SlideShare a Scribd company logo
1 of 14
Web Filtering
Table of Contents
 Need of Filtering
 Content Filtering
 Basic Model
 Filtering Techniques
 Email Filtering
 Circumvent Filtering
 Problems with Filtering
 Conclusion
Review About Web Filter
Content Filtering
 Analysis of Email and Web content
 Prevent malware and spam from
entering the network
 Determine whether incoming data
is harmful to the network or
outgoing data includes intellectual
property
 Such data is then blocked from
entering or leaving the network
 Simple network layout
 Network with traffic proxy
Web Security and Anti-Virus
Network Layout
Connection is made by forwarding the uninspected traffic
straight to the destination.
Network with Traffic Proxied
Traffic is received by an application which alters the traffic
in both the directions before sending to the destination.
Web Filtering Techniques
 Firewalls
 URL Based Filtering
 Content Analysis
Firewalls
 Basic level of web filtering
 Inspects traffic to identify requested site
to make decision (allow or block)
 Black Lists: Undesirable Web addresses
 White Lists: Desirable Web addresses
URL Based Filtering
 Database of web addresses
 Database loaded onto proxy
servers, firewalls and other
network infrastructure devices
 Supports granular blocking
Content Analysis
 Keyword Scanning
 Image Scanning
Keywords Scanning
 Tag words: Positive or Negative
score
 Block:
Sum (score) > Threshold
Image Scanning
Content Analysis
Email Filtering
 Primary communication
channel
 Need to control SPAM and virus
mails
Filtering Techniques
 Channel/Response:
Sender perform task
 Heuristic Filters: Score words
or phrases
 Bayesian Filters: Mathematical
Probability
Circumventing Web Filtering Getting around them:
Traffic is not passed through the filter.
 Getting through them:
Traffic is passed through the filter by obscuring
the address of content and/or the content
itself.
Type of Content Tested Accuracy Percentage
Content of an Adult Nature – direct URL access 87%
Content of an Adult Nature – keyword searches 81%
Content not of an Adult Nature – direct URL access 86%
Content not of an Adult Nature – keyword searches 69%
Image Searches 44%
Email Attachments 25%
RSS Feeds 48%
Catalog Searches 75%
Database Searches 88%
Internet Filtering Test
Problem with filtering
"It could be expected that allowed
content would be blocked. If all
pornographic content is to be
blocked, other content with a
resemblance in features will also be
blocked; e.g. Adult education,
medical information, erotic content
etc."
“All filters over block. All filters under block.
No filter is 100% accurate because no
one agrees on what being 100%
accurate is.”
Conclusion
1.DansGuardian (Cross Platform, Free)
2.K9 (Windows/Mac, Free)
3.OpenDNS (Cross Platform, Free)
4.SquidGuard/Squid (Linux, Free)
5.Hosts File (Cross Platform, Free)
Five Best Content Filtering Tools
Use Of DansGuardian
Reference
1) http://dansguardian.org/?page=whatisdg
2) http://www1.k9webprotection.com/aboutk9/overview
3) https://www.opendns.com/about/
4) https://www.opendns.com/about/
5) http://en.wikipedia.org/wiki/Hosts_%28file%29
6) http://en.wikipedia.org/wiki/Internet_security

More Related Content

Viewers also liked

Ivett Gonzalez-ResumeC1
Ivett Gonzalez-ResumeC1Ivett Gonzalez-ResumeC1
Ivett Gonzalez-ResumeC1
ivett glez
 
Terapia nutricional no paciente criticamente enfermo
Terapia nutricional no paciente criticamente enfermoTerapia nutricional no paciente criticamente enfermo
Terapia nutricional no paciente criticamente enfermo
Larissa Goncalves
 
Verbos ser y llamarse (actividad de repaso)
Verbos ser y llamarse (actividad de repaso)Verbos ser y llamarse (actividad de repaso)
Verbos ser y llamarse (actividad de repaso)
José I. Iglesia Puig
 
Geografía física de españa (mares, montañas y ríos)
Geografía física de españa (mares, montañas y ríos)Geografía física de españa (mares, montañas y ríos)
Geografía física de españa (mares, montañas y ríos)
José I. Iglesia Puig
 

Viewers also liked (18)

UML Notations
UML NotationsUML Notations
UML Notations
 
Capturing System Behaviour
Capturing System BehaviourCapturing System Behaviour
Capturing System Behaviour
 
Distance Learning
Distance LearningDistance Learning
Distance Learning
 
Domain object model
Domain object modelDomain object model
Domain object model
 
El mobiliario de clase
El mobiliario de claseEl mobiliario de clase
El mobiliario de clase
 
Space Invaders – Amateure erobern den Weltraum
 Space Invaders – Amateure erobern den Weltraum Space Invaders – Amateure erobern den Weltraum
Space Invaders – Amateure erobern den Weltraum
 
Ivett Gonzalez-ResumeC1
Ivett Gonzalez-ResumeC1Ivett Gonzalez-ResumeC1
Ivett Gonzalez-ResumeC1
 
PPC COMP-NRA-400
PPC COMP-NRA-400PPC COMP-NRA-400
PPC COMP-NRA-400
 
Melia Reference
Melia ReferenceMelia Reference
Melia Reference
 
Zane P Engelbrecht CV-1
Zane P Engelbrecht CV-1Zane P Engelbrecht CV-1
Zane P Engelbrecht CV-1
 
Terapia nutricional no paciente criticamente enfermo
Terapia nutricional no paciente criticamente enfermoTerapia nutricional no paciente criticamente enfermo
Terapia nutricional no paciente criticamente enfermo
 
Verbos ser y llamarse (actividad de repaso)
Verbos ser y llamarse (actividad de repaso)Verbos ser y llamarse (actividad de repaso)
Verbos ser y llamarse (actividad de repaso)
 
Los animales i
Los animales iLos animales i
Los animales i
 
1 inicio (3)
1   inicio (3)1   inicio (3)
1 inicio (3)
 
4312100026 - Presentasi
4312100026 - Presentasi4312100026 - Presentasi
4312100026 - Presentasi
 
Conquista y evolución política de Al-Ándalus
Conquista y evolución política de Al-ÁndalusConquista y evolución política de Al-Ándalus
Conquista y evolución política de Al-Ándalus
 
Senda viva
Senda vivaSenda viva
Senda viva
 
Geografía física de españa (mares, montañas y ríos)
Geografía física de españa (mares, montañas y ríos)Geografía física de españa (mares, montañas y ríos)
Geografía física de españa (mares, montañas y ríos)
 

Similar to Web Contents filtering through software

data mining for security application
data mining for security applicationdata mining for security application
data mining for security application
bharatsvnit
 
data mining for security application
data mining for security applicationdata mining for security application
data mining for security application
bharatsvnit
 

Similar to Web Contents filtering through software (20)

Trying Not to Filter: Internet Filtering Technologies in Libraries
Trying Not to Filter: Internet Filtering Technologies in LibrariesTrying Not to Filter: Internet Filtering Technologies in Libraries
Trying Not to Filter: Internet Filtering Technologies in Libraries
 
Netsentron Content Filter
Netsentron Content FilterNetsentron Content Filter
Netsentron Content Filter
 
Barracuda Web Filter Cipa Presentation
Barracuda Web Filter Cipa PresentationBarracuda Web Filter Cipa Presentation
Barracuda Web Filter Cipa Presentation
 
Watch guard reputation enabled defense
Watch guard reputation enabled defenseWatch guard reputation enabled defense
Watch guard reputation enabled defense
 
Seo
SeoSeo
Seo
 
Binance Supports Number
Binance Supports NumberBinance Supports Number
Binance Supports Number
 
SEO PPT
SEO PPTSEO PPT
SEO PPT
 
Seo
SeoSeo
Seo
 
1629885596 seoppt1 130303013241-phpapp02
1629885596 seoppt1 130303013241-phpapp021629885596 seoppt1 130303013241-phpapp02
1629885596 seoppt1 130303013241-phpapp02
 
Proxy log review and use cases
Proxy log review and use casesProxy log review and use cases
Proxy log review and use cases
 
2 . web app s canners
2 . web app s canners2 . web app s canners
2 . web app s canners
 
Web mining
Web miningWeb mining
Web mining
 
OWASP Secure Coding
OWASP Secure CodingOWASP Secure Coding
OWASP Secure Coding
 
data mining for security application
data mining for security applicationdata mining for security application
data mining for security application
 
data mining for security application
data mining for security applicationdata mining for security application
data mining for security application
 
Module 13 (web based password cracking techniques)
Module 13 (web based password cracking techniques)Module 13 (web based password cracking techniques)
Module 13 (web based password cracking techniques)
 
Fear of Filtering: The Reality of Internet Content Management (Soreide DOC)
Fear of Filtering: The Reality of Internet Content Management (Soreide DOC)Fear of Filtering: The Reality of Internet Content Management (Soreide DOC)
Fear of Filtering: The Reality of Internet Content Management (Soreide DOC)
 
Internet Research
Internet ResearchInternet Research
Internet Research
 
Web Mining
Web MiningWeb Mining
Web Mining
 
Web Mining
Web Mining Web Mining
Web Mining
 

More from university of education,Lahore

More from university of education,Lahore (20)

Activites and Time Planning
 Activites and Time Planning Activites and Time Planning
Activites and Time Planning
 
Steganography
SteganographySteganography
Steganography
 
Classical Encryption Techniques
Classical Encryption TechniquesClassical Encryption Techniques
Classical Encryption Techniques
 
Activites and Time Planning
Activites and Time PlanningActivites and Time Planning
Activites and Time Planning
 
OSI Security Architecture
OSI Security ArchitectureOSI Security Architecture
OSI Security Architecture
 
Network Security Terminologies
Network Security TerminologiesNetwork Security Terminologies
Network Security Terminologies
 
Project Scheduling, Planning and Risk Management
Project Scheduling, Planning and Risk ManagementProject Scheduling, Planning and Risk Management
Project Scheduling, Planning and Risk Management
 
Software Testing and Debugging
Software Testing and DebuggingSoftware Testing and Debugging
Software Testing and Debugging
 
ePayment Methods
ePayment MethodsePayment Methods
ePayment Methods
 
SEO
SEOSEO
SEO
 
A Star Search
A Star SearchA Star Search
A Star Search
 
Enterprise Application Integration
Enterprise Application IntegrationEnterprise Application Integration
Enterprise Application Integration
 
Uml Diagrams
Uml DiagramsUml Diagrams
Uml Diagrams
 
eDras Max
eDras MaxeDras Max
eDras Max
 
RAD Model
RAD ModelRAD Model
RAD Model
 
Microsoft Project
Microsoft ProjectMicrosoft Project
Microsoft Project
 
Itertaive Process Development
Itertaive Process DevelopmentItertaive Process Development
Itertaive Process Development
 
Computer Aided Software Engineering Nayab Awan
Computer Aided Software Engineering Nayab AwanComputer Aided Software Engineering Nayab Awan
Computer Aided Software Engineering Nayab Awan
 
Lect 2 assessing the technology landscape
Lect 2 assessing the technology landscapeLect 2 assessing the technology landscape
Lect 2 assessing the technology landscape
 
system level requirements gathering and analysis
system level requirements gathering and analysissystem level requirements gathering and analysis
system level requirements gathering and analysis
 

Recently uploaded

1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
QucHHunhnh
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
ciinovamais
 

Recently uploaded (20)

Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdf
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Advance Mobile Application Development class 07
Advance Mobile Application Development class 07Advance Mobile Application Development class 07
Advance Mobile Application Development class 07
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
General AI for Medical Educators April 2024
General AI for Medical Educators April 2024General AI for Medical Educators April 2024
General AI for Medical Educators April 2024
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdf
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 

Web Contents filtering through software

  • 2. Table of Contents  Need of Filtering  Content Filtering  Basic Model  Filtering Techniques  Email Filtering  Circumvent Filtering  Problems with Filtering  Conclusion
  • 4. Content Filtering  Analysis of Email and Web content  Prevent malware and spam from entering the network  Determine whether incoming data is harmful to the network or outgoing data includes intellectual property  Such data is then blocked from entering or leaving the network  Simple network layout  Network with traffic proxy Web Security and Anti-Virus
  • 5. Network Layout Connection is made by forwarding the uninspected traffic straight to the destination. Network with Traffic Proxied Traffic is received by an application which alters the traffic in both the directions before sending to the destination.
  • 6. Web Filtering Techniques  Firewalls  URL Based Filtering  Content Analysis Firewalls  Basic level of web filtering  Inspects traffic to identify requested site to make decision (allow or block)  Black Lists: Undesirable Web addresses  White Lists: Desirable Web addresses
  • 7. URL Based Filtering  Database of web addresses  Database loaded onto proxy servers, firewalls and other network infrastructure devices  Supports granular blocking Content Analysis  Keyword Scanning  Image Scanning
  • 8. Keywords Scanning  Tag words: Positive or Negative score  Block: Sum (score) > Threshold Image Scanning Content Analysis
  • 9. Email Filtering  Primary communication channel  Need to control SPAM and virus mails Filtering Techniques  Channel/Response: Sender perform task  Heuristic Filters: Score words or phrases  Bayesian Filters: Mathematical Probability
  • 10. Circumventing Web Filtering Getting around them: Traffic is not passed through the filter.  Getting through them: Traffic is passed through the filter by obscuring the address of content and/or the content itself. Type of Content Tested Accuracy Percentage Content of an Adult Nature – direct URL access 87% Content of an Adult Nature – keyword searches 81% Content not of an Adult Nature – direct URL access 86% Content not of an Adult Nature – keyword searches 69% Image Searches 44% Email Attachments 25% RSS Feeds 48% Catalog Searches 75% Database Searches 88% Internet Filtering Test
  • 11. Problem with filtering "It could be expected that allowed content would be blocked. If all pornographic content is to be blocked, other content with a resemblance in features will also be blocked; e.g. Adult education, medical information, erotic content etc." “All filters over block. All filters under block. No filter is 100% accurate because no one agrees on what being 100% accurate is.” Conclusion
  • 12. 1.DansGuardian (Cross Platform, Free) 2.K9 (Windows/Mac, Free) 3.OpenDNS (Cross Platform, Free) 4.SquidGuard/Squid (Linux, Free) 5.Hosts File (Cross Platform, Free) Five Best Content Filtering Tools
  • 14. Reference 1) http://dansguardian.org/?page=whatisdg 2) http://www1.k9webprotection.com/aboutk9/overview 3) https://www.opendns.com/about/ 4) https://www.opendns.com/about/ 5) http://en.wikipedia.org/wiki/Hosts_%28file%29 6) http://en.wikipedia.org/wiki/Internet_security