Title: Filtering,%20Fusion%20and%20Dynamic%20Information%20Presentation:%20Towards%20a%20General%20Information%20Firewall
1Filtering, Fusion and Dynamic Information
Presentation Towards a General Information
Firewall Gregory ContiCollege of
ComputingGeorgia Institute of Technology United
States Military Academy
http//www.sharky.tv/
2Denial of Information Attacks Intentional
Attacks that overwhelm the human or otherwise
alter their decision making
http//circadianshift.net/images/Virginia_Tech_192
0s_NS5423_Y_small.jpg
3The Problem of Information Growth
- The surface WWW contains 170TB (17xLOC)
- IM generates five billion messages a day (750GB),
or 274 terabytes a year. - Email generates about 400,000 TB/year.
- P2P file exchange on the Internet is growing
rapidly. The largest files exchanged are video
files larger than 100 MB, but the most frequently
exchanged files contain music (MP3 files). -
http//www.sims.berkeley.edu/research/projects/how
-much-info-2003/
4Defense Taxonomy (Big Picture)
Microsoft, AOL, Earthlink and Yahoo file 6
antispam lawsuits (Mar 04)
Federal Can Spam Legislation (Jan 04)
California Business and Professions Code,
prohibits the sending of unsolicited commercial
email (September 98)
First Spam Conference (Jan 03)
http//www.metroactive.com/papers/metro/12.04.03/b
ooher-0349.html
5Defense Taxonomy (Big Picture)
Microsoft, AOL, Earthlink and Yahoo file 6
antispam lawsuits (Mar 04)
Federal Can Spam Legislation (Jan 04)
California Business and Professions Code,
prohibits the sending of unsolicited commercial
email (September 98)
First Spam Conference (Jan 03)
http//www.metroactive.com/papers/metro/12.04.03/b
ooher-0349.html
6System Model
Consumer
Vision
CPU
STM
RAM
Hearing
Cognition
Speech
Consumer Node
Hard Drive
LTM
Motor
Human Consumer
Communication Channel
Vision
STM
CPU
RAM
Hearing
Cognition
Speech
Producer Node
Hard Drive
LTM
Human Producer
Motor
Producer
7Consumer
very small text
Vision
STM
CPU
RAM
Hearing
Cognition
Speech
Consumer Node
Hard Drive
LTM
Motor
Human Consumer
misleading advertisements
spoof browser
exploit round off algorithm
Communication Channel
trigger many alerts
Vision
STM
CPU
RAM
Example DoI Attacks
Hearing
Cognition
Speech
Producer Node
Hard Drive
LTM
Human Producer
Motor
Producer
8Consumer
Vision
STM
CPU
RAM
Hearing
Example DoI Defenses
Cognition
Speech
Consumer Node
Hard Drive
LTM
Motor
Human Consumer
Usable Security
Communication Channel
TCP Damping
Eliza Spam Responder
Computational Puzzle Solving
Vision
STM
CPU
RAM
Hearing
Cognition
Speech
Producer Node
Hard Drive
LTM
Human Producer
Motor
Producer
Decompression Bombs
9DoI Countermeasures in the Web Domain
10(No Transcript)
11Information Firewall
Content Producer
Content Consumer
search for desired transform
submit suggested transform
Transform Processing Engine
request transformed content
publish content
store and retrieve transforms
receive transformed content
request original content
submit new or modified transform submit
feedback on transform
Transform Database
Organizational Web Server
receive original content
view original document
12data sources
informationfirewall
analyst views
transform processing engine
filter all but headlines
parser
filtering
rules engine
filter all but todays weather
fusion
transform database
13(No Transcript)
14(No Transcript)
15Demo
16For more information
- G. Conti, M. Ahamad and R. Norback
"Filtering, Fusion and Dynamic Information
Presentation Towards a General Information
Firewall" IEEE International Conference on
Intelligence and Security Informatics (IEEE-ISI)
May 2005. for extended version email me - G. Conti and M. Ahamad "A Taxonomy and
Framework for Countering Denial of Information
Attacks" IEEE Security and Privacy. (to be
published)email me - G. Conti, M. Ahamad and J. Stasko "Attacking
Information Visualization System Usability
Overloading and Deceiving the Human" Symposium
on Usable Privacy and Security (SOUPS) July
2005. (accepted, to be published)
17For more information
- Rennison, Earl. Galaxy of News An Approach
to Visualizing and Understanding Expansive News
Landscapes. Proceedings of the 7th Annual ACM
Symposium on User Interface Software and
Technology, 1994, pp. 3 - 12. - M. Ahamad, W. Lee, L. Liu, L. Mark, E.
Omicienski, C. Pu and A. Dos Santos Guarding
the Next Internet Frontier Countering Denial of
Information Attacks Proceedings of the New
Security Paradigms Workshop pp 136-143
September 2002.
18Greg Conti conti_at_cc.gatech.edu www.cc.gatech.edu/
conti
Image http//altura.speedera.net/ccimg.catalogcit
y.com/210000/211700/211780/Products/6203927.jpg
19Backup Slides
20(No Transcript)
21GreaseMonkey
- http//developers.slashdot.org/article.pl?sid05/0
5/16/0052245tid95tid154tid156tid1
22Total Overhead (Number of Spam x (Time to Delete
Time to Observe))(Number of Email X (Time to
Decide Time to Scan))
Orient
Overhead Number of Spam x Time to Observe
Scan Subject Line
Overhead Number of Email x Time to Scan
Confirm Deletion Successful
No Observation
Observe
Decide
Not Spam
No Action
Act
Overhead Number of Spam x Time to Delete
Delete
Spam
Overhead Number of Email x Time to Decide