1 / 22

Filtering, Fusion and Dynamic Information Presentation: Towards a General Information Firewall

Filtering, Fusion and Dynamic Information Presentation: Towards a General Information Firewall Gregory Conti College of Computing Georgia Institute of Technology United States Military Academy. http://www.sharky.tv/. Denial of Information Attacks:

misha
Download Presentation

Filtering, Fusion and Dynamic Information Presentation: Towards a General Information Firewall

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Filtering, Fusion and Dynamic Information Presentation: Towards a General Information Firewall Gregory ContiCollege of ComputingGeorgia Institute of Technology United States Military Academy http://www.sharky.tv/

  2. Denial of Information Attacks: Intentional Attacks that overwhelm the human or otherwise alter their decision making http://circadianshift.net/images/Virginia_Tech_1920s_NS5423_Y_small.jpg

  3. The Problem of Information Growth • The surface WWW contains ~170TB (17xLOC) • IM generates five billion messages a day (750GB), or 274 terabytes a year. • Email generates about 400,000 TB/year. • P2P file exchange on the Internet is growing rapidly. The largest files exchanged are video files larger than 100 MB, but the most frequently exchanged files contain music (MP3 files). http://www.sims.berkeley.edu/research/projects/how-much-info-2003/

  4. Microsoft, AOL, Earthlink and Yahoo file 6 antispam lawsuits (Mar 04) Defense Taxonomy (Big Picture) Federal Can Spam Legislation (Jan 04) California Business and Professions Code, prohibits the sending of unsolicited commercial email (September 98) First Spam Conference (Jan 03) http://www.metroactive.com/papers/metro/12.04.03/booher-0349.html

  5. Microsoft, AOL, Earthlink and Yahoo file 6 antispam lawsuits (Mar 04) Defense Taxonomy (Big Picture) Federal Can Spam Legislation (Jan 04) California Business and Professions Code, prohibits the sending of unsolicited commercial email (September 98) First Spam Conference (Jan 03) http://www.metroactive.com/papers/metro/12.04.03/booher-0349.html

  6. System Model Consumer Vision STM CPU RAM Hearing Cognition Speech Consumer Node Hard Drive LTM Motor Human Consumer Communication Channel Vision STM CPU RAM Hearing Cognition Speech Producer Node Hard Drive LTM Human Producer Motor Producer

  7. Consumer very small text Vision STM CPU RAM Hearing Cognition Speech Consumer Node Hard Drive LTM Motor Human Consumer misleading advertisements spoof browser exploit round off algorithm Communication Channel trigger many alerts Vision STM CPU RAM Example DoI Attacks Hearing Cognition Speech Producer Node Hard Drive LTM Human Producer Motor Producer

  8. Consumer Vision STM CPU RAM Hearing Example DoI Defenses Cognition Speech Consumer Node Hard Drive LTM Motor Human Consumer Usable Security TCP Damping Communication Channel Eliza Spam Responder Computational Puzzle Solving Vision STM CPU RAM Hearing Cognition Speech Producer Node Hard Drive LTM Human Producer Motor Producer Decompression Bombs

  9. DoI Countermeasures in the Web Domain

  10. Information Firewall Content Consumer Content Producer search for desired transform submit suggested transform Transform Processing Engine request transformed content publish content store and retrieve transforms receive transformed content request original content submit new or modified transform submit feedback on transform Transform Database Organizational Web Server receive original content view original document

  11. analyst views informationfirewall data sources transform processing engine filter all but headlines parser filtering rules engine filter all but today’s weather fusion transform database

  12. Demo

  13. For more information… G. Conti, M. Ahamad and R. Norback; "Filtering, Fusion and Dynamic Information Presentation: Towards a General Information Firewall;" IEEE International Conference on Intelligence and Security Informatics (IEEE-ISI); May 2005. for extended version email me… G. Conti and M. Ahamad; "A Taxonomy and Framework for Countering Denial of Information Attacks;" IEEE Security and Privacy. (to be published)email me… G. Conti, M. Ahamad and J. Stasko; "Attacking Information Visualization System Usability: Overloading and Deceiving the Human;" Symposium on Usable Privacy and Security (SOUPS); July 2005. (accepted, to be published)

  14. For more information… Rennison, Earl. Galaxy of News: An Approach to Visualizing and Understanding Expansive News Landscapes. Proceedings of the 7th Annual ACM Symposium on User Interface Software and Technology, 1994, pp. 3 - 12. M. Ahamad, W. Lee, L. Liu, L. Mark, E. Omicienski, C. Pu and A. Dos Santos; “Guarding the Next Internet Frontier: Countering Denial of Information Attacks;” Proceedings of the New Security Paradigms Workshop; pp 136-143; September 2002.

  15. Questions? Greg Conti conti@cc.gatech.edu www.cc.gatech.edu/~conti Image: http://altura.speedera.net/ccimg.catalogcity.com/210000/211700/211780/Products/6203927.jpg

  16. Backup Slides

  17. GreaseMonkey • http://developers.slashdot.org/article.pl?sid=05/05/16/0052245&tid=95&tid=154&tid=156&tid=1

  18. Total Overhead= (Number of Spam x (Time to Delete + Time to Observe))+(Number of Email X (Time to Decide + Time to Scan)) Orient Overhead Number of Spam x Time to Observe Scan Subject Line Overhead Number of Email x Time to Scan Confirm Deletion Successful No Observation Observe Decide Not Spam No Action Act Overhead Number of Spam x Time to Delete Delete Spam Overhead Number of Email x Time to Decide

More Related