Security Through Diversity: MASTER - Advanced Techniques For Information Processing
Security Through Diversity: MASTER - Advanced Techniques For Information Processing
1.UBIQUITY
Most modern attacks take advantage of the fact that the
majority of personal computers on the Internet are quite nearly
in the same state.
Ubiquitous systems are good, cheap, replaceable, and
reliable — until mass failure occurs. It certainly pays to know
that ubiquity and uniformity are the absolute right choices in
the absence of threats.
It is certain that as a given computer system moves away
from the densest pool of common systems, an attacker needs to
work harder to accommodate the difference, which thus can
reduce the likelihood of compromise.
Security Through Diversity
Content Filtering
Content Filtering
b) URL Block
The URL block method is a blacklist containing known bad or unauthorized
Web site URLs. Entire URLs can be added to the blacklist and exemptions can
usually be made to allow portions of the Web site through. Many vendors
provide URL blacklists with their products to simplify the technology, giving
the user the ability to add new sites and perform URL pattern matching. With
both banned word lists and URL block lists, a customer must perform manual
updates of the vendors ’ blacklists.
Depending on the frequency of the updates, the blacklists may fall out of
compliance with the corporate policy between updates.
Content Filtering
c) Category Block
Category blocking is the latest Web content-filtering technology that greatly
simplifies the management process of Web inspection and content filtering.
Category blocking utilizes external services that help keep suspect Web sites
up to date, relying on Web category servers that contain the latest URL ratings
to perform Web filtering. With category blocking devices, there are no manual
lists to install or maintain. Web traffic is inspected against rating databases
installed on the category servers, and the results (good or bad sites) are cached
to increase performance. The advantage is up-to-date Web URL and category
information at all times, eliminating the need to manually manage and update
local blacklists.
Content Filtering
d) Bayesian Filters
Particular words and phrases have probabilities of occurring on Web sites.
For example, most Web surfers users will frequently encounter the “ word ”
XXX on a porn Web site but seldom see it on other Web pages. The filter
doesn’t know these probabilities in advance and must first be trained so it can
build them up. To train the filter, the user or an external “ grader ” must
manually indicate whether a new Web site is a XXX porn site or not. For all
words on each page, the filter will adjust the probabilities that each word will
appear in porn Web pages versus legitimate Web sites in its database. For
instance, Bayesian content filters will typically have learned a very high
probability as porn content for the words big breasts and Paris Hilton sex tape
but a very low probability for words seen only on legitimate Web sites, such
as the names of companies and commercial products.
Content Filtering