SlideShare a Scribd company logo
1 of 46
Download to read offline
Raffael Marty, CEO
Visualization 

In The Age of Big Data
HoneyNet Project Workshop
Stavanger, Norway
May, 2015
Security. Analytics. Insight.2
How Compromises Are Detected
Mandiant M Trends Report 2014 Threat Report
Attackers innetworks before detection
27 days
229 days
Average time toresolveacyberattack
Seems Like Cyber Security 

Is Not Working
Security. Analytics. Insight.3
breaches can be detected (early) - or even be prevented - if we looked at the data
Monitoring To The Rescue
Security. Analytics. Insight.4
Interactive Visualization
Security. Analytics. Insight.5
I am Raffy - I do Viz!
IBM Research
Security. Analytics. Insight.6
• Security Landscape
• What is Going Wrong?
• A New Approach
• Security Analytics
• Big Data Lake
• Visualization
• Challenges
• Data Discovery and Exploration
• Examples
Overview
Security. Analytics. Insight.7
Monitoring Tools
Scoring
Behavior
Log Mgmt
Threat Feeds
Context
Ticket
IR
False Positive
Manual

Triage
Sandboxes
…
Data Sources
Firewall
IPS
Proxy
AV
Endpoint
…
SIEM
Security. Analytics. Insight.8
• Products / Tools
• Firewall - Blocks traffic based on pre-defined rules
• Web Application Firewall - Monitors for signs of known malicious activity in Web traffic
• Intrusion Prevention System - Looks for ‘signs’ of known attacks in traffic and protocol violations
• Anti Virus - Looks for ‘signs’ of known attacks on the end system
• Malware Sandbox - Runs new binaries and monitors their behavior for malicious signs
• Security Information Management - Uses pre-defined rules to correlate signs from different data
streams to augment intelligence
• Vulnerability Scanning - Searches for known vulnerabilities and vulnerable software
• Rely on pattern matching and signatures based knowledge from the past
• Reactive -> always behind
• Unknown and new threats -> won’t be detected
• ‘Imperfect’ patterns and rules -> cause a lot of false positives
We Are Monitoring - What is Going Wrong?
Defense Has Been Relying
On Past Knowledge
Security Analytics
Security. Analytics. Insight.10
A New Approach
ENABLE analysts to leverage their knowledge effectively and efficiently
• scalability - big data based, extensible platform
• visualization - interactive exploration of billions of events
• knowledge - capture from experts
- leverage machines to guide
- automate where possible
- enable collaboration
We Need 

Analysts in the Loop!
(not better algorithms)
Security. Analytics. Insight.11
• Intercept attacks (APT) early in the kill chain
• Detecting intrusions
• Detecting data leaks
• Network-based anomaly detection
• Threat Intelligence
• Attack surface analysis
• Speed up forensic investigations and incident response
• Insider threat detection
• User behavior monitoring
• Privilege abuse
• Fraud detection
• Compliance
• Continuous monitoring
• Risk quantification and metrics
• Business improvements
• Spending justification for security
• Spending optimization (esp. cloud)
Use-Cases Enabled Through Analytics
Data Stores Analytics Forensics Models Admin
10.9.79.109 --> 3.16.204.150
10.8.24.80 --> 192.168.148.193
10.8.50.85 --> 192.168.148.193
10.8.48.128 --> 192.168.148.193
10.9.79.6 --> 192.168.148.193
10.9.79.6
10.8.48.128
80
53
8.8.8.8
127.0.0.1
Anomalies
Decomposition
Data
Seasonal
Trend
Anomaly Details
Find Intruders and ‘New Attacks’
Resolve Incidents Quicker
Communicate Findings
Security. Analytics. Insight.12
Analytics Platform - How It’s Done
Rules
Patterns
Scoring
context
data
Security Big Data Lake
• Explore 

& Hunt
• Visual

Forensics
Behavior
Anomaly 

Detection
• Alert 

Triage
Visualization
Analytics
• Visualization in the center
• Not relying on past knowledge
• Analytics to support not alert
13
Visualization
Security. Analytics. Insight.14
Visualization To …
Present / Communicate Discover / Explore
Security. Analytics. Insight.15
Unknown Unknowns - Visualization Is Central
"There are 1000 ways for someone to steal information.
If we knew how, we could have prevented it.
Visualization helps find that one way.”
- CISO UBS Switzerland
Security. Analytics. Insight.16
Visualization Example (Unknown Unknowns)
PixlCloud is a visual
analytics platform for
cyber security.
This example shows a
heatmap of behavior over
time.
In this case, we see activity
per user. We can see that
‘vincent’ is visually different
from all of the other users.
He shows up very lightly
over the entire time
period. This seems to be
something to look into.
We were able to find this
purely visual, without
understanding the data
more intrinsically.
Security. Analytics. Insight.17
Why Visualization?
the stats ...
http://en.wikipedia.org/wiki/Anscombe%27s_quartet
the data...
Security. Analytics. Insight.18
Why Visualization?
http://en.wikipedia.org/wiki/Anscombe%27s_quartet
Human analyst:
• patterndetection
• remembers context
• fantasticintuition
• canpredict
Security. Analytics. Insight.
• Access to data
• Parsed data and data context
• Data architecture for central data access and fast queries
• Application of data mining (how?, what?, scalable, …)
• Visualization tools that support
• Complex visual types (||-coordinates, treemaps, 

heat maps, link graphs)
• Linked views
• Data mining (clustering, …)
• Visual analytics workflow
19
Visualization Challenges
Security. Analytics. Insight.20
Access paradigms for a backend:
• Analytical queries - mainly for visual interaction
• Accessing large amounts of data in aggregated ways
• Support for intelligent caching (reduce slow re-query of data)
• Statistics - answering frequent ‘aggregation’ queries very fast
• Ad-hoc search
• Raw data retrieval
• Context - deal with data context for time-series data
Enablement - Data Layer Requirements
Note: No mention of HADOOP!
Big Data Lake
Security. Analytics. Insight.22
The Big Data Lake
• One central location to store all cyber security data
• “Data collected only once and third party software leveraging it”
• Scalability and interoperability
• Hard problems:
• Parsing: can you re-parse?
• Data store capabilities (search, analytics, distributed processing, etc.)
• Access to data: SQL (even in Hadoop context), how can products
access the data?
Prevent Re-Collection?
Security. Analytics. Insight.23
The Security Data Lake - Federated Data Access
SIEM
dispatcher
SIEM 

connector
SIEM console
Prod A
AD / LDAP
HR
…
IDS
FW
Prod B
DBs
Data Lake
SNMP
Many many challenges!
Security. Analytics. Insight.24
Data Lake Version 0.5a
SIEM
columnar
or
search engine

or
log management
processing
SIEM 

connector
raw logs
SIEM console
SQL or search

interface
processing
filtering
H
D
F
S
lake
Current solutions (log mgmt / siem):
- not open
- don’t scale
25
Data Discovery &
Exploration
Security. Analytics. Insight.26
Visualize Me Lots (>1TB) of Data
Security. Analytics. Insight.27
Information Visualization Mantra
Overview Zoom / Filter Details on Demand
Principle by Ben Shneiderman
28
SecViz Examples
Security. Analytics. Insight.29
Additional information about
objects, such as:
• machine
• roles
• criticality
• location
• owner
• …
• user
• roles
• office location
• …
Add Context
source destination
machine and 

user context
machine role
user role
Security. Analytics. Insight.30
Traffic Flow Analysis With Context
Security. Analytics. Insight.31
An Analytical Example - Monitor Password Resets
threshold
outliers have different magnitudes
Security. Analytics. Insight.32
Approximate Curve
fitting a curve distance to curve
Security. Analytics. Insight.33
• Holt Winters is exponential smoothing
• Lets you define thresholds for alerting!
Data Mining Applied
• Hard to define alert threshold
better 

threshold
copyright (c) 2013pixlcloud | creating actionable data stories
Internet Service Provider
• Monitoring entire network
• shows scans across
customers on port 445
(Windows shares)
new worm emerging
Security. Analytics. Insight.35
Machine Learning - Clustering Users
Source:

Email logs
Explanation:

The graph shows email
communications between employees
and outside people. 

By clustering the data, different user
groups become visible automatically.


It became visible that there was an
entire cluster that we cannot assign to
a known group of users!
unknown
product teams
sales and marketing
competition
Security. Analytics. Insight.36
Intra-Role Anomaly - Random Order
users
time
dc(machines)
Security. Analytics. Insight.37
Intra-Role Anomaly - With Seriation
Security. Analytics. Insight.38
Intra-Role Anomaly - Sorted by User Role
Administrator
Sales
Development
Finance
Admin???
Security. Analytics. Insight.39
• This looks interesting
• What is it?
• Green -> Port 53
• Only port 53?
• What IPs?
• What’s the time behavior?
• The graph doesn’t answer
these questions
Graphs - A Story
Security. Analytics. Insight.40
Graphs - A Story
• Adding a port
histogram
• Select DNS traffic
and see if other
ports light up.
Note how this is a
user experience
challenge!
Security. Analytics. Insight.41
• Linked Views
• Histograms for
• Source
• Port (Source)
• Destination
• ||-coord
DNS Traffic - A Closer Look
42
Bringing It All 

Together
Security. Analytics. Insight.43
Bringing It All Together
Data Stores Analytics Forensics Models Admin
10.9.79.109 --> 3.16.204.150
10.8.24.80 --> 192.168.148.193
10.8.50.85 --> 192.168.148.193
10.8.48.128 --> 192.168.148.193
10.9.79.6 --> 192.168.148.193
10.9.79.6
10.8.48.128
80
53
8.8.8.8
127.0.0.1
Anomalies
Decomposition
Data
Seasonal
Trend
Anomaly Details
“Hunt” ExplainVisual Search
• Big data backend
• Own visualization engine (Web-based)
• Visualization workflows
Security. Analytics. Insight.44
http://secviz.org
List: secviz.org/mailinglist
Twitter: @secviz
Share, discuss, challenge, and learn about security visualization.
Security Visualization Community
Security. Analytics. Insight.45
BlackHat Workshop
Visual Analytics -
Delivering Actionable Security
Intelligence
August 1-6 2015, Las Vegas, USA
big data | analytics | visualization
http://secviz.org
Security. Analytics. Insight.
raffael.marty@pixlcloud.com
http://slideshare.net/zrlram
http://secviz.org and @secviz
Further resources:

More Related Content

What's hot

Delivering Security Insights with Data Analytics and Visualization
Delivering Security Insights with Data Analytics and VisualizationDelivering Security Insights with Data Analytics and Visualization
Delivering Security Insights with Data Analytics and Visualization
Raffael Marty
 
UserEntityandBehaviorAnalyticsFriedman
UserEntityandBehaviorAnalyticsFriedmanUserEntityandBehaviorAnalyticsFriedman
UserEntityandBehaviorAnalyticsFriedman
Aaron Friedman
 

What's hot (20)

Delivering Security Insights with Data Analytics and Visualization
Delivering Security Insights with Data Analytics and VisualizationDelivering Security Insights with Data Analytics and Visualization
Delivering Security Insights with Data Analytics and Visualization
 
Big data Visualization and Dashboards
Big data Visualization and DashboardsBig data Visualization and Dashboards
Big data Visualization and Dashboards
 
Security Chat 5.0
Security Chat 5.0Security Chat 5.0
Security Chat 5.0
 
Creating Your Own Threat Intel Through Hunting & Visualization
Creating Your Own Threat Intel Through Hunting & VisualizationCreating Your Own Threat Intel Through Hunting & Visualization
Creating Your Own Threat Intel Through Hunting & Visualization
 
The Heatmap
 - Why is Security Visualization so Hard?
The Heatmap
 - Why is Security Visualization so Hard?The Heatmap
 - Why is Security Visualization so Hard?
The Heatmap
 - Why is Security Visualization so Hard?
 
The Heatmap
 - Why is Security Visualization so Hard?
The Heatmap
 - Why is Security Visualization so Hard?The Heatmap
 - Why is Security Visualization so Hard?
The Heatmap
 - Why is Security Visualization so Hard?
 
RSA 2006 - Visual Security Event Analysis
RSA 2006 - Visual Security Event AnalysisRSA 2006 - Visual Security Event Analysis
RSA 2006 - Visual Security Event Analysis
 
AI & ML in Cyber Security - Why Algorithms Are Dangerous
AI & ML in Cyber Security - Why Algorithms Are DangerousAI & ML in Cyber Security - Why Algorithms Are Dangerous
AI & ML in Cyber Security - Why Algorithms Are Dangerous
 
Threat Hunting with Elastic at SpectorOps: Welcome to HELK
Threat Hunting with Elastic at SpectorOps: Welcome to HELKThreat Hunting with Elastic at SpectorOps: Welcome to HELK
Threat Hunting with Elastic at SpectorOps: Welcome to HELK
 
Understanding the "Intelligence" in AI
Understanding the "Intelligence" in AIUnderstanding the "Intelligence" in AI
Understanding the "Intelligence" in AI
 
Jisheng Wang at AI Frontiers: Deep Learning in Security
Jisheng Wang at AI Frontiers: Deep Learning in SecurityJisheng Wang at AI Frontiers: Deep Learning in Security
Jisheng Wang at AI Frontiers: Deep Learning in Security
 
Threat Hunting Platforms (Collaboration with SANS Institute)
Threat Hunting Platforms (Collaboration with SANS Institute)Threat Hunting Platforms (Collaboration with SANS Institute)
Threat Hunting Platforms (Collaboration with SANS Institute)
 
Cyber Threat Hunting with Phirelight
Cyber Threat Hunting with PhirelightCyber Threat Hunting with Phirelight
Cyber Threat Hunting with Phirelight
 
CTI ANT: Hunting for Chinese Threat Intelligence
CTI ANT: Hunting for Chinese Threat IntelligenceCTI ANT: Hunting for Chinese Threat Intelligence
CTI ANT: Hunting for Chinese Threat Intelligence
 
Sqrrl and IBM: Threat Hunting for QRadar Users
Sqrrl and IBM: Threat Hunting for QRadar UsersSqrrl and IBM: Threat Hunting for QRadar Users
Sqrrl and IBM: Threat Hunting for QRadar Users
 
User and Entity Behavior Analytics using the Sqrrl Behavior Graph
User and Entity Behavior Analytics using the Sqrrl Behavior GraphUser and Entity Behavior Analytics using the Sqrrl Behavior Graph
User and Entity Behavior Analytics using the Sqrrl Behavior Graph
 
Threat Hunting vs. UEBA: Similarities, Differences, and How They Work Together
Threat Hunting vs. UEBA: Similarities, Differences, and How They Work Together Threat Hunting vs. UEBA: Similarities, Differences, and How They Work Together
Threat Hunting vs. UEBA: Similarities, Differences, and How They Work Together
 
UserEntityandBehaviorAnalyticsFriedman
UserEntityandBehaviorAnalyticsFriedmanUserEntityandBehaviorAnalyticsFriedman
UserEntityandBehaviorAnalyticsFriedman
 
Creating Your Own Threat Intel Through Hunting & Visualization
Creating Your Own Threat Intel Through Hunting & VisualizationCreating Your Own Threat Intel Through Hunting & Visualization
Creating Your Own Threat Intel Through Hunting & Visualization
 
Big Data Analytics to Enhance Security
Big Data Analytics to Enhance SecurityBig Data Analytics to Enhance Security
Big Data Analytics to Enhance Security
 

Viewers also liked

The Rise of Big Data and the Chief Data Officer (CDO)
The Rise of Big Data and the Chief Data Officer (CDO)The Rise of Big Data and the Chief Data Officer (CDO)
The Rise of Big Data and the Chief Data Officer (CDO)
gcharlesj
 
Snapdragon processors
Snapdragon processorsSnapdragon processors
Snapdragon processors
Deepak Mathew
 
Talking to your CEO about the Chief Data Officer Role
Talking to your CEO about the Chief Data Officer Role Talking to your CEO about the Chief Data Officer Role
Talking to your CEO about the Chief Data Officer Role
Craig Milroy
 

Viewers also liked (17)

Big Data Visualization
Big Data VisualizationBig Data Visualization
Big Data Visualization
 
Optical Burst Switching
Optical Burst SwitchingOptical Burst Switching
Optical Burst Switching
 
Wroclaw SAP Meetup - 2016/10
Wroclaw SAP Meetup - 2016/10Wroclaw SAP Meetup - 2016/10
Wroclaw SAP Meetup - 2016/10
 
Wroclaw SAP Meetup - 2017/01
Wroclaw SAP Meetup - 2017/01Wroclaw SAP Meetup - 2017/01
Wroclaw SAP Meetup - 2017/01
 
Quantify your drive: IoT on a personal scale with SAP technologies
Quantify your drive: IoT on a personal scale with SAP technologiesQuantify your drive: IoT on a personal scale with SAP technologies
Quantify your drive: IoT on a personal scale with SAP technologies
 
CDO Slides: A Chief Data Officer Interview
CDO Slides: A Chief Data Officer InterviewCDO Slides: A Chief Data Officer Interview
CDO Slides: A Chief Data Officer Interview
 
Workshop: Big Data Visualization for Security
Workshop: Big Data Visualization for SecurityWorkshop: Big Data Visualization for Security
Workshop: Big Data Visualization for Security
 
The Rise of Big Data and the Chief Data Officer (CDO)
The Rise of Big Data and the Chief Data Officer (CDO)The Rise of Big Data and the Chief Data Officer (CDO)
The Rise of Big Data and the Chief Data Officer (CDO)
 
The 3-Speed Chief Data Officer
The 3-Speed Chief Data OfficerThe 3-Speed Chief Data Officer
The 3-Speed Chief Data Officer
 
The Chief Data Officer: Bridging the gap between data and decision-making
The Chief Data Officer: Bridging the gap between data and decision-makingThe Chief Data Officer: Bridging the gap between data and decision-making
The Chief Data Officer: Bridging the gap between data and decision-making
 
WSO2Con USA 2015: Keynote - The Future of Real-Time Analytics and IoT
WSO2Con USA 2015: Keynote - The Future of Real-Time Analytics and IoTWSO2Con USA 2015: Keynote - The Future of Real-Time Analytics and IoT
WSO2Con USA 2015: Keynote - The Future of Real-Time Analytics and IoT
 
Snapdragon processors
Snapdragon processorsSnapdragon processors
Snapdragon processors
 
Talking to your CEO about the Chief Data Officer Role
Talking to your CEO about the Chief Data Officer Role Talking to your CEO about the Chief Data Officer Role
Talking to your CEO about the Chief Data Officer Role
 
Chief Data Officer: Overcoming Data Silos for True Business Value
Chief Data Officer: Overcoming Data Silos for True Business ValueChief Data Officer: Overcoming Data Silos for True Business Value
Chief Data Officer: Overcoming Data Silos for True Business Value
 
Combating Fraud and Intrusion Threats with Event Processing
Combating Fraud and Intrusion Threats with Event ProcessingCombating Fraud and Intrusion Threats with Event Processing
Combating Fraud and Intrusion Threats with Event Processing
 
New CPO - The First 100 Days
New CPO - The First 100 DaysNew CPO - The First 100 Days
New CPO - The First 100 Days
 
Real-Time Analytics with Confluent and MemSQL
Real-Time Analytics with Confluent and MemSQLReal-Time Analytics with Confluent and MemSQL
Real-Time Analytics with Confluent and MemSQL
 

Similar to Visualization in the Age of Big Data

BsidesLVPresso2016_JZeditsv6
BsidesLVPresso2016_JZeditsv6BsidesLVPresso2016_JZeditsv6
BsidesLVPresso2016_JZeditsv6
Rod Soto
 

Similar to Visualization in the Age of Big Data (20)

Security Analytics for Data Discovery - Closing the SIEM Gap
Security Analytics for Data Discovery - Closing the SIEM GapSecurity Analytics for Data Discovery - Closing the SIEM Gap
Security Analytics for Data Discovery - Closing the SIEM Gap
 
Security Breakout Session
Security Breakout Session Security Breakout Session
Security Breakout Session
 
Technical track chris calvert-1 30 pm-issa conference-calvert
Technical track chris calvert-1 30 pm-issa conference-calvertTechnical track chris calvert-1 30 pm-issa conference-calvert
Technical track chris calvert-1 30 pm-issa conference-calvert
 
Guardium Data Activiy Monitor For C- Level Executives
Guardium Data Activiy Monitor For C- Level ExecutivesGuardium Data Activiy Monitor For C- Level Executives
Guardium Data Activiy Monitor For C- Level Executives
 
BsidesLVPresso2016_JZeditsv6
BsidesLVPresso2016_JZeditsv6BsidesLVPresso2016_JZeditsv6
BsidesLVPresso2016_JZeditsv6
 
Security Analytics Beyond Cyber
Security Analytics Beyond CyberSecurity Analytics Beyond Cyber
Security Analytics Beyond Cyber
 
44CON 2014 - Security Analytics Beyond Cyber, Phil Huggins
44CON 2014 - Security Analytics Beyond Cyber, Phil Huggins44CON 2014 - Security Analytics Beyond Cyber, Phil Huggins
44CON 2014 - Security Analytics Beyond Cyber, Phil Huggins
 
MID_SIEM_Boubker_EN
MID_SIEM_Boubker_ENMID_SIEM_Boubker_EN
MID_SIEM_Boubker_EN
 
Preventing The Next Data Breach Through Log Management
Preventing The Next Data Breach Through Log ManagementPreventing The Next Data Breach Through Log Management
Preventing The Next Data Breach Through Log Management
 
PLNOG19 - Gaweł Mikołajczyk & Michał Garcarz - SOC, studium ciężkich przypadków
PLNOG19 - Gaweł Mikołajczyk & Michał Garcarz - SOC, studium ciężkich przypadkówPLNOG19 - Gaweł Mikołajczyk & Michał Garcarz - SOC, studium ciężkich przypadków
PLNOG19 - Gaweł Mikołajczyk & Michał Garcarz - SOC, studium ciężkich przypadków
 
Ten security product categories you've (probably) never heard of
Ten security product categories you've (probably) never heard ofTen security product categories you've (probably) never heard of
Ten security product categories you've (probably) never heard of
 
Lessons Learned Fighting Modern Cyberthreats in Critical ICS Networks
Lessons Learned Fighting Modern Cyberthreats in Critical ICS NetworksLessons Learned Fighting Modern Cyberthreats in Critical ICS Networks
Lessons Learned Fighting Modern Cyberthreats in Critical ICS Networks
 
Rise of the machines -- Owasp israel -- June 2014 meetup
Rise of the machines -- Owasp israel -- June 2014 meetupRise of the machines -- Owasp israel -- June 2014 meetup
Rise of the machines -- Owasp israel -- June 2014 meetup
 
Big Data Analytics to Enhance Security คุณอนพัทย์ พิพัฒน์กิติบดี Technical Ma...
Big Data Analytics to Enhance Security คุณอนพัทย์ พิพัฒน์กิติบดี Technical Ma...Big Data Analytics to Enhance Security คุณอนพัทย์ พิพัฒน์กิติบดี Technical Ma...
Big Data Analytics to Enhance Security คุณอนพัทย์ พิพัฒน์กิติบดี Technical Ma...
 
Operationalizing Security Intelligence
Operationalizing Security IntelligenceOperationalizing Security Intelligence
Operationalizing Security Intelligence
 
Soc analyst course content v3
Soc analyst course content v3Soc analyst course content v3
Soc analyst course content v3
 
Soc analyst course content
Soc analyst course contentSoc analyst course content
Soc analyst course content
 
Cyber Risk Management in 2017: Challenges & Recommendations
Cyber Risk Management in 2017: Challenges & RecommendationsCyber Risk Management in 2017: Challenges & Recommendations
Cyber Risk Management in 2017: Challenges & Recommendations
 
CLASS 2018 - Palestra de Denis Prado (Security Intelligence Sales Leader Lati...
CLASS 2018 - Palestra de Denis Prado (Security Intelligence Sales Leader Lati...CLASS 2018 - Palestra de Denis Prado (Security Intelligence Sales Leader Lati...
CLASS 2018 - Palestra de Denis Prado (Security Intelligence Sales Leader Lati...
 
SOC Architecture Workshop - Part 1
SOC Architecture Workshop - Part 1SOC Architecture Workshop - Part 1
SOC Architecture Workshop - Part 1
 

More from Raffael Marty

More from Raffael Marty (12)

Exploring the Defender's Advantage
Exploring the Defender's AdvantageExploring the Defender's Advantage
Exploring the Defender's Advantage
 
Extended Detection and Response (XDR) An Overhyped Product Category With Ulti...
Extended Detection and Response (XDR)An Overhyped Product Category With Ulti...Extended Detection and Response (XDR)An Overhyped Product Category With Ulti...
Extended Detection and Response (XDR) An Overhyped Product Category With Ulti...
 
Cyber Security Beyond 2020 – Will We Learn From Our Mistakes?
Cyber Security Beyond 2020 – Will We Learn From Our Mistakes?Cyber Security Beyond 2020 – Will We Learn From Our Mistakes?
Cyber Security Beyond 2020 – Will We Learn From Our Mistakes?
 
DAVIX - Data Analysis and Visualization Linux
DAVIX - Data Analysis and Visualization LinuxDAVIX - Data Analysis and Visualization Linux
DAVIX - Data Analysis and Visualization Linux
 
Cyber Security – How Visual Analytics Unlock Insight
Cyber Security – How Visual Analytics Unlock InsightCyber Security – How Visual Analytics Unlock Insight
Cyber Security – How Visual Analytics Unlock Insight
 
AfterGlow
AfterGlowAfterGlow
AfterGlow
 
Supercharging Visualization with Data Mining
Supercharging Visualization with Data MiningSupercharging Visualization with Data Mining
Supercharging Visualization with Data Mining
 
Security Visualization - Let's Take A Step Back
Security Visualization - Let's Take A Step BackSecurity Visualization - Let's Take A Step Back
Security Visualization - Let's Take A Step Back
 
Visual Analytics and Security Intelligence
Visual Analytics and Security IntelligenceVisual Analytics and Security Intelligence
Visual Analytics and Security Intelligence
 
Log Visualization - Bellua BCS 2006
Log Visualization - Bellua BCS 2006Log Visualization - Bellua BCS 2006
Log Visualization - Bellua BCS 2006
 
Event Graphs - EUSecWest 2006
Event Graphs - EUSecWest 2006Event Graphs - EUSecWest 2006
Event Graphs - EUSecWest 2006
 
Insider Threat Visualization - HackInTheBox 2007
Insider Threat Visualization - HackInTheBox 2007Insider Threat Visualization - HackInTheBox 2007
Insider Threat Visualization - HackInTheBox 2007
 

Recently uploaded

Call Girls Hsr Layout Just Call 👗 7737669865 👗 Top Class Call Girl Service Ba...
Call Girls Hsr Layout Just Call 👗 7737669865 👗 Top Class Call Girl Service Ba...Call Girls Hsr Layout Just Call 👗 7737669865 👗 Top Class Call Girl Service Ba...
Call Girls Hsr Layout Just Call 👗 7737669865 👗 Top Class Call Girl Service Ba...
amitlee9823
 
Call Girls Bannerghatta Road Just Call 👗 7737669865 👗 Top Class Call Girl Ser...
Call Girls Bannerghatta Road Just Call 👗 7737669865 👗 Top Class Call Girl Ser...Call Girls Bannerghatta Road Just Call 👗 7737669865 👗 Top Class Call Girl Ser...
Call Girls Bannerghatta Road Just Call 👗 7737669865 👗 Top Class Call Girl Ser...
amitlee9823
 
Escorts Service Kumaraswamy Layout ☎ 7737669865☎ Book Your One night Stand (B...
Escorts Service Kumaraswamy Layout ☎ 7737669865☎ Book Your One night Stand (B...Escorts Service Kumaraswamy Layout ☎ 7737669865☎ Book Your One night Stand (B...
Escorts Service Kumaraswamy Layout ☎ 7737669865☎ Book Your One night Stand (B...
amitlee9823
 
Call Girls Indiranagar Just Call 👗 7737669865 👗 Top Class Call Girl Service B...
Call Girls Indiranagar Just Call 👗 7737669865 👗 Top Class Call Girl Service B...Call Girls Indiranagar Just Call 👗 7737669865 👗 Top Class Call Girl Service B...
Call Girls Indiranagar Just Call 👗 7737669865 👗 Top Class Call Girl Service B...
amitlee9823
 
Call Girls Indiranagar Just Call 👗 9155563397 👗 Top Class Call Girl Service B...
Call Girls Indiranagar Just Call 👗 9155563397 👗 Top Class Call Girl Service B...Call Girls Indiranagar Just Call 👗 9155563397 👗 Top Class Call Girl Service B...
Call Girls Indiranagar Just Call 👗 9155563397 👗 Top Class Call Girl Service B...
only4webmaster01
 
Chintamani Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore ...
Chintamani Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore ...Chintamani Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore ...
Chintamani Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore ...
amitlee9823
 
➥🔝 7737669865 🔝▻ Thrissur Call-girls in Women Seeking Men 🔝Thrissur🔝 Escor...
➥🔝 7737669865 🔝▻ Thrissur Call-girls in Women Seeking Men  🔝Thrissur🔝   Escor...➥🔝 7737669865 🔝▻ Thrissur Call-girls in Women Seeking Men  🔝Thrissur🔝   Escor...
➥🔝 7737669865 🔝▻ Thrissur Call-girls in Women Seeking Men 🔝Thrissur🔝 Escor...
amitlee9823
 
Call Girls In Bellandur ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bellandur ☎ 7737669865 🥵 Book Your One night StandCall Girls In Bellandur ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bellandur ☎ 7737669865 🥵 Book Your One night Stand
amitlee9823
 
Probability Grade 10 Third Quarter Lessons
Probability Grade 10 Third Quarter LessonsProbability Grade 10 Third Quarter Lessons
Probability Grade 10 Third Quarter Lessons
JoseMangaJr1
 
Call Girls Jalahalli Just Call 👗 7737669865 👗 Top Class Call Girl Service Ban...
Call Girls Jalahalli Just Call 👗 7737669865 👗 Top Class Call Girl Service Ban...Call Girls Jalahalli Just Call 👗 7737669865 👗 Top Class Call Girl Service Ban...
Call Girls Jalahalli Just Call 👗 7737669865 👗 Top Class Call Girl Service Ban...
amitlee9823
 
Junnasandra Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
Junnasandra Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...Junnasandra Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
Junnasandra Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
amitlee9823
 
Call Girls Bommasandra Just Call 👗 7737669865 👗 Top Class Call Girl Service B...
Call Girls Bommasandra Just Call 👗 7737669865 👗 Top Class Call Girl Service B...Call Girls Bommasandra Just Call 👗 7737669865 👗 Top Class Call Girl Service B...
Call Girls Bommasandra Just Call 👗 7737669865 👗 Top Class Call Girl Service B...
amitlee9823
 
Call Girls Begur Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Begur Just Call 👗 7737669865 👗 Top Class Call Girl Service BangaloreCall Girls Begur Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Begur Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
amitlee9823
 
Abortion pills in Doha Qatar (+966572737505 ! Get Cytotec
Abortion pills in Doha Qatar (+966572737505 ! Get CytotecAbortion pills in Doha Qatar (+966572737505 ! Get Cytotec
Abortion pills in Doha Qatar (+966572737505 ! Get Cytotec
Abortion pills in Riyadh +966572737505 get cytotec
 

Recently uploaded (20)

Call Girls Hsr Layout Just Call 👗 7737669865 👗 Top Class Call Girl Service Ba...
Call Girls Hsr Layout Just Call 👗 7737669865 👗 Top Class Call Girl Service Ba...Call Girls Hsr Layout Just Call 👗 7737669865 👗 Top Class Call Girl Service Ba...
Call Girls Hsr Layout Just Call 👗 7737669865 👗 Top Class Call Girl Service Ba...
 
Call Girls Bannerghatta Road Just Call 👗 7737669865 👗 Top Class Call Girl Ser...
Call Girls Bannerghatta Road Just Call 👗 7737669865 👗 Top Class Call Girl Ser...Call Girls Bannerghatta Road Just Call 👗 7737669865 👗 Top Class Call Girl Ser...
Call Girls Bannerghatta Road Just Call 👗 7737669865 👗 Top Class Call Girl Ser...
 
Escorts Service Kumaraswamy Layout ☎ 7737669865☎ Book Your One night Stand (B...
Escorts Service Kumaraswamy Layout ☎ 7737669865☎ Book Your One night Stand (B...Escorts Service Kumaraswamy Layout ☎ 7737669865☎ Book Your One night Stand (B...
Escorts Service Kumaraswamy Layout ☎ 7737669865☎ Book Your One night Stand (B...
 
Call Girls Indiranagar Just Call 👗 7737669865 👗 Top Class Call Girl Service B...
Call Girls Indiranagar Just Call 👗 7737669865 👗 Top Class Call Girl Service B...Call Girls Indiranagar Just Call 👗 7737669865 👗 Top Class Call Girl Service B...
Call Girls Indiranagar Just Call 👗 7737669865 👗 Top Class Call Girl Service B...
 
Call Girls Indiranagar Just Call 👗 9155563397 👗 Top Class Call Girl Service B...
Call Girls Indiranagar Just Call 👗 9155563397 👗 Top Class Call Girl Service B...Call Girls Indiranagar Just Call 👗 9155563397 👗 Top Class Call Girl Service B...
Call Girls Indiranagar Just Call 👗 9155563397 👗 Top Class Call Girl Service B...
 
Chintamani Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore ...
Chintamani Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore ...Chintamani Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore ...
Chintamani Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore ...
 
➥🔝 7737669865 🔝▻ Thrissur Call-girls in Women Seeking Men 🔝Thrissur🔝 Escor...
➥🔝 7737669865 🔝▻ Thrissur Call-girls in Women Seeking Men  🔝Thrissur🔝   Escor...➥🔝 7737669865 🔝▻ Thrissur Call-girls in Women Seeking Men  🔝Thrissur🔝   Escor...
➥🔝 7737669865 🔝▻ Thrissur Call-girls in Women Seeking Men 🔝Thrissur🔝 Escor...
 
Call Girls In Bellandur ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bellandur ☎ 7737669865 🥵 Book Your One night StandCall Girls In Bellandur ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bellandur ☎ 7737669865 🥵 Book Your One night Stand
 
Probability Grade 10 Third Quarter Lessons
Probability Grade 10 Third Quarter LessonsProbability Grade 10 Third Quarter Lessons
Probability Grade 10 Third Quarter Lessons
 
Call Girls Jalahalli Just Call 👗 7737669865 👗 Top Class Call Girl Service Ban...
Call Girls Jalahalli Just Call 👗 7737669865 👗 Top Class Call Girl Service Ban...Call Girls Jalahalli Just Call 👗 7737669865 👗 Top Class Call Girl Service Ban...
Call Girls Jalahalli Just Call 👗 7737669865 👗 Top Class Call Girl Service Ban...
 
hybrid Seed Production In Chilli & Capsicum.pptx
hybrid Seed Production In Chilli & Capsicum.pptxhybrid Seed Production In Chilli & Capsicum.pptx
hybrid Seed Production In Chilli & Capsicum.pptx
 
Thane Call Girls 7091864438 Call Girls in Thane Escort service book now -
Thane Call Girls 7091864438 Call Girls in Thane Escort service book now -Thane Call Girls 7091864438 Call Girls in Thane Escort service book now -
Thane Call Girls 7091864438 Call Girls in Thane Escort service book now -
 
Junnasandra Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
Junnasandra Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...Junnasandra Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
Junnasandra Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
 
Call Girls Bommasandra Just Call 👗 7737669865 👗 Top Class Call Girl Service B...
Call Girls Bommasandra Just Call 👗 7737669865 👗 Top Class Call Girl Service B...Call Girls Bommasandra Just Call 👗 7737669865 👗 Top Class Call Girl Service B...
Call Girls Bommasandra Just Call 👗 7737669865 👗 Top Class Call Girl Service B...
 
Call Girls Begur Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Begur Just Call 👗 7737669865 👗 Top Class Call Girl Service BangaloreCall Girls Begur Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Begur Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
 
Cheap Rate Call girls Sarita Vihar Delhi 9205541914 shot 1500 night
Cheap Rate Call girls Sarita Vihar Delhi 9205541914 shot 1500 nightCheap Rate Call girls Sarita Vihar Delhi 9205541914 shot 1500 night
Cheap Rate Call girls Sarita Vihar Delhi 9205541914 shot 1500 night
 
Abortion pills in Doha Qatar (+966572737505 ! Get Cytotec
Abortion pills in Doha Qatar (+966572737505 ! Get CytotecAbortion pills in Doha Qatar (+966572737505 ! Get Cytotec
Abortion pills in Doha Qatar (+966572737505 ! Get Cytotec
 
Detecting Credit Card Fraud: A Machine Learning Approach
Detecting Credit Card Fraud: A Machine Learning ApproachDetecting Credit Card Fraud: A Machine Learning Approach
Detecting Credit Card Fraud: A Machine Learning Approach
 
Call Girls in Sarai Kale Khan Delhi 💯 Call Us 🔝9205541914 🔝( Delhi) Escorts S...
Call Girls in Sarai Kale Khan Delhi 💯 Call Us 🔝9205541914 🔝( Delhi) Escorts S...Call Girls in Sarai Kale Khan Delhi 💯 Call Us 🔝9205541914 🔝( Delhi) Escorts S...
Call Girls in Sarai Kale Khan Delhi 💯 Call Us 🔝9205541914 🔝( Delhi) Escorts S...
 
April 2024 - Crypto Market Report's Analysis
April 2024 - Crypto Market Report's AnalysisApril 2024 - Crypto Market Report's Analysis
April 2024 - Crypto Market Report's Analysis
 

Visualization in the Age of Big Data

  • 1. Raffael Marty, CEO Visualization 
 In The Age of Big Data HoneyNet Project Workshop Stavanger, Norway May, 2015
  • 2. Security. Analytics. Insight.2 How Compromises Are Detected Mandiant M Trends Report 2014 Threat Report Attackers innetworks before detection 27 days 229 days Average time toresolveacyberattack Seems Like Cyber Security 
 Is Not Working
  • 3. Security. Analytics. Insight.3 breaches can be detected (early) - or even be prevented - if we looked at the data Monitoring To The Rescue
  • 5. Security. Analytics. Insight.5 I am Raffy - I do Viz! IBM Research
  • 6. Security. Analytics. Insight.6 • Security Landscape • What is Going Wrong? • A New Approach • Security Analytics • Big Data Lake • Visualization • Challenges • Data Discovery and Exploration • Examples Overview
  • 7. Security. Analytics. Insight.7 Monitoring Tools Scoring Behavior Log Mgmt Threat Feeds Context Ticket IR False Positive Manual
 Triage Sandboxes … Data Sources Firewall IPS Proxy AV Endpoint … SIEM
  • 8. Security. Analytics. Insight.8 • Products / Tools • Firewall - Blocks traffic based on pre-defined rules • Web Application Firewall - Monitors for signs of known malicious activity in Web traffic • Intrusion Prevention System - Looks for ‘signs’ of known attacks in traffic and protocol violations • Anti Virus - Looks for ‘signs’ of known attacks on the end system • Malware Sandbox - Runs new binaries and monitors their behavior for malicious signs • Security Information Management - Uses pre-defined rules to correlate signs from different data streams to augment intelligence • Vulnerability Scanning - Searches for known vulnerabilities and vulnerable software • Rely on pattern matching and signatures based knowledge from the past • Reactive -> always behind • Unknown and new threats -> won’t be detected • ‘Imperfect’ patterns and rules -> cause a lot of false positives We Are Monitoring - What is Going Wrong? Defense Has Been Relying On Past Knowledge
  • 10. Security. Analytics. Insight.10 A New Approach ENABLE analysts to leverage their knowledge effectively and efficiently • scalability - big data based, extensible platform • visualization - interactive exploration of billions of events • knowledge - capture from experts - leverage machines to guide - automate where possible - enable collaboration We Need 
 Analysts in the Loop! (not better algorithms)
  • 11. Security. Analytics. Insight.11 • Intercept attacks (APT) early in the kill chain • Detecting intrusions • Detecting data leaks • Network-based anomaly detection • Threat Intelligence • Attack surface analysis • Speed up forensic investigations and incident response • Insider threat detection • User behavior monitoring • Privilege abuse • Fraud detection • Compliance • Continuous monitoring • Risk quantification and metrics • Business improvements • Spending justification for security • Spending optimization (esp. cloud) Use-Cases Enabled Through Analytics Data Stores Analytics Forensics Models Admin 10.9.79.109 --> 3.16.204.150 10.8.24.80 --> 192.168.148.193 10.8.50.85 --> 192.168.148.193 10.8.48.128 --> 192.168.148.193 10.9.79.6 --> 192.168.148.193 10.9.79.6 10.8.48.128 80 53 8.8.8.8 127.0.0.1 Anomalies Decomposition Data Seasonal Trend Anomaly Details Find Intruders and ‘New Attacks’ Resolve Incidents Quicker Communicate Findings
  • 12. Security. Analytics. Insight.12 Analytics Platform - How It’s Done Rules Patterns Scoring context data Security Big Data Lake • Explore 
 & Hunt • Visual
 Forensics Behavior Anomaly 
 Detection • Alert 
 Triage Visualization Analytics • Visualization in the center • Not relying on past knowledge • Analytics to support not alert
  • 14. Security. Analytics. Insight.14 Visualization To … Present / Communicate Discover / Explore
  • 15. Security. Analytics. Insight.15 Unknown Unknowns - Visualization Is Central "There are 1000 ways for someone to steal information. If we knew how, we could have prevented it. Visualization helps find that one way.” - CISO UBS Switzerland
  • 16. Security. Analytics. Insight.16 Visualization Example (Unknown Unknowns) PixlCloud is a visual analytics platform for cyber security. This example shows a heatmap of behavior over time. In this case, we see activity per user. We can see that ‘vincent’ is visually different from all of the other users. He shows up very lightly over the entire time period. This seems to be something to look into. We were able to find this purely visual, without understanding the data more intrinsically.
  • 17. Security. Analytics. Insight.17 Why Visualization? the stats ... http://en.wikipedia.org/wiki/Anscombe%27s_quartet the data...
  • 18. Security. Analytics. Insight.18 Why Visualization? http://en.wikipedia.org/wiki/Anscombe%27s_quartet Human analyst: • patterndetection • remembers context • fantasticintuition • canpredict
  • 19. Security. Analytics. Insight. • Access to data • Parsed data and data context • Data architecture for central data access and fast queries • Application of data mining (how?, what?, scalable, …) • Visualization tools that support • Complex visual types (||-coordinates, treemaps, 
 heat maps, link graphs) • Linked views • Data mining (clustering, …) • Visual analytics workflow 19 Visualization Challenges
  • 20. Security. Analytics. Insight.20 Access paradigms for a backend: • Analytical queries - mainly for visual interaction • Accessing large amounts of data in aggregated ways • Support for intelligent caching (reduce slow re-query of data) • Statistics - answering frequent ‘aggregation’ queries very fast • Ad-hoc search • Raw data retrieval • Context - deal with data context for time-series data Enablement - Data Layer Requirements Note: No mention of HADOOP!
  • 22. Security. Analytics. Insight.22 The Big Data Lake • One central location to store all cyber security data • “Data collected only once and third party software leveraging it” • Scalability and interoperability • Hard problems: • Parsing: can you re-parse? • Data store capabilities (search, analytics, distributed processing, etc.) • Access to data: SQL (even in Hadoop context), how can products access the data? Prevent Re-Collection?
  • 23. Security. Analytics. Insight.23 The Security Data Lake - Federated Data Access SIEM dispatcher SIEM 
 connector SIEM console Prod A AD / LDAP HR … IDS FW Prod B DBs Data Lake SNMP Many many challenges!
  • 24. Security. Analytics. Insight.24 Data Lake Version 0.5a SIEM columnar or search engine
 or log management processing SIEM 
 connector raw logs SIEM console SQL or search
 interface processing filtering H D F S lake Current solutions (log mgmt / siem): - not open - don’t scale
  • 27. Security. Analytics. Insight.27 Information Visualization Mantra Overview Zoom / Filter Details on Demand Principle by Ben Shneiderman
  • 29. Security. Analytics. Insight.29 Additional information about objects, such as: • machine • roles • criticality • location • owner • … • user • roles • office location • … Add Context source destination machine and 
 user context machine role user role
  • 30. Security. Analytics. Insight.30 Traffic Flow Analysis With Context
  • 31. Security. Analytics. Insight.31 An Analytical Example - Monitor Password Resets threshold outliers have different magnitudes
  • 32. Security. Analytics. Insight.32 Approximate Curve fitting a curve distance to curve
  • 33. Security. Analytics. Insight.33 • Holt Winters is exponential smoothing • Lets you define thresholds for alerting! Data Mining Applied • Hard to define alert threshold better 
 threshold
  • 34. copyright (c) 2013pixlcloud | creating actionable data stories Internet Service Provider • Monitoring entire network • shows scans across customers on port 445 (Windows shares) new worm emerging
  • 35. Security. Analytics. Insight.35 Machine Learning - Clustering Users Source:
 Email logs Explanation:
 The graph shows email communications between employees and outside people. 
 By clustering the data, different user groups become visible automatically. 
 It became visible that there was an entire cluster that we cannot assign to a known group of users! unknown product teams sales and marketing competition
  • 36. Security. Analytics. Insight.36 Intra-Role Anomaly - Random Order users time dc(machines)
  • 37. Security. Analytics. Insight.37 Intra-Role Anomaly - With Seriation
  • 38. Security. Analytics. Insight.38 Intra-Role Anomaly - Sorted by User Role Administrator Sales Development Finance Admin???
  • 39. Security. Analytics. Insight.39 • This looks interesting • What is it? • Green -> Port 53 • Only port 53? • What IPs? • What’s the time behavior? • The graph doesn’t answer these questions Graphs - A Story
  • 40. Security. Analytics. Insight.40 Graphs - A Story • Adding a port histogram • Select DNS traffic and see if other ports light up. Note how this is a user experience challenge!
  • 41. Security. Analytics. Insight.41 • Linked Views • Histograms for • Source • Port (Source) • Destination • ||-coord DNS Traffic - A Closer Look
  • 42. 42 Bringing It All 
 Together
  • 43. Security. Analytics. Insight.43 Bringing It All Together Data Stores Analytics Forensics Models Admin 10.9.79.109 --> 3.16.204.150 10.8.24.80 --> 192.168.148.193 10.8.50.85 --> 192.168.148.193 10.8.48.128 --> 192.168.148.193 10.9.79.6 --> 192.168.148.193 10.9.79.6 10.8.48.128 80 53 8.8.8.8 127.0.0.1 Anomalies Decomposition Data Seasonal Trend Anomaly Details “Hunt” ExplainVisual Search • Big data backend • Own visualization engine (Web-based) • Visualization workflows
  • 44. Security. Analytics. Insight.44 http://secviz.org List: secviz.org/mailinglist Twitter: @secviz Share, discuss, challenge, and learn about security visualization. Security Visualization Community
  • 45. Security. Analytics. Insight.45 BlackHat Workshop Visual Analytics - Delivering Actionable Security Intelligence August 1-6 2015, Las Vegas, USA big data | analytics | visualization http://secviz.org