摘要(英) |
With developments of scientific technologies, the Internet has increasingly made a great impact on the world. The network technology experienced an exciting evolution from dial-up, ADSL, CATV to FTTx and 3G which make it indispensable to people life. According to statistics, the population of Internet user in Taiwan ranked fourth in Asia, just behind Korea, Japan and Singapore. Most of Internet users are the youth including junior and senior high school students. It is hard to ask students’ parents to watch their children go on line. In addition, parents worry about websites and contents which their children visit is appropriate and healthy or not. Thus, how to solve aforementioned problem is becoming an important issue. On the other hand, company managers concern with their employee surfing the Internet which may cause huge losses by infecting viruses or malwares. To avoid these incidents happening, the technique of content-based filtering is a feasible solution. It is possible to reduce the loss, and even avoid effects by filtering inappropriate information, such as phishing, spam, and pornography.
In this paper, we designed and implemented a content-based filter on an embedded broadband gateway. We analyzed and compared various feasible approaches with their advantages and disadvantages. And then, we took into account implementation and chose the most appropriate approach to develop the mechanism. In our filtering proposal, we proposed following functional modules consisted with URL blocker, keyword filter, traffic recorder, sender identifier, porn image recognizer, and timed-access monitor to help users blocking harmful information. Once the filter detected bad contents, the filter generated real time notices to the client and informed users the reason of drop-out and then redirected the browser to normal webpage.
Additionally, user friendly management interfaces were designed. System administrator can easily configure settings and fetch blacklists from Internet, which announced by 3rd parties to enhance filter accuracy. We examined our content-filter mechanism with numerous experiments. The result demonstrated that our proposal significantly improve efficiency of blocking malicious information and reduce hazards of virus affecting.
|
參考文獻 |
[1] 台灣網路資訊中心網路使用調查, http://statistics.twnic.net.tw/
[2] 財團法人杏陵醫學基金會, http://www.sexedu.org.tw/
[3] 財團法人台灣網站分級推廣基金會, http://www.ticrf.org.tw/
[4] The State of Spam & Phishing Report, http://go.symantec.com/spam_report/
[5] M. Sahami, S. Dumais, D. Heckerman, and E. Horvitz. "A Bayesian approach to filtering junk email.", AAAI Workshop on Learning for Text Categorization, July 1998.
[6] 中華電信色情守門員, http://hicare.hinet.net/
[7] M. Kodialam, T. Lakshman and S. Sengupta, "Configuring networks with content filtering nodes with applications to network security," INFOCOM 2005. 24th Annual Joint Conference of the IEEE Computer and Communications Societies. Proceedings IEEE , vol.4, no., pp. 2395-2404 vol. 4, 13-17 Mar. 2005.
[8] J. L. Zhang, D. Y. Fang and L. Li, "Intelligent Content Filtering Model for Network Security Audit System," Second International Workshop on Knowledge Discovery and Data Mining, 2009. WKDD 2009. , vol., no., pp.546-548, 23-25 Jan. 2009.
[9] J. G. Tang and G. P. Xiong, "A Perspective of Applying Autonomia to Content Filtering at Network," International Conference on Computer Science and Software Engineering, 2008, vol.5, no., pp.1242-1247, 12-14 Dec. 2008.
[10] D. Sculley and G. M. Wachman, "Relaxed Online SVMs for Spam Filtering", Proceedings of the 30th annual international ACM SIGIR conference on Research and development in information retrieval, pp.415-422, 23-27 July 2007.
[11] A. C. M. Fong, S. C. Hui and P. Y. Lee, "XFighter: an Intelligent Web Content Filtering System," Kybernetes, vol.38, no.9, pp.1541-1555, 2009.
[12] J. M. G. Hidalgo, F. C. Garc’ıa, and E. P. Sanz, "Named Entity Recognition for Web Content Filtering", International conference on applications of natural languages to information systems, vol. 3513, no., pp. 286-297, 15-17 Jun. 2005
[13] S. Kim, H. Min, J. Jeon, Y. M. Ro and S. Han, "Malicious Content Filtering Based On Semantic Features", Proceedings of the 2nd International Conference on Interaction Sciences: Information Technology, Culture and Human, vol., no., pp.802-806, 2009
[14] M. G. Noll and C. Meinel, "Building a Scalable Collaborative Web Filter with Free and Open Source Software", Proceedings of the 2008 IEEE International Conference on Signal Image Technology and Internet Based System, vol., no., pp.563-571, Dec. 2008
[15] 綠壩.花季護航, http://www.lssw365.net/
[16] D. E. Knuth, J. H. Morris and V. R. Pratt, "Fast Pattern Matching in Strings.", SIAM Journal on Computing, vol.6, pp.323-350. , 1977
[17] R. S. Boyer, J. S. Moore, "A fast string searching algorithm.", Communications of the ACM, vol.20, pp.762-772., 1977
[18] Traditional IP Network Address Translator, http://tools.ietf.org/html/rfc3022
[19] Netfilter, http://www.netfilter.org/
[20] D. B. Judd, G. Wyszecki, "Color in Business, Science and Industry", Wiley-Interscience 3rd Edition, pp.388, Jul. 1975
[21] Yang, W Lu, A Waibel, "Skin-color modeling and adaptation", Computer Vision ACCV'98, 1997
[22] E. Hamilton, "JPEG File Interchange Format (Version 1.02)", Sep. 1992
[23] ITU-R Recommendation BT.601, http://www.itu.int/rec/R-REC-BT.601/
[24] M. Soriano, B Martinkauppi, S Huovinen and M. Laaksonen, "Using the skin locus to cope with changing illumination conditions in color-based face tracking.", Proceedings of the IEEE nordic signal processing symposium, pp. 383-386., 2000
[25] OpenWrt, http://openwrt.org/
[26] dd-wrt, http://www.dd-wrt.com/
[27] SafeSquid, http://www.safesquid.com/
[28] Nufw, http://www.nufw.org/
[29] Freescale MPC8323E, http://www.freescale.com/webapp/sps/site/prod_summary.jsp?code=MPC8323E
[30] Blacklists UT1, http://cri.univ-tlse1.fr/blacklists/index_en.php
|