SlideShare une entreprise Scribd logo
1  sur  16
Télécharger pour lire hors ligne
Supercharged graph visualization
for cyber security
5th May 2016
Corey Lanum / Ed Wood
09:00 am PDT
12:00 noon EDT
17:00 BST
18:00 CEST
Supercharged graph visualization
for cyber security
5th May 2016
Corey Lanum / Ed Wood
Agenda
● Introductions
● Some Challenges of Cyber Data
● Live Demos
● Hints and Tips
● Your Questions
Webinar will be recorded.
Video will be shared tomorrow.
Please submit questions via Citrix panel!
Cambridge Intelligence
• Founded in 2011
• Cambridge UK & Boston US
• We help organizations to
understand connected
data:
– Award-winning products
– Developer services
– Expert know-how
• Cross-browser compatibility
• Works on any device
• A fast developer experience
• Rapid deployment
• Easy maintenance
• Full customization
• Powerful functionality
Introducing KeyLines
KeyLines is a powerful SDK for building network
visualization web applications:
‘Graph’ data
Enron email traffic
Nodes are people
Links (or ‘Edges’) are
emails exchanged
Scale and colour Node
using Social Network
algorithms
Betweenness = number
of shortest paths Nodes
are on ; indicates
seniority
Links scaled proportional
to volume of email
Cyber Security Data
“Cybersecurity is the body of technologies, processes and
practices designed to protect networks, computers, programs
and data from attack, damage or unauthorized access.”
Cyber Security data structures often fit very well with Graph
entities and visualisations….
E.g. NODES
● Machines
● People
● Data Centres
● Malware Families
● Applications
● Credentials
E.g. LINKS
● Attack Vectors
● Data Packets
● Emails
● Credentials
● Vulnerabilities
● Exfiltrated Data
A visual and interactive representation can efficiently uncover
patterns, trends and anomalies in complex data-sets
Size / Volume
• Huge number of security events generated by SIEM and other
systems...
Challenges of Cyber Data (I)
Generated at millisecond levels of resolution;
Typically stored in disparate silos that can be
unwieldy to manage.
Challenge is to detect unusual behavior inside
terabytes of event and attribute data,
including:
● IP logs – detecting indications of infected machines
or botnet zombies
● Network logs – uncover applications or users that
hog bandwidth so they can optimize systems and
prioritize business critical applications.
● Communications logs – for performing analysis to
uncover sabotage, espionage or other unwanted
activities.
● Web server logs – managing and prevent external
threats, such as DDoS attacks.
Complexity
• Combination of machine and human
actors
• Subtle interactions of the When and
the Where
Noise
• Significant events and patterns can
be hidden in a sea of data
• Attackers will attempt to hide their
behaviour !
Challenges of Cyber Data (II)
● How to visualize cyber security data:
○ Performance demo
○ Malware demo
○ Data Breach demo
○ Combinations/Grouping demo
○ Geo/TimeBar demo
Demos
KeyLines 3.0!
• Supercharge your charts with (Alpha)
○ Rendering speed up to 10x faster
○ Supported by ‘Big 4’ Browser brands
and most devices
○ Improves fluidity & responsiveness
with larger datasets
• Three new cyber-security demos
○ Inspire creative use of KeyLines
• New Angular directive
○ Performance and compatibility
Your Questions (I)
“Can KeyLines work with real-time data? If so, what visual
model / techniques would you recommend?”
• Yes, it does.
• The Time Bar and Tweak Layouts are designed for this.
• Try to limit the volume of data being communicated at any one
time. Techniques like combos or ghosting can help.
“What is the maximum number of nodes/links you can
handle?”
● HTML5 Canvas - a few thousand.
● WebGL - many tens of thousands.
● Using show/hide, around 1 million. BUT this is rarely useful.
“How easy it is to change the shape, design and layout
of nodes and edges?”
• Very easy.
• Shapes, image nodes, font icons and other designs possible.
• 6 extensible & customizable automated layouts available.
“Does WebGL handle rendering thousands of nodes and
edges well on machine with say Intel HD 3000?”
• WebGL harnesses machine’s GPU and performance will vary
• For reference, demos today were using Mac Book Air on Intel
HD 5000.
Your Questions (II)
Your Questions
+ Live Questions…!
● Cyber Security data is big, complex and noisy.
● A good cyber security visualization needs:
➔ A well thought-out visual model and defined question
➔ Functionality to overcome complexity and noise
◆ Good layouts, filtering, combos, time bar, geospatial
➔ Power to work with data at scale
● Graph visualization is the ideal tool.
We’d love to help!
Summary
Thanks for joining us!
@CambridgeIntel Cambridge-Intelligence.com
info@cambridge-intelligence.com

Contenu connexe

Tendances

II-SDV 14 Product Presentations Cambridge Intelligence
II-SDV 14 Product Presentations Cambridge IntelligenceII-SDV 14 Product Presentations Cambridge Intelligence
II-SDV 14 Product Presentations Cambridge IntelligenceDr. Haxel Consult
 
MDEC Fintech Conference - Demystifying Fintech in the SMAC Era, Darien Nagle ...
MDEC Fintech Conference - Demystifying Fintech in the SMAC Era, Darien Nagle ...MDEC Fintech Conference - Demystifying Fintech in the SMAC Era, Darien Nagle ...
MDEC Fintech Conference - Demystifying Fintech in the SMAC Era, Darien Nagle ...iTrain
 
Introduction to Internet of Things
Introduction to Internet of ThingsIntroduction to Internet of Things
Introduction to Internet of ThingsNikhil Patankar
 
Internet of things getting started
Internet of things   getting startedInternet of things   getting started
Internet of things getting startedOmkar Khair
 
20 Latest Computer Science Seminar Topics on Emerging Technologies
20 Latest Computer Science Seminar Topics on Emerging Technologies20 Latest Computer Science Seminar Topics on Emerging Technologies
20 Latest Computer Science Seminar Topics on Emerging TechnologiesSeminar Links
 
Software training courses
Software training coursesSoftware training courses
Software training coursesmingglelabs
 
Creating a team of DevOps “Super Sentai”
Creating a team of DevOps “Super Sentai”Creating a team of DevOps “Super Sentai”
Creating a team of DevOps “Super Sentai”Rakuten Group, Inc.
 
ITCamp 2018 - Magnus Mårtensson - Azure Global Application Perspectives
ITCamp 2018 - Magnus Mårtensson - Azure Global Application PerspectivesITCamp 2018 - Magnus Mårtensson - Azure Global Application Perspectives
ITCamp 2018 - Magnus Mårtensson - Azure Global Application PerspectivesITCamp
 
Developing io t applications in the fog a distributed dataflow approach
Developing io t applications in the fog  a distributed dataflow approachDeveloping io t applications in the fog  a distributed dataflow approach
Developing io t applications in the fog a distributed dataflow approachNam Giang
 
SMAC talk for the enterprise
SMAC talk for the enterpriseSMAC talk for the enterprise
SMAC talk for the enterprise3Sixty Insights
 
Go real-time with the InternetOfThings
Go real-time with the InternetOfThingsGo real-time with the InternetOfThings
Go real-time with the InternetOfThingsUffe Björklund
 
IoT World - creating a secure robust IoT reference architecture
IoT World - creating a secure robust IoT reference architectureIoT World - creating a secure robust IoT reference architecture
IoT World - creating a secure robust IoT reference architecturePaul Fremantle
 
May 2013 Federal Cloud Computing Summit Presentation
May 2013 Federal Cloud Computing Summit PresentationMay 2013 Federal Cloud Computing Summit Presentation
May 2013 Federal Cloud Computing Summit PresentationTim Harvey
 
Edge intelligence slide share
Edge intelligence slide shareEdge intelligence slide share
Edge intelligence slide shareBit Stew Systems
 
Internet of Things
Internet of ThingsInternet of Things
Internet of ThingsMphasis
 
May 2013 Federal Cloud Computing Summit Welcome by Dr. David McClure
May 2013 Federal Cloud Computing Summit Welcome by Dr. David McClureMay 2013 Federal Cloud Computing Summit Welcome by Dr. David McClure
May 2013 Federal Cloud Computing Summit Welcome by Dr. David McClureTim Harvey
 

Tendances (20)

II-SDV 14 Product Presentations Cambridge Intelligence
II-SDV 14 Product Presentations Cambridge IntelligenceII-SDV 14 Product Presentations Cambridge Intelligence
II-SDV 14 Product Presentations Cambridge Intelligence
 
MDEC Fintech Conference - Demystifying Fintech in the SMAC Era, Darien Nagle ...
MDEC Fintech Conference - Demystifying Fintech in the SMAC Era, Darien Nagle ...MDEC Fintech Conference - Demystifying Fintech in the SMAC Era, Darien Nagle ...
MDEC Fintech Conference - Demystifying Fintech in the SMAC Era, Darien Nagle ...
 
Internet of Things
Internet of ThingsInternet of Things
Internet of Things
 
Introduction to Internet of Things
Introduction to Internet of ThingsIntroduction to Internet of Things
Introduction to Internet of Things
 
Internet of things getting started
Internet of things   getting startedInternet of things   getting started
Internet of things getting started
 
20 Latest Computer Science Seminar Topics on Emerging Technologies
20 Latest Computer Science Seminar Topics on Emerging Technologies20 Latest Computer Science Seminar Topics on Emerging Technologies
20 Latest Computer Science Seminar Topics on Emerging Technologies
 
Software training courses
Software training coursesSoftware training courses
Software training courses
 
SMAC
SMACSMAC
SMAC
 
Creating a team of DevOps “Super Sentai”
Creating a team of DevOps “Super Sentai”Creating a team of DevOps “Super Sentai”
Creating a team of DevOps “Super Sentai”
 
ITCamp 2018 - Magnus Mårtensson - Azure Global Application Perspectives
ITCamp 2018 - Magnus Mårtensson - Azure Global Application PerspectivesITCamp 2018 - Magnus Mårtensson - Azure Global Application Perspectives
ITCamp 2018 - Magnus Mårtensson - Azure Global Application Perspectives
 
Developing io t applications in the fog a distributed dataflow approach
Developing io t applications in the fog  a distributed dataflow approachDeveloping io t applications in the fog  a distributed dataflow approach
Developing io t applications in the fog a distributed dataflow approach
 
SMAC talk for the enterprise
SMAC talk for the enterpriseSMAC talk for the enterprise
SMAC talk for the enterprise
 
Go real-time with the InternetOfThings
Go real-time with the InternetOfThingsGo real-time with the InternetOfThings
Go real-time with the InternetOfThings
 
IoT World - creating a secure robust IoT reference architecture
IoT World - creating a secure robust IoT reference architectureIoT World - creating a secure robust IoT reference architecture
IoT World - creating a secure robust IoT reference architecture
 
May 2013 Federal Cloud Computing Summit Presentation
May 2013 Federal Cloud Computing Summit PresentationMay 2013 Federal Cloud Computing Summit Presentation
May 2013 Federal Cloud Computing Summit Presentation
 
Edge intelligence slide share
Edge intelligence slide shareEdge intelligence slide share
Edge intelligence slide share
 
Internet of Things
Internet of ThingsInternet of Things
Internet of Things
 
Internet of things
Internet of thingsInternet of things
Internet of things
 
A chip to protect IOT
A chip to protect IOTA chip to protect IOT
A chip to protect IOT
 
May 2013 Federal Cloud Computing Summit Welcome by Dr. David McClure
May 2013 Federal Cloud Computing Summit Welcome by Dr. David McClureMay 2013 Federal Cloud Computing Summit Welcome by Dr. David McClure
May 2013 Federal Cloud Computing Summit Welcome by Dr. David McClure
 

En vedette

Actividades portuarias
Actividades portuariasActividades portuarias
Actividades portuariasStalyn Macias
 
Filosofia de la historia de max weber.
Filosofia de la historia de max weber.Filosofia de la historia de max weber.
Filosofia de la historia de max weber.deretv1
 
Clean room system tarkett
Clean room system tarkettClean room system tarkett
Clean room system tarkettCutting Corners
 
Global Internet TV Industry
Global Internet TV IndustryGlobal Internet TV Industry
Global Internet TV IndustryReportLinker.com
 
123458_Atlas_de_Bolsillo_de_fisiologia
123458_Atlas_de_Bolsillo_de_fisiologia123458_Atlas_de_Bolsillo_de_fisiologia
123458_Atlas_de_Bolsillo_de_fisiologiaAdlem Dutra
 
Newton Paiva - DI - Aula 03
Newton Paiva - DI - Aula 03Newton Paiva - DI - Aula 03
Newton Paiva - DI - Aula 03Marcello Cardoso
 
Perl6: Interfaces und Factories für Testdriven Development
Perl6: Interfaces und Factories für Testdriven DevelopmentPerl6: Interfaces und Factories für Testdriven Development
Perl6: Interfaces und Factories für Testdriven DevelopmentRalf Peine
 
iData Insights Report Store
iData Insights Report StoreiData Insights Report Store
iData Insights Report StoreiData Insights
 
Accelerate your sales performance.
Accelerate your sales performance.  Accelerate your sales performance.
Accelerate your sales performance. Safe Rise
 
The Pensions 2015 Guide, 2015 Pension Guide, Pension Information, 2015 Pensi...
The Pensions 2015 Guide,  2015 Pension Guide, Pension Information, 2015 Pensi...The Pensions 2015 Guide,  2015 Pension Guide, Pension Information, 2015 Pensi...
The Pensions 2015 Guide, 2015 Pension Guide, Pension Information, 2015 Pensi...Corp LiveWire
 
Invitación a la feria IMEX Madrid (24 y 25 de abril). País invitado USA. LIFI...
Invitación a la feria IMEX Madrid (24 y 25 de abril). País invitado USA. LIFI...Invitación a la feria IMEX Madrid (24 y 25 de abril). País invitado USA. LIFI...
Invitación a la feria IMEX Madrid (24 y 25 de abril). País invitado USA. LIFI...Carmen Urbano
 
LA MADERA Y SUS NO TAN GRATAS CONSECUENCIAS.
LA MADERA Y SUS NO TAN GRATAS CONSECUENCIAS.LA MADERA Y SUS NO TAN GRATAS CONSECUENCIAS.
LA MADERA Y SUS NO TAN GRATAS CONSECUENCIAS.KINGKONG301
 
Owasp top 10_-_2013_final_-_español
Owasp top 10_-_2013_final_-_españolOwasp top 10_-_2013_final_-_español
Owasp top 10_-_2013_final_-_españolfosoSSS
 
Tecnología sin zanja para la instalación y rehabilitación de redes de acueduc...
Tecnología sin zanja para la instalación y rehabilitación de redes de acueduc...Tecnología sin zanja para la instalación y rehabilitación de redes de acueduc...
Tecnología sin zanja para la instalación y rehabilitación de redes de acueduc...Andesco
 
Guia del docente_religion_5_basico_edebe
Guia del docente_religion_5_basico_edebeGuia del docente_religion_5_basico_edebe
Guia del docente_religion_5_basico_edebeMireya Burgos Peredo
 

En vedette (20)

Actividades portuarias
Actividades portuariasActividades portuarias
Actividades portuarias
 
Filosofia de la historia de max weber.
Filosofia de la historia de max weber.Filosofia de la historia de max weber.
Filosofia de la historia de max weber.
 
Clean room system tarkett
Clean room system tarkettClean room system tarkett
Clean room system tarkett
 
Global Internet TV Industry
Global Internet TV IndustryGlobal Internet TV Industry
Global Internet TV Industry
 
123458_Atlas_de_Bolsillo_de_fisiologia
123458_Atlas_de_Bolsillo_de_fisiologia123458_Atlas_de_Bolsillo_de_fisiologia
123458_Atlas_de_Bolsillo_de_fisiologia
 
Newton Paiva - DI - Aula 03
Newton Paiva - DI - Aula 03Newton Paiva - DI - Aula 03
Newton Paiva - DI - Aula 03
 
WinterCatalog
WinterCatalogWinterCatalog
WinterCatalog
 
Perl6: Interfaces und Factories für Testdriven Development
Perl6: Interfaces und Factories für Testdriven DevelopmentPerl6: Interfaces und Factories für Testdriven Development
Perl6: Interfaces und Factories für Testdriven Development
 
iData Insights Report Store
iData Insights Report StoreiData Insights Report Store
iData Insights Report Store
 
Accelerate your sales performance.
Accelerate your sales performance.  Accelerate your sales performance.
Accelerate your sales performance.
 
GaliciaWifi.com
GaliciaWifi.com
GaliciaWifi.com
GaliciaWifi.com
 
FXDaily.pdf
FXDaily.pdfFXDaily.pdf
FXDaily.pdf
 
The Pensions 2015 Guide, 2015 Pension Guide, Pension Information, 2015 Pensi...
The Pensions 2015 Guide,  2015 Pension Guide, Pension Information, 2015 Pensi...The Pensions 2015 Guide,  2015 Pension Guide, Pension Information, 2015 Pensi...
The Pensions 2015 Guide, 2015 Pension Guide, Pension Information, 2015 Pensi...
 
Invitación a la feria IMEX Madrid (24 y 25 de abril). País invitado USA. LIFI...
Invitación a la feria IMEX Madrid (24 y 25 de abril). País invitado USA. LIFI...Invitación a la feria IMEX Madrid (24 y 25 de abril). País invitado USA. LIFI...
Invitación a la feria IMEX Madrid (24 y 25 de abril). País invitado USA. LIFI...
 
LA MADERA Y SUS NO TAN GRATAS CONSECUENCIAS.
LA MADERA Y SUS NO TAN GRATAS CONSECUENCIAS.LA MADERA Y SUS NO TAN GRATAS CONSECUENCIAS.
LA MADERA Y SUS NO TAN GRATAS CONSECUENCIAS.
 
Owasp top 10_-_2013_final_-_español
Owasp top 10_-_2013_final_-_españolOwasp top 10_-_2013_final_-_español
Owasp top 10_-_2013_final_-_español
 
Accesorios para vacio kf
Accesorios para vacio kfAccesorios para vacio kf
Accesorios para vacio kf
 
Oportunidades JUNIO - JAFRA 2015
Oportunidades JUNIO - JAFRA 2015Oportunidades JUNIO - JAFRA 2015
Oportunidades JUNIO - JAFRA 2015
 
Tecnología sin zanja para la instalación y rehabilitación de redes de acueduc...
Tecnología sin zanja para la instalación y rehabilitación de redes de acueduc...Tecnología sin zanja para la instalación y rehabilitación de redes de acueduc...
Tecnología sin zanja para la instalación y rehabilitación de redes de acueduc...
 
Guia del docente_religion_5_basico_edebe
Guia del docente_religion_5_basico_edebeGuia del docente_religion_5_basico_edebe
Guia del docente_religion_5_basico_edebe
 

Similaire à Supercharged graph visualization for cyber security

Choosing the right Technologies for your next unicorn.
Choosing the right Technologies for your next unicorn.Choosing the right Technologies for your next unicorn.
Choosing the right Technologies for your next unicorn.Gladson DSouza
 
Bridging the Gap: Analyzing Data in and Below the Cloud
Bridging the Gap: Analyzing Data in and Below the CloudBridging the Gap: Analyzing Data in and Below the Cloud
Bridging the Gap: Analyzing Data in and Below the CloudInside Analysis
 
Big Data made easy in the era of the Cloud - Demi Ben-Ari
Big Data made easy in the era of the Cloud - Demi Ben-AriBig Data made easy in the era of the Cloud - Demi Ben-Ari
Big Data made easy in the era of the Cloud - Demi Ben-AriDemi Ben-Ari
 
Emerging trends in information technology
Emerging trends in information technologyEmerging trends in information technology
Emerging trends in information technologyShiv Mehmi
 
Career Domain 2022-23.pptx
Career Domain 2022-23.pptxCareer Domain 2022-23.pptx
Career Domain 2022-23.pptxJanani S
 
Why defensive research is sexy too.. … and a real sign of skill
Why defensive research is sexy too.. … and a real sign of skillWhy defensive research is sexy too.. … and a real sign of skill
Why defensive research is sexy too.. … and a real sign of skillOllie Whitehouse
 
How Precisely and Splunk Can Help You Better Manage Your IBM Z and IBM i Envi...
How Precisely and Splunk Can Help You Better Manage Your IBM Z and IBM i Envi...How Precisely and Splunk Can Help You Better Manage Your IBM Z and IBM i Envi...
How Precisely and Splunk Can Help You Better Manage Your IBM Z and IBM i Envi...Precisely
 
fields of technology and computer .pptx
fields of technology and computer  .pptxfields of technology and computer  .pptx
fields of technology and computer .pptxHome
 
How Cloud Computing will change how you and your team will run IT
How Cloud Computing will change how you and your team will run ITHow Cloud Computing will change how you and your team will run IT
How Cloud Computing will change how you and your team will run ITPeter HJ van Eijk
 
System Security on Cloud
System Security on CloudSystem Security on Cloud
System Security on CloudTu Pham
 
.Net Microservices with Event Sourcing, CQRS, Docker and... Windows Server 20...
.Net Microservices with Event Sourcing, CQRS, Docker and... Windows Server 20....Net Microservices with Event Sourcing, CQRS, Docker and... Windows Server 20...
.Net Microservices with Event Sourcing, CQRS, Docker and... Windows Server 20...Javier García Magna
 
Microservices - opportunities, dilemmas and problems
Microservices - opportunities, dilemmas and problemsMicroservices - opportunities, dilemmas and problems
Microservices - opportunities, dilemmas and problemsŁukasz Sowa
 
Microservices - when, why and how incontrodevops.it
Microservices  - when, why and how incontrodevops.itMicroservices  - when, why and how incontrodevops.it
Microservices - when, why and how incontrodevops.itGiuseppe Lavagetto
 
A non-technical introduction to Cloud Computing
A non-technical introduction to Cloud ComputingA non-technical introduction to Cloud Computing
A non-technical introduction to Cloud ComputingWilliam Pourmajidi
 
apidays LIVE Paris - Serverless security: how to protect what you don't see? ...
apidays LIVE Paris - Serverless security: how to protect what you don't see? ...apidays LIVE Paris - Serverless security: how to protect what you don't see? ...
apidays LIVE Paris - Serverless security: how to protect what you don't see? ...apidays
 
Hac IT 4. Emerging Technologies (1).pdf
Hac IT 4. Emerging Technologies  (1).pdfHac IT 4. Emerging Technologies  (1).pdf
Hac IT 4. Emerging Technologies (1).pdfAAFREEN SHAIKH
 
Cybersecurity Legos - We're all part of something bigger
Cybersecurity Legos - We're all part of something biggerCybersecurity Legos - We're all part of something bigger
Cybersecurity Legos - We're all part of something biggerBen Boyd
 
Cloud computing
Cloud computingCloud computing
Cloud computingAmit Kumar
 
AI for Manufacturing (Machine Vision, Edge AI, Federated Learning)
AI for Manufacturing (Machine Vision, Edge AI, Federated Learning)AI for Manufacturing (Machine Vision, Edge AI, Federated Learning)
AI for Manufacturing (Machine Vision, Edge AI, Federated Learning)byteLAKE
 

Similaire à Supercharged graph visualization for cyber security (20)

Choosing the right Technologies for your next unicorn.
Choosing the right Technologies for your next unicorn.Choosing the right Technologies for your next unicorn.
Choosing the right Technologies for your next unicorn.
 
Bridging the Gap: Analyzing Data in and Below the Cloud
Bridging the Gap: Analyzing Data in and Below the CloudBridging the Gap: Analyzing Data in and Below the Cloud
Bridging the Gap: Analyzing Data in and Below the Cloud
 
Big Data made easy in the era of the Cloud - Demi Ben-Ari
Big Data made easy in the era of the Cloud - Demi Ben-AriBig Data made easy in the era of the Cloud - Demi Ben-Ari
Big Data made easy in the era of the Cloud - Demi Ben-Ari
 
Emerging trends in information technology
Emerging trends in information technologyEmerging trends in information technology
Emerging trends in information technology
 
Career Domain 2022-23.pptx
Career Domain 2022-23.pptxCareer Domain 2022-23.pptx
Career Domain 2022-23.pptx
 
Why defensive research is sexy too.. … and a real sign of skill
Why defensive research is sexy too.. … and a real sign of skillWhy defensive research is sexy too.. … and a real sign of skill
Why defensive research is sexy too.. … and a real sign of skill
 
Deep dive in to modern it technology
Deep dive in to modern it technologyDeep dive in to modern it technology
Deep dive in to modern it technology
 
How Precisely and Splunk Can Help You Better Manage Your IBM Z and IBM i Envi...
How Precisely and Splunk Can Help You Better Manage Your IBM Z and IBM i Envi...How Precisely and Splunk Can Help You Better Manage Your IBM Z and IBM i Envi...
How Precisely and Splunk Can Help You Better Manage Your IBM Z and IBM i Envi...
 
fields of technology and computer .pptx
fields of technology and computer  .pptxfields of technology and computer  .pptx
fields of technology and computer .pptx
 
How Cloud Computing will change how you and your team will run IT
How Cloud Computing will change how you and your team will run ITHow Cloud Computing will change how you and your team will run IT
How Cloud Computing will change how you and your team will run IT
 
System Security on Cloud
System Security on CloudSystem Security on Cloud
System Security on Cloud
 
.Net Microservices with Event Sourcing, CQRS, Docker and... Windows Server 20...
.Net Microservices with Event Sourcing, CQRS, Docker and... Windows Server 20....Net Microservices with Event Sourcing, CQRS, Docker and... Windows Server 20...
.Net Microservices with Event Sourcing, CQRS, Docker and... Windows Server 20...
 
Microservices - opportunities, dilemmas and problems
Microservices - opportunities, dilemmas and problemsMicroservices - opportunities, dilemmas and problems
Microservices - opportunities, dilemmas and problems
 
Microservices - when, why and how incontrodevops.it
Microservices  - when, why and how incontrodevops.itMicroservices  - when, why and how incontrodevops.it
Microservices - when, why and how incontrodevops.it
 
A non-technical introduction to Cloud Computing
A non-technical introduction to Cloud ComputingA non-technical introduction to Cloud Computing
A non-technical introduction to Cloud Computing
 
apidays LIVE Paris - Serverless security: how to protect what you don't see? ...
apidays LIVE Paris - Serverless security: how to protect what you don't see? ...apidays LIVE Paris - Serverless security: how to protect what you don't see? ...
apidays LIVE Paris - Serverless security: how to protect what you don't see? ...
 
Hac IT 4. Emerging Technologies (1).pdf
Hac IT 4. Emerging Technologies  (1).pdfHac IT 4. Emerging Technologies  (1).pdf
Hac IT 4. Emerging Technologies (1).pdf
 
Cybersecurity Legos - We're all part of something bigger
Cybersecurity Legos - We're all part of something biggerCybersecurity Legos - We're all part of something bigger
Cybersecurity Legos - We're all part of something bigger
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
AI for Manufacturing (Machine Vision, Edge AI, Federated Learning)
AI for Manufacturing (Machine Vision, Edge AI, Federated Learning)AI for Manufacturing (Machine Vision, Edge AI, Federated Learning)
AI for Manufacturing (Machine Vision, Edge AI, Federated Learning)
 

Dernier

AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024The Digital Insurer
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDropbox
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfOverkill Security
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...apidays
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024The Digital Insurer
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...Zilliz
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...apidays
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesrafiqahmad00786416
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot ModelNavi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot ModelDeepika Singh
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MIND CTI
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 

Dernier (20)

AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot ModelNavi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 

Supercharged graph visualization for cyber security

  • 1. Supercharged graph visualization for cyber security 5th May 2016 Corey Lanum / Ed Wood 09:00 am PDT 12:00 noon EDT 17:00 BST 18:00 CEST
  • 2. Supercharged graph visualization for cyber security 5th May 2016 Corey Lanum / Ed Wood
  • 3. Agenda ● Introductions ● Some Challenges of Cyber Data ● Live Demos ● Hints and Tips ● Your Questions Webinar will be recorded. Video will be shared tomorrow. Please submit questions via Citrix panel!
  • 4. Cambridge Intelligence • Founded in 2011 • Cambridge UK & Boston US • We help organizations to understand connected data: – Award-winning products – Developer services – Expert know-how
  • 5. • Cross-browser compatibility • Works on any device • A fast developer experience • Rapid deployment • Easy maintenance • Full customization • Powerful functionality Introducing KeyLines KeyLines is a powerful SDK for building network visualization web applications:
  • 6. ‘Graph’ data Enron email traffic Nodes are people Links (or ‘Edges’) are emails exchanged Scale and colour Node using Social Network algorithms Betweenness = number of shortest paths Nodes are on ; indicates seniority Links scaled proportional to volume of email
  • 7. Cyber Security Data “Cybersecurity is the body of technologies, processes and practices designed to protect networks, computers, programs and data from attack, damage or unauthorized access.” Cyber Security data structures often fit very well with Graph entities and visualisations…. E.g. NODES ● Machines ● People ● Data Centres ● Malware Families ● Applications ● Credentials E.g. LINKS ● Attack Vectors ● Data Packets ● Emails ● Credentials ● Vulnerabilities ● Exfiltrated Data A visual and interactive representation can efficiently uncover patterns, trends and anomalies in complex data-sets
  • 8. Size / Volume • Huge number of security events generated by SIEM and other systems... Challenges of Cyber Data (I) Generated at millisecond levels of resolution; Typically stored in disparate silos that can be unwieldy to manage. Challenge is to detect unusual behavior inside terabytes of event and attribute data, including: ● IP logs – detecting indications of infected machines or botnet zombies ● Network logs – uncover applications or users that hog bandwidth so they can optimize systems and prioritize business critical applications. ● Communications logs – for performing analysis to uncover sabotage, espionage or other unwanted activities. ● Web server logs – managing and prevent external threats, such as DDoS attacks.
  • 9. Complexity • Combination of machine and human actors • Subtle interactions of the When and the Where Noise • Significant events and patterns can be hidden in a sea of data • Attackers will attempt to hide their behaviour ! Challenges of Cyber Data (II)
  • 10. ● How to visualize cyber security data: ○ Performance demo ○ Malware demo ○ Data Breach demo ○ Combinations/Grouping demo ○ Geo/TimeBar demo Demos
  • 11. KeyLines 3.0! • Supercharge your charts with (Alpha) ○ Rendering speed up to 10x faster ○ Supported by ‘Big 4’ Browser brands and most devices ○ Improves fluidity & responsiveness with larger datasets • Three new cyber-security demos ○ Inspire creative use of KeyLines • New Angular directive ○ Performance and compatibility
  • 12. Your Questions (I) “Can KeyLines work with real-time data? If so, what visual model / techniques would you recommend?” • Yes, it does. • The Time Bar and Tweak Layouts are designed for this. • Try to limit the volume of data being communicated at any one time. Techniques like combos or ghosting can help. “What is the maximum number of nodes/links you can handle?” ● HTML5 Canvas - a few thousand. ● WebGL - many tens of thousands. ● Using show/hide, around 1 million. BUT this is rarely useful.
  • 13. “How easy it is to change the shape, design and layout of nodes and edges?” • Very easy. • Shapes, image nodes, font icons and other designs possible. • 6 extensible & customizable automated layouts available. “Does WebGL handle rendering thousands of nodes and edges well on machine with say Intel HD 3000?” • WebGL harnesses machine’s GPU and performance will vary • For reference, demos today were using Mac Book Air on Intel HD 5000. Your Questions (II)
  • 14. Your Questions + Live Questions…!
  • 15. ● Cyber Security data is big, complex and noisy. ● A good cyber security visualization needs: ➔ A well thought-out visual model and defined question ➔ Functionality to overcome complexity and noise ◆ Good layouts, filtering, combos, time bar, geospatial ➔ Power to work with data at scale ● Graph visualization is the ideal tool. We’d love to help! Summary
  • 16. Thanks for joining us! @CambridgeIntel Cambridge-Intelligence.com info@cambridge-intelligence.com