Filtering, Fusion and Dynamic Information Presentation: Towards a General Information Firewall Gregory Conti College of Computing Georgia Institute of.

Slides:



Advertisements
Similar presentations
Introduction to Computers Lecture By K. Ezirim. What is a Computer? An electronic device –Desktops, Notebooks, Mobile Devices, Calculators etc. Require.
Advertisements

Embedded Web Hyung-min Koo. 2 Table of Contents Introduction of Embedded Web Introduction of Embedded Web Advantages of Embedded Web Advantages of Embedded.
Client/Server Computing Model of computing in which very powerful personal computers (clients) are connected in a network with one or more server computers.
Search Engines and Information Retrieval
1 Network Security Derived from original slides by Henric Johnson Blekinge Institute of Technology, Sweden From the book by William Stallings.
Information Retrieval in Practice
Security Awareness: Applying Practical Security in Your World, Second Edition Chapter 3 Internet Security.
Mobile Code and Worms By Mitun Sinha Pandurang Kamat 04/16/2003.
Hardware and Software Basics. Computer Hardware  Central Processing Unit - also called “The Chip”, a CPU, a processor, or a microprocessor  Memory (RAM)
Feeds Computer Applications to Medicine NSF REU at University of Virginia July 27, 2006 Paul Lee.
Internet Basics مهندس / محمد العنزي
Lesson 46: Using Information From the Web copy and paste information from a Web site print a Web page download information from a Web site customize Web.
Practical PC, 7 th Edition Chapter 9: Sending and Attachments.
How Companies Fight Spamming by Sonya Tormaschy & Marc Eggert E-Commerce: Tuesday & Thursdays; 1:30 – 2:45.
Computers, The Internet & The Web Jacie Yang Texas State University.
Lecturer: Ghadah Aldehim
Objectives Overview Discuss the evolution of the Internet
The Internet. The World’s largest computer network A world wide collection of networks that connects millions of businesses, government agencies, educational.
© 2006 Consumer Jungle Minimizing Online Risks. © 2006 Consumer Jungle 15 Steps to Minimizing Online Risks 1.Update your operating system 2.Use a firewall.
Networks and Security. Types of Attacks/Security Issues  Malware  Viruses  Worms  Trojan Horse  Rootkit  Phishing  Spyware  Denial of Service.
Unit 9 Communication Services
Computers Are Your Future Tenth Edition Chapter 2: The Internet & the World Wide Web Copyright © 2009 Pearson Education, Inc. Publishing as Prentice Hall1.
Countering Denial of Information Attacks Gregory Conti Original Photos: National Geographic, Photoshopper: Unknown.
Search Engines and Information Retrieval Chapter 1.
Information Security and YOU!. Information Assurance Outreach Information Security Online Security Remote Access with Demonstration The Cloud Social.
Unit 10 Communication Services.  Identify types of electronic communication  Describe users of electronic communication  Identify major components.
1 Chapter 2 (Continued) Section 2.2 Section 2.2. Internet Service Provider (ISP) ISP - a company that connects you through your communications line to.
Internet Information ISYS 105B. What is the Internet? Comprised of network of computers Started in 1969 by U.S. Defense Dept.
Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Technology Education Copyright © 2006 by The McGraw-Hill Companies,
Dr. Omar Al Jadaan The Internet. Internet Service Provider (ISP) Content Providers: create and maintained material that can be accessed using the internet.
Discovering Computers 2010 Chapter 2 The Internet and World Wide Web.
Chapter 11 Computers and Society, Security, Privacy, and Ethics.
Introduction to Engineering and Technology Concepts Unit Five Chapter Five – Computer and Internet Connections.
1 INTERNET AND WORLD WIDE WEB TECHNOLOGIES BUS Abdou Illia, Spring 2007 (Week 11, Thursday 3/22/2007)
The Internet and World Wide Web By: Shilpa Phanse 10/8/2008.
Introduction to Computers
November 2003 Presented to “Commercializing RDF” Semantic Software Solutions for Enterprise Web Management International World Wide Web Conference 2004.
Objectives Overview Discuss the evolution of the Internet Briefly describe various broadband Internet connections Describe the purpose of an IP address.
Introduction To Internet
Microsoft Internet Explorer and the Internet Using Microsoft Explorer 5.
Privacy & Security Online Ivy, Kris & Neil Privacy Threat - Ivy Is Big Brother Watching You? - Kris Identity Theft - Kris Medical Privacy - Neil Children’s.
Chapter 17 Direct and Online Marketing: Building Direct Customer Relationships.
Unit 10 Communication Services
Building Tomorrow’s Corporate Portal David C. Hastings Director, Solutions Management
Denial of Service (DoS) DoS attacks are aggressive attacks on an individual computer or groups of computers with the intent to deny services to intended.
Countering Denial of Information Attacks with Network Visualization Gregory Conti
Internet Fundamentals Presented by the Tech Team.
Digital Literacy Lesson 3. The Role of Memory A computer stores data in the memory when a task is performed. Data is stored in the form of 0s and 1s.
1 CS 502: Computing Methods for Digital Libraries Lecture 19 Interoperability Z39.50.
Copyright © Terry Felke-Morris WEB DEVELOPMENT & DESIGN FOUNDATIONS WITH HTML5 7 TH EDITION Chapter 1 Key Concepts 1.
Chapter 9 Sending and Attachments. 2Practical PC 5 th Edition Chapter 9 Getting Started In this Chapter, you will learn: − How works − How.
Operating Systems Foundation Computing Half the people you know are below average.
Introduction to Information Technology Applications.
CHAPTER 7 THE INTERNET AND INTRANETS 1/11. What is the Internet? 2/11 Large computer network ARPANET (Dept of Defense) It is international and growing.
Jeff Reintjes, Kevin Hao, Carinne Rawlins. Background 1975 in Redmond, WA 3 rd most successful start-up company ever Founded by Bill Gates and Paul Allen.
  is a system of electronic communication that allows the user to exchange messages over the internet  Everyone’s address is unique  Two.
Web Server.
Internet Applications (Cont’d) Basic Internet Applications – World Wide Web (WWW) Browser Architecture Static Documents Dynamic Documents Active Documents.
The Internet  Define the internet  Discuss advantages of the internet  List requirement needed to access the internet.
What is the Internet? 11/27/07. Where did the Internet start?  Networked computers started by Military  ARPANET – 1969 experiment by the Defense department.
Chapter 9 Sending and Attachments. Sending and Attachments FAQs: – How does work? – How do I use local ? – How do I use Web-based.
The Internet What is the Internet? The Internet is a lot of computers over the whole world connected together so that they can share information. It.
Secure Services Shared Hosted MS Exchange 2010.
Server Implementation. NETGATE 2 Netgate2 Spam Firewall and Server deliver the most robust, effective and easy to manage security available.
The Internet and the WWW IT-IDT-5.1. History of the Internet How did the Internet originate? Goal: To function if part of network were disabled Became.
Fourth Grade Home Directory/H-Drive The location on the server where individual users can save their work. This directory is named the same as the username.
Using Using Computers Safely, Effectively and Responsibly.
How Much Do You Know About the Internet?. What is the Internet? The Internet is the world’s largest computer network, connecting more than 4 million computers.
Web Application.
Unit# 5: Internet and Worldwide Web
Presentation transcript:

Filtering, Fusion and Dynamic Information Presentation: Towards a General Information Firewall Gregory Conti College of Computing Georgia Institute of Technology United States Military Academy

Denial of Information Attacks: Intentional Attacks that overwhelm the human or otherwise alter their decision making

The Problem of Information Growth The surface WWW contains ~170TB (17xLOC) IM generates five billion messages a day (750GB), or 274 terabytes a year. generates about 400,000 TB/year. P2P file exchange on the Internet is growing rapidly. The largest files exchanged are video files larger than 100 MB, but the most frequently exchanged files contain music (MP3 files).

Defense Taxonomy (Big Picture) Microsoft, AOL, Earthlink and Yahoo file 6 antispam lawsuits (Mar 04) Federal Can Spam Legislation (Jan 04) California Business and Professions Code, prohibits the sending of unsolicited commercial (September 98) First Spam Conference (Jan 03)

Defense Taxonomy (Big Picture) Microsoft, AOL, Earthlink and Yahoo file 6 antispam lawsuits (Mar 04) Federal Can Spam Legislation (Jan 04) California Business and Professions Code, prohibits the sending of unsolicited commercial (September 98) First Spam Conference (Jan 03)

Human Consumer Human Producer Communication Channel Consumer Node RAM Hard Drive CPU Producer Node STM LTM Cognition Consumer Producer RAM Hard Drive CPU STM LTM Cognition Vision Hearing Speech Motor Vision Hearing Speech Motor System Model

Human Consumer Human Producer Communication Channel Consumer Node RAM Hard Drive CPU Producer Node STM LTM Cognition Consumer Producer RAM Hard Drive CPU STM LTM Cognition Vision Hearing Speech Motor Vision Hearing Speech Motor very small text exploit round off algorithm trigger many alerts Example DoI Attacks misleading advertisements spoof browser

Human Consumer Human Producer Communication Channel Consumer Node RAM Hard Drive CPU Producer Node STM LTM Cognition Consumer Producer RAM Hard Drive CPU STM LTM Cognition Vision Hearing Speech Motor Vision Hearing Speech Motor TCP Damping Usable Security Eliza Spam Responder Decompression Bombs Example DoI Defenses Computational Puzzle Solving

DoI Countermeasures in the Web Domain

Transform Database Content Producer Transform Processing Engine Organizational Web Server view original document Information Firewall publish content submit suggested transform store and retrieve transforms Content Consumer receive original content submit new or modified transform submit feedback on transform search for desired transform request transformed content receive transformed content request original content

parser data sources information firewall filtering fusion filter all but headlines rules engine transform database analyst views filter all but today’s weather transform processing engine

Demo

For more information… G. Conti, M. Ahamad and R. Norback; "Filtering, Fusion and Dynamic Information Presentation: Towards a General Information Firewall;" IEEE International Conference on Intelligence and Security Informatics (IEEE-ISI); May for extended version me… G. Conti and M. Ahamad; "A Taxonomy and Framework for Countering Denial of Information Attacks;" IEEE Security and Privacy. (to be published) me… G. Conti, M. Ahamad and J. Stasko; "Attacking Information Visualization System Usability: Overloading and Deceiving the Human;" Symposium on Usable Privacy and Security (SOUPS); July (accepted, to be published)

For more information… Rennison, Earl. Galaxy of News: An Approach to Visualizing and Understanding Expansive News Landscapes. Proceedings of the 7th Annual ACM Symposium on User Interface Software and Technology, 1994, pp M. Ahamad, W. Lee, L. Liu, L. Mark, E. Omicienski, C. Pu and A. Dos Santos; “Guarding the Next Internet Frontier: Countering Denial of Information Attacks;” Proceedings of the New Security Paradigms Workshop; pp ; September 2002.

Questions? Image: Greg Conti

Backup Slides

GreaseMonkey 05/05/16/ &tid=95&tid=154&tid=1 56&tid=1

Orient Observe Act Decide Scan Subject Line Spam Delete Confirm Deletion Successful Not Spam No Observation No Action Overhead Number of x Time to Decide Overhead Number of Spam x Time to Delete Overhead Number of Spam x Time to Observe Total Overhead = (Number of Spam x (Time to Delete + Time to Observe))+(Number of X (Time to Decide + Time to Scan)) Overhead Number of x Time to Scan