Академический Документы
Профессиональный Документы
Культура Документы
ABSTRACT
Technological advancement increases the uses of Internet access and also web access. As the web access is increases, the
vulnerability point in an organization, institution in any places is also increases which may affect the productivity and
performance level of the organization. Many times it seen that the ways some places use the Internet is very much objectionable
for others. As a result the whole network may not be fully utilized. In order to screen out the unwanted information from the
access, content filtering technique is developed. Till today, lots of different filtering techniques are developed and developing
by using different approaches, knowledge and technologies, but not fully able to protect the web content. This paper provides an
inclusive survey of all major approaches, tasks and processes involved in the web content filtering and trying to find out a better
technique to solve the above mentioned problem for the web access.
Keywords :— Web access, Content Filtering, Filtering Technique, Web protection.
Mingliang Zhu, Ou Wu, Weiming Hu and Zhouyao Chen [5] V S Kharad and S. S. Kulkarni, “International Journal of
developed an algorithm namely novel base web page filtering. Advanced Research in Computer Science and Software
This algorithm is used to filter objectionable images and text Engineering” Volume 5, Issue 4, p. 248, (2015).
from web sites [19].
[6] Uri Hanani, Bracha Shapira and Peretzshoval,
Sarifullah Khan ,Sadaf Khurshid and Shariq Bashir have “Information filtering: overview of issues, research and
developed an smart filtering technique to classify the text, in systems”, Department of Information System
this technique they using feature engineering method and Engineering, PP. 203-259, (2001).
sentiment analysis of text. In order to block the unwanted web
pages Novel content filtering technique is used. With the help [7] Berry Michael W, “Automatic Discovery of Similar
of machine learning algorithm Text classification is done to Words”, in “Survey of Text Mining: Clustering,
classify the positive and negative classes [20]. Classification and Retrieval”, Springer Verlag, New
York, PP. 24-43, (2004).
Ammar Almomani , Eman Almomani, B.B.Gupta and
Samer Atawneh A Meulenberg have developed a technique [8] Wu and Weiming Hu, “Web sensitive text filtering by
to avert phishing email attacks. This is basically a client based combing semantics and statistics,” Preceding of NLP-
filtering technique. Supervised learning algorithm is used in KE IEEE, (2005).
this technique. With the help of this technique we can able to
identify new email attacks [21]. [9] K.S.Kuppusamy and G. Aghila, “A personalised web
page content filtering model based on segmentation”,
International journal of information sciences and
V. CONCLUSION techniques Vol.2,No1, (2012).
This paper presents the detail description of the web content [10] Jianping Zhang, Jason Qin and Quiuming Yan,“Role of
filtering and also reviewed different types of techniques and URL‟S in objectionable web content
tools used in filtering and summarized them. In this paper we cauterization”,Procedding of international conference on
discuss about Keyword analysis, packet analysis, URL web intelligence IEEE ,(2006).
analysis, Rating Systems, Black Listing / White Listing,
[12] Ying-Dar Lin, Po-Ching Lin, Yuan-Cheng Lai. “An [18] Hui Li,Fei cai and Zhifang Liao, “Content based filtering
Early Decision Algorithm to Accelerate Web Content recommendation algorithm using Hmm”, International
Filtering”, IEICE TRANS. INF. & SYST., VOL.E91–D. conference on computational and information sciences,
IEEE,( 2012).
[13] Saba Hilal and Neha Gupta, “An Algorithm to Filter &
Redirect the Web Content for Kids”, IJET13-05-01-024. [19] Zhouyao Chen, Ou Wu, Mingliang Zhu and Weiming
Hu, “A novel web page filtering system by combining
[14] Tiago A.Almeida and Akebo Yamakami, “Content texts and images”, Procedding of international
Based Spam Filtering”, Neural Networks (IJCNN), The conference on web intelligence, IEEE, (2006).
2010 International Joint Conference on 18-23 July,
(2010). [20] Sadaf Khurshid, sarifullah Khan and Shariq Bashir,
“Text-based intelligent content filtering on social
[15] M. Thangaraj and V.K.T.Karthikeyan, “KT-grand: an platforms”, International frontiers Of Information
algorithm for web content filtering”, international Technology l, IEEE, (2014).
journal of advance research in computer science and
management studies”, Vol2, Issue 9, (2014). [21] Ammar Almomani, B.B.Gupta, Samer Atawneh A
Meulenberg, and Eman Almomani, “A survey of
[16] Mohamed Hammanai, Youssef chachir, Liming chena phishing email filtering techniques”,IEEE
“Web Guard: Web based adult content detection and communication surveys and tutorials Vol 15, No. 4,
(2013).