrationEnterprise Application Integration
Enterprise Application Integration
 
Uml Diagrams
Uml DiagramsUml Diagrams
Uml Diagrams
 
eDras Max
eDras MaxeDras Max
eDras Max
 
RAD Model
RAD ModelRAD Model
RAD Model
 
Microsoft Project
Microsoft ProjectMicrosoft Project
Microsoft Project
 
Itertaive Process Development
Itertaive Process DevelopmentItertaive Process Development
Itertaive Process Development
 
Computer Aided Software Engineering Nayab Awan
Computer Aided Software Engineering Nayab AwanComputer Aided Software Engineering Nayab Awan
Computer Aided Software Engineering Nayab Awan
 
Lect 2 assessing the technology landscape
Lect 2 assessing the technology landscapeLect 2 assessing the technology landscape
Lect 2 assessing the technology landscape
 
system level requirements gathering and analysis
system level requirements gathering and analysissystem level requirements gathering and analysis
system level requirements gathering and analysis
 

Recently uploaded

Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsTechSoup
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxVishalSingh1417
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
An Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdfAn Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdfSanaAli374401
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...christianmathematics
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17Celine George
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhikauryashika82
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.christianmathematics
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Disha Kariya
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxVishalSingh1417
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxDenish Jangid
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docxPoojaSen20
 

Recently uploaded (20)

Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
An Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdfAn Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdf
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docx
 

Web filtering through Software

  • 2. Table of Contents  Need of Filtering  Content Filtering  Basic Model  Filtering Techniques  Email Filtering  Circumvent Filtering  Problems with Filtering  Conclusion
  • 4. Content Filtering  Analysis of Email and Web content  Prevent malware and spam from entering the network  Determine whether incoming data is harmful to the network or outgoing data includes intellectual property  Such data is then blocked from entering or leaving the network  Simple network layout  Network with traffic proxy Web Security and Anti-Virus
  • 5. Network Layout Connection is made by forwarding the uninspected traffic straight to the destination. Network with Traffic Proxied Traffic is received by an application which alters the traffic in both the directions before sending to the destination.
  • 6. Web Filtering Techniques  Firewalls  URL Based Filtering  Content Analysis Firewalls  Basic level of web filtering  Inspects traffic to identify requested site to make decision (allow or block)  Black Lists: Undesirable Web addresses  White Lists: Desirable Web addresses
  • 7. URL Based Filtering  Database of web addresses  Database loaded onto proxy servers, firewalls and other network infrastructure devices  Supports granular blocking Content Analysis  Keyword Scanning  Image Scanning
  • 8. Keywords Scanning  Tag words: Positive or Negative score  Block: Sum (score) > Threshold Image Scanning Content Analysis
  • 9. Email Filtering  Primary communication channel  Need to control SPAM and virus mails Filtering Techniques  Channel/Response: Sender perform task  Heuristic Filters: Score words or phrases  Bayesian Filters: Mathematical Probability
  • 10. Circumventing Web Filtering Getting around them: Traffic is not passed through the filter.  Getting through them: Traffic is passed through the filter by obscuring the address of content and/or the content itself. Type of Content Tested Accuracy Percentage Content of an Adult Nature – direct URL access 87% Content of an Adult Nature – keyword searches 81% Content not of an Adult Nature – direct URL access 86% Content not of an Adult Nature – keyword searches 69% Image Searches 44% Email Attachments 25% RSS Feeds 48% Catalog Searches 75% Database Searches 88% Internet Filtering Test
  • 11. Problem with filtering "It could be expected that allowed content would be blocked. If all pornographic content is to be blocked, other content with a resemblance in features will also be blocked; e.g. Adult education, medical information, erotic content etc." “All filters over block. All filters under block. No filter is 100% accurate because no one agrees on what being 100% accurate is.” Conclusion
  • 12. 1.DansGuardian (Cross Platform, Free) 2.K9 (Windows/Mac, Free) 3.OpenDNS (Cross Platform, Free) 4.SquidGuard/Squid (Linux, Free) 5.Hosts File (Cross Platform, Free) Five Best Content Filtering Tools
  • 14. Reference 1) http://dansguardian.org/?page=whatisdg 2) http://www1.k9webprotection.com/aboutk9/overview 3) https://www.opendns.com/about/ 4) https://www.opendns.com/about/ 5) http://en.wikipedia.org/wiki/Hosts_%28file%29 6) http://en.wikipedia.org/wiki/Internet_security