博碩士論文 985202095 詳細資訊




以作者查詢圖書館館藏 以作者查詢臺灣博碩士 以作者查詢全國書目 勘誤回報 、線上人數:57 、訪客IP:18.188.211.8
姓名 曲華榮(Hua-Rong Chu)  查詢紙本館藏   畢業系所 資訊工程學系
論文名稱 基於雲端之網頁內容過濾服務–以色情網頁過濾為例
(An Approach to Web Filtering as a Service based on Cloud: Using Pornography as an Example)
相關論文
★ 無線行動隨意網路上穩定品質服務路由機制之研究★ 應用多重移動式代理人之網路管理系統
★ 應用移動式代理人之網路協同防衛系統★ 鏈路狀態資訊不確定下QoS路由之研究
★ 以訊務觀察法改善光突發交換技術之路徑建立效能★ 感測網路與競局理論應用於舒適性空調之研究
★ 以搜尋樹為基礎之無線感測網路繞徑演算法★ 基於無線感測網路之行動裝置輕型定位系統
★ 多媒體導覽玩具車★ 以Smart Floor為基礎之導覽玩具車
★ 行動社群網路服務管理系統-應用於發展遲緩兒家庭★ 具位置感知之穿戴式行動廣告系統
★ 調適性車載廣播★ 車載網路上具預警能力之車輛碰撞避免機制
★ 應用於無線車載網路上之合作式交通資訊傳播機制以改善車輛擁塞★ 智慧都市中應用車載網路以改善壅塞之調適性虛擬交通號誌
檔案 [Endnote RIS 格式]    [Bibtex 格式]    [相關文章]   [文章引用]   [完整記錄]   [館藏目錄]   至系統瀏覽論文 ( 永不開放)
摘要(中) 網路色情的氾濫對青少年造成的負面影響日益受到重視。即使專家學者一再強調家長陪同學齡兒童上網的重要性,青少年瀏覽色情網站的比例依舊居高不下。網頁過濾技術因此成為解決這個問題的選項之一。色情網頁的過濾基於高計算成本的網路應用層內容分析,雲端計算的興起提供了降低計算成本的可能性。然而,基於雲端的過濾架構造成不可忽視的傳輸成本。此外雲端過濾的實現亦需克服相容性的問題,以及對不同的佈署環境及使用者提供合適服務的能力。本論文藉由分析可能的雲端過濾佈署方式、網路設備能力、以及網頁流量的組成,提出適合基於公有雲提供過濾服務的網頁過濾策略。此過濾策略藉由於雲端處理TCP會議(Session)降低設備複雜度,並以中間人(Man-in-the-middle)方式,避免將網頁回應內容由雲端回傳至客戶端,因此能降低架構於雲端的過濾服務的傳輸成本,亦可相容於現有網頁內容提供架構,如通透式代理伺服器(Transparent Proxy)及內容傳遞網路(Content Delivery Network)。基於此過濾策略以及現有網頁過濾及內容分析方法,本論文設計一個基於雲端之網頁內容過濾服務的系統架構並進行實做。此系統可對不同佈署情境採用不同的過濾方法,並對使用者提供不同的過濾效果。分析結果顯示本論文提出的過濾策略可降低於公有雲提供過濾服務的傳輸成本,且當阻擋率越低改善的幅度越高。實驗結果驗證與現有網路環境的形容性及效能。本論文藉由設計一基於雲端之網頁內容過濾服務,以期能讓過濾服務更廣泛被佈署,降低色情網頁對青少年的危害。
摘要(英) Pornography on the web brings non-ignorable influence on minors. Moreover, according to statistics, the problem is hard to solve by simply asking parents and teachers to watch their children go on line. Web filtering, on the other hand, is a potential choice to mitigate the problem. The web filter for pornography relies on expensive application layer analysis, and the rise of Cloud Computing provides a direction for proposing a Cloud-based web filtering architecture to cut the cost. Nevertheless, the architecture of web filtering on Cloud causes significant delivery overhead. Besides, the compatibility problems, different deployed scenarios and requirements of users are also needed to consider for achieving web filtering on Cloud. The web filtering strategies for public Cloud scenarios are proposed in the thesis. The strategies maintain TCP session on Cloud to reduce the complexity of network equipment. It uses the “Man-in-the-middle” way instead of TCP hijacking, thus reduces the delivery overhead on Cloud, and is compatible to current web content providing services, such as transparent proxy and content delivery network. Moreover, system design of Cloud-based web filtering service is then proposed based on the proposed strategies. The system offers a flexible range of deployment options, and can provide different service level for costumers. Analysis shows that the proposed web filtering strategies can reduce delivery overhead in public Cloud scenarios, and the improve rate is inversely proportional to the blocking rate. Experiments show that the proposed system is compatible to the current network environment.
關鍵字(中) ★ 網頁過濾
★ 內容檢測
★ 雲端計算
關鍵字(英) ★ web filtering
★ content-based filtering
★ Cloud Computing
論文目次 Chapter 1. Introduction 1
1.1 Motivation 1
1.2 Challenges and Goals 4
1.3 Contributions 7
1.4 Organization 7
Chapter 2. Background and Related Works 8
2.1 Overview of Cloud Computing 8
2.2 Web Filtering Approaches 10
Chapter 3. The Proposed Cloud-based Web Filtering Service 21
3.1 Assumptions and Modeling 21
3.2 Web Filtering Strategies 24
3.2.1 Complexity of filter-enabled network equipment 26
3.2.2 Compatibility 28
3.2.3 Delivery overhead 30
3.3 Architecture Design 37
Chapter 4. Results and Discussion 46
4.1 Analysis 46
4.1.1 Delivery Overhead 46
4.1.2 Delivery Cost 48
4.1.3 Delivery Cost on Amazon EC2 52
4.1.4 Impact of Blocking Rate on Delivery Cost 54
4.2 Implementation 55
4.2.1 Filter-enabled network equipment 55
4.2.2 Web filtering service on Cloud 60
4.3 Experiment 61
4.3.1 Function Test 61
4.3.2 Equipment overhead 64
4.3.3 Coverage and space complexity 65
4.3.4 Processing time of image recognition 69
4.3.5 Impact of client numbers on web filtering time 70
4.3.6 Delivery overhead 72
Chapter 5. Conclusion and Future Work 74
References 77
參考文獻 [1] Taiwan Network Information Center, “A Survey on Broadband Usage in Taiwan 2011,” http://www.twnic.net.tw/download/200307/200307index.shtml
[2] Online MBA, “The Stats on Internet Porn,”
http://www.onlinemba.com/blog/the-stats-on-internet-porn/
[3] Li-Der Chou, Zheng He, Hua-Rong Chu, Neng-Hsing Chen, “Design and Implementation of Content-based Filter on Embedded Linux Gateway,” Proceedings of 2010 Taiwan Academic Network Conference (TANET2010), Tainan, Taiwan, 2010.
[4] Hicare, http://hicare.hinet.net/
[5] Peter Mell, Timothy Grance, “The NIST Definition of Cloud Computing (Draft)”, NIST Special Publication 800-145 (Draft), 2011.
[6] Armbrust, Michael and Fox, Armando and Griffith, Rean and Joseph, Anthony D. and Katz, Randy H. and Konwinski, Andrew and Lee, Gunho and Patterson, David A. and Rabkin, Ariel and Stoica, Ion and Zaharia, Matei, “Above the Clouds: A Berkeley View of Cloud Computing,”
http://www.eecs.berkeley.edu/Pubs/TechRpts/2009/EECS-2009-28.html
[7] Andy Isherwood, quoted in ZDnet News, December 11, 2008.
[8] Judith Hurwitz, Robin Bloor, Marcia Kaufman, and Fern Halper, “Cloud Computing for Dummies,” For Dummies; 1 edition, 2009.
[9] Cloud computing hype spurs confusion, Gartner says,
http://www.computerworld.com/s/article/9115904/Cloud_computing_hype_spurs_confusion_Gartner_says
[10] Cloud Computing, http://en.wikipedia.org/wiki/Cloud_computing
[11] Amazon Web Services, http://aws.amazon.com
[12] Hinet HiCloud, http://hicloud.hinet.net
[13] NTU Cloud, https://www.cloud.ntu.edu.tw
[14] S. Kim, H. Min, J. Jeon, Y. M. Ro and S. Han, “Malicious Content Filtering Based On Semantic Features,” Proceedings of the 2nd International Conference on Interaction Sciences: Information Technology, Culture and Human, Busan, Korea, 2009.
[15] J. M. G. Hidalgo, F. C. Garcıa, and E. P. Sanz, “Named Entity Recognition for Web Content Filtering,” Proceedings of International Conference on Applications of Natural Languages to Information Systems, Alicante, Spain, 2005.
[16] M. Kodialam, T. Lakshman and S. Sengupta, “Configuring networks with content filtering nodes with applications to network security,” Proceedings the 24th Annual Conference Sponsored by IEEE Communications Society (INFOCOM), Miami, America. 2005.
[17] J. L. Zhang, D. Y. Fang and L. Li, "Intelligent Content Filtering Model for Network Security Audit System," Proceedings the Second International Workshop on Knowledge Discovery and Data Mining, Moscow, Russia, 2009.
[18] D. Sculley and G. M. Wachman, “Relaxed Online SVMs for Spam Filtering,” Proceedings of the 30th annual international ACM SIGIR conference on Research and development in information retrieval, Amsterda, Netherlands, 2007.
[19] J. G. Tang and G. P. Xiong, “A Perspective of Applying Autonomia to Content Filtering at Network,” Proceedings of International Conference on Computer Science and Software Engineering, Wuhan, China, 2008.
[20] M. Soriano, B Martinkauppi, S Huovinen and M. Laaksonen, "Using the skin locus to cope with changing illumination conditions in color-based face tracking," Proceedings of the IEEE nordic signal processing symposium, pp. 383-386., 2000.
[21] User-generated Content, http://en.wikipedia.org/wiki/User-generated_content
[22] Web 2.0, http://en.wikipedia.org/wiki/Web_2.0
[23] Google Cache, http://www.googleguide.com/cached_pages.html
[24] Internet Archive, http://www.archive.org/
[25] Yan Liu, Gang Zhao, and Tai Wang, “Architecture Research and Design for the Internet Content Rating Implementation System,” Proceedings of the Second International Workshop on Education Technology and Computer Science (ETCS), Wuhan, China, 2010.
[26] Microsoft Bing Safe Search,
http://www.bing.com/community/site_blogs/b/search/archive/2009/06/12/safe-search-update.aspx
[27] Google SafeSearch,
http://www.google.com/support/websearch/bin/answer.py?answer=510
[28] Taiwan Internet Content Rating Promotion Foundation (TICRF), http://www.ticrf.org.tw/
[29] Internet Association Japan, http://www.iajapan.org/
[30] W3C Platform for Internet Content Selection, http://www.w3.org/PICS/
[31] Internet Content Rating Association, http://www.fosi.org/icra/
[32] M. G. Noll and C. Meinel, “Design and Anatomy of a Social Web Filtering Service,” Proceedings of the forth International Conference on Cooperative Internet Computing (CIC), Hong Kong, China. 2006.
[33] M. G. Noll and C. Meinel, “Building a Scalable Collaborative Web Filter with Free and Open Source Software” Proceedings of the 2008 IEEE International Conference on Signal Image Technology and Internet Based System, Bali. Indonesia, Dec. 2008.
[34] Green Dam Youth Escort, http://www.lssw365.net/
[35] Honda Chen, Chia-Wei Chen, “Development of IP and Domain Name Filter using ARM9 Based Embedded System,” The International Conference on Computer and Network Technologies in Education, Chung Hua, Taiwan, 2009.
[36] 彭炳衡, 劉懷仁, 魏煥雲, “Linux 作業系統之內容過濾效能之改善,” Journal of Information Technology and Applications, Vol. 2, No. 3, pp. 157-163, 2007.
[37] Internet Content Adaptation Protocol (ICAP), RFC 3507.
[38] Open Pluggable Edge Services (OPES) Use Cases and Deployment Scenarios, RFC 3752.
[39] Modern trends at content filtering, http://alexott.net/en/writings/cf/
[40] Requirements for OPES Callout Protocols, RFC 3836.
[41] Liao-Shuang Kuo, “A DNS Based Pornographic Web Sites Filtering System,” Master thesis, National Central University, 2003.
[42] Zscaler, http://www.zscaler.com/
[43] Network Ingress Filtering: Defeating Denial of Service, RFC 2827
[44] Ingress Filtering for Multihomed Networks, RFC 3704.
[45] The MIT ANA Spoofer project, http://spoofer.csail.mit.edu/index.php
[46] Service Terms of Amazon Web Service, http://aws.amazon.com/serviceterms/
[47] IP in IP Tunneling, RFC 1853, 1995.
[48] Web Cache Communication Protocol,
http://docwiki.cisco.com/wiki/Network_Caching_Technologies#WCCP_Network_Caching
[49] Generic Routing Encapsulation (GRE), RFC 2784, 2000.
[50] Generic Routing Encapsulation (GRE), RFC 1701, 1994.
[51] Broadcom Flexible TCAM-based ContentAware™ Classification technology for affordable security and Access Control List,
http://www.broadcom.com/products/Switching/Home-and-Small-Business/BCM5348
[52] Marvel PRESTERA DX Series, http://www.marvell.com/selector_guide/series20.html
[53] Cisco WAN and Application Optimization Solution Guide Traffic Classification, http://www.cisco.com/en/US/docs/nsite/enterprise/wan/wan_optimization/chap05.html
[54] Dansguardian, http://www.dansguardian.org/
[55] Li-Der Chou, Zheng He, David Chunhu Li, Hui-Fan Chen , Jun-Jie Su Ching-Yung Chen, Hsu-Chuan Wei, Chia-Jen Li, “Performance Analysis of Pornographic Image Recognizing on Cloud Computing Platform,” Proceedings of the 16th Mobile Computing Workshop, Kaosiung, Taiwan, 2011.
[56] Alexa Top Sites in Taiwan, http://www.alexa.com/topsites/countries/TW
指導教授 周立德(Li-Der Chou) 審核日期 2011-8-10
推文 facebook   plurk   twitter   funp   google   live   udn   HD   myshare   reddit   netvibes   friend   youpush   delicious   baidu   
網路書籤 Google bookmarks   del.icio.us   hemidemi   myshare   

若有論文相關問題,請聯絡國立中央大學圖書館推廣服務組 TEL:(03)422-7151轉57407,或E-mail聯絡  - 隱私權政策聲明