Filtering, Fusion and Dynamic Information Presentation: Towards a General

advertisement
Filtering, Fusion and
Dynamic Information
Presentation:
Towards a General
Information Firewall
Gregory Conti
College of Computing
Georgia Institute of Technology
United States Military Academy
http://www.sharky.tv/
Denial of
Information Attacks:
Intentional Attacks
that overwhelm the
human or otherwise
alter their decision
making
http://circadianshift.net/images/Virginia_Tech_1920s_NS5423_Y_small.jpg
The Problem of Information Growth
• The surface WWW contains ~170TB (17xLOC)
• IM generates five billion messages a day (750GB),
or 274 terabytes a year.
• Email generates about 400,000 TB/year.
• P2P file exchange on the Internet is growing
rapidly. The largest files exchanged are video files
larger than 100 MB, but the most frequently
exchanged files contain music (MP3 files).
http://www.sims.berkeley.edu/research/projects/how-much-info-2003/
Defense Taxonomy (Big
Picture)
Legal
Federal Can Spam
Legislation (Jan 04)
Lawsuits
New Laws
Regulatory
Government Regulation
Moral
PR Campaign
Microsoft, AOL, Earthlink
and Yahoo file 6 antispam
lawsuits (Mar 04)
California Business and
Professions Code, prohibits
the sending of unsolicited
commercial email
(September 98)
Code of Ethics
First Spam Conference
(Jan 03)
Cultural
Communities
Organizational
Topical counter-DoI groups
Financial
Increasing cost of DoI operations
Violence
Violence against DoI perpetrators
Technology
(see next slide)
http://www.metroactive.com/papers/metro/12.04.03/booher-0349.html
Defense Taxonomy (Big
Picture)
Legal
Federal Can Spam
Legislation (Jan 04)
Lawsuits
New Laws
Regulatory
Government Regulation
Moral
PR Campaign
Microsoft, AOL, Earthlink
and Yahoo file 6 antispam
lawsuits (Mar 04)
California Business and
Professions Code, prohibits
the sending of unsolicited
commercial email
(September 98)
Code of Ethics
First Spam Conference
(Jan 03)
Cultural
Communities
Organizational
Topical counter-DoI groups
Financial
Increasing cost of DoI operations
Violence
Violence against DoI perpetrators
Technology
(see next slide)
http://www.metroactive.com/papers/metro/12.04.03/booher-0349.html
System Model
Consumer
Vision
STM
Cognition
CPU
Hearing
RAM
Speech
LTM
Consumer
Node
Motor
Hard
Drive
Human Consumer
Communication
Channel
Vision
CPU
Producer
Node
RAM
Hearing
STM
Cognition
Speech
Hard
Drive
Motor
Human Producer
LTM
Producer
Consumer
very small text
Vision
STM
CPU
Hearing
Cognition
RAM
Speech
LTM
Consumer
Node
Motor
Hard
Drive
Human Consumer
misleading
advertisements
spoof
browser
Communication
Channel
exploit round off
algorithm
trigger many alerts
Vision
Example
DoI
Attacks
CPU
Producer
Node
RAM
Hearing
STM
Cognition
Speech
Hard
Drive
Motor
Human Producer
LTM
Producer
Consumer
Vision
STM
CPU
Hearing
Cognition
RAM
Example
DoI
Defenses
Speech
LTM
Consumer
Node
Motor
Hard
Drive
Human Consumer
Usable
Security
Communication
Channel
TCP Damping
Eliza Spam Responder
Computational
Puzzle Solving
Vision
CPU
Producer
Node
RAM
Hearing
STM
Cognition
Speech
Hard
Drive
Motor
Human Producer
LTM
Producer
Decompression Bombs
DoI Countermeasures in the
Web Domain
Information Firewall
search for
desired
transform
request
transformed
content
receive
transformed
content
submit
suggested
transform
Content
Producer
Transform
Processing
Engine
publish
content
store and
retrieve transforms
Content Consumer
submit new
or modified
transform
Transform
Database
submit
feedback
on transform
request
original
content
receive
original
content
view original document
Organizational
Web
Server
analyst
views
filter all
but headlines
information
firewall
transform
processing
engine
parser
filtering
rules
engine
filter all
but today’s
weather
fusion
transform
database
data
sources
Demo
For more information…
G. Conti, M. Ahamad and R. Norback;
"Filtering, Fusion and Dynamic Information
Presentation: Towards a General Information
Firewall;" IEEE International Conference on
Intelligence and Security Informatics (IEEEISI); May 2005. for extended version email me…
G. Conti and M. Ahamad; "A Taxonomy and
Framework for Countering Denial of
Information Attacks;" IEEE Security and
Privacy. (to be published)email me…
G. Conti, M. Ahamad and J. Stasko;
"Attacking Information Visualization System
Usability: Overloading and Deceiving the
Human;" Symposium on Usable Privacy and
Security (SOUPS); July 2005. (accepted, to
be published)
For more information…
Rennison, Earl. Galaxy of News: An
Approach to Visualizing and Understanding
Expansive News Landscapes. Proceedings
of the 7th Annual ACM Symposium on
User Interface Software and Technology,
1994, pp. 3 - 12.
M. Ahamad, W. Lee, L. Liu, L. Mark, E.
Omicienski, C. Pu and A. Dos Santos;
“Guarding the Next Internet Frontier:
Countering Denial of Information
Attacks;” Proceedings of the New
Security Paradigms Workshop; pp 136143; September 2002.
Questions?
Greg Conti
conti@cc.gatech.edu
www.cc.gatech.edu/~conti
Image: http://altura.speedera.net/ccimg.catalogcity.com/210000/211700/211780/Products/6203927.jpg
Backup Slides
GreaseMonkey
• http://developers.slashdot.org/article.pl?sid=
05/05/16/0052245&tid=95&tid=154&tid=1
56&tid=1
Total Overhead= (Number of Spam x (Time to Delete + Time to Observe))+(Number of Email X (Time to Decide + Time to Scan))
Overhead
Number of Spam
Orient
Scan
Subject
Line
x Time to Observe
Confirm Deletion
Successful
Overhead
Number of Email
x Time to Scan
No
Observation
Observe
Decide
Not Spam
No Action
Overhead
Number of Spam
x Time to Delete
Delete
Spam
Act
Overhead
Number of Email
x Time to Decide
Download