Web Content Filter: technology for social safe browsing Ilya Tikhomirov Institute for Systems Analysis of the Russian Academy of Sciences

Slides:



Advertisements
Similar presentations
Inktomi Confidential and Proprietary The Inktomi Climate Lab: An Integrated Environment for Analyzing and Simulating Customer Network Traffic Stephane.
Advertisements

Web Content Control Application Providing Secure & Reliable Internet Access December 2010.
Page 1 / 18 Internet Traffic Monitor IM Page 2 / 18 Outline Product Overview Product Features Product Application Web UI.
4.01 How Web Pages Work.
CE80N Introduction to Networks & The Internet Dr. Chane L. Fullmer UCSC Winter 2002.
1 Configuring Internet- related services (April 22, 2015) © Abdou Illia, Spring 2015.
Communicating Information: Web Design. It’s a big net HTTP FTP TCP/IP SMTP protocols The Internet The Internet is a network of networks… It connects millions.
Content  Overview of Computer Networks (Wireless and Wired)  IP Address, MAC Address and Workgroups  LAN Setup and Creating Workgroup  Concept on.
Web Caching Schemes1 A Survey of Web Caching Schemes for the Internet Jia Wang.
A Security Pattern for a Virtual Private Network Ajoy Kumar and Eduardo B. Fernandez Dept. of Computer Science and Eng. Florida Atlantic University Boca.
EECS Presentation Web Tap: Intelligent Intrusion Detection Kevin Borders.
WHAT IS AJAX? Zack Sheppard [zts2101] WHIM April 19, 2011.
Progress Report 11/1/01 Matt Bridges. Overview Data collection and analysis tool for web site traffic Lets website administrators know who is on their.
12/11/01 Matt Bridges Advisor: Ralph Morelli. What is Web Analytics? In traditional commerce, store owners can observe their customers habits: What time.
Adaptive Content Delivery for Scalable Web Servers Authors: Rahul Pradhan and Mark Claypool Presented by: David Finkel Computer Science Department Worcester.
Searching and Researching the World Wide: Emphasis on Christian Websites Developed from the book: Searching and Researching on the Internet and World Wide.
1 Web Content Delivery Reading: Section and COS 461: Computer Networks Spring 2007 (MW 1:30-2:50 in Friend 004) Ioannis Avramopoulos Instructor:
 Proxy Servers are software that act as intermediaries between client and servers on the Internet.  They help users on private networks get information.
Web Cache. Introduction what is web cache?  Introducing proxy servers at certain points in the network that serve in caching Web documents for faster.
Course 201 – Administration, Content Inspection and SSL VPN
Internet basics, Browsers, application, advantages and disadvantages, architecture, WWW, URL, HTML Week 10 Mr. Mohammed Rahmath.
Web Programming Language Dr. Ken Cosh Week 1 (Introduction)
Boris Tshibangu. What is a proxy server? A proxy server is a server (a computer system or an application) that acts as an intermediary for requests from.
The World's Most Secured Browsing Solution COCKPIT4i is a radically new, powerful solution that protects against the security risks posed by exposure to.
Norman SecureSurf Protect your users when surfing the Internet.
Internet Traffic Filtering System based on Data Mining Approach Vladimir Maslyakov Computer Science Department of Lomonosov Moscow State University.
Configuring a Web Server. Overview Overview of IIS Preparing for an IIS Installation Installing IIS Configuring a Web Site Administering IIS Troubleshooting.
Internet Technology I د. محمد البرواني. Project Number 3 Computer crimes in the cybernet Computer crimes in the cybernet Privacy in the cybernet Privacy.
By : Himanshu Mishra Nimish Agarwal CPSC 624.  A system designed to prevent unauthorized access to or from a private network.  It must have at least.
How Web Servers and the Internet Work by by: Marshall Brainby: Marshall Brain
TCP/IP Protocols Dr. Sharon Hall Perkins Applications World Wide Web(HTTP) Presented by.
Internet  Major:Safety science and engineering  Author:jiangqian( 蒋乾 )
Firewalls. Intro to Firewalls Basically a firewall is a __________to keep destructive forces away from your ________ ____________.
Module 5: Configuring Internet Explorer and Supporting Applications.
Securing Internet Access Designing an Internet Acceptable Use Policy Securing Access to the Internet by Private Network Users Restricting Access to Content.
I NTERNET BASICS, B ROWSERS, APPLICATION, ADVANTAGES AND DISADVANTAGES, ARCHITECTURE, WWW, URL, HTML Week 10 Mr. Mohammed Rahmath.
CensorNet Ltd An introduction to CensorNet Professional On-premise web filtering & management An introduction to CensorNet Professional On-premise web.
Adaptive Web Caching CS411 Dynamic Web-Based Systems Flying Pig Fei Teng/Long Zhao/Pallavi Shinde Computer Science Department.
Web Design (1) Terminology. Coding ‘languages’ (1) HTML - Hypertext Markup Language - describes the content of a web page CSS - Cascading Style Sheets.
McLean HIGHER COMPUTER NETWORKING Lesson 14 Firewalls & Filtering Comparison of Internet content filtering methods: firewalls, Internet filtering.
1 Network Firewalls CSCI Web Security Spring 2003 Presented By Yasir Zahur.
Setup and Management for the CacheRaQ. Confidential, Page 2 Cache Installation Outline – Setup & Wizard – Cache Configurations –ICP.
Microsoft ISA Server 2000 Presented by Ricardo Diaz Ryan Fansa.
01 - Introduction Informatics Department Parahyangan Catholic University.
The Internet, Fourth Edition-- Illustrated 1 The Internet – Illustrated Introductory, Fourth Edition Unit B Understanding Browser Basics.
Winter 2001C.Watters1 Apache Proxy Notes. winter 2001C.Watters2 Proxy Intermediary between clients and the web Configure browser to go to the proxy Proxy.
Chapter 6.  Internet and characteristics of Internet.  Various Internet protocols  Static IP addressing and Dynamic IP addressing Prepared by Saher.
/ Fast Web Content Delivery An Introduction to Related Techniques by Paper Survey B Li, Chien-chang R Sung, Chih-kuei.
Web Design Terminology Unit 2 STEM. 1. Accessibility – a web page or site that address the users limitations or disabilities 2. Active server page (ASP)
PROXY SERVER Kalyani Ravi. A proxy server is essentially an electronic gatekeeper, residing between an organization's internal network and the Internet,
Week-6 (Lecture-1) Publishing and Browsing the Web: Publishing: 1. upload the following items on the web Google documents Spreadsheets Presentations drawings.
General Architecture of Retrieval Systems 1Adrienn Skrop.
Search Engine and Optimization 1. Introduction to Web Search Engines 2.
Cofax Scalability Document Version Scaling Cofax in General The scalability of Cofax is directly related to the system software, hardware and network.
Telnet Media. Telnet Media Ltd Surfing the Web Secure Content Management Products Reasons to implement Agenda.
E-Business Infrastructure PRESENTED BY IKA NOVITA DEWI, MCS.
BUILD SECURE PRODUCTS AND SERVICES
Web Programming Language
TMG Client Protection 6NPS – Session 7.
Presentation on Distributed Web Based Systems Submitted by WWW
E-commerce | WWW World Wide Web - Concepts
E-commerce | WWW World Wide Web - Concepts
Introducing the World Wide Web
Some Common Terms The Internet is a network of computers spanning the globe. It is also called the World Wide Web. World Wide Web It is a collection of.
Advanced Security Architecture System Engineer Cisco: practice-questions.html.
IS 4506 Server Configuration (HTTP Server)
Configuring Internet-related services
Objectives To understand the about types of computer network
Employee Monitoring Solution
The Internet and Electronic mail
Presentation transcript:

Web Content Filter: technology for social safe browsing Ilya Tikhomirov Institute for Systems Analysis of the Russian Academy of Sciences WWW:

2 State of art (1) The HTTP traffic is about 50 % of the information transfer in the Web. A part of Web is inappropriate (extremist and porno sites, social networks and music archives) for some categories of users (children, students, employees). The number of inappropriate sites grows constantly. Blocking access to inappropriate Web sites is the main goal of the content filters.

3 State of art (2) Modern content filters use predefined ban lists of URLs or IP addresses of inappropriate Web sites. Ban lists are formed manually by content filter developers or by network administrators. HTTP proxy servers became more popular in Web surfing. It makes usage of predefined ban lists inefficient and useless.

4 Disadvantage of current solutions Content filters use pattern matching for HTTP response. Content is blocked if any restricted signature was found in the HTTP response. Text is seen like a stream of bytes. No full-text analysis. Low recall and precision of filtering. The exponential growth of the Web and dynamically changing content cause an incomplete coverage of inappropriate Web resources.

5 Solution The solution is automatic classification based on full-text content analysis of the Web pages “on the fly”: System assigns documents to categories and denies access to inappropriate Web pages. The automatic classification method analyses Web pages according to terms importance in natural language text. Morphological analysis is used for text preprocessing.

6 Architecture of the Web Content Filter

7 Dynamic content filtering algorithm

8 Deployment of the Web Content Filter Main steps: 1.Forming inappropriate categories. 2.Preparing learning examples. 3.Running the automatic classifier in learning mode. 4.System setup, testing and parameters customization. 5.Running the automatic classifier in filtering mode.

9 Advantages Higher precision and recall of filtering than traditional methods. Transparency for users: no advanced settings of Web browsers and other Web applications are required. Adaptability to users’ behavior: only requested pages are examined. Scalability: distributed modules withstand load in big computer networks. Strictness level customization.

10 Usage Content Filtering for social safe Web browsing at: Educational institutions. State institutions. Companies. Home networks.

Contacts Institute for Systems Analysis of the Russian Academy of Sciences ,Moscow, pr. 60-let Octiabrya, 9 phone/fax: +7 (499)