Web Content Filtering Mayur Lodha (mdl2130). Agenda  Need of Filtering  Content Filtering  Basic Model  Filtering Techniques  Email Filtering  Circumvent.

Slides:



Advertisements
Similar presentations
A NASSCOM ® Initiative Comprehensive Computer Security Software An advanced computer security software usually have one or more of the following utilities.
Advertisements

Microsoft ® Exchange Online Advanced Security Name Title Microsoft Corporation.
FIREWALLS Chapter 11.
Phishing (pronounced “fishing”) is the process of sending messages to lure Internet users into revealing personal information such as credit card.
Authored by: Rachit Rastogi Computer Science & Engineering Deptt., College of Technology, G.B.P.U.A. & T., Pantnagar.
Lisa Farmer, Cedo Vicente, Eric Ahlm
What is SpamSniper? SpamSniper is the leading security solution which locates in front of mail server to perform mail proxy, virus firewall and filter.
Firewall Ercan Sancar & Caner Sahin. Index History of Firewall Why Do You Need A Firewall Working Principle Of Firewalls Can a Firewall Really Protect.
INTRANET SECURITY Catherine Alexis CMPT 585 Computer and Data Security Dr Stefan Robila.
Network Security. Network security starts from authenticating any user. Once authenticated, firewall enforces access policies such as what services are.
S EC (4.5): S ECURITY 1. F ORMS OF ATTACK There are numerous way that a computer system and its contents can be attacked via network connections. Many.
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. 6 Packet Filtering By Whitman, Mattord, & Austin© 2008 Course Technology.
Course 201 – Administration, Content Inspection and SSL VPN
 Proxy Servers are software that act as intermediaries between client and servers on the Internet.  They help users on private networks get information.
Delivery at the University of Guelph. Background flow has dramatically increased in the past few years (~2,000,000 msgs/week) This increase.
Norman SecureTide Powerful cloud solution to stop spam and threats before it reaches your network.
Your technology solution partner.™ Security Enterprise Protection Gener C. Tongco Product Manager CT Link Systems Inc.
Internet Safety By Megan Wilkinson. Viruses If your computer haves a viruses on it, it will show one of them or a different one. All commuters have different.
Internet safety Viruses A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your.
Internet Safety Basics Being responsible -- and safer -- online Visit age-appropriate sites Minimize chatting with strangers. Think critically about.
BY- NIKHIL TRIPATHI 12MCMB10.  What is a FIREWALL?  Can & Can’t in Firewall perspective  Development of Firewalls  Firewall Architectures  Some Generalization.
CS426Fall 2010/Lecture 361 Computer Security CS 426 Lecture 36 Perimeter Defense and Firewalls.
Packet Filtering. 2 Objectives Describe packets and packet filtering Explain the approaches to packet filtering Recommend specific filtering rules.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
InterScan Gateway Security Appliance 1.0 Filip Demianiuk Sales Engineer Eastern Europe
ProtectionProfiles. 2 Fortinet Technologies Protection Profiles Protection profiles control t the type of traffic protected t HTTP t FTP t IMAP t POP3.
Hacker Zombie Computer Reflectors Target.
Chapter 6: Packet Filtering
Lecture#2 on Internet and World Wide Web. Internet Applications Electronic Mail ( ) Electronic Mail ( ) Domain mail server collects incoming mail.
Internet Security facilities for secure communication.
Windows Vista Security Center Chapter 5(WV): Protecting Your Computer 9/17/20151Instructor: Shilpa Phanse.
WIRELESS IN YOUR LIBRARY The Anatomy of a Library Communications Network.
Safeguarding OECD Information Assets Frédéric CHALLAL Head, Systems Engineering Team OECD.
 A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. It is deliberately.
Packet Filtering Chapter 4. Learning Objectives Understand packets and packet filtering Understand approaches to packet filtering Set specific filtering.
3.05 Protect Your Computer and Information Unit 3 Internet Basics.
Internet Filtering seyed Ehsan shariaty shiraz university of Technology.
McLean HIGHER COMPUTER NETWORKING Lesson 14 Firewalls & Filtering Comparison of Internet content filtering methods: firewalls, Internet filtering.
Intro to Firewalls. A firewall is hardware, software, or a combination of both that is used to prevent unauthorized programs or Internet users from accessing.
1 Network Firewalls CSCI Web Security Spring 2003 Presented By Yasir Zahur.
Security Version 6.1 | August Need for Complete Security Stop threats at the perimeter High volume spam, phishing, viruses and.
Security fundamentals Topic 10 Securing the network perimeter.
Overview of Firewalls. Outline Objective Background Firewalls Software Firewall Hardware Firewall Demilitarized Zone (DMZ) Firewall Types Firewall Configuration.
A Network Security -Firewall Bruce Turin.
AQA A2 COMP 3: Internet Security. Lesson Aim By the end of the lesson: By the end of the lesson: Describe different security issues and recommend tools/techniques.
Firewalls. Intro to Firewalls Basically a firewall is a barrier to keep destructive forces away from your computer network.
NETWORK SECURITY Definitions and Preventions Toby Wilson.
What's a Firewall? A security system that acts as a protective boundary between a network and the outside world Isolates computer from the internet using.
3/5/2016Faculty : Trần Thị Ngọc Hoa1 From Proxy Server To ISA 2006  Overview  History  Functions  Caching Process  Caching Types  How does it work.
Unit 1 Understanding computer systems: How legal, ethical, safety and security issues affect how computers should be used OCR Cambridge Nationals in ICT.
Bay Ridge Security Consulting (BRSC). Importance in Securing System  If don’t keep up with security issues or fixes Exploitation of root access Installation.
Regan Little. Definition Methods of Screening Types of Firewall Network-Level Firewalls Circuit-Level Firewalls Application-Level Firewalls Stateful Multi-Level.
IP packet filtering Breno de Medeiros. Florida State University Fall 2005 Packet filtering Packet filtering is a network security mechanism that works.
I NTRODUCTION TO F IREWALLS. O VERVIEW OF F IREWALLS As the name implies, a firewall acts to provide secured access between two networks A firewall may.
ANONYMIZING / WEB PRIVACY. TOOLS: STAYING ANONYMOUS ON THE INTERNET Proxy Server Tor.
Presented By Hareesh Pattipati.  Introduction  Firewall Environments  Type of Firewalls  Future of Firewalls  Conclusion.
Windows Vista Configuration MCTS : Productivity Applications.
Firewalls. Overview of Firewalls As the name implies, a firewall acts to provide secured access between two networks A firewall may be implemented as.
Chapter 8.  Upon completion of this chapter, you should be able to:  Understand the purpose of a firewall  Name two types of firewalls  Identify common.
Important of Firewall Security in LAN Presented by: Guo Chean Ooi.
FIREWALLS By k.shivakumar 08k81f0025. CONTENTS Introduction. What is firewall? Hardware vs. software firewalls. Working of a software firewalls. Firewall.
Avast Mail Scanner When we talk about antivirus, Avast has never disappointed us. With the inclusions of latest features all the time, it is able to.
Computer Data Security & Privacy
Introduction to Networking
Information Security Session October 24, 2005
Firewalls Jiang Long Spring 2002.
Firewall.
Management Suite v2.0 DoubleCheck Manager Management Suite v2.0.
AbbottLink™ - IP Address Overview
FIREWALL.
Presentation transcript:

Web Content Filtering Mayur Lodha (mdl2130)

Agenda  Need of Filtering  Content Filtering  Basic Model  Filtering Techniques  Filtering  Circumvent Filtering  Problems with Filtering  Conclusion

NEED for Filtering

SAFE access to the INTERNET!

For Business

Keep kids SAFE on the Internet

PROTECT children for UNSUITABLE CONTENTS

Web Security and Anti-Virus Prevent malware and spam from entering the network

Content Filtering  Analysis of and Web content  Determine whether incoming data is harmful to the network or outgoing data includes intellectual property  Such data is then blocked from entering or leaving the network

Basic Model  Simple network layout  Network with traffic proxied

Simple Network Layout Connection is made by forwarding the uninspected traffic straight to the destination.

Network with Traffic Proxied Traffic is received by an application which alters the traffic in both the directions before sending to the destination.

Web Filtering Techniques  Firewalls  URL Based Filtering  Content Analysis

Firewalls  Basic level of web filtering  Inspects traffic to identify requested site to make decision (allow or block)  Black Lists: Undesirable Web addresses  White Lists: Desirable Web addresses

URL Based Filtering  Database of web addresses  Database loaded onto proxy servers, firewalls and other network infrastructure devices  Supports granular blocking

Content Analysis  Keyword Scanning  Image Scanning

Keywords Scanning  Tag words: Positive or Negative score  Block: Sum (score) > Threshold

Image Scanning

Filtering  Primary communication channel  Need to control SPAM and virus mails

Filtering Techniques  Channel/Response: Sender perform task  Heuristic Filters: Score words or phrases  Bayesian Filters: Mathematical Probability

Circumventing Web Filtering  Getting around them: Traffic is not passed through the filter.  Getting through them: Traffic is passed through the filter by obscuring the address of content and/or the content itself.

Proxy sites

Internet Filtering Test San Jose Public Library: Each filter blocks desirable protected content in its attempt to block objectionable content Type of Content TestedAccuracy Percentage Content of an Adult Sexual Nature – direct URL access 87% Content of an Adult Sexual Nature – keyword searches 81% Content not of an Adult Sexual Nature – direct URL access 86% Content not of an Adult Sexual Nature – keyword searches 69% Image Searches 44% Attachments 25% RSS Feeds 48% Catalog Searches 75% Database Searches 88%

Problem with filtering "It could be expected that allowed content would be blocked. If all pornographic content is to be blocked, other content with a resemblance in features will also be blocked; e.g. sex education, medical information, erotic content etc." - Dr Bjorn Landfeldt

Conclusion “All filters over block. All filters under block. No filter is 100% accurate because no one agrees on what being 100% accurate is.” - Lori Bowen Ayre

Thank You!!!