Cisco shines light on dark corners of the Web

October 9, 2009 by Glenn Chapman
Cisco IronPort Web Usage Controls promise to identify as much as 90 percent of "egregious" content that has escaped detection by business IT managers and security applications because of its stealthy nature on the Internet.

Cisco launched software that shines light on potentially troublesome websites hidden in what the US computer security firm dubbed the "Dark Web."

Cisco IronPort Web Usage Controls promise to identify as much as 90 percent of "egregious" content that has escaped detection by business IT managers and security applications because of its stealthy nature on the Internet.

"The Dark Web is about corporate users' inability to see how workers are using the Web," product line manager Kevin Kennedy told AFP on Thursday.

"It is that dark, dynamic and churning part of the Web that has created the problem for business."

Computer users are growing increasingly savvy about sidestepping Internet filters, using proxy servers and other techniques to mask which websites they visit while at work, according to Cisco.

For example, if workers log into from an office computer someone in the IT department can typically tell how much time they fritter away at the popular .

However, if the employee connects to Facebook through any of thousands of proxy websites set up daily all an IT department monitor will see is a nondescript as the online destination, Kennedy said.

Blocking porn websites on work computers typically involves using filter software based on lists of known online adult-content locales.

Internet porn purveyors have taken to constantly changing URLs, Internet addresses, in a practice referred to as "churning," according to Cisco.

"It's happening and businesses don't necessarily see it," Kennedy said of workers circumventing company constraints on online access to websites for gambling, porn, hate speech and other material that can cause legal woes.

"Most people are pretty well behaved at work, but some are not," Kennedy said.

"Using an anonymous proxy is sophisticated to us, but the kids that have graduated from colleges in the past five years are very aware of using software to get to proxies."

The Dark Web has been formed largely as a result of tidal wave of Web pages triggered by Web 2.0 trends in user-generated content such as blogging and social networking, according to Cisco.

Only 20 percent of the more than 45 billion websites in the world are reportedly categorized effectively enough to be used by filtering programs, leaving 80 percent of the Web in the dark.

"Legacy approaches only give a small view now that there is this explosion of user-generated content online," Kennedy said. "We as an industry have to do better at how we solve this problem."

Tests of Ironport Web Usage Controls reportedly identified 50 percent more off-limits websites than did previous-generation filtering software relying on website address lists.

Ironport combines list-based filtering of known websites with a "dynamic engine" that reads pages to decide in real time whether content on them is something businesses don't want workers to access on company time.

Ironport software is also trained to recognize proxy servers, according to Kennedy.

"We are doing pretty well; there is room for improvement," Kennedy said. "You have to balance between catch rate and false-positive rate."

False positives are times when filtering software blocks access to websites that don't deserve to be off-limits by company standards.

(c) 2009 AFP

Explore further: Disabled technologies pave the way for next generation mobile Web

Related Stories

Cyber-crooks targeting social-networking websites

March 3, 2009

Computer security specialists warn that Facebook users have been hit with a series of data-stealing attacks in the past week as cyber crooks increasingly stalk social-networking websites.

Recommended for you

Cryptocurrency rivals snap at Bitcoin's heels

January 14, 2018

Bitcoin may be the most famous cryptocurrency but, despite a dizzying rise, it's not the most lucrative one and far from alone in a universe that counts 1,400 rivals, and counting.

Top takeaways from Consumers Electronics Show

January 13, 2018

The 2018 Consumer Electronics Show, which concluded Friday in Las Vegas, drew some 4,000 exhibitors from dozens of countries and more than 170,000 attendees, showcased some of the latest from the technology world.

Finnish firm detects new Intel security flaw

January 12, 2018

A new security flaw has been found in Intel hardware which could enable hackers to access corporate laptops remotely, Finnish cybersecurity specialist F-Secure said on Friday.


Adjust slider to filter visible comments by rank

Display comments: newest first

3.7 / 5 (3) Oct 09, 2009
Of course the same software that enables companies to block access to "egregious" sites can be used by governments to block access to politically "egregious" sites.
Oct 10, 2009
This comment has been removed by a moderator.

Please sign in to add a comment. Registration is free, and takes less than a minute. Read more

Click here to reset your password.
Sign in to get notified via email when new comments are made.