Filtering, Fusion and Dynamic Information Presentation: Towards a General Information Firewall
This presentation is the property of its rightful owner.
Sponsored Links
1 / 22

Filtering, Fusion and Dynamic Information Presentation: Towards a General Information Firewall PowerPoint PPT Presentation


  • 54 Views
  • Uploaded on
  • Presentation posted in: General

Filtering, Fusion and Dynamic Information Presentation: Towards a General Information Firewall Gregory Conti College of Computing Georgia Institute of Technology United States Military Academy. http://www.sharky.tv/. Denial of Information Attacks:

Download Presentation

Filtering, Fusion and Dynamic Information Presentation: Towards a General Information Firewall

An Image/Link below is provided (as is) to download presentation

Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.


- - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - -

Presentation Transcript


Filtering, Fusion and Dynamic Information Presentation: Towards a General Information Firewall

Gregory ContiCollege of ComputingGeorgia Institute of Technology

United States Military Academy

http://www.sharky.tv/


Denial of Information Attacks:

Intentional Attacks that overwhelm the human or otherwise alter their decision making

http://circadianshift.net/images/Virginia_Tech_1920s_NS5423_Y_small.jpg


The Problem of Information Growth

  • The surface WWW contains ~170TB (17xLOC)

  • IM generates five billion messages a day (750GB), or 274 terabytes a year.

  • Email generates about 400,000 TB/year.

  • P2P file exchange on the Internet is growing rapidly. The largest files exchanged are video files larger than 100 MB, but the most frequently exchanged files contain music (MP3 files).

http://www.sims.berkeley.edu/research/projects/how-much-info-2003/


Microsoft, AOL, Earthlink and Yahoo file 6 antispam lawsuits (Mar 04)

Defense Taxonomy (Big Picture)

Federal Can Spam Legislation (Jan 04)

California Business and Professions Code, prohibits the sending of unsolicited commercial email

(September 98)

First Spam Conference (Jan 03)

http://www.metroactive.com/papers/metro/12.04.03/booher-0349.html


Microsoft, AOL, Earthlink and Yahoo file 6 antispam lawsuits (Mar 04)

Defense Taxonomy (Big Picture)

Federal Can Spam Legislation (Jan 04)

California Business and Professions Code, prohibits the sending of unsolicited commercial email

(September 98)

First Spam Conference (Jan 03)

http://www.metroactive.com/papers/metro/12.04.03/booher-0349.html


System Model

Consumer

Vision

STM

CPU

RAM

Hearing

Cognition

Speech

Consumer

Node

Hard

Drive

LTM

Motor

Human Consumer

Communication

Channel

Vision

STM

CPU

RAM

Hearing

Cognition

Speech

Producer

Node

Hard

Drive

LTM

Human Producer

Motor

Producer


Consumer

very small text

Vision

STM

CPU

RAM

Hearing

Cognition

Speech

Consumer

Node

Hard

Drive

LTM

Motor

Human Consumer

misleading

advertisements

spoof browser

exploit round off

algorithm

Communication

Channel

trigger many alerts

Vision

STM

CPU

RAM

Example

DoI

Attacks

Hearing

Cognition

Speech

Producer

Node

Hard

Drive

LTM

Human Producer

Motor

Producer


Consumer

Vision

STM

CPU

RAM

Hearing

Example

DoI

Defenses

Cognition

Speech

Consumer

Node

Hard

Drive

LTM

Motor

Human Consumer

Usable

Security

TCP Damping

Communication

Channel

Eliza Spam Responder

Computational

Puzzle Solving

Vision

STM

CPU

RAM

Hearing

Cognition

Speech

Producer

Node

Hard

Drive

LTM

Human Producer

Motor

Producer

Decompression Bombs


DoI Countermeasures in the Web Domain


Information Firewall

Content Consumer

Content

Producer

search for

desired

transform

submit

suggested

transform

Transform Processing Engine

request transformed

content

publish

content

store and

retrieve transforms

receive

transformed

content

request

original

content

submit new or modified

transform

submit

feedback

on transform

Transform

Database

Organizational

Web

Server

receive

original

content

view original document


analyst views

informationfirewall

data sources

transform processing engine

filter all but headlines

parser

filtering

rules engine

filter all

but today’s weather

fusion

transform

database


Demo


For more information…

G. Conti, M. Ahamad and R. Norback; "Filtering, Fusion and Dynamic Information Presentation: Towards a General Information Firewall;" IEEE International Conference on Intelligence and Security Informatics (IEEE-ISI); May 2005. for extended version email me…

G. Conti and M. Ahamad; "A Taxonomy and Framework for Countering Denial of Information Attacks;" IEEE Security and Privacy. (to be published)email me…

G. Conti, M. Ahamad and J. Stasko; "Attacking Information Visualization System Usability: Overloading and Deceiving the Human;" Symposium on Usable Privacy and Security (SOUPS); July 2005. (accepted, to be published)


For more information…

Rennison, Earl. Galaxy of News: An Approach to Visualizing and Understanding Expansive News Landscapes. Proceedings of the 7th Annual ACM Symposium on User Interface Software and Technology, 1994, pp. 3 - 12.

M. Ahamad, W. Lee, L. Liu, L. Mark, E. Omicienski, C. Pu and A. Dos Santos; “Guarding the Next Internet Frontier: Countering Denial of Information Attacks;” Proceedings of the New Security Paradigms Workshop; pp 136-143; September 2002.


Questions?

Greg Conti

[email protected]

www.cc.gatech.edu/~conti

Image: http://altura.speedera.net/ccimg.catalogcity.com/210000/211700/211780/Products/6203927.jpg


Backup Slides


GreaseMonkey

  • http://developers.slashdot.org/article.pl?sid=05/05/16/0052245&tid=95&tid=154&tid=156&tid=1


Total Overhead= (Number of Spam x (Time to Delete + Time to Observe))+(Number of Email X (Time to Decide + Time to Scan))

Orient

Overhead

Number of Spam

x Time to Observe

Scan

Subject

Line

Overhead

Number of Email

x Time to Scan

Confirm Deletion

Successful

No

Observation

Observe

Decide

Not Spam

No Action

Act

Overhead

Number of Spam

x Time to Delete

Delete

Spam

Overhead

Number of Email

x Time to Decide


  • Login