Download presentation
Presentation is loading. Please wait.
Published byDenis Norman Modified over 9 years ago
1
Countering Denial of Information Attacks Gregory Conti www.cc.gatech.edu/~conti conti@acm.org Original Photos: National Geographic, Photoshopper: Unknown
2
Disclaimer The views expressed in this presentation are those of the author and do not reflect the official policy or position of the United States Military Academy, the Department of the Army, the Department of Defense or the U.S. Government. image: http://www.leavenworth.army.mil/usdb/standard%20products/vtdefault.htm
3
Denial of Information Attacks: Intentional Attacks that overwhelm the human or otherwise alter their decision making http://www.consumptive.org/sasquatch/hoax.html
4
http://www.colinfahey2.com/spam_topics/spam_typical_inbox.jpg
5
http://blogs.msdn.com/michkap/archive/2005/05/07/415335.aspx
6
The Problem of Information Growth The surface WWW contains ~170TB (17xLOC) IM generates five billion messages a day (750GB), or 274 terabytes a year. Email generates about 400,000 TB/year. P2P file exchange on the Internet is growing rapidly. The largest files exchanged are video files larger than 100 MB, but the most frequently exchanged files contain music (MP3 files). http://www.sims.berkeley.edu/research/projects/how-much-info-2003/
8
Source: http://www.advantage.msn.it/images/gallery/popup.gif
9
In the end, all the power of the IDS is ultimately controlled by a single judgment call on whether or not to take action. - from Hack Proofing Your Network
10
DoI Attack Scenarios ScenarioSignal (s)Noise (n)s/nImpact #1HighLowVery GoodGood to excellent ability to find information #2Low ParityMarginal to good ability to find information #3LowHighBadDoI #4Very High ParityDoI, processing, I/O or storage capability exceeded (aka DoS)
11
DoI Attack Scenarios ScenarioSignal (s)Noise (n)s/nImpact #1HighLowVery GoodGood to excellent ability to find information #2Low ParityMarginal to good ability to find information #3LowHighBadDoI #4Very High ParityDoI, processing, I/O or storage capability exceeded (aka DoS)
12
DoI Attack Scenarios ScenarioSignal (s)Noise (n)s/nImpact #1HighLowVery GoodGood to excellent ability to find information #2Low ParityMarginal to good ability to find information #3LowHighBadDoI #4Very High ParityDoI, processing, I/O or storage capability exceeded (aka DoS)
13
DoI Attack Scenarios ScenarioSignal (s)Noise (n)s/nImpact #1HighLowVery GoodGood to excellent ability to find information #2Low ParityMarginal to good ability to find information #3LowHighBadDoI #4Very High ParityDoI, processing, I/O or storage capability exceeded (aka DoS)
16
observe http://www.mindsim.com/MindSim/Corporate/OODA.html
17
orient observe http://www.mindsim.com/MindSim/Corporate/OODA.html
18
orient decideobserve http://www.mindsim.com/MindSim/Corporate/OODA.html
19
orient decide act observe http://www.mindsim.com/MindSim/Corporate/OODA.html
22
Defense Taxonomy (Big Picture) Microsoft, AOL, Earthlink and Yahoo file 6 antispam lawsuits (Mar 04) Federal Can Spam Legislation (Jan 04) California Business and Professions Code, prohibits the sending of unsolicited commercial email (September 98) http://www.metroactive.com/papers/metro/12.04.03/booher-0349.html First Spam Conference (Jan 03)
23
Defense Taxonomy (Big Picture) Microsoft, AOL, Earthlink and Yahoo file 6 antispam lawsuits (Mar 04) Federal Can Spam Legislation (Jan 04) California Business and Professions Code, prohibits the sending of unsolicited commercial email (September 98) http://www.metroactive.com/papers/metro/12.04.03/booher-0349.html First Spam Conference (Jan 03)
24
Human Consumer Human Producer Communication Channel Consumer Node RAM Hard Drive CPU Producer Node STM LTM Cognition Consumer Producer RAM Hard Drive CPU STM LTM Cognition Vision Hearing Speech Motor Vision Hearing Speech Motor System Model
25
Human Consumer Human Producer Communication Channel Consumer Node RAM Hard Drive CPU Producer Node STM LTM Cognition Consumer Producer RAM Hard Drive CPU STM LTM Cognition Vision Hearing Speech Motor Vision Hearing Speech Motor System Model
26
Human Consumer Human Producer Communication Channel Consumer Node RAM Hard Drive CPU Producer Node STM LTM Cognition Consumer Producer RAM Hard Drive CPU STM LTM Cognition Vision Hearing Speech Motor Vision Hearing Speech Motor System Model
27
Human Consumer Human Producer Communication Channel Consumer Node RAM Hard Drive CPU Producer Node STM LTM Cognition Consumer Producer RAM Hard Drive CPU STM LTM Cognition Vision Hearing Speech Motor Vision Hearing Speech Motor System Model
28
Human Consumer Human Producer Communication Channel Consumer Node RAM Hard Drive CPU Producer Node STM LTM Cognition Consumer Producer RAM Hard Drive CPU STM LTM Cognition Vision Hearing Speech Motor Vision Hearing Speech Motor System Model
29
Human Consumer Human Producer Communication Channel Consumer Node RAM Hard Drive CPU Producer Node STM LTM Cognition Consumer Producer RAM Hard Drive CPU STM LTM Cognition Vision Hearing Speech Motor Vision Hearing Speech Motor System Model
30
Human Consumer Human Producer Communication Channel Consumer Node RAM Hard Drive CPU Producer Node STM LTM Cognition Consumer Producer RAM Hard Drive CPU STM LTM Cognition Vision Hearing Speech Motor Vision Hearing Speech Motor very small text exploit round off algorithm trigger many alerts Example DoI Attacks misleading advertisements spoof browser
31
Human Consumer Human Producer Communication Channel Consumer Node RAM Hard Drive CPU Producer Node STM LTM Cognition Consumer Producer RAM Hard Drive CPU STM LTM Cognition Vision Hearing Speech Motor Vision Hearing Speech Motor TCP Damping Usable Security Eliza Spam Responder Decompression Bombs Example DoI Defenses Computational Puzzle Solving
32
from Slashdot… I have a little PHP script that I use whenever I get a phishing email. The script generates fake credit card numbers, expiration dates, etc. and repeatedly hits the phishing site's form dumping in random info. Any halfway intelligent phisher would record the IP address of each submission and just dump all of mine when he saw there were bogus, but it makes me feel good that I at least wasted some of his time ;) http://yro.slashdot.org/ comments.pl?sid=150848&cid=12651434
33
For more information… G. Conti and M. Ahamad; "A Taxonomy and Framework for Countering Denial of Information Attacks;" IEEE Security and Privacy. (to be published) email me…
34
DoI Countermeasures in the Network Security Domain
35
information visualization is the use of interactive, sensory representations, typically visual, of abstract data to reinforce cognition. http://en.wikipedia.org/wiki/Information_visualization
36
rumint security PVR
38
Last year at DEFCON First question… How do we attack it?
39
Malicious Visualizations…
40
Objectives Understand how information visualization system attacks occur. Design systems to protect your users and your infrastructure. There attacks are entirely different…
41
Basic Notion A malicious entity can attack humans through information visualization systems by: –Inserting relatively small amounts of malicious data into dataset (not DOS) –Altering timing of data Note that we do not assume any alteration or modification of data, such as that provided from legitimate sources or stored in databases.
42
Attack Domains… Network traffic Usenet Blogs Web Forms syslog Web logs Air Traffic Control
43
Human Consumer Human Producer Communication Channel Consumer Node RAM Hard Drive CPU Producer Node STM LTM Cognition Consumer Producer RAM Hard Drive CPU STM LTM Cognition Vision Hearing Speech Motor Vision Hearing Speech Motor Data Generation Vector Data Insertion Attack
44
Human Consumer Human Producer Communication Channel Consumer Node RAM Hard Drive CPU Producer Node STM LTM Cognition Consumer Producer RAM Hard Drive CPU STM LTM Cognition Vision Hearing Speech Motor Vision Hearing Speech Motor Timing Vector Timing Attack
45
Attack Manifestations
46
Human Consumer Human Producer Communication Channel Consumer Node RAM Hard Drive CPU Producer Node STM LTM Cognition Consumer Producer RAM Hard Drive CPU STM LTM Cognition Vision Hearing Speech Motor Vision Hearing Speech Motor Targets (User’s Computer)
47
Labeling Attack (algorithm) 100 elements X = 1..100 Y = rand() x 10
48
CDX 2003 Dataset X = Time Y = Destination IP Z = Destination Port Labeling Attack (algorithm)
49
AutoScale Attack/Force User to Zoom (algorithm)
50
Autoscale http://www.neti.gatech.edu/
51
Precision Attack (algorithm) http://developers.slashdot.org/article.pl?sid=04/06/01/1747223&mode=thread&tid=126&tid=172 http://www.nersc.gov/nusers/security/Cube.jpg
52
Occlusion (visualization design)
53
Jamming (visualization design)
54
Countermeasures Authenticate users Assume an intelligent and well informed adversary Design system with malicious data in mind Assume your tool (and source) are in the hands of an attacker Train users to be alert for manipulation Validate data Assume your infrastructure will be attacked In worst case, assume your attacker has knowledge about specific users Design visualizations/vis systems that are resistant to attack If you can’t defeat attack, at least facilitate detection Use intelligent defaults Provide adequate customization
55
For more information… G. Conti, M. Ahamad and J. Stasko; "Attacking Information Visualization System Usability: Overloading and Deceiving the Human;" Symposium on Usable Privacy and Security (SOUPS); July 2005. See also www.rumint.org for the tool. on the con CD…
56
Other Sources of Information… Guarding the Next Internet Frontier: Countering Denial of Information Attacks by Ahamad, et al –http://portal.acm.org/citation.cfm?id=844126 Denial of Service via Algorithmic Complexity Attacks by Crosby –http://www.cs.rice.edu/~scrosby/hash/ A Killer Adversary for Quicksort by McIlroy –http://www.cs.dartmouth.edu/~doug/mdmspe.pdf Semantic Hacking –http://www.ists.dartmouth.edu/cstrc/projects/ semantic-hacking.php
57
Demo http://www.defcon.org/images/graphics/PICTURES/defcar1.jpg
58
On the CD… Talk Slides (extended) Code –rumint –secvis –rumint file conversion tool (pcap to rumint) Papers –SOUPS Malicious Visualization paper –Hacker conventions article Data –SOTM 21.rum See also: www.cc.gatech.edu/~conti and www.rumint.org http://www.silverballard.co.nz/content/images/shop/accessories/cd/blank%20stock/41827.jpg CACM
59
rumint feedback requested… Tasks Usage –provide feedback on GUI –needed improvements –multiple monitor machines –bug reports Data –interesting packet traces –screenshots with supporting capture file, if possible Pointers to interesting related tools (viz or not) New viz and other analysis ideas Volunteers to participate in user study
60
Acknowledgements 404.se2600, Kulsoom Abdullah, Sandip Agarwala, Mustaque Ahamad, Bill Cheswick, Chad, Clint, Tom Cross, David Dagon, DEFCON, Ron Dodge, EliO, Emma, Mr. Fuzzy, Jeff Gribschaw, Julian Grizzard, GTISC, Hacker Japan, Mike Hamelin, Hendrick, Honeynet Project, Interz0ne, Jinsuk Jun, Kenshoto, Oleg Kolesnikov, Sven Krasser, Chris Lee, Wenke Lee, John Levine, David Maynor, Jeff Moss, NETI@home, Henry Owen, Dan Ragsdale, Rockit, Byung-Uk Roho, Charles Robert Simpson, Ashish Soni, SOUPS, Jason Spence, John Stasko, StricK, Susan, USMA ITOC, IEEE IAW, VizSEC 2004, Grant Wagner and the Yak.
61
GTISC 100+ Graduate Level InfoSec Researchers Multiple InfoSec degree and certificate programs Representative Research –User-centric Security –Adaptive Intrusion Detection Models –Defensive Measures Against Network Denial of Service Attacks –Exploring the Power of Safe Areas of Computation –Denial of Information Attacks (Semantic Hacking) –Enterprise Information Security Looking for new strategic partners, particularly in industry and government www.gtisc.gatech.edu
62
http://www.museumofhoaxes.com/tests/hoaxphototest.html Greg Conti conti@cc.gatech.edu www.cc.gatech.edu/~conti www.rumint.org Questions?
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.