SlideShare a Scribd company logo
1 of 14
         Adware Blocker Sponsored by :   Symantec Corporation By :                                                                       - SonalKamble (4622)                                                                       - ChaitaliMagdum (4628)                                                                       - Aditi Pantoji (4633)                                                                       - Prajakta Pednekar (4637)       External Guide:                                       Internal Guide:       Mr. Vikram  Saurabh                              Mr. Harshad Wadkar        10/1/2010 1 Adware Blocker
What is Adware ? ,[object Object],   automatically  plays,  displays or  downloads advertisements  to  a     computer. ,[object Object],   integrated  spyware  such as  key  loggers  and  other  privacy-invasive       software. Need of Adware Blocker Application: ,[object Object],    which  can  be in the form of Pop-up and Pop-under which we come across       while    accessing   many  websites. 10/1/2010 2 Adware Blocker
10/1/2010 Adware Blocker 3     Project Problem Statement:      Development Of Adware Blocker Project Problem Statement Description: ,[object Object]
It sniffs the traffic and applies policies before rendering it to the client and the client will not be aware about this.
The policies applied should be based on predefined categories read by the application from database and user defined policies can also be added to it.
User defined policies can depend on certain predefined keywords and regular expressions. Predefined categories like bank, pornography, social media etc.,[object Object]
 Working Of Adware Blocker Application 1.Read HTTP response packets coming from Web server. 2.Filter out pop-up and pop-under packets from http response. 3.Parse URL of pop-up and pop-under. 4.Search for domain of URL. 5.Send request to signature database to find whether packet is valid or invalid . 6.Process HTTP response based on query from database     Valid packets :-Allowed to enter into the client network .    Invalid packets :- Blocked. 10/1/2010 5 Adware Blocker
  Area/Domain:  Internet Security   Technologies to be used:   ,[object Object]
 jsp ( java server pages) for frontend
 MySQL for database10/1/2010 6 Adware Blocker
Learning Requirements: 1.Languages:  ,[object Object]
   Java  for front end.
   My SQL for  Database.2.Operating System: ,[object Object],10/1/2010 7 Adware Blocker Database
3.Technical: ,[object Object]

More Related Content

Viewers also liked (7)

Intelligent adware blocker symantec
Intelligent adware blocker symantecIntelligent adware blocker symantec
Intelligent adware blocker symantec
 
Forecast romanov
Forecast romanovForecast romanov
Forecast romanov
 
Czasopisma wydawnictwa borgis
Czasopisma wydawnictwa borgisCzasopisma wydawnictwa borgis
Czasopisma wydawnictwa borgis
 
Rio
Rio Rio
Rio
 
Ofvigo Company
Ofvigo CompanyOfvigo Company
Ofvigo Company
 
Bring stories to life using BDD (Behaviour driven development)
Bring stories to life using BDD (Behaviour driven development)Bring stories to life using BDD (Behaviour driven development)
Bring stories to life using BDD (Behaviour driven development)
 
Flash americanbloger
Flash americanblogerFlash americanbloger
Flash americanbloger
 

Similar to Intelligent adware blocker Presentation

Spe cs getting_started_guide
Spe cs getting_started_guideSpe cs getting_started_guide
Spe cs getting_started_guide
saurabh_classic
 
Spe cs getting_started_guide
Spe cs getting_started_guideSpe cs getting_started_guide
Spe cs getting_started_guide
Saurabh Singh
 
A Decentralized Cloud Firewall Framework with Resources Provisioning Cost Opt...
A Decentralized Cloud FirewallFramework with Resources ProvisioningCost Opt...A Decentralized Cloud FirewallFramework with Resources ProvisioningCost Opt...
A Decentralized Cloud Firewall Framework with Resources Provisioning Cost Opt...
Pranav Gontalwar
 
Investigation of CryptoLocker Ransomware Trojans - Microsoft Windows
Investigation of CryptoLocker Ransomware Trojans - Microsoft WindowsInvestigation of CryptoLocker Ransomware Trojans - Microsoft Windows
Investigation of CryptoLocker Ransomware Trojans - Microsoft Windows
Aaron ND Sawmadal
 
Investigation of CryptoLocker Ransomware Trojans - Microsoft Windows
Investigation of CryptoLocker Ransomware Trojans - Microsoft WindowsInvestigation of CryptoLocker Ransomware Trojans - Microsoft Windows
Investigation of CryptoLocker Ransomware Trojans - Microsoft Windows
Aaron ND Sawmadal
 
B04010 01 0917
B04010 01 0917B04010 01 0917
B04010 01 0917
IJMER
 
GDP Product Presentation
GDP Product PresentationGDP Product Presentation
GDP Product Presentation
tswong
 

Similar to Intelligent adware blocker Presentation (20)

Spe cs getting_started_guide
Spe cs getting_started_guideSpe cs getting_started_guide
Spe cs getting_started_guide
 
Spe cs getting_started_guide
Spe cs getting_started_guideSpe cs getting_started_guide
Spe cs getting_started_guide
 
Spyware
SpywareSpyware
Spyware
 
FIREWALL PROJECT.pptx BY SAKSHI SOLAPURE
FIREWALL PROJECT.pptx BY SAKSHI SOLAPUREFIREWALL PROJECT.pptx BY SAKSHI SOLAPURE
FIREWALL PROJECT.pptx BY SAKSHI SOLAPURE
 
Top 10 Software to Detect & Prevent Security Vulnerabilities from BlackHat US...
Top 10 Software to Detect & Prevent Security Vulnerabilities from BlackHat US...Top 10 Software to Detect & Prevent Security Vulnerabilities from BlackHat US...
Top 10 Software to Detect & Prevent Security Vulnerabilities from BlackHat US...
 
Android malware presentation
Android malware presentationAndroid malware presentation
Android malware presentation
 
Web application & proxy server
Web application & proxy serverWeb application & proxy server
Web application & proxy server
 
Firewall presentation
Firewall presentationFirewall presentation
Firewall presentation
 
A Decentralized Cloud Firewall Framework with Resources Provisioning Cost Opt...
A Decentralized Cloud FirewallFramework with Resources ProvisioningCost Opt...A Decentralized Cloud FirewallFramework with Resources ProvisioningCost Opt...
A Decentralized Cloud Firewall Framework with Resources Provisioning Cost Opt...
 
Firewall & packet filter new
Firewall & packet filter newFirewall & packet filter new
Firewall & packet filter new
 
Adware
AdwareAdware
Adware
 
Adware
AdwareAdware
Adware
 
Comodo advanced endpoint protection
Comodo advanced endpoint protectionComodo advanced endpoint protection
Comodo advanced endpoint protection
 
BlackDuck Suite
BlackDuck SuiteBlackDuck Suite
BlackDuck Suite
 
Investigation of CryptoLocker Ransomware Trojans - Microsoft Windows
Investigation of CryptoLocker Ransomware Trojans - Microsoft WindowsInvestigation of CryptoLocker Ransomware Trojans - Microsoft Windows
Investigation of CryptoLocker Ransomware Trojans - Microsoft Windows
 
Investigation of CryptoLocker Ransomware Trojans - Microsoft Windows
Investigation of CryptoLocker Ransomware Trojans - Microsoft WindowsInvestigation of CryptoLocker Ransomware Trojans - Microsoft Windows
Investigation of CryptoLocker Ransomware Trojans - Microsoft Windows
 
B04010 01 0917
B04010 01 0917B04010 01 0917
B04010 01 0917
 
HackInBo2k16 - Threat Intelligence and Malware Analysis
HackInBo2k16 - Threat Intelligence and Malware AnalysisHackInBo2k16 - Threat Intelligence and Malware Analysis
HackInBo2k16 - Threat Intelligence and Malware Analysis
 
Pentesting Android Applications
Pentesting Android ApplicationsPentesting Android Applications
Pentesting Android Applications
 
GDP Product Presentation
GDP Product PresentationGDP Product Presentation
GDP Product Presentation
 

Recently uploaded

The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
heathfieldcps1
 

Recently uploaded (20)

Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptx
 
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
 
REMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxREMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptx
 
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxHMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfUnit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 

Intelligent adware blocker Presentation

  • 1. Adware Blocker Sponsored by : Symantec Corporation By : - SonalKamble (4622) - ChaitaliMagdum (4628) - Aditi Pantoji (4633) - Prajakta Pednekar (4637) External Guide: Internal Guide: Mr. Vikram Saurabh Mr. Harshad Wadkar 10/1/2010 1 Adware Blocker
  • 2.
  • 3.
  • 4. It sniffs the traffic and applies policies before rendering it to the client and the client will not be aware about this.
  • 5. The policies applied should be based on predefined categories read by the application from database and user defined policies can also be added to it.
  • 6.
  • 7. Working Of Adware Blocker Application 1.Read HTTP response packets coming from Web server. 2.Filter out pop-up and pop-under packets from http response. 3.Parse URL of pop-up and pop-under. 4.Search for domain of URL. 5.Send request to signature database to find whether packet is valid or invalid . 6.Process HTTP response based on query from database Valid packets :-Allowed to enter into the client network . Invalid packets :- Blocked. 10/1/2010 5 Adware Blocker
  • 8.
  • 9. jsp ( java server pages) for frontend
  • 10. MySQL for database10/1/2010 6 Adware Blocker
  • 11.
  • 12. Java for front end.
  • 13.
  • 14.
  • 15. Squid Proxy Server (basics, installation and configuration).
  • 16. Firewall (basics, installation and configuration).
  • 17. Web Server (basics, installation).
  • 18. Pop-up and pop-under (basics, working and creation).
  • 19. Webpage and Website creation with pop-up, pop-under and hyperlink.
  • 20. Packet Sniffer Wireshark (HTTP request, HTTP response, Pop-up, Pop-under, Adware) .10/1/2010 8 Adware Blocker Learning Requirements Continued……….
  • 23. 10/1/2010 Adware Blocker 11 Use Case Diagram
  • 24. 10/1/2010 Adware Blocker 12 Click to view our Log Book LogBook.xlsx
  • 25.
  • 26.