20
Internet Filtering seyed Ehsan shariaty shiraz university of Technology

Internet Filtering seyed Ehsan shariaty shiraz university of Technology

Embed Size (px)

Citation preview

Page 1: Internet Filtering seyed Ehsan shariaty shiraz university of Technology

Internet Filtering

seyed Ehsan shariatyshiraz university of Technology

Page 2: Internet Filtering seyed Ehsan shariaty shiraz university of Technology

topics Definition Internet Filtering Approaches to Content Filtering Inclusive Blocking Exclusive Blocking Content Blocking Content –base Filtering Where can Content Filtering occur? What to look for in Internet Filter Software

Page 3: Internet Filtering seyed Ehsan shariaty shiraz university of Technology

Definition Internet Filtering

The terms ‘blocking’ and ‘filtering’ are often used as synonyms for the technologiesthat prevent access to particular types or specific pieces of the content that is availableon the Internet.

Page 4: Internet Filtering seyed Ehsan shariaty shiraz university of Technology

Definition Internet Filtering

Software which is used to control access to material on the Internet

Typically used to prevent access to pornography and other potentially offensive material

Used in many organisations including public libraries and schools

Page 5: Internet Filtering seyed Ehsan shariaty shiraz university of Technology

Approaches to Content Filtering

Allowing through known ‘good’ content (inclusion filtering)

Blocking known ‘bad’ content (exclusion filtering)

Examining content and blocking when it fails acceptability tests

Page 6: Internet Filtering seyed Ehsan shariaty shiraz university of Technology

Inclusion Filtering Products based on inclusion filtering only allow

access to a relatively small number of sites that are known to be ‘acceptable’, and block access to the rest of the Internet – a ‘guilty until proven innocent’ approach to filtering. The product vendor or some other body trawls the Internet and comes up with a list of sites that meet their criteria of ‘acceptability’. These sites are put on a ‘white list’ of sites that can be ccessed. Attempts to access any other Internet content are blocked. This type of filtering can be 100% effective as only known ‘good’ sites can be accessed.

Page 7: Internet Filtering seyed Ehsan shariaty shiraz university of Technology

Exclusion Filtering

Exclusion filtering is based on black lists (or blocking lists) of known objectionable sites and is a more common form of filtering than inclusion filtering. Exclusion filtering adopts the ‘innocent until proven guilty’ philosophy and allows through all content it does not know to be unacceptable. It has the advantage of giving access to the whole Internet, rather than restricting users to a ‘walled garden’.

Page 8: Internet Filtering seyed Ehsan shariaty shiraz university of Technology

Content Filtering

The last approach is to allow access to the entire Internet but to examine the content retrieved before allowing it through to the user. These filtering products will look for certain ‘key words’ in Web pages or for other characteristics that are supposed to indicate dubious content, such as graphics with large amounts of ‘flesh tones’.

Content that fails to meet the acceptability tests will be blocked, regardless of whether it is a Rubens painting or a Penthouse centrefold.

Page 9: Internet Filtering seyed Ehsan shariaty shiraz university of Technology

Content –base Filtering

Key word Filtering Phrase Filtering Profile filtering Image analysis filtering

Page 10: Internet Filtering seyed Ehsan shariaty shiraz university of Technology

Key Word Blocking

Products using key word filtering scan Internet content as it is being loaded into a user’s computer and look for words that are included in a black list. A page is blocked if it contains any of the words in the block list. Filtering products also often check requests before they are sent out to prevent users from using search engines to find sites that may contain ‘undesirable’ content but not included in the product’s black lists.

Page 11: Internet Filtering seyed Ehsan shariaty shiraz university of Technology

several problems with key word filtering technologies:(1)

• They only check text, and cannot block objectionable pictures that are not

accompanied by (in)appropriate text. This could be a particular problem for

pornographic content, as Russian or Japanese sexually explicit photographs

look much the same as Australian or US pornography but may not come with

any helpful English key words.

Page 12: Internet Filtering seyed Ehsan shariaty shiraz university of Technology

several problems with key word filtering technologies:(2)

• They have to be able to distinguish the ‘acceptability’ of a word from its context. Early key word scanning products had a reputation for being simplistic, blocking words regardless of how they were being used, and unnecessarily blocking access to desirable content as a result. The classic

example is the term breast cancer, which would be picked up by a key word filter looking for the word breast, resulting in blocking the entire site.

Page 13: Internet Filtering seyed Ehsan shariaty shiraz university of Technology

Phrase Filtering

Phrase filtering is a more sophisticated extension of keyword filtering. Phrase filtering does not consider words in isolation, but as part of a phrase. This allows for more fine-grained classification, as it would allow one to consider the phrases huge breasts, and breast cancer in their respective contexts. While this approach might be expected to do better than keyword filtering alone, it still has many of the associated problems (such as deciding how many objectionable phrases are required before a page is blocked, and being useless for non-English sites), and, in addition, has the added difficulty of having to enumerate all the different phrases that are considered objectionable.

Page 14: Internet Filtering seyed Ehsan shariaty shiraz university of Technology

Profile filtering

Several companies have introduced products that filter Internet content based on the characteristics of the received content. Vendors tend to be circumspect on how these products work, but some of the features they look for include the ratio of pictures-totext and links to other known ‘undesirable’ sites.

Page 15: Internet Filtering seyed Ehsan shariaty shiraz university of Technology

Where can Content Filtering occur?

Filtering on the user’s personal computer

Filtering at the ISP or corporate server Content filtering by an ISP using a

proxy filter

Page 16: Internet Filtering seyed Ehsan shariaty shiraz university of Technology

Filtering on the user’s personal computer

Page 17: Internet Filtering seyed Ehsan shariaty shiraz university of Technology

Filtering at the ISP or corporate server

Page 18: Internet Filtering seyed Ehsan shariaty shiraz university of Technology

Content filtering by an ISP using a proxy filter

Page 19: Internet Filtering seyed Ehsan shariaty shiraz university of Technology

What to look for in Internet Filter Software

Ease of Use Effective at filtering Filtering algorithm Activity reporting Client-Server based Foreign language filtering Port filtering and blocking

Page 20: Internet Filtering seyed Ehsan shariaty shiraz university of Technology

Thank you

Your Questions?