Contact Us Search Paper

Web Profile Recommendations for Safe Surfing and Ethical Usage

V. Dhilip Kumar1, Gaurav Kumar1, Ajay Singh Patel1, Neeraj Chaurasiya1, Kemal Polat2, *

Corresponding Author:

Kemal Polat

Affiliation(s):

1. Department of CSE, Vel Tech Rangarajan Dr.Sagunthala R & D Institute of Science and Technology, Chennai

2. Department of Electrical and Electronics Engineering, Bolu Abant Izzet Baysal University, Bolu 14280, Turkey

*Corresponding Author: [email protected]

Abstract:

People are using the internet for all their day-to-day activities like shopping, banking, mailing, etc. The term censored is a kind of spoofing website which is used to steal important information. Therefore, there is a need for an efficient prevention mechanism to find out the censored web page among the legitimate web pages. This paper proposes a study on identifying censored websites by developing an effective algorithm with domain features of URL. Detecting proxies by URL is done by implementing domain pattern matching. We found that the detector accuracy and speed, reflecting in response efficacy as perceived by users, censored websites as a great source of phishing and malicious activities that users have no knowledge about. Data from government-issued is used to detect censored sites. Security of browsers is the concern with users having low-level security settings.

Keywords:

Censored, detecting proxies, spoofing, security

Downloads: 73 Views: 989
Cite This Paper:

V. Dhilip Kumar, Gaurav Kumar, Ajay Singh Patel, Neeraj Chaurasiya, Kemal Polat (2021). Web Profile Recommendations for Safe Surfing and Ethical Usage. Journal of the Institute of Electronics and Computer, 3, 53-60. https://doi.org/10.33969/JIEC.2021.31004.

References:

[1] www.klientsolutech.com/how-internet-impact-on-society-positively-and-negatively/

[2] Allen, N.J. and Meyer, J.P. The measurement and antecedents of affective, continuance and normative commitment to the organization. J. Occupational Psych. 63, (1990), 1–18.

[3] Open Web Application Security Project, XSS (Cross- Site Scripting), Prevention Cheat Sheet, 2011; https:// www.owasp.org/index.php/XSS_(Cross_Site_Scripting)_ Prevention_Cheat_Sheet.

[4] S. Fogie et al., XSS Attacks: Cross Site Scripting Exploits and Defense, Syngress, 2007. 3. N. Li et al., "Perturbation-Based User-Input-Validation Testing of Web Applications," J. Systems and Software, Nov. 2010, pp. 2263-2274.

[5] H. Shahriar and M. Zulkernine, "MUTEC: Mutation-Based Testing of Cross Site Scripting," Proc. 5th Int’l Workshop Software Eng. for Secure Systems (SESS 09), IEEE, 2009, pp. 47-53.

[6] M.S. Lam et al., "Securing Web Applications with Static and Dynamic Information Flow Tracking," Proc. 2008 ACM SIGPLAN Symp. Partial Evaluation and Semantics-Based Program Manipulation (PEPM 08), ACM, 2008, pp. 3-12.

[7] G. Wassermann and Z. Su, "Static Detection of Cross-Site Scripting Vulnerabilities," Proc. 30th Int’l Conf. Software Eng. (ICSE 08), ACM, 2008, pp. 171-180.

[8] Heritrix, Internet Archive's open-source, extensible, web-scale, archival-quality web crawler project, http://crawler.archive.org/

[9] A SURVEY ON SQL INJECTION: VULNERABILITIES, ATTACKS, AND PREVENTION TECHNIQUES Diallo Abdoulaye Kindy and Al-SakibKhan Pathan Department of Computer Science, International Islamic University Malaysia, Malaysia.