1 / 27

Web Content Filtering

Web Content Filtering. Mayur Lodha (mdl2130). Agenda. Need of Filtering Content Filtering Basic Model Filtering Techniques Email Filtering Circumvent Filtering Problems with Filtering Conclusion. NEED for Filtering. SAFE access to the INTERNET!. For Business.

truda
Download Presentation

Web Content Filtering

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Web Content Filtering Mayur Lodha (mdl2130)

  2. Agenda • Need of Filtering • Content Filtering • Basic Model • Filtering Techniques • Email Filtering • Circumvent Filtering • Problems with Filtering • Conclusion

  3. NEED for Filtering

  4. SAFE access to the INTERNET!

  5. For Business

  6. Keep kids SAFE on the Internet

  7. PROTECT children for UNSUITABLE CONTENTS

  8. Web Security and Anti-Virus Prevent malware and spam from entering the network

  9. Content Filtering • Analysis of Email and Web content • Determine whether incoming data is harmful to the network or outgoing data includes intellectual property • Such data is then blocked from entering or leaving the network

  10. Basic Model • Simple network layout • Network with traffic proxied

  11. Simple Network Layout Connection is made by forwarding the uninspected traffic straight to the destination.

  12. Network with Traffic Proxied Traffic is received by an application which alters the traffic in both the directions before sending to the destination.

  13. Web Filtering Techniques • Firewalls • URL Based Filtering • Content Analysis

  14. Firewalls • Basic level of web filtering • Inspects traffic to identify requested site to make decision (allow or block) • Black Lists: Undesirable Web addresses • White Lists: Desirable Web addresses

  15. URL Based Filtering • Database of web addresses • Database loaded onto proxy servers, firewalls and other network infrastructure devices • Supports granular blocking

  16. Content Analysis • Keyword Scanning • Image Scanning

  17. Keywords Scanning • Tag words: Positive or Negative score • Block: Sum (score) > Threshold

  18. Image Scanning

  19. Email Filtering • Primary communication channel • Need to control SPAM and virus mails

  20. Filtering Techniques • Channel/Response: Sender perform task • Heuristic Filters:Score words or phrases • Bayesian Filters: Mathematical Probability

  21. Circumventing Web Filtering • Getting around them: Traffic is not passed through the filter. • Getting through them: Traffic is passed through the filter by obscuring the address of content and/or the content itself.

  22. Proxy sites

  23. Internet Filtering Test San Jose Public Library: Each filter blocks desirable protected content in its attempt to block objectionable content

  24. Problem with filtering "It could be expected that allowed content would be blocked. If all pornographic content is to be blocked, other content with a resemblance in features will also be blocked; e.g. sex education, medical information, erotic content etc." - Dr Bjorn Landfeldt

  25. Conclusion “All filters over block. All filters under block. No filter is 100% accurate because no one agrees on what being 100% accurate is.” - Lori Bowen Ayre

  26. Thank You!!!

More Related