SlideShare a Scribd company logo
1 of 14
Web Filtering
Table of Contents
 Need of Filtering
 Content Filtering
 Basic Model
 Filtering Techniques
 Email Filtering
 Circumvent Filtering
 Problems with Filtering
 Conclusion
Review About Web Filter
Content Filtering
 Analysis of Email and Web content
 Prevent malware and spam from
entering the network
 Determine whether incoming data
is harmful to the network or
outgoing data includes intellectual
property
 Such data is then blocked from
entering or leaving the network
 Simple network layout
 Network with traffic proxy
Web Security and Anti-Virus
Network Layout
Connection is made by forwarding the uninspected traffic
straight to the destination.
Network with Traffic Proxied
Traffic is received by an application which alters the traffic
in both the directions before sending to the destination.
Web Filtering Techniques
 Firewalls
 URL Based Filtering
 Content Analysis
Firewalls
 Basic level of web filtering
 Inspects traffic to identify requested site
to make decision (allow or block)
 Black Lists: Undesirable Web addresses
 White Lists: Desirable Web addresses
URL Based Filtering
 Database of web addresses
 Database loaded onto proxy
servers, firewalls and other
network infrastructure devices
 Supports granular blocking
Content Analysis
 Keyword Scanning
 Image Scanning
Keywords Scanning
 Tag words: Positive or Negative
score
 Block:
Sum (score) > Threshold
Image Scanning
Content Analysis
Email Filtering
 Primary communication
channel
 Need to control SPAM and virus
mails
Filtering Techniques
 Channel/Response:
Sender perform task
 Heuristic Filters: Score words
or phrases
 Bayesian Filters: Mathematical
Probability
Circumventing Web Filtering Getting around them:
Traffic is not passed through the filter.
 Getting through them:
Traffic is passed through the filter by obscuring
the address of content and/or the content
itself.
Type of Content Tested Accuracy Percentage
Content of an Adult Nature – direct URL access 87%
Content of an Adult Nature – keyword searches 81%
Content not of an Adult Nature – direct URL access 86%
Content not of an Adult Nature – keyword searches 69%
Image Searches 44%
Email Attachments 25%
RSS Feeds 48%
Catalog Searches 75%
Database Searches 88%
Internet Filtering Test
Problem with filtering
"It could be expected that allowed
content would be blocked. If all
pornographic content is to be
blocked, other content with a
resemblance in features will also be
blocked; e.g. Adult education,
medical information, erotic content
etc."
“All filters over block. All filters under block.
No filter is 100% accurate because no
one agrees on what being 100%
accurate is.”
Conclusion
1.DansGuardian (Cross Platform, Free)
2.K9 (Windows/Mac, Free)
3.OpenDNS (Cross Platform, Free)
4.SquidGuard/Squid (Linux, Free)
5.Hosts File (Cross Platform, Free)
Five Best Content Filtering Tools
Use Of DansGuardian
Reference
1) http://dansguardian.org/?page=whatisdg
2) http://www1.k9webprotection.com/aboutk9/overview
3) https://www.opendns.com/about/
4) https://www.opendns.com/about/
5) http://en.wikipedia.org/wiki/Hosts_%28file%29
6) http://en.wikipedia.org/wiki/Internet_security

More Related Content

What's hot

A2 - broken authentication and session management(OWASP thailand chapter Apri...
A2 - broken authentication and session management(OWASP thailand chapter Apri...A2 - broken authentication and session management(OWASP thailand chapter Apri...
A2 - broken authentication and session management(OWASP thailand chapter Apri...Noppadol Songsakaew
 
Vulnerabilities in modern web applications
Vulnerabilities in modern web applicationsVulnerabilities in modern web applications
Vulnerabilities in modern web applicationsNiyas Nazar
 
Footprinting and reconnaissance
Footprinting and reconnaissanceFootprinting and reconnaissance
Footprinting and reconnaissanceNishaYadav177
 
Application Security
Application SecurityApplication Security
Application Securityflorinc
 
Cross Site Scripting ( XSS)
Cross Site Scripting ( XSS)Cross Site Scripting ( XSS)
Cross Site Scripting ( XSS)Amit Tyagi
 
Web application security
Web application securityWeb application security
Web application securityKapil Sharma
 
Different Types of Phishing Attacks
Different Types of Phishing AttacksDifferent Types of Phishing Attacks
Different Types of Phishing AttacksSysCloud
 
Web Application Security and Awareness
Web Application Security and AwarenessWeb Application Security and Awareness
Web Application Security and AwarenessAbdul Rahman Sherzad
 
Pen Testing Explained
Pen Testing ExplainedPen Testing Explained
Pen Testing ExplainedRand W. Hirt
 
Introduction to penetration testing
Introduction to penetration testingIntroduction to penetration testing
Introduction to penetration testingNezar Alazzabi
 
Ethical Hacking Powerpoint
Ethical Hacking PowerpointEthical Hacking Powerpoint
Ethical Hacking PowerpointRen Tuazon
 
Intrusion detection
Intrusion detectionIntrusion detection
Intrusion detectionCAS
 
NETWORK PENETRATION TESTING
NETWORK PENETRATION TESTINGNETWORK PENETRATION TESTING
NETWORK PENETRATION TESTINGEr Vivek Rana
 
Hacking And Its Prevention
Hacking And Its PreventionHacking And Its Prevention
Hacking And Its PreventionDinesh O Bareja
 
The Cross Site Scripting Guide
The Cross Site Scripting GuideThe Cross Site Scripting Guide
The Cross Site Scripting GuideDaisuke_Dan
 

What's hot (20)

A2 - broken authentication and session management(OWASP thailand chapter Apri...
A2 - broken authentication and session management(OWASP thailand chapter Apri...A2 - broken authentication and session management(OWASP thailand chapter Apri...
A2 - broken authentication and session management(OWASP thailand chapter Apri...
 
Vulnerabilities in modern web applications
Vulnerabilities in modern web applicationsVulnerabilities in modern web applications
Vulnerabilities in modern web applications
 
Footprinting and reconnaissance
Footprinting and reconnaissanceFootprinting and reconnaissance
Footprinting and reconnaissance
 
Application Security
Application SecurityApplication Security
Application Security
 
Cross Site Scripting ( XSS)
Cross Site Scripting ( XSS)Cross Site Scripting ( XSS)
Cross Site Scripting ( XSS)
 
Web application security
Web application securityWeb application security
Web application security
 
Different Types of Phishing Attacks
Different Types of Phishing AttacksDifferent Types of Phishing Attacks
Different Types of Phishing Attacks
 
Web Application Security and Awareness
Web Application Security and AwarenessWeb Application Security and Awareness
Web Application Security and Awareness
 
Pen Testing Explained
Pen Testing ExplainedPen Testing Explained
Pen Testing Explained
 
Introduction to penetration testing
Introduction to penetration testingIntroduction to penetration testing
Introduction to penetration testing
 
Ethical Hacking Powerpoint
Ethical Hacking PowerpointEthical Hacking Powerpoint
Ethical Hacking Powerpoint
 
CyberSecurity
CyberSecurityCyberSecurity
CyberSecurity
 
Intrusion detection
Intrusion detectionIntrusion detection
Intrusion detection
 
PPT on Phishing
PPT on PhishingPPT on Phishing
PPT on Phishing
 
Security testing
Security testingSecurity testing
Security testing
 
NETWORK PENETRATION TESTING
NETWORK PENETRATION TESTINGNETWORK PENETRATION TESTING
NETWORK PENETRATION TESTING
 
Hacking And Its Prevention
Hacking And Its PreventionHacking And Its Prevention
Hacking And Its Prevention
 
Broken access controls
Broken access controlsBroken access controls
Broken access controls
 
Hacking
HackingHacking
Hacking
 
The Cross Site Scripting Guide
The Cross Site Scripting GuideThe Cross Site Scripting Guide
The Cross Site Scripting Guide
 

Viewers also liked

Internet Filtering and Blocking
Internet Filtering and BlockingInternet Filtering and Blocking
Internet Filtering and BlockingJoshua Sparks
 
Internet Filtering, Intellectual Freedom, & Your School Librarian
Internet Filtering, Intellectual Freedom, & Your School LibrarianInternet Filtering, Intellectual Freedom, & Your School Librarian
Internet Filtering, Intellectual Freedom, & Your School LibrarianKate Gukeisen
 
Web Content Filtering for Education and Schools - Webtitan Cloud Reseller Pre...
Web Content Filtering for Education and Schools - Webtitan Cloud Reseller Pre...Web Content Filtering for Education and Schools - Webtitan Cloud Reseller Pre...
Web Content Filtering for Education and Schools - Webtitan Cloud Reseller Pre...Dryden Geary
 
Entity Relationship Model
Entity Relationship ModelEntity Relationship Model
Entity Relationship ModelSlideshare
 
Web Mining Presentation Final
Web Mining Presentation FinalWeb Mining Presentation Final
Web Mining Presentation FinalEr. Jagrat Gupta
 
Web mining slides
Web mining slidesWeb mining slides
Web mining slidesmahavir_a
 

Viewers also liked (12)

Internet Filtering and Blocking
Internet Filtering and BlockingInternet Filtering and Blocking
Internet Filtering and Blocking
 
Internet Filtering, Intellectual Freedom, & Your School Librarian
Internet Filtering, Intellectual Freedom, & Your School LibrarianInternet Filtering, Intellectual Freedom, & Your School Librarian
Internet Filtering, Intellectual Freedom, & Your School Librarian
 
Web Content Filtering for Education and Schools - Webtitan Cloud Reseller Pre...
Web Content Filtering for Education and Schools - Webtitan Cloud Reseller Pre...Web Content Filtering for Education and Schools - Webtitan Cloud Reseller Pre...
Web Content Filtering for Education and Schools - Webtitan Cloud Reseller Pre...
 
Web mining
Web miningWeb mining
Web mining
 
Web mining
Web miningWeb mining
Web mining
 
Entity Relationship Model
Entity Relationship ModelEntity Relationship Model
Entity Relationship Model
 
Web content mining
Web content miningWeb content mining
Web content mining
 
WEB MINING.
WEB MINING.WEB MINING.
WEB MINING.
 
Web Mining Presentation Final
Web Mining Presentation FinalWeb Mining Presentation Final
Web Mining Presentation Final
 
Web mining slides
Web mining slidesWeb mining slides
Web mining slides
 
Filters
FiltersFilters
Filters
 
Web Mining
Web Mining Web Mining
Web Mining
 

Similar to Web Filtering Techniques and Circumvention Methods Explained

Trying Not to Filter: Internet Filtering Technologies in Libraries
Trying Not to Filter: Internet Filtering Technologies in LibrariesTrying Not to Filter: Internet Filtering Technologies in Libraries
Trying Not to Filter: Internet Filtering Technologies in LibrariesSarah Houghton
 
Netsentron Content Filter
Netsentron Content FilterNetsentron Content Filter
Netsentron Content FilterTom Kobelt
 
Barracuda Web Filter Cipa Presentation
Barracuda Web Filter Cipa PresentationBarracuda Web Filter Cipa Presentation
Barracuda Web Filter Cipa PresentationCarolynrahn
 
Binance Supports Number
Binance Supports NumberBinance Supports Number
Binance Supports Numberkanha lal
 
1629885596 seoppt1 130303013241-phpapp02
1629885596 seoppt1 130303013241-phpapp021629885596 seoppt1 130303013241-phpapp02
1629885596 seoppt1 130303013241-phpapp02DpSaini1
 
Proxy log review and use cases
Proxy log review and use casesProxy log review and use cases
Proxy log review and use casesMostafa Yahia
 
OWASP Secure Coding
OWASP Secure CodingOWASP Secure Coding
OWASP Secure Codingbilcorry
 
data mining for security application
data mining for security applicationdata mining for security application
data mining for security applicationbharatsvnit
 
data mining for security application
data mining for security applicationdata mining for security application
data mining for security applicationbharatsvnit
 
Module 13 (web based password cracking techniques)
Module 13 (web based password cracking techniques)Module 13 (web based password cracking techniques)
Module 13 (web based password cracking techniques)Wail Hassan
 
Fear of Filtering: The Reality of Internet Content Management (Soreide DOC)
Fear of Filtering: The Reality of Internet Content Management (Soreide DOC)Fear of Filtering: The Reality of Internet Content Management (Soreide DOC)
Fear of Filtering: The Reality of Internet Content Management (Soreide DOC)Nebraska Library Commission
 
Principles Of Searching Reading Discussion
Principles Of Searching Reading DiscussionPrinciples Of Searching Reading Discussion
Principles Of Searching Reading Discussionscaines
 

Similar to Web Filtering Techniques and Circumvention Methods Explained (20)

Trying Not to Filter: Internet Filtering Technologies in Libraries
Trying Not to Filter: Internet Filtering Technologies in LibrariesTrying Not to Filter: Internet Filtering Technologies in Libraries
Trying Not to Filter: Internet Filtering Technologies in Libraries
 
Netsentron Content Filter
Netsentron Content FilterNetsentron Content Filter
Netsentron Content Filter
 
Barracuda Web Filter Cipa Presentation
Barracuda Web Filter Cipa PresentationBarracuda Web Filter Cipa Presentation
Barracuda Web Filter Cipa Presentation
 
Watch guard reputation enabled defense
Watch guard reputation enabled defenseWatch guard reputation enabled defense
Watch guard reputation enabled defense
 
Binance Supports Number
Binance Supports NumberBinance Supports Number
Binance Supports Number
 
SEO PPT
SEO PPTSEO PPT
SEO PPT
 
Seo
SeoSeo
Seo
 
1629885596 seoppt1 130303013241-phpapp02
1629885596 seoppt1 130303013241-phpapp021629885596 seoppt1 130303013241-phpapp02
1629885596 seoppt1 130303013241-phpapp02
 
Seo
SeoSeo
Seo
 
Proxy log review and use cases
Proxy log review and use casesProxy log review and use cases
Proxy log review and use cases
 
2 . web app s canners
2 . web app s canners2 . web app s canners
2 . web app s canners
 
Web mining
Web miningWeb mining
Web mining
 
OWASP Secure Coding
OWASP Secure CodingOWASP Secure Coding
OWASP Secure Coding
 
data mining for security application
data mining for security applicationdata mining for security application
data mining for security application
 
data mining for security application
data mining for security applicationdata mining for security application
data mining for security application
 
Module 13 (web based password cracking techniques)
Module 13 (web based password cracking techniques)Module 13 (web based password cracking techniques)
Module 13 (web based password cracking techniques)
 
Fear of Filtering: The Reality of Internet Content Management (Soreide DOC)
Fear of Filtering: The Reality of Internet Content Management (Soreide DOC)Fear of Filtering: The Reality of Internet Content Management (Soreide DOC)
Fear of Filtering: The Reality of Internet Content Management (Soreide DOC)
 
Internet Research
Internet ResearchInternet Research
Internet Research
 
Web Mining
Web MiningWeb Mining
Web Mining
 
Principles Of Searching Reading Discussion
Principles Of Searching Reading DiscussionPrinciples Of Searching Reading Discussion
Principles Of Searching Reading Discussion
 

More from university of education,Lahore

More from university of education,Lahore (20)

Activites and Time Planning
 Activites and Time Planning Activites and Time Planning
Activites and Time Planning
 
Steganography
SteganographySteganography
Steganography
 
Classical Encryption Techniques
Classical Encryption TechniquesClassical Encryption Techniques
Classical Encryption Techniques
 
Activites and Time Planning
Activites and Time PlanningActivites and Time Planning
Activites and Time Planning
 
OSI Security Architecture
OSI Security ArchitectureOSI Security Architecture
OSI Security Architecture
 
Network Security Terminologies
Network Security TerminologiesNetwork Security Terminologies
Network Security Terminologies
 
Project Scheduling, Planning and Risk Management
Project Scheduling, Planning and Risk ManagementProject Scheduling, Planning and Risk Management
Project Scheduling, Planning and Risk Management
 
Software Testing and Debugging
Software Testing and DebuggingSoftware Testing and Debugging
Software Testing and Debugging
 
ePayment Methods
ePayment MethodsePayment Methods
ePayment Methods
 
SEO
SEOSEO
SEO
 
A Star Search
A Star SearchA Star Search
A Star Search
 
Enterprise Application Integration
Enterprise Application IntegrationEnterprise Application Integration
Enterprise Application Integration
 
Uml Diagrams
Uml DiagramsUml Diagrams
Uml Diagrams
 
eDras Max
eDras MaxeDras Max
eDras Max
 
RAD Model
RAD ModelRAD Model
RAD Model
 
Microsoft Project
Microsoft ProjectMicrosoft Project
Microsoft Project
 
Itertaive Process Development
Itertaive Process DevelopmentItertaive Process Development
Itertaive Process Development
 
Computer Aided Software Engineering Nayab Awan
Computer Aided Software Engineering Nayab AwanComputer Aided Software Engineering Nayab Awan
Computer Aided Software Engineering Nayab Awan
 
Lect 2 assessing the technology landscape
Lect 2 assessing the technology landscapeLect 2 assessing the technology landscape
Lect 2 assessing the technology landscape
 
system level requirements gathering and analysis
system level requirements gathering and analysissystem level requirements gathering and analysis
system level requirements gathering and analysis
 

Recently uploaded

Culture Uniformity or Diversity IN SOCIOLOGY.pptx
Culture Uniformity or Diversity IN SOCIOLOGY.pptxCulture Uniformity or Diversity IN SOCIOLOGY.pptx
Culture Uniformity or Diversity IN SOCIOLOGY.pptxPoojaSen20
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPCeline George
 
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfMr Bounab Samir
 
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Celine George
 
How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17Celine George
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...Nguyen Thanh Tu Collection
 
4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptxmary850239
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatYousafMalik24
 
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...Postal Advocate Inc.
 
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptxAUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptxiammrhaywood
 
Karra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxKarra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxAshokKarra1
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPCeline George
 
Judging the Relevance and worth of ideas part 2.pptx
Judging the Relevance  and worth of ideas part 2.pptxJudging the Relevance  and worth of ideas part 2.pptx
Judging the Relevance and worth of ideas part 2.pptxSherlyMaeNeri
 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Jisc
 
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfInclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfTechSoup
 

Recently uploaded (20)

Culture Uniformity or Diversity IN SOCIOLOGY.pptx
Culture Uniformity or Diversity IN SOCIOLOGY.pptxCulture Uniformity or Diversity IN SOCIOLOGY.pptx
Culture Uniformity or Diversity IN SOCIOLOGY.pptx
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERP
 
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptxLEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
 
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
 
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
 
Raw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptxRaw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptx
 
How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
 
4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice great
 
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
 
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptxYOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
 
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptxAUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
 
Karra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxKarra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptx
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERP
 
Judging the Relevance and worth of ideas part 2.pptx
Judging the Relevance  and worth of ideas part 2.pptxJudging the Relevance  and worth of ideas part 2.pptx
Judging the Relevance and worth of ideas part 2.pptx
 
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptxYOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...
 
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfInclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
 

Web Filtering Techniques and Circumvention Methods Explained

  • 2. Table of Contents  Need of Filtering  Content Filtering  Basic Model  Filtering Techniques  Email Filtering  Circumvent Filtering  Problems with Filtering  Conclusion
  • 4. Content Filtering  Analysis of Email and Web content  Prevent malware and spam from entering the network  Determine whether incoming data is harmful to the network or outgoing data includes intellectual property  Such data is then blocked from entering or leaving the network  Simple network layout  Network with traffic proxy Web Security and Anti-Virus
  • 5. Network Layout Connection is made by forwarding the uninspected traffic straight to the destination. Network with Traffic Proxied Traffic is received by an application which alters the traffic in both the directions before sending to the destination.
  • 6. Web Filtering Techniques  Firewalls  URL Based Filtering  Content Analysis Firewalls  Basic level of web filtering  Inspects traffic to identify requested site to make decision (allow or block)  Black Lists: Undesirable Web addresses  White Lists: Desirable Web addresses
  • 7. URL Based Filtering  Database of web addresses  Database loaded onto proxy servers, firewalls and other network infrastructure devices  Supports granular blocking Content Analysis  Keyword Scanning  Image Scanning
  • 8. Keywords Scanning  Tag words: Positive or Negative score  Block: Sum (score) > Threshold Image Scanning Content Analysis
  • 9. Email Filtering  Primary communication channel  Need to control SPAM and virus mails Filtering Techniques  Channel/Response: Sender perform task  Heuristic Filters: Score words or phrases  Bayesian Filters: Mathematical Probability
  • 10. Circumventing Web Filtering Getting around them: Traffic is not passed through the filter.  Getting through them: Traffic is passed through the filter by obscuring the address of content and/or the content itself. Type of Content Tested Accuracy Percentage Content of an Adult Nature – direct URL access 87% Content of an Adult Nature – keyword searches 81% Content not of an Adult Nature – direct URL access 86% Content not of an Adult Nature – keyword searches 69% Image Searches 44% Email Attachments 25% RSS Feeds 48% Catalog Searches 75% Database Searches 88% Internet Filtering Test
  • 11. Problem with filtering "It could be expected that allowed content would be blocked. If all pornographic content is to be blocked, other content with a resemblance in features will also be blocked; e.g. Adult education, medical information, erotic content etc." “All filters over block. All filters under block. No filter is 100% accurate because no one agrees on what being 100% accurate is.” Conclusion
  • 12. 1.DansGuardian (Cross Platform, Free) 2.K9 (Windows/Mac, Free) 3.OpenDNS (Cross Platform, Free) 4.SquidGuard/Squid (Linux, Free) 5.Hosts File (Cross Platform, Free) Five Best Content Filtering Tools
  • 14. Reference 1) http://dansguardian.org/?page=whatisdg 2) http://www1.k9webprotection.com/aboutk9/overview 3) https://www.opendns.com/about/ 4) https://www.opendns.com/about/ 5) http://en.wikipedia.org/wiki/Hosts_%28file%29 6) http://en.wikipedia.org/wiki/Internet_security