Cisco shines light on dark corners of the Web

Oct 09, 2009 by Glenn Chapman
Cisco IronPort Web Usage Controls promise to identify as much as 90 percent of "egregious" content that has escaped detection by business IT managers and security applications because of its stealthy nature on the Internet.

Cisco launched software that shines light on potentially troublesome websites hidden in what the US computer security firm dubbed the "Dark Web."

Cisco IronPort Web Usage Controls promise to identify as much as 90 percent of "egregious" content that has escaped detection by business IT managers and security applications because of its stealthy nature on the Internet.

"The Dark Web is about corporate users' inability to see how workers are using the Web," product line manager Kevin Kennedy told AFP on Thursday.

"It is that dark, dynamic and churning part of the Web that has created the problem for business."

Computer users are growing increasingly savvy about sidestepping Internet filters, using proxy servers and other techniques to mask which websites they visit while at work, according to Cisco.

For example, if workers log into Facebook.com from an office computer someone in the IT department can typically tell how much time they fritter away at the popular .

However, if the employee connects to Facebook through any of thousands of proxy websites set up daily all an IT department monitor will see is a nondescript as the online destination, Kennedy said.

Blocking porn websites on work computers typically involves using filter software based on lists of known online adult-content locales.

Internet porn purveyors have taken to constantly changing URLs, Internet addresses, in a practice referred to as "churning," according to Cisco.

"It's happening and businesses don't necessarily see it," Kennedy said of workers circumventing company constraints on online access to websites for gambling, porn, hate speech and other material that can cause legal woes.

"Most people are pretty well behaved at work, but some are not," Kennedy said.

"Using an anonymous proxy is sophisticated to us, but the kids that have graduated from colleges in the past five years are very aware of using software to get to proxies."

The Dark Web has been formed largely as a result of tidal wave of Web pages triggered by Web 2.0 trends in user-generated content such as blogging and social networking, according to Cisco.

Only 20 percent of the more than 45 billion websites in the world are reportedly categorized effectively enough to be used by filtering programs, leaving 80 percent of the Web in the dark.

"Legacy approaches only give a small view now that there is this explosion of user-generated content online," Kennedy said. "We as an industry have to do better at how we solve this problem."

Tests of Ironport Web Usage Controls reportedly identified 50 percent more off-limits websites than did previous-generation filtering software relying on website address lists.

Ironport combines list-based filtering of known websites with a "dynamic engine" that reads pages to decide in real time whether content on them is something businesses don't want workers to access on company time.

Ironport software is also trained to recognize proxy servers, according to Kennedy.

"We are doing pretty well; there is room for improvement," Kennedy said. "You have to balance between catch rate and false-positive rate."

False positives are times when filtering software blocks access to websites that don't deserve to be off-limits by company standards.

(c) 2009 AFP

Explore further: Body by smartphone

add to favorites email to friend print save as pdf

Related Stories

Cyber-crooks targeting social-networking websites

Mar 03, 2009

Computer security specialists warn that Facebook users have been hit with a series of data-stealing attacks in the past week as cyber crooks increasingly stalk social-networking websites.

Recommended for you

Body by smartphone

10 hours ago

We love our smartphones. Since they marched out of the corporate world and into the hands of consumers about 10 years ago, we've relied more and more on our iPhone and Android devices to organize our schedules, ...

Breakthrough elastic cloud-to cloud networking

12 hours ago

Scientists from AT&T, IBM and Applied Communication Sciences (ACS) announced a proof-of-concept technology that reduces set up times for cloud-to-cloud connectivity from days to seconds. This advance is a major step forward ...

Security CTO to detail Android Fake ID flaw at Black Hat

Jul 29, 2014

Where have you heard this before: A team of security researchers discover a security flaw in Android devices. This is, however, news. This time, experts are talking about a flaw that involves a widespread ...

Software provides a clear overview in long documents

Jul 25, 2014

In the future, a software will help users better analyze long texts such as the documents for calls for bids, which are often more than one thousand pages long. Experts at Siemens' global research unit Corporate ...

User comments : 1

Adjust slider to filter visible comments by rank

Display comments: newest first

frajo
3.7 / 5 (3) Oct 09, 2009
Of course the same software that enables companies to block access to "egregious" sites can be used by governments to block access to politically "egregious" sites.
Sweetcheeks
Oct 10, 2009
This comment has been removed by a moderator.