DoI: Denial of Information
Center for Experimental Research in Computer Systems and
Georgia Tech Information Security Center,
College of Computing,
Georgia Institute of Technology
Project Summary
As applications enabled by the Internet become information rich, ensuring
access to quality information in the presence of potentially malicious entities
will be a major challenge. The goal of this research project is to develop
defensive techniques to counter denial-of-information (DoI) attacks. Such
attacks attempt to confuse an information system by deliberately introducing
noise that appears to be useful information. The mere availability of
information is insufficient if the user must find a needle in a haystack of
noise that is created by an adversary to hide critical information. The
research focuses on the characterization of information quality metrics that
are relevant in the presence of DoI attacks. In particular, two complementary
metrics are explored. Information regularity captures predictability in the
patterns of information creation and access. The second metric, information
quality trust, captures the known ability of an information source to meet the
needs of its clients. The development of techniques to derive the values of
these metrics for information sources is a key goal of the research. Other
planned research activities include the building of a distributed information
infrastructure and experimental evaluation of defensive techniques against DoI
attacks.
People
Faculty
Students
Alumni
Publications
- D. Wang, D. Irani, and C. Pu. "SPADE: A Social-spam Analytics and Detection Framework". To appear in Social Network Analysis and Mining (SNAM). 2014. [PDF]
- D. Wang. "Analysis and Detection of Low Quality Information in Social Networks". In Proc. of Ph.D. Symposium at 30th IEEE International Conference on Data Engineering (ICDE 2014). Chicago, IL, United States, March 2014.
- D. Wang, D. Irani, and C. Pu. "A Perspective of Evolution after Five Years: A Large-scale Study of Web Spam Evolution". To appear in special issue of International Journal of Cooperative Information Systems (IJCIS). 2014. [PDF]
- D. Wang, S. Webb, K. Lee, J. Caverlee, and C. Pu. "Granular Computing System Vulnerabilities: Exploring the Dark Side of Social Networking Communities". To appear in Encycolpedia of Complexity and Systems Science, 2nd Edition, 2015. [PDF]
- D. Wang, S. B. Navathe, L. Liu, D. Irani, A. Tamersoy, and C. Pu. "Click Traffic Analysis of Short URL Spam on Twitter," in Proc. of 9th IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom 2013). Austin, Texas, United States, October 2013. Invited paper [PDF]
- D. Wang, D. Irani, and C. Pu. "A Study on Evolution of Email Spam over Fifteen Years," in Proc. of 9th IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom 2013). Austin, Texas, United States, October 2013. [PDF] Best Paper Award
- D. Wang, D. Irani, and C. Pu. "Evolutionary Study of Web Spam: Webb Spam Corpus 2011 versus Webb Spam Corpus 2006," in Proc. of 8th IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom 2012). October, 2012, Pittsburgh, Pennsylvania, United States. [PDF]
- D. Wang, D. Irani, and C. Pu. "A Social-Spam Detection Framework," in Proc. of 8th Annual Collaboration, Electronic messaging, Anti-Abuse and Spam Conference (CEAS 2011). September, 2011, Perth, Australia.[PDF]
- D. Irani, M. Balduzzi, D. Balzarotti, E. Kirda, and C. Pu. "Reverse Social Engineering Attacks in Online Social Networks," in Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA'11). Amsterdam, Netherlands, July 2011. [PDF]
- D. Irani, S. Webb, K. Li, and C. Pu. "Modeling Unintended Personal Information Leakage from Multiple Online Social Networks," in IEEE Internet Computing special issue on Security and Privacy in Social Networks. 2011. [PDF]
- D. Irani, S. Webb, and C. Pu. "Study of Trend-Stuffing on Twitter through Text Classification". in Conference on Email and Anti-Spam (CEAS'10). Seattle, WA, July 2010. [PDF]
-
D. Irani, S. Webb, and and C. Pu, "Study of Static Classification of Social Spam Profiles in MySpace,"
in Proceedings of the International AAAI Conference on Weblogs and Social Media, May, 2010, Washington, D.C.
[ pdf ]
-
D. Irani, S. Webb, K. Li, and and C. Pu, "Large Online Social Footprints - An Emerging Threat,"
in Proceedings of the International Symposium on Secure Computing, August, 2009, Vancouver, B.C., Canada.
[ pdf ]
-
K. Li, Z. Zhong, and Lakshmish Ramaswamy, "Privacy-Aware Collaborative Spam Filtering,"
in IEEE Transactions on Parallel and Distributed systems, Vol. 20, No.5, May 2009,
[ pdf ]
-
B. Byun, C. Lee, S. Webb, D. Irani, and C. Pu, "An Anti-spam Filter Combination Framework for Text-and-Image Emails through Incremental Learning,"
in Proceedings of the Fourth Conference on Email and Anti-Spam (CEAS 2009), July, 2009, Mountain View, CA.
[ pdf ]
-
K. Vangapandu, D. Brewer and K. Li, "A Study of URL Redirection Indicating Spam,"
in Proceedings of the Fourth Conference on Email and Anti-Spam (CEAS 2009), July, 2009, Mountain View, CA.
[ pdf ]
-
S. Webb,"Automatic Identification and Removal of Low Quality Online Information," Ph.D. Dissertation, Georgia Institute of Technology, December 2008.
-
Z. Zhong, L. Ramaswamy, and K. Li, "ALPACAS: A Large-scale Privacy-Aware Collaborative Anti-spam System,"
in Proceedings of the IEEE Infocom (Infocom 2008), 2008, Phoenix, AZ.
[ pdf ]
-
D. Irani, S. Webb, J. Giffin and C. Pu, "Evolutionary study of phishing,"
in Proceedings of the 3rd Anti-Phishing Working Group eCrime Researchers Summit, October 2008, Atlanta, GA.
[ pdf ] - Best Paper Award.
-
S. Webb, J. Caverlee, and C. Pu, "Predicting Web Spam with HTTP Session Information,"
in Proceedings of the Seventeenth Conference on Information and Knowledge Management (CIKM 2008), October 26-30, 2008, Napa Valley, CA.
[ pdf ]
-
S. Webb, J. Caverlee, and C. Pu, "Social Honeypots: Making Friends with a Spammer Near You,"
in Proceedings of the Fifth Conference on Email and Anti-Spam (CEAS 2008), August 21-22, 2008, Mountain View, CA.
[ pdf ]
-
J. Caverlee, L. Liu, and S. Webb, "SocialTrust: Tamper-Resilient Trust Establishment in Online Communities,"
in Proceedings of the ACM/IEEE Joint Conference on Digital Libraries (JCDL 2008), June 16-20, 2008, Pittsburgh, PA
[ pdf ]
-
J. Caverlee and S. Webb, "A Large-Scale Study of MySpace: Observations and Implications for Online Social Networks,"
in Proceedings of the International Conference on Weblogs and Social Media (ICWSM 2008), March 30 - April 2, 2008, Seattle, WA.
[ pdf ]
-
S. Webb, J. Caverlee, C. Pu, "Characterizing Web Spam Using Content and HTTP Session Analysis,"
in Proceedings of the Fourth Conference on Email and Anti-Spam (CEAS 2007), August 2-3, 2007, Mountain View, CA.
[ pdf ]
-
B. Byun, C. Lee, S. Webb, and C. Pu, "A Discriminative Classifier Learning Approach to Image Modeling and Spam Image Identification,"
in Proceedings of the Fourth Conference on Email and Anti-Spam (CEAS 2007), August 2-3, 2007, Mountain View, CA.
[ pdf ]
-
J. Caverlee, S. Webb, and L. Liu, "Spam-Resilient Web Rankings via Influence Throttling,"
in Proceedings of the 21st IEEE International Parallel & Distributed Processing Symposium (IPDPS 2007), March 26-30, 2007, Long Beach, CA.
[ pdf ]
-
S. Webb, J. Caverlee, and C. Pu, "Introducing the Webb Spam Corpus: Using Email Spam to Identify Web Spam Automatically,"
in Proceedings of the Third Conference on Email and Anti-Spam (CEAS 2006), July 27-28, 2006, Mountain View, CA.
[ pdf ] [Webb Spam Corpus can be found here]
-
C. Pu and S. Webb, "Observed Trends in Spam Construction Techniques: A Case Study of Spam Evolution,"
in Proceedings of the Third Conference on Email and Anti-Spam (CEAS 2006), July 27-28, 2006, Mountain View, CA.
[ pdf ]
-
C. Pu, S. Webb, O. Kolesnikov, W. Lee, and R. Lipton, "Towards the Integration of Diverse Spam Filtering Techniques,"
in Proceedings of the IEEE International Conference on Granular Computing (GrC 2006), May 10-12, 2006, Atlanta, GA.
[ pdf ]
-
K. Li, Z. Zhong, "Fast Statistical Spam Filter by Approximate Classifications,"
in Proceedings of the ACM SIGMETRICS 2006/IFIP Performance, June 2006, St. Malo, France.
[ pdf ]
-
G. Conti, K. Abdullah, J. Grizzard, J. Stasko, J. Copeland, M. Ahamad, H. Owen, and C. Lee, "Countering Security Analyst and
Network Administrator Overload Through Alert and Packet Visualization," IEEE Computer Graphics and Applications (CG&A), March 2006.
[ pdf ]
-
Z. Zhong, K. Huang, and K. Li, "Throttling Outgoing SPAM for Webmail Services,"
in Proceedings of the the second Conference on Email and Anti-Spam (CEAS 2005), Mountain View, CA..
[ pdf ]
-
G. Conti and M. Ahamad, "A Taxonomy and Framework for Countering Denial of Information Attacks," IEEE Security and Privacy, November/December 2005.
[ pdf ]
-
G. Conti, J. Grizzard, M. Ahamad, and H. Owen, "Visual Exploration of Malicious Network Objects Using Semantic Zoom, Interactive Encoding and Dynamic Queries,"
in Proceedings of the IEEE Symposium on Information Visualization's Workshop on Visualization for Computer Security (VizSEC), October 26, 2005, Minneapolis, MN.
[ pdf ]
-
K. Li, S. Ding, D. McCreary, and S. Webb, "Analysis of State Exposure Control to Prevent Cheating in Online Games,"
in Proceedings of the ACM Nossdav, 2004, Kinsale, County Cork, Ireland.
[ pdf ]
Associated Projects
- GRAIT-DM : Global Research on Applying Information Technology for Disaster Management