All submissions of the EM system will be redirected toOnline Manuscript Submission System. Authors are requested to submit articles directly toOnline Manuscript Submission Systemof respective journal.

Adding Trust to the Social Networking Sites: A Prominent Way of Content Filtering

Aman Sharma, Atul Arora, Abhinav Sharma, Akshant Gupta, Ankit Malik
B.Tech Student, Dept. of Electronics & Computer Engineering, Dronacharya Collage of Engineering, Gurgaon, India
Related article atPubmed,Scholar Google

Visit for more related articles atInternational Journal of Advanced Research in Electrical, Electronics and Instrumentation Engineering

Abstract

This paper reviews about the internet filtering and content filtering techniques of the web pages that helps in removing particular types of encrypted data from that webpage. As soon as the social networking and the internet came into existence the transfer of various types of viruses and unauthorized data which is illegal in law have became a biggest threat to the industry. So, Saving our document from these types of unauthorized viruses and encrypted files is a major issue. Various organizations are working on it to prevent the free flow of these type of viruses from internet to our system and for that reason content filtering has gain importance in making our documentary files secure. This paper includes various types of filters, bases to select a filter and methods for filtering with the conclusion of the content filtering.

Keywords

Filter, Domain, Internet

INTRODUCTION

Today, social networking sites had gained popularity. They have become the greatest source of communication, share a considerable amount of human views, exchange of several types of data like text, videos, etc and even provide employments. Suppose, if somebody wants to search any desired information here come the data mining process which is known to play the most efficient part in it. The search engine selects the input, compare it with all the record saved in the database of the engine. The record in the database is again selected and respective url is displayed. Now generally the information, advertisement or message given on that webpage is shown as such without any change known as general walls. These walls may have that advertisement which is of no use of that user or may have unauthorized photos or encrypted data.
So keeping all this is mind, social networking sites must be equipped with the facility that if something unauthorized is available there on the webpage we have searched for, it will filter the page and remove all its unauthorized contents. This paper reviews about the various techniques and methods of doing it.ML technique[1, 2, 3] and several other methods [4, 5] are also used to study Content based filtering.

现代的过滤技术

An Internet filter can be something, not necessary required to be only hardware, it can be software well, used to check the flow of undesired data that is present on the internet or travels through the webpages when we click on them. Filters plays a major role in not allowing the free flow of unwanted Advertisement or any vulgar images to show on the web pages. Filters also plays a great role in passing on the free flow of harmful files that can infect our system and lead to any miss-happening. If used in a useful manner these Internet Filters can play crucial role in blocking the access of certain sites, web pages, videos and certain porn cites as well. The greatest achievement in these filters is achieved due to a new emerging technology named as Machine learning (ML) text categorization procedure.[6]. ML technique breaks the content of messages into several parts and place them according to the different categories that may have been created. For example, all the pictures are placed in one category while rest text is placed in another category and so on. On the basses of these categories, only allowed contents are allowed to display and rest of them are cleared off.
In 2002, a warning was issued by the president Hinckley that we are using several techniques to safeguard our home and electronics appliances but we never worried about the security on the internet [7]. Therefore, we must pay some attention to our social networking safety as well. One might be shocked to hear that these social networking sites, website, etc are much easier to crack or hack than our physical Quantities like Electronics gadgets. But nobody pays attention to it. It is highly required to block the flow of harmful contents and that’s what the benefits of these filters.
我们许多过滤器提供设施的检查the flow of any harmful material and we can used any of them to protect our sites. Several Advanced content filters even provide you security in chatting sites, blocks the unnecessary advertisement on your processed webpage. One might have noticed that there are several Advertisement that may come to see when you are surfing any webpage. These Internet filters provide us the facility to get ride of such unwanted advertisement. Suppose if two users are present in a trusted site in a direct relationship of some type say RT and X then there must be an edge between them which will be connecting them i.e the messages will be directly transferred from one node to another node. [8].All these features of Content filtering keep us safe from the harmful data transfer online and keep us intact on social networking sites.
But these have a major drawback that it can be overcome by providing some certain conditions to it that are specified in its library and hence the filter can be of no use when we talk of the security that it was providing us. But you know at the same time, it’s the part and parcel of the game that if something big positive is coming our way then it may have certain negative points also which can be neglected keeping the values of positives.
Due to advancement in the several hacking and account breaking techniques, it is highly recommended to filter the content that one surfing on the internet. So it is highly advised to use you check the capability of your filter that one must use the internet in public areas as to check the maximum unauthorized filtering of data flowing. But if somebody wants to be sure of security then he/she must not use the internet when there is somebody around him/her. This may increase the threat of passward leaking and hence destroy security. Also one must use those Operating Systems which have the availability of Internet filters like Windows 7, vista, mac, etc.
In a conference, once President Faust said that As the number of user on any sites increases, user generally shifts from general filters to his/her personal filter to block any untrusted things to flow through. [9].

VARIOUS FILTER AVAILABLE TO APPROACH CONTENT FILTERING

Let us consider a thing that everything that is available on the internet is not secure or it is affected with any untrusted virus which is really a big threat to our system. Thus, keeping the same in our mind, let us make a filter which will safeguard us online, checking everything that we surf, see weather if we are visiting a malware affecting site or a secure site. In case if we are visiting a affected site it will automatically starts it is functioning. For Example if we had a filter that filters any affected mails from our mail account, which automatically removes any infected file or mail from it, if it detects any. Since we are not require to deal with it our self and hence, provide security.
These filters have a very basic way of operation. Before using them, we are just required to set what kind of file we are setting for it as a malware affected file and which one have the right to access through. Keeping all these key points in mind, these filters are grouped into various categories named below
Using Software based Filters-软件基于过滤器的过滤器mostly used because of their popularity and ease of usage. These types of Filters are easily available on the web and they can be easily downloaded from there. After they are downloaded, they are installed and then they are all set for usage. Generally we have different types of filters available and they are general purpose i.e they are only use for specific task only. For example we different types of filters available for firewalls, mails extraction and sending. Basic working of these filters is explained as, these filters acts like a kind of interface between your system and internet. Everything you search on the internet if first checked by this filters and then passed on to your system. You are first require to define the set of operation it have to do in beginning. They provide us a good security not even in the case of pornography but also protects us from other threats.
If you want to compare it with your daily life, it may be considered with the security systems that are installed in banks or high security places. Guest considered as incoming data have to pass on through the security checks and prove its identity so that they can enter through. The same is the functioning of these software filters. If you had the set of instructions that don’t allow such types of instructions to pass on then access id denied.
Using Hardware based Filters-这些类型的过滤器也使用但大多数the people do not know where they actually using them. Generally people think that there is only one type of filter available that is software based filters but that is not what truth is. There is another types of filter which are named based on hardware based. Today people use internet connections at their homes through several means, either they may be using a modem or wireless internet likes wifi etc. These modems or routers have in built data filtering capability. What you require to do is to connect the modem externally to the system, these modems are having a capability to filter the data across the internet. You are not require to install any software further for this functionality. These modems have the access of only trusted and secure sites. So these modems are the best example of hardware filters. These filters are easy to use and provide us the access to the internet with the security that the data is secure or filtered.
Hardware Filters are best understood with the example of a person who is standing just in front of a mailbo who is just checking that whatever mails somebody is actually drops to your mailbox. If these mails were actually belonging to you it will accept otherwise rejects.
Domain Name System-A modern approach- DNS is the modern way for content filtering which provided several benefits of better online security and data filtration.
Another option is to use a DNS service such as OpenDNS to provide filtering. This provides a free option with many of the benefits of having a hardware solution, without having to purchase additional hardware because it will probably work with your existing home networking hardware.
All that is required is to update the primary and secondary DNS entries at the router to point to the opendns servers, and then open an account on open DNS, which allows you to set your filtering options for your home network. Directions for doing so are on the open DNS website.
这个选项已经过滤所有的优势the devices in the home; including the computers, cell phones, TVs, game consoles, any device that would connect to your router, either hardwired or wireless. However cell phones connected to the Internet via a cell tower will not be filtered.
Using Internet Service Providers –A Magical Technique.- Well, it might be surprising that even our internet service provider can even provide us the content filtering technique. The reason why content filtering using Internet service providers is magical because one didn’t need anything to be downloaded or installed on your system. Please make note that not every service provider gives you the facilities of content filtering but there are only limited one. The main thing in this is that it just present online so there is no worry for you that you are required to download anything or install anything. It is just present between the data you are surfing on the net and your system which checks for the infected file and after checking it passes on to the user. If it is infected, it blocks it and don’t allow it to pass through. The key factor that one must be caring about is that the system you are using must be configured with the proxy server.
这可以更好的understood by the example of a postman which delivers the letters to our home after inspecting them. They are infected, he will not deliver it to us and if they are all ok, means not infected, then it will delivers them at our home.

MAJOR ISSUES CONSIDERED BEFORE SELECTING ANY TYPE OF FILTER

Up to now, we have discussed about the different types of Filters, like hardware, software, DNS, etc but now we will be taking issues that will matter while selecting a special type of filter from all available. The type of filter which you might be selecting will depend upon the following under defined points.
1. Thing which is you trying to save from the untrusted sites?-Now a days, in the modern era, we have seen several devices which uses internet connection and therefore they are required to be protected from the infected sites. One must remember that one is not required to protect older desktops or older versions of software but one is also concerned about the newer technology based devices like palmtops and utrabooks that works on net connection and help us in doing several tasks. One must note that your mobiles does not comes into this category as they uses different net connection for surfing.
if somebody is using the internet connection for several devices, then it must be a broadband connection. It is possible that the devices that one is using may not be functioning well with the hardware one is using so one must be careful about that as well.
2. O.S that one is using in desktop?-Operating System is the interface that act between hardware and software which helps user's functioning on desktop. Which operating system you are using can be identified by rebooting your system. The name that one might see on booting like window xp,7,8 etc tells you what operating system you are using.
First of all, what we require to do is to check what hardware filter one is using. Although it has nothing to do with what operating system one is using. In some operating system, we have couple of hardware filters present or may be more than that. In new versions of operating system like window 8 and mac these hardware filters are already been installed up to the newer version. System's software filters are even better than hardware filters providing better security from several internet issues but they were not present in older versions of operating systems.
3. Using internet at home or also at public places?-This point is although is of less importance but can't be avoided. Is somebody is having desktop then it is highly possible that he/she will be using internet at home only at chance of connecting that desktop away from home to any un-trusted network are pity less. But if somebody is using a laptop then there are fair amount of chances that the person can use internet away from the home so one has to be sure about the security. Therefore, they require a software based filters that they can use to protect their laptops to connect to any fishing site as hardware filters can protect only when one is connected to internet through hardware based internet services.
4. Way by which one is authenticating to the internet?-It might be of less importance and somebody will find it really a unique thing when one say that if somebody is authenticating to the network by using a modem or any WIFI connection then the use of hardware based filters will not be the best option but one must think of using of any software based filter. Also if one is accessing the internet through LAN cable then the hardware filter will be the better option.

HOW TO BLOCK A SITE BY USE OF HOST FILE

Sometimes we do not want the users of a particular computer or network to open a particular website. For example we want our children or our friends to stop accessing a website then we needs to block that website on the computer or network. Although web browsers provide facilities to block a website but they do not work always and it is quite easy to undo the settings. So through this guide I will show you how to block websites by using computer’s host file. By settings a password for your host file, other users will not be able to unblock the websites back. Here are the steps:
1. Open the ‘Command Prompt’ and type "notepad C:/Windows/System32/drivers/etc/hosts" and start instead of moving cursor just start typing, the host file will be open in Notepad.
2. Now in the host file find the line that says: "127.0.0.1 localhost,”. Bellow this line type the IP address and name of the website that you want to block separating by a space. If you want to block more than one site write the similar details in individual line. For example if you want to block Facebook.com then write the following line: 66.220.158.11 www.facebook.com
3. To find out the IP address of a website open the command prompt and type "ping www.facebook.com" and press Enter key. If a website has more than one IP address then write each one with the website name in separate line. 4. Save the host file after adding the details of all website that you want to block and close the host file and command prompt.

CONCLUSION

As now we can conclude that from the past few years with the advancement in the field of internet, the issues of online protection had gone up. It is highly required these days to protect your laptop, desktop or nay other device using which you are connected to this virtual world of technology. With the advance ment of several techniques people feel highly secure when they click on any unknown site because they know that if there will be anything fishing behind that then his/her firewall or filters will provide him/her security.
Content filtering is the fast growing field in which in every second any new infected site is produced and on the same second, we generate the way by which the previous junked site can be detected and avoided. Hence, it is ongoing terminology which will keep on fighting with the people's FACEBOOK, twitter, YOUTUBE conflicts for a better online world which will be secure from fishing sites.

Figures at a glance

Figure Figure
Figure 1 Figure 2

References

Global Tech Summit