SlideShare a Scribd company logo
International Journal of Innovative Research in Advanced Engineering (IJIRAE) ISSN: 2349-2163
Volume 1 Issue 6 (July 2014) http://ijirae.com
________________________________________________________________________________________________________
© 2014, IJIRAE- All Rights Reserved Page -254
SECURING THE WEB DOMAIN BASED ON HASHING
Jyoti P. Asabe R. W. Deshpande
Information Technology, Pune University Information Technology, Pune University
Abstract - Now a day’s risk of becoming a victim of spam and phishing attacks increases while accessing Internet. Many Web
sites exhibit violent and illegal content. Most of users are now unable to protect their networks and themselves also. However,
some countries have deployed systems for filtering the Web content. Since, the existing systems show high latency and over-
blocking. Thus, an efficient method for Web filtering concept to protect users at the Internet service provider level is
presented. The proposed solution can detect and block illegal and threatening Web sites. The suggested scalable software-
based approach can examine Internet domains in wire speed without over-blocking. The Web filter serves as security measure
for all connected users, especially for users with limited IT expert knowledge. This solution is totally transparent to all
Network devices in the network. Setup, installation and maintenance can be created only by the Internet Service provider
administrator. So, the suggested security system is safe from attacks from users and from the network side.
KEYWORDS: over-blocking, phishing, service provider administrator, web filtering.
I. INTRODUCTION
Providing security to the network is one of the most important tasks in today’s Internet. There are various threats such as [1]
viruses, malware, and phishing that are able to harm Internet users. Moreover, violent and illegal contents such as child
pornography are found on the Internet. Users may use antivirus software and firewalls to protect their computers and networks
against this malicious software. However, these kinds of programs do not give protection against [1] malicious Web content. As a
preventive measure against this type of content, Web filters can be used. Users of computer have installed security Measures on
computer. But installing security measures at the users’ side has two serious drawbacks [1].
Firstly, threat detection is done on the target machine, which [1] is often already infected with malicious software. Second
thing is that, the users must have install, maintain, and upgrade these security measures without any professional support.
Especially, a Web filter is often not installed at all and requires additional maintenance [4]. Moreover, the majority of Internet
users are missing the necessary expertise to configure their security Software so that it provides optimal protection. Therefore, it
is mandatory to support users in issues of Internet security by means of a Web [1] filter.
A trustworthy place for the placement of a Web [1] filter is the ingress of the network – in the access network. Users, are
referred to as subscribers by Internet Service Providers (ISPs), are connected to the Internet through the internet access network.
The access nodes (ANs) [2] already present in the access network. As ANs are transparent for subscribers and the core network,
these components are secure and safe from, e.g., Denial of Service attacks (DoS) which affect on ISP. In order to provide
protection for subscribers, an AN is the optimal place to develop extra security Service for the dataset such as Web filter. With
the help of this extra security feature, the user does not need to care about security measures himself [5]. However, although an
ISP can take up new security [1] measures in its portfolio, various challenges have to be addressed:
• On an AN, high traffic rates (e.g., 1Gbit/s or More than that) have to be processed.
• The Web surfing experience of users must not be disturbed.
• Web sites, which are not malicious, must not be falsely [1] blocked by the Web filter.
The suggested approach was developed as part of the Secure Access Node (SecAN) project presented in [2] as “work in
progress”. Purpose of devoting SecAN is to protect the ordinary users of access networks. It deals with firewalls, intrusion
detection systems and Web filters. Thereby, Web filtering functionality moves from the subscriber to the ISP [3]. This paper
elaborates on the Web filter approach highlighting its benefits concerning speed, resource consumption, scalability, and distinct
pattern matching. Briefly summarized, the main contributions of this paper are the following:
 A novel scalable software approach of a Web filter placed onto an AN is presented.
 The suggested architecture does not create false positives. Thus, only blacklisted domains will be blocked.
The system is able to control traffic with more than 1Gbit/s in wire speed on the target platform without packet loss.
In next section II we are presenting the literature survey over the various security methods at data sharing systems. In section
III, the proposed approach and its system block diagram are depicted. In IV, we are presenting the current Status of the solution.
Finally conclusion and future work is predicted in section V.
International Journal of Innovative Research in Advanced Engineering (IJIRAE) ISSN: 2349-2163
Volume 1 Issue 6 (July 2014) http://ijirae.com
________________________________________________________________________________________________________
© 2014, IJIRAE- All Rights Reserved Page -255
II. LITERATURE SURVEY
Several researchers have done the qualitative and quantitative analysis for Securing the Web Domain based on hardware and
software using different techniques for this purpose, as well as many new techniques has introduced:
 Below we are discussing some of the J. Rohrbeck, V. Altmann, S. Pfeiffer and D. Timmermann, “Secure Access Node:
an FPGA-based Security Architecture for Access Networks,” ICIW, 2011. Providing network security is one of the most
important tasks in today’s Internet. Since, users do not have capability to protect themselves and also their networks.
 Therefore, we present a security concept to protect users at the Internet Service Provider (ISP) level. Now, ISP is already
using various security measures, e.g. Virtual Local Area Network tags and limitation of MAC, or address translation of
MAC. Our approach extends these security measures by a packet filter firewall and a deep packet Inspection engine. A
firewall and a deep packet inspection system, at the ingress of the network, offers security measures to all the connected
users, especially to those who have limited IT expert knowledge. The ISP Administrator can have an ability of
adjustments. Consequently, our security system is safe against attacks from users and from the network side.
 R. Clayton, “Anonymity and traceability in cyberspace,” the risk of becoming a victim of spam and phishing attacks
increases in today’s Internet. Most of the Web sites on World Wide Web show violent or not legal content. Since, Most
of users are not able to protect themselves and their networks. Most of the countries have deployed the systems for
filtering the Web content. However, solutions which are already present shows high latency and over-blocking. Thus, a
Web filtering concept to protect users at the Internet Service provider level is presented. Ability of proposed system is
that it can detect and block illegal and threatening Web sites are on the Web. The suggested scalable software-based
approach examines Internet domains in wire speed without over blocking. The proposed system is totally transparent
and flexible over network devices. Administrator is responsible for the setup and maintenance for Internet service
provider (IPS). Consequently, the suggested security system itself is safe from attacks from users and from the network
side.
 US District Court for the Eastern District of Pennsylvania, “CDT, ACLU, Plantagenet Inc. v Pappert, [1]” A firewall
engine controls the header of Ethernet frames, Internet Packets, and the next following protocols. Furthermore, a Web
filter method disables access to violent and child pornography Web content. The third subsystem is a Bloom filter-based
deep packet inspection engine to observe the payload after the Protocol header. Possibilities of detecting network
intruder are depending on deep Packet inspection. A firewall, a Web filter as well as a network intrusion detection
system, at the ingress of the network, offer security measures [3] to all connected users, especially to users with limited
IT expert knowledge. Each of the mentioned systems has a powerful packet classification engine and a high speed rule
set engine used by the Firewall to find specific rules for each frame [3]. Consequently, the security system itself is
secured against attacks from users and from the network side [10].
OVERVIEW OF PHISHING EMAILS
In this section, we discuss various types of phishing attacks, the life cycle of phishing email, email-analyzing methods,
phishing email evaluation methods, features to detect phishing email, and feature selection and extraction methods. We
discuss zero-day phishing email attacks in detail, and then compare this survey with existing work.
A. Various types of phishing attacks
Phishing is a particular type of spam. There are two techniques, deceptive phishing and malware-based phishing.
First technique was totally same as engineering dataset schemes, that are depend on forged email claims that are
available to generate it from a legitimate organization and bank. Subsequently, through an embedded link within the
email, the phisher attempts to redirect users to fake Websites. On the Web available fake Web sites are designed to
fraudulently obtain financial data and private authenticated data (usernames, passwords, credit card numbers, and
Personal information) from victims.
The second technique contain technical subterfuge schemes that rely on malicious code or malware after Phishing attach
link embedded in the email, or by detecting and using privacy authentication security holes at the client machine
(computer) to obtain the victim’s online account information directly [9]. Sometimes, phisher attempts to give wrong
advice to the user from a fake Web site monitored by proxies. In the proposed design, our focus is on deceptive phishing
International Journal of Innovative Research in Advanced Engineering (IJIRAE) ISSN: 2349-2163
Volume 1 Issue 6 (July 2014) http://ijirae.com
________________________________________________________________________________________________________
© 2014, IJIRAE- All Rights Reserved Page -256
Fig. 1: Types of phishing attacks
using social engineering schemes, as it is one of the popular ways to steal victim’s information by phishing. Figure 1
explains the various types of phishing attacks.
III. PROPOSED APPROACH FRAMEWORK AND DESIGN
3.1 PROPOSED SYSTEM:
Every subscriber is connected to the Internet by the access network. Access networks contain access nodes like Digital
Subscriber Line (DSL) Access Multiplexers. Because the Web filter is located on an AN, a bandwidth of at Least 1 Gbit
per second must be achieved. Therefore, the Web filter was designed and developed.
 Web Filtering: The purpose of protecting ordinary Internet users on internet, e.g., against malicious Web content, there
are three general possibilities: Either IP addresses, URLs, or domain names can be controlled. The filtering of IP
addresses can lead to crucial over-blocking since different Web sites can share the same Web server. Moreover, a Web
site can move to a new Web server while [1] it remains accessible over the old domain names [11].
Fig 2: Proposed System Architecture
 Moreover, HTTP requests to proxies are checked, as well. HTTP redirections as used by URL shorteners are captured
too, since the final request is still sent to the target domain. As the goal is to monitor the Web traffic, other protocols
should not be blocked. Using HTTP monitoring, the Web filter cannot be simply bypassed by adding the IP address of
the Web server into [8] the Local hosts file [8]. Based on the results, which highlight the benefits of HTTP filtering, it is
advantageous to check domain names in HTTP requests.
 1st level search architecture: For the 1st level searching, hashing method is used. While the Web filter processes and
caches the domain name, the hash value is calculated in parallel. The hash table is stored in a cache memory (BRAM)
and thus access to it is very fast (one cycle) [1][7]. As hash function, parallel CRC64 was chosen as it provides optimal
resource consumption in term of speed/collision ratio. The size of the hash table corresponds to the blacklist length.
International Journal of Innovative Research in Advanced Engineering (IJIRAE) ISSN: 2349-2163
Volume 1 Issue 6 (July 2014) http://ijirae.com
________________________________________________________________________________________________________
© 2014, IJIRAE- All Rights Reserved Page -257
 2nd level search architecture: The 2nd level search architecture contains plain text domain names and extra Meta
information. The architecture shows a Buckets structure. Each bucket contains a domain name list with information on
domains producing the same hash value.[9]
IV. WORK DONE
4.1 CURRENT STATUS
 Packet Capturing: It is the Process of intercepting and logging web traffic.
 Domain name filtration: In this we filter out domain which is not valid. If URL does not contain http:// then it is not
valid URL, so we first filter this type of domain name.
 Hashing of domain name: In this process we apply hashing on domain names with its hash key means with unique
hash key.
 Block list: Then at last makes list of blocked URLs which are not allowed to access in web browser.
V. CONCLUSION AND FUTURE WORK
In this paper, the working prototype of the [1] Web filter is presented. As hardware solution, it offers more advantages in terms of
security and robustness than a software solution. The solution can control HTTP Traffic in wire speed without packet loss. On the
test platform, 1 Gbit/s throughput is achieved. As a high speed Web filter, it can be deployed in the access Networks of ISPs.
Hereby, the suggested solution can protect users without IT expert knowledge from illegal, aggressive, violent or threatening
Web-contents like child Pornography or phishing. It is unable to produce false positives. Thus, only blacklisted domains will get
blocked. The configuration of the blacklist can be done only by the ISP administrator. Since it is fully transparent for all network
participants, it is safe from attacks. Prospectively, the functionality of the Web [1] filter can be extended to URL filtering
allowing blocking specific resource.
REFERENCES
[1] Vlado Altmann, Jens Rohrbeck, Jan Skodzik, Maik Roennau, Matthias Ninnemann, 2013 “SWIFT: A Secure Web Domain
Filter in Hardware”, ICAINAW
[2] S. Ooghe, N. Voigt, M. Platnic, et al., May 2010. [Online]., “Framework and Requirements for an Access Node Control
Mechanism in Broadband Multi-Service Networks,” Internet Requests for Comments, RFC Editor, RFC 5851, Available:
http://www.rfc-editor.org/rfc/rfc5851.txt
[3] J. Rohrbeck, V. Altmann, S. Pfeiffer, and D. Timmermann, 2011 “Secure Access Node: an FPGA-based Security Architecture
for Access Networks,” ICIW.
[4] R. Clayton, Nov. 2005 “Anonymity and traceability in cyberspace,” ACM SIGACT News, vol. 36, no. 653, pp. 115–148.
[5] US District Court for the Eastern District of Pennsylvania, September 2004, “CDT, ACLU, Plantagenet Inc. v Pappert,” 337
F.Supp. 2d 606.
[6] R. Clayton, S. J. Murdoch, and R. N. M. Watson, June 2006, “Ignoring the great firewall of china,” 6th Workshop on Privacy
Enhancing Technologies, no. 16.
[7] Telenor Norge, “Telenor and krips introduce internet child pornography filter,” Telenor Press Release, September 2004.
[Online]. Available: http://presse.telenor.no/PR/200409/961319 5.html
[8] King Abdulaziz City for Science and Technology, 2004, “Local content filtering Procedure,” Internet Services Unit. [Online].
Available: http://www.isu.net.sa/saudi-internet/contenet-filtring/filtringmechanism. htm
[9] The Open Net Initiative, 2005 “Internet filtering In Burma, in 2005: A country study,” [Online]. Available:
http://opennet.net/sites/opennet.net/files/ ONI Burma Country Study.pdf
[10]Barracuda Networks, “Barracuda web filter,” 2012. [Online]. Available:
http://www.barracudanetworks.com/ns/downloads/Datasheets/ Barracuda Web Filter DS US.pdf
[11]Lue Coat ProxySG, 2012. [Online]. Available: http://www.bluecoat.com/products/proxysg

More Related Content

What's hot

A comprehensive study on classification of passive intrusion and extrusion de...
A comprehensive study on classification of passive intrusion and extrusion de...A comprehensive study on classification of passive intrusion and extrusion de...
A comprehensive study on classification of passive intrusion and extrusion de...
csandit
 
Risks and Security of Internet and System
Risks and Security of Internet and SystemRisks and Security of Internet and System
Risks and Security of Internet and System
Param Nanavati
 
An Assessment of Intrusion Detection System IDS and Data Set Overview A Compr...
An Assessment of Intrusion Detection System IDS and Data Set Overview A Compr...An Assessment of Intrusion Detection System IDS and Data Set Overview A Compr...
An Assessment of Intrusion Detection System IDS and Data Set Overview A Compr...
ijtsrd
 
Intrusion detection and anomaly detection system using sequential pattern mining
Intrusion detection and anomaly detection system using sequential pattern miningIntrusion detection and anomaly detection system using sequential pattern mining
Intrusion detection and anomaly detection system using sequential pattern mining
eSAT Journals
 
Introduction to cyber security i
Introduction to cyber security iIntroduction to cyber security i
Introduction to cyber security i
Emmanuel Gbenga Dada (BSc, MSc, PhD)
 
Healthcare_Security_White_Paper
Healthcare_Security_White_PaperHealthcare_Security_White_Paper
Healthcare_Security_White_PaperJames Maudlin
 
NETWORK INTRUSION DETECTION AND NODE RECOVERY USING DYNAMIC PATH ROUTING
NETWORK INTRUSION DETECTION AND NODE RECOVERY USING DYNAMIC PATH ROUTINGNETWORK INTRUSION DETECTION AND NODE RECOVERY USING DYNAMIC PATH ROUTING
NETWORK INTRUSION DETECTION AND NODE RECOVERY USING DYNAMIC PATH ROUTINGNishanth Gandhidoss
 
Intrusion Detection System (IDS): Anomaly Detection using Outlier Detection A...
Intrusion Detection System (IDS): Anomaly Detection using Outlier Detection A...Intrusion Detection System (IDS): Anomaly Detection using Outlier Detection A...
Intrusion Detection System (IDS): Anomaly Detection using Outlier Detection A...
Drjabez
 
Data Mining For Intrusion Detection in Mobile Systems
Data Mining For Intrusion Detection in Mobile SystemsData Mining For Intrusion Detection in Mobile Systems
Data Mining For Intrusion Detection in Mobile Systems
IOSR Journals
 
Security Solutions against Computer Networks Threats
Security Solutions against Computer Networks ThreatsSecurity Solutions against Computer Networks Threats
Security Solutions against Computer Networks Threats
Eswar Publications
 
Comparative Study on Intrusion Detection Systems for Smartphones
Comparative Study on Intrusion Detection Systems for SmartphonesComparative Study on Intrusion Detection Systems for Smartphones
Comparative Study on Intrusion Detection Systems for Smartphones
iosrjce
 
V01 i010413
V01 i010413V01 i010413
V01 i010413
IJARBEST JOURNAL
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
IRJET Journal
 
A STUDY ON INTRUSION DETECTION
A STUDY ON INTRUSION DETECTIONA STUDY ON INTRUSION DETECTION
A STUDY ON INTRUSION DETECTION
IAEME Publication
 
The Next Generation Cognitive Security Operations Center: Network Flow Forens...
The Next Generation Cognitive Security Operations Center: Network Flow Forens...The Next Generation Cognitive Security Operations Center: Network Flow Forens...
The Next Generation Cognitive Security Operations Center: Network Flow Forens...
Konstantinos Demertzis
 
Malicious Code Intrusion Detection using Machine Learning and Indicators of C...
Malicious Code Intrusion Detection using Machine Learning and Indicators of C...Malicious Code Intrusion Detection using Machine Learning and Indicators of C...
Malicious Code Intrusion Detection using Machine Learning and Indicators of C...
IJCSIS Research Publications
 
Bt33430435
Bt33430435Bt33430435
Bt33430435
IJERA Editor
 
Analytical survey of active intrusion detection techniques in mobile ad hoc n...
Analytical survey of active intrusion detection techniques in mobile ad hoc n...Analytical survey of active intrusion detection techniques in mobile ad hoc n...
Analytical survey of active intrusion detection techniques in mobile ad hoc n...
eSAT Publishing House
 

What's hot (18)

A comprehensive study on classification of passive intrusion and extrusion de...
A comprehensive study on classification of passive intrusion and extrusion de...A comprehensive study on classification of passive intrusion and extrusion de...
A comprehensive study on classification of passive intrusion and extrusion de...
 
Risks and Security of Internet and System
Risks and Security of Internet and SystemRisks and Security of Internet and System
Risks and Security of Internet and System
 
An Assessment of Intrusion Detection System IDS and Data Set Overview A Compr...
An Assessment of Intrusion Detection System IDS and Data Set Overview A Compr...An Assessment of Intrusion Detection System IDS and Data Set Overview A Compr...
An Assessment of Intrusion Detection System IDS and Data Set Overview A Compr...
 
Intrusion detection and anomaly detection system using sequential pattern mining
Intrusion detection and anomaly detection system using sequential pattern miningIntrusion detection and anomaly detection system using sequential pattern mining
Intrusion detection and anomaly detection system using sequential pattern mining
 
Introduction to cyber security i
Introduction to cyber security iIntroduction to cyber security i
Introduction to cyber security i
 
Healthcare_Security_White_Paper
Healthcare_Security_White_PaperHealthcare_Security_White_Paper
Healthcare_Security_White_Paper
 
NETWORK INTRUSION DETECTION AND NODE RECOVERY USING DYNAMIC PATH ROUTING
NETWORK INTRUSION DETECTION AND NODE RECOVERY USING DYNAMIC PATH ROUTINGNETWORK INTRUSION DETECTION AND NODE RECOVERY USING DYNAMIC PATH ROUTING
NETWORK INTRUSION DETECTION AND NODE RECOVERY USING DYNAMIC PATH ROUTING
 
Intrusion Detection System (IDS): Anomaly Detection using Outlier Detection A...
Intrusion Detection System (IDS): Anomaly Detection using Outlier Detection A...Intrusion Detection System (IDS): Anomaly Detection using Outlier Detection A...
Intrusion Detection System (IDS): Anomaly Detection using Outlier Detection A...
 
Data Mining For Intrusion Detection in Mobile Systems
Data Mining For Intrusion Detection in Mobile SystemsData Mining For Intrusion Detection in Mobile Systems
Data Mining For Intrusion Detection in Mobile Systems
 
Security Solutions against Computer Networks Threats
Security Solutions against Computer Networks ThreatsSecurity Solutions against Computer Networks Threats
Security Solutions against Computer Networks Threats
 
Comparative Study on Intrusion Detection Systems for Smartphones
Comparative Study on Intrusion Detection Systems for SmartphonesComparative Study on Intrusion Detection Systems for Smartphones
Comparative Study on Intrusion Detection Systems for Smartphones
 
V01 i010413
V01 i010413V01 i010413
V01 i010413
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
A STUDY ON INTRUSION DETECTION
A STUDY ON INTRUSION DETECTIONA STUDY ON INTRUSION DETECTION
A STUDY ON INTRUSION DETECTION
 
The Next Generation Cognitive Security Operations Center: Network Flow Forens...
The Next Generation Cognitive Security Operations Center: Network Flow Forens...The Next Generation Cognitive Security Operations Center: Network Flow Forens...
The Next Generation Cognitive Security Operations Center: Network Flow Forens...
 
Malicious Code Intrusion Detection using Machine Learning and Indicators of C...
Malicious Code Intrusion Detection using Machine Learning and Indicators of C...Malicious Code Intrusion Detection using Machine Learning and Indicators of C...
Malicious Code Intrusion Detection using Machine Learning and Indicators of C...
 
Bt33430435
Bt33430435Bt33430435
Bt33430435
 
Analytical survey of active intrusion detection techniques in mobile ad hoc n...
Analytical survey of active intrusion detection techniques in mobile ad hoc n...Analytical survey of active intrusion detection techniques in mobile ad hoc n...
Analytical survey of active intrusion detection techniques in mobile ad hoc n...
 

Viewers also liked

Analysis of Multi-Band Characteristics of Fractal Shape Antenna
Analysis of Multi-Band Characteristics of Fractal Shape AntennaAnalysis of Multi-Band Characteristics of Fractal Shape Antenna
Analysis of Multi-Band Characteristics of Fractal Shape Antenna
AM Publications
 
Dauda Adamu originalCV2
Dauda Adamu originalCV2Dauda Adamu originalCV2
Dauda Adamu originalCV2Dauda Adamu
 
Analysis of Microbiological Quality of Water at Housing Societies
Analysis of Microbiological Quality of Water at Housing SocietiesAnalysis of Microbiological Quality of Water at Housing Societies
Analysis of Microbiological Quality of Water at Housing Societies
AM Publications
 
Dna damage
Dna damageDna damage
Dna damage
riddhi patel
 
Survey on Text Classification
Survey on Text ClassificationSurvey on Text Classification
Survey on Text Classification
AM Publications
 
Node Community Chennai MeetUp1
Node Community Chennai MeetUp1Node Community Chennai MeetUp1
Node Community Chennai MeetUp1
akendoffice
 
Tebak umur dengan mie instan nu ngahiji
Tebak umur dengan mie instan nu ngahijiTebak umur dengan mie instan nu ngahiji
Tebak umur dengan mie instan nu ngahijiArifDoble
 
A Comparative Study of RSA and ECC and Implementation of ECC on Embedded Systems
A Comparative Study of RSA and ECC and Implementation of ECC on Embedded SystemsA Comparative Study of RSA and ECC and Implementation of ECC on Embedded Systems
A Comparative Study of RSA and ECC and Implementation of ECC on Embedded Systems
AM Publications
 
Theoretical and Software Based Comparison of Cantilever Beam: MODAL ANALYSIS
Theoretical and Software Based Comparison of Cantilever Beam: MODAL ANALYSISTheoretical and Software Based Comparison of Cantilever Beam: MODAL ANALYSIS
Theoretical and Software Based Comparison of Cantilever Beam: MODAL ANALYSIS
AM Publications
 
Resume - Paul McIntyre updated 6-2015
Resume - Paul McIntyre updated 6-2015Resume - Paul McIntyre updated 6-2015
Resume - Paul McIntyre updated 6-2015Paul McIntyre
 

Viewers also liked (11)

Analysis of Multi-Band Characteristics of Fractal Shape Antenna
Analysis of Multi-Band Characteristics of Fractal Shape AntennaAnalysis of Multi-Band Characteristics of Fractal Shape Antenna
Analysis of Multi-Band Characteristics of Fractal Shape Antenna
 
Dauda Adamu originalCV2
Dauda Adamu originalCV2Dauda Adamu originalCV2
Dauda Adamu originalCV2
 
Analysis of Microbiological Quality of Water at Housing Societies
Analysis of Microbiological Quality of Water at Housing SocietiesAnalysis of Microbiological Quality of Water at Housing Societies
Analysis of Microbiological Quality of Water at Housing Societies
 
Dna damage
Dna damageDna damage
Dna damage
 
EXTRA
EXTRA EXTRA
EXTRA
 
Survey on Text Classification
Survey on Text ClassificationSurvey on Text Classification
Survey on Text Classification
 
Node Community Chennai MeetUp1
Node Community Chennai MeetUp1Node Community Chennai MeetUp1
Node Community Chennai MeetUp1
 
Tebak umur dengan mie instan nu ngahiji
Tebak umur dengan mie instan nu ngahijiTebak umur dengan mie instan nu ngahiji
Tebak umur dengan mie instan nu ngahiji
 
A Comparative Study of RSA and ECC and Implementation of ECC on Embedded Systems
A Comparative Study of RSA and ECC and Implementation of ECC on Embedded SystemsA Comparative Study of RSA and ECC and Implementation of ECC on Embedded Systems
A Comparative Study of RSA and ECC and Implementation of ECC on Embedded Systems
 
Theoretical and Software Based Comparison of Cantilever Beam: MODAL ANALYSIS
Theoretical and Software Based Comparison of Cantilever Beam: MODAL ANALYSISTheoretical and Software Based Comparison of Cantilever Beam: MODAL ANALYSIS
Theoretical and Software Based Comparison of Cantilever Beam: MODAL ANALYSIS
 
Resume - Paul McIntyre updated 6-2015
Resume - Paul McIntyre updated 6-2015Resume - Paul McIntyre updated 6-2015
Resume - Paul McIntyre updated 6-2015
 

Similar to SECURING THE WEB DOMAIN BASED ON HASHING

network security.pdf
network security.pdfnetwork security.pdf
network security.pdf
JeganathanJayaran
 
Seguridad web -articulo completo- ingles
Seguridad web -articulo completo- inglesSeguridad web -articulo completo- ingles
Seguridad web -articulo completo- inglesisidro luna beltran
 
AN ISP BASED NOTIFICATION AND DETECTION SYSTEM TO MAXIMIZE EFFICIENCY OF CLIE...
AN ISP BASED NOTIFICATION AND DETECTION SYSTEM TO MAXIMIZE EFFICIENCY OF CLIE...AN ISP BASED NOTIFICATION AND DETECTION SYSTEM TO MAXIMIZE EFFICIENCY OF CLIE...
AN ISP BASED NOTIFICATION AND DETECTION SYSTEM TO MAXIMIZE EFFICIENCY OF CLIE...
IJNSA Journal
 
IRJET- Cross Platform Penetration Testing Suite
IRJET-  	  Cross Platform Penetration Testing SuiteIRJET-  	  Cross Platform Penetration Testing Suite
IRJET- Cross Platform Penetration Testing Suite
IRJET Journal
 
Understanding the web browser threat
Understanding the web browser threatUnderstanding the web browser threat
Understanding the web browser threatTola Odugbesan
 
Security Testing Approach for Web Application Testing.pdf
Security Testing Approach for Web Application Testing.pdfSecurity Testing Approach for Web Application Testing.pdf
Security Testing Approach for Web Application Testing.pdf
AmeliaJonas2
 
Web Applications Assessment Tools: Comparison and Discussion
Web Applications Assessment Tools: Comparison and DiscussionWeb Applications Assessment Tools: Comparison and Discussion
Web Applications Assessment Tools: Comparison and Discussion
EECJOURNAL
 
Designing Security Assessment of Client Server System using Attack Tree Modeling
Designing Security Assessment of Client Server System using Attack Tree ModelingDesigning Security Assessment of Client Server System using Attack Tree Modeling
Designing Security Assessment of Client Server System using Attack Tree Modeling
ijtsrd
 
Computer Network Security
Computer Network SecurityComputer Network Security
Computer Network Security
Sachithra Gayan
 
IRJET- Zombie - Venomous File: Analysis using Legitimate Signature for Securi...
IRJET- Zombie - Venomous File: Analysis using Legitimate Signature for Securi...IRJET- Zombie - Venomous File: Analysis using Legitimate Signature for Securi...
IRJET- Zombie - Venomous File: Analysis using Legitimate Signature for Securi...
IRJET Journal
 
Network security
Network securityNetwork security
Network security
Simranpreet Singh
 
GUL Network Infrastructure
GUL Network InfrastructureGUL Network Infrastructure
GUL Network InfrastructureMuhammad Zeeshan
 
Security against Web Application Attacks Using Ontology Based Intrusion Detec...
Security against Web Application Attacks Using Ontology Based Intrusion Detec...Security against Web Application Attacks Using Ontology Based Intrusion Detec...
Security against Web Application Attacks Using Ontology Based Intrusion Detec...
IRJET Journal
 
Self-Protecting Technology for Web Applications
Self-Protecting Technology for Web ApplicationsSelf-Protecting Technology for Web Applications
Self-Protecting Technology for Web Applications
IRJET Journal
 
IRJET- A Review on Honeypots
IRJET-  	  A Review on HoneypotsIRJET-  	  A Review on Honeypots
IRJET- A Review on Honeypots
IRJET Journal
 
Prevention based mechanism for attacks in Network Security
Prevention based mechanism for attacks in Network SecurityPrevention based mechanism for attacks in Network Security
Prevention based mechanism for attacks in Network Security
Editor IJMTER
 
IRJET- A Cloud based Honeynet System for Attack Detection using Machine Learn...
IRJET- A Cloud based Honeynet System for Attack Detection using Machine Learn...IRJET- A Cloud based Honeynet System for Attack Detection using Machine Learn...
IRJET- A Cloud based Honeynet System for Attack Detection using Machine Learn...
IRJET Journal
 
3.8 Ways to Establish Secure Protocols in a Digital Organization.pdf
3.8 Ways to Establish Secure Protocols in a Digital Organization.pdf3.8 Ways to Establish Secure Protocols in a Digital Organization.pdf
3.8 Ways to Establish Secure Protocols in a Digital Organization.pdf
Belayet Hossain
 

Similar to SECURING THE WEB DOMAIN BASED ON HASHING (20)

network security.pdf
network security.pdfnetwork security.pdf
network security.pdf
 
Seguridad web -articulo completo- ingles
Seguridad web -articulo completo- inglesSeguridad web -articulo completo- ingles
Seguridad web -articulo completo- ingles
 
AN ISP BASED NOTIFICATION AND DETECTION SYSTEM TO MAXIMIZE EFFICIENCY OF CLIE...
AN ISP BASED NOTIFICATION AND DETECTION SYSTEM TO MAXIMIZE EFFICIENCY OF CLIE...AN ISP BASED NOTIFICATION AND DETECTION SYSTEM TO MAXIMIZE EFFICIENCY OF CLIE...
AN ISP BASED NOTIFICATION AND DETECTION SYSTEM TO MAXIMIZE EFFICIENCY OF CLIE...
 
IRJET- Cross Platform Penetration Testing Suite
IRJET-  	  Cross Platform Penetration Testing SuiteIRJET-  	  Cross Platform Penetration Testing Suite
IRJET- Cross Platform Penetration Testing Suite
 
Understanding the web browser threat
Understanding the web browser threatUnderstanding the web browser threat
Understanding the web browser threat
 
Security Testing Approach for Web Application Testing.pdf
Security Testing Approach for Web Application Testing.pdfSecurity Testing Approach for Web Application Testing.pdf
Security Testing Approach for Web Application Testing.pdf
 
Web Applications Assessment Tools: Comparison and Discussion
Web Applications Assessment Tools: Comparison and DiscussionWeb Applications Assessment Tools: Comparison and Discussion
Web Applications Assessment Tools: Comparison and Discussion
 
Designing Security Assessment of Client Server System using Attack Tree Modeling
Designing Security Assessment of Client Server System using Attack Tree ModelingDesigning Security Assessment of Client Server System using Attack Tree Modeling
Designing Security Assessment of Client Server System using Attack Tree Modeling
 
Computer Network Security
Computer Network SecurityComputer Network Security
Computer Network Security
 
IRJET- Zombie - Venomous File: Analysis using Legitimate Signature for Securi...
IRJET- Zombie - Venomous File: Analysis using Legitimate Signature for Securi...IRJET- Zombie - Venomous File: Analysis using Legitimate Signature for Securi...
IRJET- Zombie - Venomous File: Analysis using Legitimate Signature for Securi...
 
Network security
Network securityNetwork security
Network security
 
GUL Network Infrastructure
GUL Network InfrastructureGUL Network Infrastructure
GUL Network Infrastructure
 
Security against Web Application Attacks Using Ontology Based Intrusion Detec...
Security against Web Application Attacks Using Ontology Based Intrusion Detec...Security against Web Application Attacks Using Ontology Based Intrusion Detec...
Security against Web Application Attacks Using Ontology Based Intrusion Detec...
 
Research Paper
Research PaperResearch Paper
Research Paper
 
Self-Protecting Technology for Web Applications
Self-Protecting Technology for Web ApplicationsSelf-Protecting Technology for Web Applications
Self-Protecting Technology for Web Applications
 
IRJET- A Review on Honeypots
IRJET-  	  A Review on HoneypotsIRJET-  	  A Review on Honeypots
IRJET- A Review on Honeypots
 
Prevention based mechanism for attacks in Network Security
Prevention based mechanism for attacks in Network SecurityPrevention based mechanism for attacks in Network Security
Prevention based mechanism for attacks in Network Security
 
Bn31437444
Bn31437444Bn31437444
Bn31437444
 
IRJET- A Cloud based Honeynet System for Attack Detection using Machine Learn...
IRJET- A Cloud based Honeynet System for Attack Detection using Machine Learn...IRJET- A Cloud based Honeynet System for Attack Detection using Machine Learn...
IRJET- A Cloud based Honeynet System for Attack Detection using Machine Learn...
 
3.8 Ways to Establish Secure Protocols in a Digital Organization.pdf
3.8 Ways to Establish Secure Protocols in a Digital Organization.pdf3.8 Ways to Establish Secure Protocols in a Digital Organization.pdf
3.8 Ways to Establish Secure Protocols in a Digital Organization.pdf
 

More from AM Publications

DEVELOPMENT OF TODDLER FAMILY CADRE TRAINING BASED ON ANDROID APPLICATIONS IN...
DEVELOPMENT OF TODDLER FAMILY CADRE TRAINING BASED ON ANDROID APPLICATIONS IN...DEVELOPMENT OF TODDLER FAMILY CADRE TRAINING BASED ON ANDROID APPLICATIONS IN...
DEVELOPMENT OF TODDLER FAMILY CADRE TRAINING BASED ON ANDROID APPLICATIONS IN...
AM Publications
 
TESTING OF COMPOSITE ON DROP-WEIGHT IMPACT TESTING AND DAMAGE IDENTIFICATION ...
TESTING OF COMPOSITE ON DROP-WEIGHT IMPACT TESTING AND DAMAGE IDENTIFICATION ...TESTING OF COMPOSITE ON DROP-WEIGHT IMPACT TESTING AND DAMAGE IDENTIFICATION ...
TESTING OF COMPOSITE ON DROP-WEIGHT IMPACT TESTING AND DAMAGE IDENTIFICATION ...
AM Publications
 
THE USE OF FRACTAL GEOMETRY IN TILING MOTIF DESIGN
THE USE OF FRACTAL GEOMETRY IN TILING MOTIF DESIGNTHE USE OF FRACTAL GEOMETRY IN TILING MOTIF DESIGN
THE USE OF FRACTAL GEOMETRY IN TILING MOTIF DESIGN
AM Publications
 
TWO-DIMENSIONAL INVERSION FINITE ELEMENT MODELING OF MAGNETOTELLURIC DATA: CA...
TWO-DIMENSIONAL INVERSION FINITE ELEMENT MODELING OF MAGNETOTELLURIC DATA: CA...TWO-DIMENSIONAL INVERSION FINITE ELEMENT MODELING OF MAGNETOTELLURIC DATA: CA...
TWO-DIMENSIONAL INVERSION FINITE ELEMENT MODELING OF MAGNETOTELLURIC DATA: CA...
AM Publications
 
USING THE GENETIC ALGORITHM TO OPTIMIZE LASER WELDING PARAMETERS FOR MARTENSI...
USING THE GENETIC ALGORITHM TO OPTIMIZE LASER WELDING PARAMETERS FOR MARTENSI...USING THE GENETIC ALGORITHM TO OPTIMIZE LASER WELDING PARAMETERS FOR MARTENSI...
USING THE GENETIC ALGORITHM TO OPTIMIZE LASER WELDING PARAMETERS FOR MARTENSI...
AM Publications
 
ANALYSIS AND DESIGN E-MARKETPLACE FOR MICRO, SMALL AND MEDIUM ENTERPRISES
ANALYSIS AND DESIGN E-MARKETPLACE FOR MICRO, SMALL AND MEDIUM ENTERPRISESANALYSIS AND DESIGN E-MARKETPLACE FOR MICRO, SMALL AND MEDIUM ENTERPRISES
ANALYSIS AND DESIGN E-MARKETPLACE FOR MICRO, SMALL AND MEDIUM ENTERPRISES
AM Publications
 
REMOTE SENSING AND GEOGRAPHIC INFORMATION SYSTEMS
REMOTE SENSING AND GEOGRAPHIC INFORMATION SYSTEMS REMOTE SENSING AND GEOGRAPHIC INFORMATION SYSTEMS
REMOTE SENSING AND GEOGRAPHIC INFORMATION SYSTEMS
AM Publications
 
EVALUATE THE STRAIN ENERGY ERROR FOR THE LASER WELD BY THE H-REFINEMENT OF TH...
EVALUATE THE STRAIN ENERGY ERROR FOR THE LASER WELD BY THE H-REFINEMENT OF TH...EVALUATE THE STRAIN ENERGY ERROR FOR THE LASER WELD BY THE H-REFINEMENT OF TH...
EVALUATE THE STRAIN ENERGY ERROR FOR THE LASER WELD BY THE H-REFINEMENT OF TH...
AM Publications
 
HMM APPLICATION IN ISOLATED WORD SPEECH RECOGNITION
HMM APPLICATION IN ISOLATED WORD SPEECH RECOGNITIONHMM APPLICATION IN ISOLATED WORD SPEECH RECOGNITION
HMM APPLICATION IN ISOLATED WORD SPEECH RECOGNITION
AM Publications
 
PEDESTRIAN DETECTION IN LOW RESOLUTION VIDEOS USING A MULTI-FRAME HOG-BASED D...
PEDESTRIAN DETECTION IN LOW RESOLUTION VIDEOS USING A MULTI-FRAME HOG-BASED D...PEDESTRIAN DETECTION IN LOW RESOLUTION VIDEOS USING A MULTI-FRAME HOG-BASED D...
PEDESTRIAN DETECTION IN LOW RESOLUTION VIDEOS USING A MULTI-FRAME HOG-BASED D...
AM Publications
 
INTELLIGENT BLIND STICK
INTELLIGENT BLIND STICKINTELLIGENT BLIND STICK
INTELLIGENT BLIND STICK
AM Publications
 
EFFECT OF SILICON - RUBBER (SR) SHEETS AS AN ALTERNATIVE FILTER ON HIGH AND L...
EFFECT OF SILICON - RUBBER (SR) SHEETS AS AN ALTERNATIVE FILTER ON HIGH AND L...EFFECT OF SILICON - RUBBER (SR) SHEETS AS AN ALTERNATIVE FILTER ON HIGH AND L...
EFFECT OF SILICON - RUBBER (SR) SHEETS AS AN ALTERNATIVE FILTER ON HIGH AND L...
AM Publications
 
UTILIZATION OF IMMUNIZATION SERVICES AMONG CHILDREN UNDER FIVE YEARS OF AGE I...
UTILIZATION OF IMMUNIZATION SERVICES AMONG CHILDREN UNDER FIVE YEARS OF AGE I...UTILIZATION OF IMMUNIZATION SERVICES AMONG CHILDREN UNDER FIVE YEARS OF AGE I...
UTILIZATION OF IMMUNIZATION SERVICES AMONG CHILDREN UNDER FIVE YEARS OF AGE I...
AM Publications
 
REPRESENTATION OF THE BLOCK DATA ENCRYPTION ALGORITHM IN AN ANALYTICAL FORM F...
REPRESENTATION OF THE BLOCK DATA ENCRYPTION ALGORITHM IN AN ANALYTICAL FORM F...REPRESENTATION OF THE BLOCK DATA ENCRYPTION ALGORITHM IN AN ANALYTICAL FORM F...
REPRESENTATION OF THE BLOCK DATA ENCRYPTION ALGORITHM IN AN ANALYTICAL FORM F...
AM Publications
 
OPTICAL CHARACTER RECOGNITION USING RBFNN
OPTICAL CHARACTER RECOGNITION USING RBFNNOPTICAL CHARACTER RECOGNITION USING RBFNN
OPTICAL CHARACTER RECOGNITION USING RBFNN
AM Publications
 
DETECTION OF MOVING OBJECT
DETECTION OF MOVING OBJECTDETECTION OF MOVING OBJECT
DETECTION OF MOVING OBJECT
AM Publications
 
SIMULATION OF ATMOSPHERIC POLLUTANTS DISPERSION IN AN URBAN ENVIRONMENT
SIMULATION OF ATMOSPHERIC POLLUTANTS DISPERSION IN AN URBAN ENVIRONMENTSIMULATION OF ATMOSPHERIC POLLUTANTS DISPERSION IN AN URBAN ENVIRONMENT
SIMULATION OF ATMOSPHERIC POLLUTANTS DISPERSION IN AN URBAN ENVIRONMENT
AM Publications
 
PREPARATION AND EVALUATION OF WOOL KERATIN BASED CHITOSAN NANOFIBERS FOR AIR ...
PREPARATION AND EVALUATION OF WOOL KERATIN BASED CHITOSAN NANOFIBERS FOR AIR ...PREPARATION AND EVALUATION OF WOOL KERATIN BASED CHITOSAN NANOFIBERS FOR AIR ...
PREPARATION AND EVALUATION OF WOOL KERATIN BASED CHITOSAN NANOFIBERS FOR AIR ...
AM Publications
 
ANALYSIS ON LOAD BALANCING ALGORITHMS IMPLEMENTATION ON CLOUD COMPUTING ENVIR...
ANALYSIS ON LOAD BALANCING ALGORITHMS IMPLEMENTATION ON CLOUD COMPUTING ENVIR...ANALYSIS ON LOAD BALANCING ALGORITHMS IMPLEMENTATION ON CLOUD COMPUTING ENVIR...
ANALYSIS ON LOAD BALANCING ALGORITHMS IMPLEMENTATION ON CLOUD COMPUTING ENVIR...
AM Publications
 
A MODEL BASED APPROACH FOR IMPLEMENTING WLAN SECURITY
A MODEL BASED APPROACH FOR IMPLEMENTING WLAN SECURITY A MODEL BASED APPROACH FOR IMPLEMENTING WLAN SECURITY
A MODEL BASED APPROACH FOR IMPLEMENTING WLAN SECURITY
AM Publications
 

More from AM Publications (20)

DEVELOPMENT OF TODDLER FAMILY CADRE TRAINING BASED ON ANDROID APPLICATIONS IN...
DEVELOPMENT OF TODDLER FAMILY CADRE TRAINING BASED ON ANDROID APPLICATIONS IN...DEVELOPMENT OF TODDLER FAMILY CADRE TRAINING BASED ON ANDROID APPLICATIONS IN...
DEVELOPMENT OF TODDLER FAMILY CADRE TRAINING BASED ON ANDROID APPLICATIONS IN...
 
TESTING OF COMPOSITE ON DROP-WEIGHT IMPACT TESTING AND DAMAGE IDENTIFICATION ...
TESTING OF COMPOSITE ON DROP-WEIGHT IMPACT TESTING AND DAMAGE IDENTIFICATION ...TESTING OF COMPOSITE ON DROP-WEIGHT IMPACT TESTING AND DAMAGE IDENTIFICATION ...
TESTING OF COMPOSITE ON DROP-WEIGHT IMPACT TESTING AND DAMAGE IDENTIFICATION ...
 
THE USE OF FRACTAL GEOMETRY IN TILING MOTIF DESIGN
THE USE OF FRACTAL GEOMETRY IN TILING MOTIF DESIGNTHE USE OF FRACTAL GEOMETRY IN TILING MOTIF DESIGN
THE USE OF FRACTAL GEOMETRY IN TILING MOTIF DESIGN
 
TWO-DIMENSIONAL INVERSION FINITE ELEMENT MODELING OF MAGNETOTELLURIC DATA: CA...
TWO-DIMENSIONAL INVERSION FINITE ELEMENT MODELING OF MAGNETOTELLURIC DATA: CA...TWO-DIMENSIONAL INVERSION FINITE ELEMENT MODELING OF MAGNETOTELLURIC DATA: CA...
TWO-DIMENSIONAL INVERSION FINITE ELEMENT MODELING OF MAGNETOTELLURIC DATA: CA...
 
USING THE GENETIC ALGORITHM TO OPTIMIZE LASER WELDING PARAMETERS FOR MARTENSI...
USING THE GENETIC ALGORITHM TO OPTIMIZE LASER WELDING PARAMETERS FOR MARTENSI...USING THE GENETIC ALGORITHM TO OPTIMIZE LASER WELDING PARAMETERS FOR MARTENSI...
USING THE GENETIC ALGORITHM TO OPTIMIZE LASER WELDING PARAMETERS FOR MARTENSI...
 
ANALYSIS AND DESIGN E-MARKETPLACE FOR MICRO, SMALL AND MEDIUM ENTERPRISES
ANALYSIS AND DESIGN E-MARKETPLACE FOR MICRO, SMALL AND MEDIUM ENTERPRISESANALYSIS AND DESIGN E-MARKETPLACE FOR MICRO, SMALL AND MEDIUM ENTERPRISES
ANALYSIS AND DESIGN E-MARKETPLACE FOR MICRO, SMALL AND MEDIUM ENTERPRISES
 
REMOTE SENSING AND GEOGRAPHIC INFORMATION SYSTEMS
REMOTE SENSING AND GEOGRAPHIC INFORMATION SYSTEMS REMOTE SENSING AND GEOGRAPHIC INFORMATION SYSTEMS
REMOTE SENSING AND GEOGRAPHIC INFORMATION SYSTEMS
 
EVALUATE THE STRAIN ENERGY ERROR FOR THE LASER WELD BY THE H-REFINEMENT OF TH...
EVALUATE THE STRAIN ENERGY ERROR FOR THE LASER WELD BY THE H-REFINEMENT OF TH...EVALUATE THE STRAIN ENERGY ERROR FOR THE LASER WELD BY THE H-REFINEMENT OF TH...
EVALUATE THE STRAIN ENERGY ERROR FOR THE LASER WELD BY THE H-REFINEMENT OF TH...
 
HMM APPLICATION IN ISOLATED WORD SPEECH RECOGNITION
HMM APPLICATION IN ISOLATED WORD SPEECH RECOGNITIONHMM APPLICATION IN ISOLATED WORD SPEECH RECOGNITION
HMM APPLICATION IN ISOLATED WORD SPEECH RECOGNITION
 
PEDESTRIAN DETECTION IN LOW RESOLUTION VIDEOS USING A MULTI-FRAME HOG-BASED D...
PEDESTRIAN DETECTION IN LOW RESOLUTION VIDEOS USING A MULTI-FRAME HOG-BASED D...PEDESTRIAN DETECTION IN LOW RESOLUTION VIDEOS USING A MULTI-FRAME HOG-BASED D...
PEDESTRIAN DETECTION IN LOW RESOLUTION VIDEOS USING A MULTI-FRAME HOG-BASED D...
 
INTELLIGENT BLIND STICK
INTELLIGENT BLIND STICKINTELLIGENT BLIND STICK
INTELLIGENT BLIND STICK
 
EFFECT OF SILICON - RUBBER (SR) SHEETS AS AN ALTERNATIVE FILTER ON HIGH AND L...
EFFECT OF SILICON - RUBBER (SR) SHEETS AS AN ALTERNATIVE FILTER ON HIGH AND L...EFFECT OF SILICON - RUBBER (SR) SHEETS AS AN ALTERNATIVE FILTER ON HIGH AND L...
EFFECT OF SILICON - RUBBER (SR) SHEETS AS AN ALTERNATIVE FILTER ON HIGH AND L...
 
UTILIZATION OF IMMUNIZATION SERVICES AMONG CHILDREN UNDER FIVE YEARS OF AGE I...
UTILIZATION OF IMMUNIZATION SERVICES AMONG CHILDREN UNDER FIVE YEARS OF AGE I...UTILIZATION OF IMMUNIZATION SERVICES AMONG CHILDREN UNDER FIVE YEARS OF AGE I...
UTILIZATION OF IMMUNIZATION SERVICES AMONG CHILDREN UNDER FIVE YEARS OF AGE I...
 
REPRESENTATION OF THE BLOCK DATA ENCRYPTION ALGORITHM IN AN ANALYTICAL FORM F...
REPRESENTATION OF THE BLOCK DATA ENCRYPTION ALGORITHM IN AN ANALYTICAL FORM F...REPRESENTATION OF THE BLOCK DATA ENCRYPTION ALGORITHM IN AN ANALYTICAL FORM F...
REPRESENTATION OF THE BLOCK DATA ENCRYPTION ALGORITHM IN AN ANALYTICAL FORM F...
 
OPTICAL CHARACTER RECOGNITION USING RBFNN
OPTICAL CHARACTER RECOGNITION USING RBFNNOPTICAL CHARACTER RECOGNITION USING RBFNN
OPTICAL CHARACTER RECOGNITION USING RBFNN
 
DETECTION OF MOVING OBJECT
DETECTION OF MOVING OBJECTDETECTION OF MOVING OBJECT
DETECTION OF MOVING OBJECT
 
SIMULATION OF ATMOSPHERIC POLLUTANTS DISPERSION IN AN URBAN ENVIRONMENT
SIMULATION OF ATMOSPHERIC POLLUTANTS DISPERSION IN AN URBAN ENVIRONMENTSIMULATION OF ATMOSPHERIC POLLUTANTS DISPERSION IN AN URBAN ENVIRONMENT
SIMULATION OF ATMOSPHERIC POLLUTANTS DISPERSION IN AN URBAN ENVIRONMENT
 
PREPARATION AND EVALUATION OF WOOL KERATIN BASED CHITOSAN NANOFIBERS FOR AIR ...
PREPARATION AND EVALUATION OF WOOL KERATIN BASED CHITOSAN NANOFIBERS FOR AIR ...PREPARATION AND EVALUATION OF WOOL KERATIN BASED CHITOSAN NANOFIBERS FOR AIR ...
PREPARATION AND EVALUATION OF WOOL KERATIN BASED CHITOSAN NANOFIBERS FOR AIR ...
 
ANALYSIS ON LOAD BALANCING ALGORITHMS IMPLEMENTATION ON CLOUD COMPUTING ENVIR...
ANALYSIS ON LOAD BALANCING ALGORITHMS IMPLEMENTATION ON CLOUD COMPUTING ENVIR...ANALYSIS ON LOAD BALANCING ALGORITHMS IMPLEMENTATION ON CLOUD COMPUTING ENVIR...
ANALYSIS ON LOAD BALANCING ALGORITHMS IMPLEMENTATION ON CLOUD COMPUTING ENVIR...
 
A MODEL BASED APPROACH FOR IMPLEMENTING WLAN SECURITY
A MODEL BASED APPROACH FOR IMPLEMENTING WLAN SECURITY A MODEL BASED APPROACH FOR IMPLEMENTING WLAN SECURITY
A MODEL BASED APPROACH FOR IMPLEMENTING WLAN SECURITY
 

Recently uploaded

NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
Amil Baba Dawood bangali
 
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
MdTanvirMahtab2
 
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Dr.Costas Sachpazis
 
H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
H.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdfH.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdf
H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
MLILAB
 
ethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.pptethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.ppt
Jayaprasanna4
 
block diagram and signal flow graph representation
block diagram and signal flow graph representationblock diagram and signal flow graph representation
block diagram and signal flow graph representation
Divya Somashekar
 
Courier management system project report.pdf
Courier management system project report.pdfCourier management system project report.pdf
Courier management system project report.pdf
Kamal Acharya
 
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
bakpo1
 
ethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.pptethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.ppt
Jayaprasanna4
 
Gen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdfGen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdf
gdsczhcet
 
Planning Of Procurement o different goods and services
Planning Of Procurement o different goods and servicesPlanning Of Procurement o different goods and services
Planning Of Procurement o different goods and services
JoytuBarua2
 
Quality defects in TMT Bars, Possible causes and Potential Solutions.
Quality defects in TMT Bars, Possible causes and Potential Solutions.Quality defects in TMT Bars, Possible causes and Potential Solutions.
Quality defects in TMT Bars, Possible causes and Potential Solutions.
PrashantGoswami42
 
Final project report on grocery store management system..pdf
Final project report on grocery store management system..pdfFinal project report on grocery store management system..pdf
Final project report on grocery store management system..pdf
Kamal Acharya
 
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdfTop 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Teleport Manpower Consultant
 
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxCFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
R&R Consult
 
Student information management system project report ii.pdf
Student information management system project report ii.pdfStudent information management system project report ii.pdf
Student information management system project report ii.pdf
Kamal Acharya
 
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdfAKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
SamSarthak3
 
The Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdfThe Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdf
Pipe Restoration Solutions
 
Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024
Massimo Talia
 
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
obonagu
 

Recently uploaded (20)

NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
 
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
 
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
 
H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
H.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdfH.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdf
H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
 
ethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.pptethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.ppt
 
block diagram and signal flow graph representation
block diagram and signal flow graph representationblock diagram and signal flow graph representation
block diagram and signal flow graph representation
 
Courier management system project report.pdf
Courier management system project report.pdfCourier management system project report.pdf
Courier management system project report.pdf
 
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
 
ethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.pptethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.ppt
 
Gen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdfGen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdf
 
Planning Of Procurement o different goods and services
Planning Of Procurement o different goods and servicesPlanning Of Procurement o different goods and services
Planning Of Procurement o different goods and services
 
Quality defects in TMT Bars, Possible causes and Potential Solutions.
Quality defects in TMT Bars, Possible causes and Potential Solutions.Quality defects in TMT Bars, Possible causes and Potential Solutions.
Quality defects in TMT Bars, Possible causes and Potential Solutions.
 
Final project report on grocery store management system..pdf
Final project report on grocery store management system..pdfFinal project report on grocery store management system..pdf
Final project report on grocery store management system..pdf
 
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdfTop 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
 
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxCFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
 
Student information management system project report ii.pdf
Student information management system project report ii.pdfStudent information management system project report ii.pdf
Student information management system project report ii.pdf
 
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdfAKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
 
The Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdfThe Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdf
 
Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024
 
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
 

SECURING THE WEB DOMAIN BASED ON HASHING

  • 1. International Journal of Innovative Research in Advanced Engineering (IJIRAE) ISSN: 2349-2163 Volume 1 Issue 6 (July 2014) http://ijirae.com ________________________________________________________________________________________________________ © 2014, IJIRAE- All Rights Reserved Page -254 SECURING THE WEB DOMAIN BASED ON HASHING Jyoti P. Asabe R. W. Deshpande Information Technology, Pune University Information Technology, Pune University Abstract - Now a day’s risk of becoming a victim of spam and phishing attacks increases while accessing Internet. Many Web sites exhibit violent and illegal content. Most of users are now unable to protect their networks and themselves also. However, some countries have deployed systems for filtering the Web content. Since, the existing systems show high latency and over- blocking. Thus, an efficient method for Web filtering concept to protect users at the Internet service provider level is presented. The proposed solution can detect and block illegal and threatening Web sites. The suggested scalable software- based approach can examine Internet domains in wire speed without over-blocking. The Web filter serves as security measure for all connected users, especially for users with limited IT expert knowledge. This solution is totally transparent to all Network devices in the network. Setup, installation and maintenance can be created only by the Internet Service provider administrator. So, the suggested security system is safe from attacks from users and from the network side. KEYWORDS: over-blocking, phishing, service provider administrator, web filtering. I. INTRODUCTION Providing security to the network is one of the most important tasks in today’s Internet. There are various threats such as [1] viruses, malware, and phishing that are able to harm Internet users. Moreover, violent and illegal contents such as child pornography are found on the Internet. Users may use antivirus software and firewalls to protect their computers and networks against this malicious software. However, these kinds of programs do not give protection against [1] malicious Web content. As a preventive measure against this type of content, Web filters can be used. Users of computer have installed security Measures on computer. But installing security measures at the users’ side has two serious drawbacks [1]. Firstly, threat detection is done on the target machine, which [1] is often already infected with malicious software. Second thing is that, the users must have install, maintain, and upgrade these security measures without any professional support. Especially, a Web filter is often not installed at all and requires additional maintenance [4]. Moreover, the majority of Internet users are missing the necessary expertise to configure their security Software so that it provides optimal protection. Therefore, it is mandatory to support users in issues of Internet security by means of a Web [1] filter. A trustworthy place for the placement of a Web [1] filter is the ingress of the network – in the access network. Users, are referred to as subscribers by Internet Service Providers (ISPs), are connected to the Internet through the internet access network. The access nodes (ANs) [2] already present in the access network. As ANs are transparent for subscribers and the core network, these components are secure and safe from, e.g., Denial of Service attacks (DoS) which affect on ISP. In order to provide protection for subscribers, an AN is the optimal place to develop extra security Service for the dataset such as Web filter. With the help of this extra security feature, the user does not need to care about security measures himself [5]. However, although an ISP can take up new security [1] measures in its portfolio, various challenges have to be addressed: • On an AN, high traffic rates (e.g., 1Gbit/s or More than that) have to be processed. • The Web surfing experience of users must not be disturbed. • Web sites, which are not malicious, must not be falsely [1] blocked by the Web filter. The suggested approach was developed as part of the Secure Access Node (SecAN) project presented in [2] as “work in progress”. Purpose of devoting SecAN is to protect the ordinary users of access networks. It deals with firewalls, intrusion detection systems and Web filters. Thereby, Web filtering functionality moves from the subscriber to the ISP [3]. This paper elaborates on the Web filter approach highlighting its benefits concerning speed, resource consumption, scalability, and distinct pattern matching. Briefly summarized, the main contributions of this paper are the following:  A novel scalable software approach of a Web filter placed onto an AN is presented.  The suggested architecture does not create false positives. Thus, only blacklisted domains will be blocked. The system is able to control traffic with more than 1Gbit/s in wire speed on the target platform without packet loss. In next section II we are presenting the literature survey over the various security methods at data sharing systems. In section III, the proposed approach and its system block diagram are depicted. In IV, we are presenting the current Status of the solution. Finally conclusion and future work is predicted in section V.
  • 2. International Journal of Innovative Research in Advanced Engineering (IJIRAE) ISSN: 2349-2163 Volume 1 Issue 6 (July 2014) http://ijirae.com ________________________________________________________________________________________________________ © 2014, IJIRAE- All Rights Reserved Page -255 II. LITERATURE SURVEY Several researchers have done the qualitative and quantitative analysis for Securing the Web Domain based on hardware and software using different techniques for this purpose, as well as many new techniques has introduced:  Below we are discussing some of the J. Rohrbeck, V. Altmann, S. Pfeiffer and D. Timmermann, “Secure Access Node: an FPGA-based Security Architecture for Access Networks,” ICIW, 2011. Providing network security is one of the most important tasks in today’s Internet. Since, users do not have capability to protect themselves and also their networks.  Therefore, we present a security concept to protect users at the Internet Service Provider (ISP) level. Now, ISP is already using various security measures, e.g. Virtual Local Area Network tags and limitation of MAC, or address translation of MAC. Our approach extends these security measures by a packet filter firewall and a deep packet Inspection engine. A firewall and a deep packet inspection system, at the ingress of the network, offers security measures to all the connected users, especially to those who have limited IT expert knowledge. The ISP Administrator can have an ability of adjustments. Consequently, our security system is safe against attacks from users and from the network side.  R. Clayton, “Anonymity and traceability in cyberspace,” the risk of becoming a victim of spam and phishing attacks increases in today’s Internet. Most of the Web sites on World Wide Web show violent or not legal content. Since, Most of users are not able to protect themselves and their networks. Most of the countries have deployed the systems for filtering the Web content. However, solutions which are already present shows high latency and over-blocking. Thus, a Web filtering concept to protect users at the Internet Service provider level is presented. Ability of proposed system is that it can detect and block illegal and threatening Web sites are on the Web. The suggested scalable software-based approach examines Internet domains in wire speed without over blocking. The proposed system is totally transparent and flexible over network devices. Administrator is responsible for the setup and maintenance for Internet service provider (IPS). Consequently, the suggested security system itself is safe from attacks from users and from the network side.  US District Court for the Eastern District of Pennsylvania, “CDT, ACLU, Plantagenet Inc. v Pappert, [1]” A firewall engine controls the header of Ethernet frames, Internet Packets, and the next following protocols. Furthermore, a Web filter method disables access to violent and child pornography Web content. The third subsystem is a Bloom filter-based deep packet inspection engine to observe the payload after the Protocol header. Possibilities of detecting network intruder are depending on deep Packet inspection. A firewall, a Web filter as well as a network intrusion detection system, at the ingress of the network, offer security measures [3] to all connected users, especially to users with limited IT expert knowledge. Each of the mentioned systems has a powerful packet classification engine and a high speed rule set engine used by the Firewall to find specific rules for each frame [3]. Consequently, the security system itself is secured against attacks from users and from the network side [10]. OVERVIEW OF PHISHING EMAILS In this section, we discuss various types of phishing attacks, the life cycle of phishing email, email-analyzing methods, phishing email evaluation methods, features to detect phishing email, and feature selection and extraction methods. We discuss zero-day phishing email attacks in detail, and then compare this survey with existing work. A. Various types of phishing attacks Phishing is a particular type of spam. There are two techniques, deceptive phishing and malware-based phishing. First technique was totally same as engineering dataset schemes, that are depend on forged email claims that are available to generate it from a legitimate organization and bank. Subsequently, through an embedded link within the email, the phisher attempts to redirect users to fake Websites. On the Web available fake Web sites are designed to fraudulently obtain financial data and private authenticated data (usernames, passwords, credit card numbers, and Personal information) from victims. The second technique contain technical subterfuge schemes that rely on malicious code or malware after Phishing attach link embedded in the email, or by detecting and using privacy authentication security holes at the client machine (computer) to obtain the victim’s online account information directly [9]. Sometimes, phisher attempts to give wrong advice to the user from a fake Web site monitored by proxies. In the proposed design, our focus is on deceptive phishing
  • 3. International Journal of Innovative Research in Advanced Engineering (IJIRAE) ISSN: 2349-2163 Volume 1 Issue 6 (July 2014) http://ijirae.com ________________________________________________________________________________________________________ © 2014, IJIRAE- All Rights Reserved Page -256 Fig. 1: Types of phishing attacks using social engineering schemes, as it is one of the popular ways to steal victim’s information by phishing. Figure 1 explains the various types of phishing attacks. III. PROPOSED APPROACH FRAMEWORK AND DESIGN 3.1 PROPOSED SYSTEM: Every subscriber is connected to the Internet by the access network. Access networks contain access nodes like Digital Subscriber Line (DSL) Access Multiplexers. Because the Web filter is located on an AN, a bandwidth of at Least 1 Gbit per second must be achieved. Therefore, the Web filter was designed and developed.  Web Filtering: The purpose of protecting ordinary Internet users on internet, e.g., against malicious Web content, there are three general possibilities: Either IP addresses, URLs, or domain names can be controlled. The filtering of IP addresses can lead to crucial over-blocking since different Web sites can share the same Web server. Moreover, a Web site can move to a new Web server while [1] it remains accessible over the old domain names [11]. Fig 2: Proposed System Architecture  Moreover, HTTP requests to proxies are checked, as well. HTTP redirections as used by URL shorteners are captured too, since the final request is still sent to the target domain. As the goal is to monitor the Web traffic, other protocols should not be blocked. Using HTTP monitoring, the Web filter cannot be simply bypassed by adding the IP address of the Web server into [8] the Local hosts file [8]. Based on the results, which highlight the benefits of HTTP filtering, it is advantageous to check domain names in HTTP requests.  1st level search architecture: For the 1st level searching, hashing method is used. While the Web filter processes and caches the domain name, the hash value is calculated in parallel. The hash table is stored in a cache memory (BRAM) and thus access to it is very fast (one cycle) [1][7]. As hash function, parallel CRC64 was chosen as it provides optimal resource consumption in term of speed/collision ratio. The size of the hash table corresponds to the blacklist length.
  • 4. International Journal of Innovative Research in Advanced Engineering (IJIRAE) ISSN: 2349-2163 Volume 1 Issue 6 (July 2014) http://ijirae.com ________________________________________________________________________________________________________ © 2014, IJIRAE- All Rights Reserved Page -257  2nd level search architecture: The 2nd level search architecture contains plain text domain names and extra Meta information. The architecture shows a Buckets structure. Each bucket contains a domain name list with information on domains producing the same hash value.[9] IV. WORK DONE 4.1 CURRENT STATUS  Packet Capturing: It is the Process of intercepting and logging web traffic.  Domain name filtration: In this we filter out domain which is not valid. If URL does not contain http:// then it is not valid URL, so we first filter this type of domain name.  Hashing of domain name: In this process we apply hashing on domain names with its hash key means with unique hash key.  Block list: Then at last makes list of blocked URLs which are not allowed to access in web browser. V. CONCLUSION AND FUTURE WORK In this paper, the working prototype of the [1] Web filter is presented. As hardware solution, it offers more advantages in terms of security and robustness than a software solution. The solution can control HTTP Traffic in wire speed without packet loss. On the test platform, 1 Gbit/s throughput is achieved. As a high speed Web filter, it can be deployed in the access Networks of ISPs. Hereby, the suggested solution can protect users without IT expert knowledge from illegal, aggressive, violent or threatening Web-contents like child Pornography or phishing. It is unable to produce false positives. Thus, only blacklisted domains will get blocked. The configuration of the blacklist can be done only by the ISP administrator. Since it is fully transparent for all network participants, it is safe from attacks. Prospectively, the functionality of the Web [1] filter can be extended to URL filtering allowing blocking specific resource. REFERENCES [1] Vlado Altmann, Jens Rohrbeck, Jan Skodzik, Maik Roennau, Matthias Ninnemann, 2013 “SWIFT: A Secure Web Domain Filter in Hardware”, ICAINAW [2] S. Ooghe, N. Voigt, M. Platnic, et al., May 2010. [Online]., “Framework and Requirements for an Access Node Control Mechanism in Broadband Multi-Service Networks,” Internet Requests for Comments, RFC Editor, RFC 5851, Available: http://www.rfc-editor.org/rfc/rfc5851.txt [3] J. Rohrbeck, V. Altmann, S. Pfeiffer, and D. Timmermann, 2011 “Secure Access Node: an FPGA-based Security Architecture for Access Networks,” ICIW. [4] R. Clayton, Nov. 2005 “Anonymity and traceability in cyberspace,” ACM SIGACT News, vol. 36, no. 653, pp. 115–148. [5] US District Court for the Eastern District of Pennsylvania, September 2004, “CDT, ACLU, Plantagenet Inc. v Pappert,” 337 F.Supp. 2d 606. [6] R. Clayton, S. J. Murdoch, and R. N. M. Watson, June 2006, “Ignoring the great firewall of china,” 6th Workshop on Privacy Enhancing Technologies, no. 16. [7] Telenor Norge, “Telenor and krips introduce internet child pornography filter,” Telenor Press Release, September 2004. [Online]. Available: http://presse.telenor.no/PR/200409/961319 5.html [8] King Abdulaziz City for Science and Technology, 2004, “Local content filtering Procedure,” Internet Services Unit. [Online]. Available: http://www.isu.net.sa/saudi-internet/contenet-filtring/filtringmechanism. htm [9] The Open Net Initiative, 2005 “Internet filtering In Burma, in 2005: A country study,” [Online]. Available: http://opennet.net/sites/opennet.net/files/ ONI Burma Country Study.pdf [10]Barracuda Networks, “Barracuda web filter,” 2012. [Online]. Available: http://www.barracudanetworks.com/ns/downloads/Datasheets/ Barracuda Web Filter DS US.pdf [11]Lue Coat ProxySG, 2012. [Online]. Available: http://www.bluecoat.com/products/proxysg