Chapter 1 3

You might also like

Download as doc, pdf, or txt
Download as doc, pdf, or txt
You are on page 1of 33

ALIBATA Web Browser Berou, Delos Reyes, Somera

Chapter 1 INTRODUCTION

Web browsers have come a long way from the days of the first Internet Web browsers, Mosaic and the like. Web browsers today have progressed from being amore internet exploring tool to being a multi-purposed, multi prolonged application that brings several advantages to the web visitor. The prominent browsers available for personal computers include Microsoft Internet Explorer, Mozilla Firefox, Google Chrome and so on. Todays Web browsers are easy to download because it is readily available to the market and comes for free. In web browsers allow users to search for specific topics, download files, watch movies online, listen music online, online streaming, chatting, file sharing send and receive email, playing games, and just about something everyone could imagine. Through web browsers someone can make or access any kind of cybercrime to open malicious files. In web browsers can easily get viruses, malware, spyware, that can harm personal computers. The reason for developing the Alibata web browser is to lessen such cases and to block malicious content. And also to prevent personal computers to viruses, malware, spyware, that can get through internet.

ALIBATA Web Browser Berou, Delos Reyes, Somera

Background of the Study

Web browser is an application that is most used by people using internet. It is however the most exploited in terms of usage. The advantages of web browser now is, it can be used for online selling, play online games, social networking, watch videos online, listen music online and download files. The disadvantages in web browser today can scam easily on site especially if selling online. Another disadvantage of web browsers is its malicious content. Some files can get while downloading in internet contains viruses, spyware, and malware. With this reasons, the proponent decided to develop an Alibata web browser. The Alibata web browser has the ability to block malicious content to prevent opening of pornographic and violent interest. Alibata web browser has also an ability to prevent from spyware and malware while downloading files using internet.

Statement of the problem

The purpose of this study is to develop a web browser and increase its security features from viruses, malicious contents and possible cyber crimes. This web browser will help prevent internet threats that are harmful to computers and the users themselves.

ALIBATA Web Browser Berou, Delos Reyes, Somera

The study seeks answers for the following problems. 1. What is the demographic profile of the respondents in terms of:
1.1 Browser preference

1.2 Computer proficiency 2. How do the respondents address security issues in web browsing?
3. How do the respondents assess their preferred browser and the

proposed Alibata Web Browser in terms of: 3.1 Efficiency In terms of CPU Usage In terms of Memory Usage

3.2 Speed 3.3 Security -

malware protection unwanted Jscript application anti-phishing anti-spyware anti-adware

3.4 User Friendliness 3.5 Compatibility

ALIBATA Web Browser Berou, Delos Reyes, Somera

Hypothesis Based on the problem stated, the proponent has formulated this hypothesis, which was tested at 0.05 level of significance, there is no significant difference between the existing and proposed system in terms of: Efficiency, Speed, Security, User Friendliness, Compatibility. Significance of the study This study is important for the users of internet. It will protect the personal computers in virus threats usually encountered while using the internet. It serve as a guide and it inform the users to protect personal computers when the user is encountering virus threaths. The following are the beneficiaries of the study. User- the user will be informed if he/she encountered malicious content while using the internet. Users will be assured that he/she can be protected while using personal computers and can have a secured web browser. These will surely give safe and secured web browser.

Future Researchers- it will serve as a guide for those researchers

ALIBATA Web Browser Berou, Delos Reyes, Somera

Scopes and Limitations This research has its specific coverage as to what the browser can perform. The following are the scope of this study. The Alibata web browser is created with the idea of fully having almost every capability if not all, of a typical web browser. Basically it has an address bar wherein the user will type the desired website address he/she wishes to go to. It can run everything that can be found on the net from sounds to pictures, videos and such. It may host multiple private websites and constitute an important component and focal point of internal communication and collaboration. Cookies can help users to locate and view information faster and use applications relevant to their roles and responsibilities. It can also bookmark websites specifically chosen by the user. Lastly as stated earlier this browser concentrate mostly with security issues therefore a built-in pop-up blocker is also smartly integrated within the browser. Like any other computer applications, the proposed browse has its limitations. This web browser cannot extend its security capabilities with an already infected system. It does not have a function to scan a virus. In terms of speed of the web browser, achieving best browsing experience is subject to the users internet connection speed. The browser does not cover the some network tools. It also cannot provide themes for customizing the web browser. Disabled security options by the user.
5

ALIBATA Web Browser Berou, Delos Reyes, Somera

Chapter 2 Review of Literature

This chapter discusses the studies and criticisms conducted to highlight the significance of the proposed system. These will help to understand the ins and outs of the existing browsers to help come up with the desired results. The review of related literature is done to find out the ways, needs and further wants of web browser users. The proponents will create a system that will provide more convenient and user friendly browser with improved security. This section contains the theory that serves as the proponents guide toward the possible completion of this study.

Related Literature Literature is a part of our lives in which it expresses the essence of direction and point of views. Literature is significant in relation to the nature of application and problems under investigation. Related literatures are composed of discussions of facts and principles to which the present study is related. These materials are usually printed and found in books, encyclopedia, professional journal, magazines, newspapers and other publications.

ALIBATA Web Browser Berou, Delos Reyes, Somera

Foreign Literatures

According to the author Roger A. Grimes What is Browser Security Review , Its stated that this article discusses everything about internet security within every web browser out there. It critizices every web browser from its features to its security. According to this website http://xtream.online.fr/project/security.html, What is Internet Security Research Paper , This paper explains that the securty problemsof the internet largely are due to the design structure of the internet. According to this website http:// www.w3.org/WAI/eval/ What is evaluating Web sites for Accessibility , This is a multi-page resource suite that outlines different approaches for evaluating Web sites for accessibility. According to this website http://orcabrowser.com/ What is Orca Browser Review by SoftSea , It discussed the different features and edge of this newly developed browser among the other existing ones. According to sudy of Wall Street Journal, Google has introduced a new Web browser, called Chrome, aimed at wresting dominance of the browser market from Microsofts Internet Explorer. These omissions include a way to manage bookmarks, a command for emailing links and pages directly from the

ALIBATA Web Browser Berou, Delos Reyes, Somera


browser, and even a progress bar to show how much of a Web page has loaded.

Local Literatures

According to the study of Genalyn Kabiling, Palace Denounces hacking, increases Internet security , It discuss security breach within the Philippine Governments official sites. This article emphasizes the significance of internet security which is also the main concern of the proponents in developing this browser. According to this website http://www.mb.com.ph/node/278375/rp-drop by Manila Bulletin, RP drops from Top 20 Countries Most Hit by Malware Attacks , This article also tackled the serious effects of malwares lurking in the world wide web. According to the author Abigail Kwok, RP 4th in SE Asia as source of internet security threats , Web-based attacks are launched from computers other than that of the user through redirection or malicious advertisements. According to the author Alexander Villafania, Money is main cause of internet security threats Symantec , Virus makers are more ingenious now and are not just attacking operating system vulnerabilities and multimedia

ALIBATA Web Browser Berou, Delos Reyes, Somera


attacks, particularly those that use click-over videos that actually download viruses onto unprotected computers. According to the author James O. Ventura SATAN ( Security Administrator Tool for Analyzing Network The problem with this is that the internet is a jungle, if you connect a machine to it, you can be sure that it will probed for security weaknesses by the malicious and the curious.

Related Studies This review helped the proponent in understanding how the internet works and how it helps in communication. And how it eases mans lives, Some citations are stated below.

Foreign Studies This review helped the proponent in understanding how the computers worldwide are interconnected and how it can be used as a communication tool. According to the study of Kent State University, a Web browser is a specific type of document that allows you to access resources on the world wide web.

ALIBATA Web Browser Berou, Delos Reyes, Somera


According to the developer of SpectorSoft, this studys aim is also for additional security purposes same as to our proposed systems aim which is also improved security. According to the developer of Password Management, a small

application created by Bitshifter from sourcecodesters.com is to manage username and password for favorite sites. According to the developer of Home Security with Finger Print, keyless is a biometric lock that uses finger print identification as a method. According to the author Nickun Kach, Kacha Web Browser is a simple web browser using visual basic.net. Technically the same as to our proposed application the difference is that ours is more complex with smartly integrated security system and features.

Local Studies According to the study of James O. Ventura, SATAN (Security Administrator Tool for Analyzing Network) The problem with this is that the Internet is a jungle if you connect a machine to it, you can be sure that it will be probed for security weaknesses by the malicious and the curious.

10

ALIBATA Web Browser Berou, Delos Reyes, Somera

According to the study of Richard T. Garcia and John Derek S. Susi,


Philippine Search Engine, Internet to promote the Philippines its society and

culture. According to the study of Rickson G. Chew, Generic Pop-up Keylogger This keylogger is a Trojan and at the same time a backdoor. It runs anonymously in the background providing a backdoor server which allows a remote intruder to gain access and control over the computer. According to the study of Onel A. De Guzman AMA Computer College, Email Password Sender Trojan , he stated that trojan horse is a legitimate program that has been altered by the placement of unauthorized instructions within it. According to the study of Ria Ann D. Ero AMA Computer College Makati (1998), Trojan System: File System Guard , She stated that the software is all about security and protections against unauthorized program running in hidden mode and unknown to user.

11

ALIBATA Web Browser Berou, Delos Reyes, Somera

Synthesis Local studies tackle security but with a different approach. The related studies prove the relevance of the research in addition with the related literatures where security is the main issue. The epidemic spread of malware and virus attack is very alarming especially in the Philippines as reported by Symantec Philippines. Beyond any features or functions the community of the worldwide web should not forget security to be the main function to look at. This has been evident learning from Onel de Guzmans rejected thesis proposal as to how Trojan works. Same with the study of Ms. Ria Ann D. Ero proposed system in

preventing unauthorized access by applications like Trojan. The team will also apply encryption and other innovative way to secure browsing experience just like other web browsers do. Mozilla for functions, Internet Explorer for security and Google Chrome for speed will be the basis of the project. With the same vision of Richard T. Garcia and Derek S. Susi, the study project is to promote the Philippine heritage, so the team named the project, Alibata Web Browser.

12

ALIBATA Web Browser Berou, Delos Reyes, Somera


Conceptual Framework
EXISTING CRITERIA PROPOSED

Security Compatibility User Friendliness Speed Efficiency

Figure 2.0

Conceptual Framework The figure above shows the conceptual framework showing the difference between the Existing system and the Proposed system in terms of Security, Compatibility, User Friendliness, Speed and Efficiency. Having the

above criteria, the project will help the web users/community to be aware of internet security and assure the safety of web browsing without the worries of being hacked, infected or scammed. The project is an open source, so it is free and open for improvement to suit the needs of the web user or developer.

13

ALIBATA Web Browser Berou, Delos Reyes, Somera

Theoretical Framework for the Proposed System Web Application Security Framework

Figure 1.0

Theoretical Framework for the Proposed System The figure above shows the theoretical framework of the proposed system that filters web frames for any sign of malicious/non-certified content. The proposed system security defense provides protection against such web application attacks since these attacks are launched on port 80 (default for websites) which has to remain open to allow regular operation of the business. The proposed system adds one more layer of protection and it is on the
14

ALIBATA Web Browser Berou, Delos Reyes, Somera


Application Layer, the layer that are most exploited, transferring data through Port 80. With all the protection present in the User Layer, Transport Layer, Access Layer and Network Layer, through vulnerability scanning and source code analysis of every web application, the proposed system brings a more secured and more efficient web browsing. Definition of Terms

Authentication. The method used to verify the identity of a user, program or computer on the web. ASP(Active Server Pages). A technology allowing the insertion of server executable scripts in web pages. Bookmark. A link to a particular web site, stored (bookmarked) by a web user for future use and easy access. Browse. A term to describe a users movement across the web, moving from page to page via hyperlinks, using a web browser. Cache. A web browser or web server feature which stores copies of web pages on a computer hard disk. CGI(Common Gateway Interfaces). A set of rules that describes how CGI program communicates with a web server.

15

ALIBATA Web Browser Berou, Delos Reyes, Somera


Compressions. A method of reducing the size (compress) of web documents or graphics for faster delivery via the web. Cookie. Information from a web browser, stored on your computer by your web browser. The purpose of a cookie is to provide information about your visit to the web site for use by the server during a later visit. E-mail Address. The address used for sending e-mails to a person or an organization. E-mail Server. A web server dedicated to the task of serving e-mail. Firewall. A software that acts as a security filter that can restrict types of

network communication. Frame. A part of the browser screen displaying a particular content frames are often used to display content from different web pages. Helper Application. A program helping the browser to display, view, or work with files that the browser cannot handle itself. Hits. The number of times a web object (page or picture) has been viewed or downloaded. Home page. The default page displayed when you visit a web site.

16

ALIBATA Web Browser Berou, Delos Reyes, Somera


Internet. A network that links computer networks all over the world by satellite and telephone, connecting users with service networks such as e-mail and the World Wide Web Java. Mostly for programming web servers and web applets. Search Engine. Computer program used to search and catalog (index) the millions of pages of available information on the web. Spyware. A computer software hidden in a computer with the purpose of collecting information about the use of the computer. Trojan Horse. Computer program hidden in another computer program with the purpose of destroying software or collecting information about the use of the computer. Upload. To transfer a file from a local computer to a remote computer. To transfer a file from a web client to a web browser. URL (Uniform Resource Locator). The standard way to address web documents (pages) on the internet. Web Applet. A program that can be downloaded over the web and run on the users computer. Web Application Security. Science of information security relating to the World Wide Web, HTTP and web application software. Also known as Web Security.

17

ALIBATA Web Browser Berou, Delos Reyes, Somera


Web Browser. A program used for displaying and viewing pages on the World Wide Web. Web Client. A software program used to access web pages. Web Page. A document (normally an HTML file) designed to be distributed over the web. Web Server. A server that delivers web content to web browsers. Web Services. Software components and applications running on web servers. The server provides these services to the other computers, browser or individuals, using standard communication protocols. Web Site. A collection of related web pages belonging to a company or an individual. Worm. A computer virus that can make copies of itself and spread to other computers over the internet.
WWW (World Wide Web). A Global Network of computers using the internet to exchange web documents.

18

ALIBATA Web Browser Berou, Delos Reyes, Somera

Chapter 3 Materials and Methods Materials and methods are important components of any formal studies.This section provides detailed information of procedures that will be used in completing studies. This provided a set of instruction and procedures particularly the interview, questionnaire, observation and evaluation in gathered data and information. This chapter uses analytical tool for showing the process of the system through diagrams and provides system requirements for software and hardware specification.

Research Design Descriptive Method


This method is typically used for describing the different characteristics and capabilities to fully understand the differences within two specific researches or in this case software application. The method describes the existing applications in several essential instruments like gathering of information and requirements to ensure the improvement and to also identify the necessities for the proposed system. It aims to make process more accurate, efficent and fast.

19

ALIBATA Web Browser Berou, Delos Reyes, Somera

Instrumentation It is important for a research to consider the necessary instruments to be used. The success will depend on the accuracy of the information. This study uses the questionnaire, interview, observation and evaluation form in gathering data. Interview An interview is a conversation between two people (the interviewer and the interviewee) where questions are asked by the interviewer to obtain information from the interviewee. Questionnaire A questionnaire is a research instrument consisting of a series

of questions and other prompts for the purpose of gathering information from respondents. Although they are often designed for statistical analysis of the responses, this is not always the case. The questionnaire was invented by Sir Francis Galton. Questionnaires have advantages over some other types of surveys in that they are cheap, do not require as much effort from the questioner as verbal or telephone surveys, and often have standardized answers that make it simple to

20

ALIBATA Web Browser Berou, Delos Reyes, Somera


compile data. However, such standardized answers may frustrate users. Questionnaires are also sharply limited by the fact that respondents must be able to read the questions and respond to them. Thus, for some demographic groups conducting a survey by questionnaire may not be practical. As a type of survey, questionnaires also have many of the same problems relating to question construction and wording that exist in other types of opinion polls. Evaluation It is systematic determination of merit, worth, and significance of something or someone using criteria against a set of standards. An assessment will be conducted after the observation that can now lead to a conclusion and generalization of the study. The proposed system will be measured or evaluated in the criteria the proposed system aims. Observation A process of observing and analyzing gathered data from the interview. This procedure needs a brain storming among the proponents and by this the study can now go to another step of research.

21

ALIBATA Web Browser Berou, Delos Reyes, Somera

Respondents The target respondents will be composed of at least approximately 30 individuals. This is for the purpose of gathering views from advance users with regards to computer literacy. Procedure The proponents provided questionnaires to be accomplished by selected respondents. Interview was conducted to make an observation and assessment about the problems that occurred in a manual system.

Analytical Tools Analytical tools serves as the guidelines in developing the system. Through these tools the proponents are capable of performing the creation of the system in a very organized manner. It shows analytical procedures, processes and presentation of the system components. It contains the definition of the context diagram, data flow diagram ad the flow of the system that proponents used to complete their study. Use Case Diagram. A diagram containing a set of scenarios

that describing an interaction between a user and a system. A use

22

ALIBATA Web Browser Berou, Delos Reyes, Somera


case diagram displays the relationship among actors and use cases. The two main components of a use case diagram are use cases and actors.

Use Case Narrative. Is a table that represents an algorithm or process and use a logical flow of the system in analyzing, designing and managing processes or programs in different fields.

Fishbone Diagram. Ishikawa diagrams (also called fishbone diagrams, cause-and-effect diagrams or Fishikawa) are diagrams that show the causes of a certain event. Common uses of the Ishikawa diagram are product design and quality defect prevention, to identify potential factors causing an overall effect. Each cause or reason for imperfection is a source of variation. Causes are usually grouped into major categories to identify these sources of variation

Activity Diagram. Activity diagrams are graphical representations of workflows of stepwise activities and actions with support for choice, iteration and concurrency. In the Unified Modeling Language, activity diagrams can be used to describe the business and operational step-by-step workflows of components in a system. An activity diagram shows the overall flow of control.

23

ALIBATA Web Browser Berou, Delos Reyes, Somera

Statistical Tools The researchers use this method in order to determine the difference between the other system and the proposed system. Problem No. 1 What is the demographic profile of the respondents in terms of age, gender and computer Literacy? Percentage. This statistical tool was used to describe the profile of the respondents of the study in terms of age, gender and computer literacy. This was solved using formula: f P=. ------N *100

Where: P = Percentage f = frequency, sum, of respondents N = Number of respondents

24

ALIBATA Web Browser Berou, Delos Reyes, Somera

Problem no.2 which was about the significant difference between the manual and the proposed system, the T Test and ranking were used. This was expressed through these formulas:

Where: d bar = mean difference s2 = the sample variance n = sample size t = a student t quantile with n-1 degree of freedom

Ranking This will be used to show the positional importance of the item that was analyzed. Five-Point rating the following is the verbal interpretation of the Likerts 5-point rating scale and its interval to be evaluating the overall responses of the users. Likerts scaling is a bipolar method, measuring either positive or negative response to a statement.

25

ALIBATA Web Browser Berou, Delos Reyes, Somera


Verbal Interpretation Excellent Above Average Average Below Average Poor Weighted Mean 5 4 3 2 1 Interval 4.50 - 5.00 3.50 4.49 2.50 3.49 1.50 2.49 1.00 1.49

Software Development Model Reuse-based Development (Component-based) With the majority of software projects, there are some softwares which are reuse. This usually happens informally when people working on the project know the designs or code which is similar to the required one. Users look for these, modify them as needed and incorporate them into their system. This reuseoriented approach relies on a large base of reusable software components and some integrating framework for these components.

26

ALIBATA Web Browser Berou, Delos Reyes, Somera


Component-based software engineering has the obvious advantage of reducing the amount of software to be developed and so reducing cost and risk. While the initial requirements specification stage and the validation stage are comparable with other processes, the intermediate stages in reuse-oriented process are different. These stages are:
1. Component

Analysis. Given the requirements specification, a

search is made for components to implement that specification. Usually, there is no exact match and the components that may be used only provide some of the functionality required.
2. Requirement Modification. During this stage, the requirements

are analyzed using information about the components that have

been discovered. They are then modified to reflect the available components. Where modifications are impossible, the component analysis activity maybe re-entered to search for alternative solutions.
3. System Design with reuse. During this phase, the framework of

the system is designed or an existing framework is reused. The designers take into account the components that are reused and organize the framework to cater to this. Some new software may have to be designed if reusable components are available.

27

ALIBATA Web Browser Berou, Delos Reyes, Somera


4. Development and Integration. Software that cannot be externally

procured is developed, and the components are integrated to create the new system.

Specifications Software

Operating System Windows XP, Windows 7, Mac OS, and Linux Kernel 2.6.0 and higher.

Hardware Minimum:
28

ALIBATA Web Browser Berou, Delos Reyes, Somera


1.6 GHz processor clock speed or lower 64MB RAM Minimum available Hard disk Space 1gb Dial-Up 56 Kbps Internet Connection. VGA Monitor Keyboard Mouse

Recommended: 2.0 GHz or higher processor clock speed 256MB or more RAM Minimum available Hard disk Space 1gb DSL or Broadband Internet Connection XVGA Monitor Keyboard

29

ALIBATA Web Browser Berou, Delos Reyes, Somera


Mouse

30

ALIBATA Web Browser Berou, Delos Reyes, Somera

Appendix A

31

ALIBATA Web Browser Berou, Delos Reyes, Somera

Appendix B

32

ALIBATA Web Browser Berou, Delos Reyes, Somera

33

You might also like