Filtering,%20Fusion%20and%20Dynamic%20Information%20Presentation:%20Towards%20a%20General%20Information%20Firewall - PowerPoint PPT Presentation

About This Presentation
Title:

Filtering,%20Fusion%20and%20Dynamic%20Information%20Presentation:%20Towards%20a%20General%20Information%20Firewall

Description:

Filtering, Fusion and Dynamic Information Presentation: Towards a General Information Firewall ... Georgia Institute of Technology. United States Military ... – PowerPoint PPT presentation

Number of Views:108
Avg rating:3.0/5.0
Slides: 23
Provided by: rum2
Learn more at: http://www.rumint.org
Category:

less

Transcript and Presenter's Notes

Title: Filtering,%20Fusion%20and%20Dynamic%20Information%20Presentation:%20Towards%20a%20General%20Information%20Firewall


1
Filtering, Fusion and Dynamic Information
Presentation Towards a General Information
Firewall Gregory ContiCollege of
ComputingGeorgia Institute of Technology United
States Military Academy
http//www.sharky.tv/
2
Denial of Information Attacks Intentional
Attacks that overwhelm the human or otherwise
alter their decision making
http//circadianshift.net/images/Virginia_Tech_192
0s_NS5423_Y_small.jpg
3
The Problem of Information Growth
  • The surface WWW contains 170TB (17xLOC)
  • IM generates five billion messages a day (750GB),
    or 274 terabytes a year.
  • Email generates about 400,000 TB/year.
  • P2P file exchange on the Internet is growing
    rapidly. The largest files exchanged are video
    files larger than 100 MB, but the most frequently
    exchanged files contain music (MP3 files).

http//www.sims.berkeley.edu/research/projects/how
-much-info-2003/
4
Defense Taxonomy (Big Picture)
Microsoft, AOL, Earthlink and Yahoo file 6
antispam lawsuits (Mar 04)
Federal Can Spam Legislation (Jan 04)
California Business and Professions Code,
prohibits the sending of unsolicited commercial
email (September 98)
First Spam Conference (Jan 03)
http//www.metroactive.com/papers/metro/12.04.03/b
ooher-0349.html
5
Defense Taxonomy (Big Picture)
Microsoft, AOL, Earthlink and Yahoo file 6
antispam lawsuits (Mar 04)
Federal Can Spam Legislation (Jan 04)
California Business and Professions Code,
prohibits the sending of unsolicited commercial
email (September 98)
First Spam Conference (Jan 03)
http//www.metroactive.com/papers/metro/12.04.03/b
ooher-0349.html
6
System Model
Consumer
Vision
CPU
STM
RAM
Hearing
Cognition
Speech
Consumer Node
Hard Drive
LTM
Motor
Human Consumer
Communication Channel
Vision
STM
CPU
RAM
Hearing
Cognition
Speech
Producer Node
Hard Drive
LTM
Human Producer
Motor
Producer
7
Consumer
very small text
Vision
STM
CPU
RAM
Hearing
Cognition
Speech
Consumer Node
Hard Drive
LTM
Motor
Human Consumer
misleading advertisements
spoof browser
exploit round off algorithm
Communication Channel
trigger many alerts
Vision
STM
CPU
RAM
Example DoI Attacks
Hearing
Cognition
Speech
Producer Node
Hard Drive
LTM
Human Producer
Motor
Producer
8
Consumer
Vision
STM
CPU
RAM
Hearing
Example DoI Defenses
Cognition
Speech
Consumer Node
Hard Drive
LTM
Motor
Human Consumer
Usable Security
Communication Channel
TCP Damping
Eliza Spam Responder
Computational Puzzle Solving
Vision
STM
CPU
RAM
Hearing
Cognition
Speech
Producer Node
Hard Drive
LTM
Human Producer
Motor
Producer
Decompression Bombs
9
DoI Countermeasures in the Web Domain
10
(No Transcript)
11
Information Firewall
Content Producer
Content Consumer
search for desired transform
submit suggested transform
Transform Processing Engine
request transformed content
publish content
store and retrieve transforms
receive transformed content
request original content
submit new or modified transform submit
feedback on transform
Transform Database
Organizational Web Server
receive original content
view original document
12
data sources
informationfirewall
analyst views
transform processing engine
filter all but headlines
parser
filtering
rules engine
filter all but todays weather
fusion
transform database
13
(No Transcript)
14
(No Transcript)
15
Demo
16
For more information
  • G. Conti, M. Ahamad and R. Norback
    "Filtering, Fusion and Dynamic Information
    Presentation Towards a General Information
    Firewall" IEEE International Conference on
    Intelligence and Security Informatics (IEEE-ISI)
    May 2005. for extended version email me
  • G. Conti and M. Ahamad "A Taxonomy and
    Framework for Countering Denial of Information
    Attacks" IEEE Security and Privacy. (to be
    published)email me
  • G. Conti, M. Ahamad and J. Stasko "Attacking
    Information Visualization System Usability
    Overloading and Deceiving the Human" Symposium
    on Usable Privacy and Security (SOUPS) July
    2005. (accepted, to be published)

17
For more information
  • Rennison, Earl. Galaxy of News An Approach
    to Visualizing and Understanding Expansive News
    Landscapes. Proceedings of the 7th Annual ACM
    Symposium on User Interface Software and
    Technology, 1994, pp. 3 - 12.
  • M. Ahamad, W. Lee, L. Liu, L. Mark, E.
    Omicienski, C. Pu and A. Dos Santos Guarding
    the Next Internet Frontier Countering Denial of
    Information Attacks Proceedings of the New
    Security Paradigms Workshop pp 136-143
    September 2002.

18
  • Questions?

Greg Conti conti_at_cc.gatech.edu www.cc.gatech.edu/
conti
Image http//altura.speedera.net/ccimg.catalogcit
y.com/210000/211700/211780/Products/6203927.jpg
19
Backup Slides
20
(No Transcript)
21
GreaseMonkey
  • http//developers.slashdot.org/article.pl?sid05/0
    5/16/0052245tid95tid154tid156tid1

22
Total Overhead (Number of Spam x (Time to Delete
Time to Observe))(Number of Email X (Time to
Decide Time to Scan))
Orient
Overhead Number of Spam x Time to Observe
Scan Subject Line
Overhead Number of Email x Time to Scan
Confirm Deletion Successful
No Observation
Observe
Decide
Not Spam
No Action
Act
Overhead Number of Spam x Time to Delete
Delete
Spam
Overhead Number of Email x Time to Decide
Write a Comment
User Comments (0)
About PowerShow.com