Download presentation
Presentation is loading. Please wait.
Published byChristian Jennings Modified over 9 years ago
1
Countering Denial of Information Attacks with Network Visualization Gregory Conti www.cc.gatech.edu/~conti conti@acm.org http://plus.maths.org/issue23/editorial/information.jpg
2
Disclaimer The views expressed in this presentation are those of the author and do not reflect the official policy or position of the United States Military Academy, the Department of the Army, the Department of Defense or the U.S. Government. image: http://www.leavenworth.army.mil/usdb/standard%20products/vtdefault.htm
3
Denial of Information Attacks: Intentional Attacks that overwhelm the human or otherwise alter their decision making http://circadianshift.net/images/Virginia_Tech_1920s_NS5423_Y_small.jpg
4
http://cagle.slate.msn.com/news/EvilEmailHackers/main.asp
5
The Problem of Information Growth The surface WWW contains ~170TB (17xLOC) IM generates five billion messages a day (750GB), or 274 terabytes a year. Email generates about 400,000 TB/year. P2P file exchange on the Internet is growing rapidly. The largest files exchanged are video files larger than 100 MB, but the most frequently exchanged files contain music (MP3 files). http://www.sims.berkeley.edu/research/projects/how-much-info-2003/
6
Applying the Model & Taxonomy… http://www.butterfly-insect.com/butterfly-insect/graphic/education-pic-worldlife-on.gif
7
Defense Taxonomy (Big Picture) Microsoft, AOL, Earthlink and Yahoo file 6 antispam lawsuits (Mar 04) Federal Can Spam Legislation (Jan 04) California Business and Professions Code, prohibits the sending of unsolicited commercial email (September 98) http://www.metroactive.com/papers/metro/12.04.03/booher-0349.html First Spam Conference (Jan 03)
8
Defense Taxonomy (Big Picture) Microsoft, AOL, Earthlink and Yahoo file 6 antispam lawsuits (Mar 04) Federal Can Spam Legislation (Jan 04) California Business and Professions Code, prohibits the sending of unsolicited commercial email (September 98) http://www.metroactive.com/papers/metro/12.04.03/booher-0349.html First Spam Conference (Jan 03)
9
Human Consumer Human Producer Communication Channel Consumer Node RAM Hard Drive CPU Producer Node STM LTM Cognition Consumer Producer RAM Hard Drive CPU STM LTM Cognition Vision Hearing Speech Motor Vision Hearing Speech Motor System Model
10
Human Consumer Human Producer Communication Channel Consumer Node RAM Hard Drive CPU Producer Node STM LTM Cognition Consumer Producer RAM Hard Drive CPU STM LTM Cognition Vision Hearing Speech Motor Vision Hearing Speech Motor very small text exploit round off algorithm trigger many alerts Example DoI Attacks misleading advertisements spoof browser
11
Human Consumer Human Producer Communication Channel Consumer Node RAM Hard Drive CPU Producer Node STM LTM Cognition Consumer Producer RAM Hard Drive CPU STM LTM Cognition Vision Hearing Speech Motor Vision Hearing Speech Motor TCP Damping Usable Security Eliza Spam Responder Decompression Bombs Example DoI Defenses Computational Puzzle Solving
12
Orient Observe Act Decide Scan Subject Line Spam Delete Confirm Deletion Successful Not Spam No Observation No Action Overhead Number of Email x Time to Decide Overhead Number of Spam x Time to Delete Overhead Number of Spam x Time to Observe Total Overhead = (Number of Spam x (Time to Delete + Time to Observe))+(Number of Email X (Time to Decide + Time to Scan)) Overhead Number of Email x Time to Scan
13
For more information… G. Conti and M. Ahamad; "A Taxonomy and Framework for Countering Denial of Information Attacks;" IEEE Security and Privacy. (to be published) email me…
14
DoI Countermeasures in the Network Security Domain
15
information visualization is the use of interactive, sensory representations, typically visual, of abstract data to reinforce cognition. http://en.wikipedia.org/wiki/Information_visualization
16
rumint v.51
18
nmap 3 (RH8) NMapWin 3 (XP) SuperScan 3.0 (XP) SuperScan 4.0 (XP) nmap 3 UDP (RH8) nmap 3.5 (XP) scanline 1.01 (XP) nikto 1.32 (XP)
19
For more information… G. Conti and K. Abdullah; " Passive Visual Fingerprinting of Network Attack Tools;" ACM Conference on Computer and Communications Security's Workshop on Visualization and Data Mining for Computer Security (VizSEC); October 2004. --Talk PPT Slides see www.cc.gatech.edu/~conti and www.rumint.org for the tool G. Conti; "Network Attack Visualization;" DEFCON 12; August 2004. --Talk PPT Slides --Classical InfoVis Survey PPT Slides --Security InfoVis Survey PPT Slides
20
Last year at DEFCON First question… How do we attack it?
21
Malicious Visualizations…
22
Pokemon http://www.miowebitalia.com/desktop/cartoni/pokemon.jpg
23
Visual Information Overload (perception)
24
Attack Fading (memory) Image: http://www.inf.uct.cl/~amellado/gestion_en_linux/etherape.jpg http://etherape.sourceforge.net/
25
Motion Induced Blindness (perception) http://www.keck.ucsf.edu/~yoram/mib-basic.html
26
Optical Illusions (perception) http://www.ritsumei.ac.jp.nyud.net:8090/~akitaoka/index-e.html
27
Crying Wolf… (cognitive/motor) Snot vs. Snort
28
CDX 2003 Dataset X = Time Y = Destination IP Z = Destination Port Labeling Attack (algorithm)
29
AutoScale Attack/Force User to Zoom (algorithm)
30
Precision Attack (algorithm) http://developers.slashdot.org/article.pl?sid=04/06/01/1747223&mode=thread&tid=126&tid=172 http://www.nersc.gov/nusers/security/Cube.jpg
31
Occlusion (visualization design)
32
Jamming (visualization design)
33
For more information… G. Conti, M. Ahamad and J. Stasko; "Attacking Information Visualization System Usability: Overloading and Deceiving the Human;" Symposium on Usable Privacy and Security (SOUPS); July 2005. (submitted, under review) See also www.rumint.org for the tool. email me…
34
rumint v 1.15 beta
35
Network packets over time Bit 0, Bit 1, Bit 2 Length of packet - 1
36
rumint 1.15 tool overview network monitoring mode (left), clicking the small pane brings up the detailed analysis view for that visualization.
37
So what do you think…
39
Visual exploration of binary objects…
40
Reverse Engineering IDA Pro Dissassembler and Debugger http://www.datarescue.com/idabase/
41
Textual vs. Visual Exploration
42
binaryexplorer.exe
43
visualexplorer.exe (visual studio) calc.exe (unknown compiler) rumint.exe (visual studio) regedit.exe (unkown compiler) Comparing Executable Binaries (1 bit per pixel) mozillafirebird.exe (unknown compiler) cdex.exe (unknown compiler) apache.exe (unknown compiler) ethereal.exe (unknown compiler)
44
image.bmp image.zipimage.jpg image.pae (encrypted) Comparing Image Files (1 bit per pixel)
45
pash.mp3 disguises.mp3the.mp3 Comparing mp3 files (1 bit per pixel)
46
secvis w/Sven Krasser, Julian Grizzard, Jeff Gribschaw and Henry Owen (Georgia Tech)
47
Overview of Visualization
49
Overview and Detail
50
Routine Honeynet Traffic (baseline)
51
Compromised Honeypot
52
Slammer Worm
53
Constant Bitrate UDP Traffic
54
Port Sweep
55
System Performance
56
For more information… S. Krasser, G. Conti, J. Grizzard, J. Gribschaw and H. Owen; "Real-Time and Forensic Network Data Analysis Using Animated and Coordinated Visualization;" IEEE Information Assurance Workshop (IAW); June 2005. (submitted) email me…
57
Demos binary exploration rumint 1.15 secvis
58
Questions? Image: http://altura.speedera.net/ccimg.catalogcity.com/210000/211700/211780/Products/6203927.jpg Gregory Conti conti@cc.gatech.edu www.cc.gatech.edu/~conti
59
Backup Slides
60
External IP to Internal Port 6 Oct 04 13 Oct 04 20 Oct 04 27 Oct 04 30 Nov 04 One Week SnapshotsOne Month
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.