SlideShare a Scribd company logo
Big Data vs. Big Brother:
Join the Conversation #WolframDataSummit
@ParrottSquawk
@ProjectOpenSOC
Privacy-Preserving Advanced
Threat Analytics at Scale
Chester Parrott, Data Scientist, Cisco ATA
PhD Student, LSU
Research
ML/DM/AI
Security
Game Theory
Graph Theory
Anomaly Detection
Access Control
Automated Testing
System Simulation
Stochastic Models
Software
Engineering
Scalable Data
Platforms
Background Skillset Application
Work
Research
• Threats
• Models
• Algorithms
Prototype
• Threats
• Algorithms
• Systems
Weaponize
• Systems
• Architecture
• Algorithms
Managed Security Services
Advanced Threat Analytics
Conway’s Data Science Venn Diagram
Credit: http://drewconway.com/zia/2013/3/26/the-data-science-venn-diagram
Joel Grus’ Post-Prism Data Science Venn Diagram
Credit: http://joelgrus.com/2013/06/09/post-prism-data-science-venn-diagram/
Ruthless Pragmatism?
Credit: http://static1.businessinsider.com/image/5310f81469beddd64eae2721/frank-underwood-is-embarrassingly-ignorant-about-how-
treasury-auctions-work.jpg
Freedom/Anarchy/Chaos?
Credit: http://blog.codefx.org/wp-content/uploads/anonymous-classes.jpg
Unbalanced between two extremes
Credit: http://ecx.images-amazon.com/images/I/51se5x3zlxL.jpg
http://blog.gabrielsaldana.org/how-orwells-1984-novel-is-very-accurate-for-2013
Necessity is the mother of reinvention
Credit: http://i.stack.imgur.com/9eHIv.png
Lack of communication
Credit: http://rhinestonearmadillo.typepad.com/the_rhinestone_bookmark/2013/04/the-blind-men-and-the-elephant-fairy-tale-art.html
Data Anonymization
Join the Conversation #WolframDataSummit
@ParrottSquawk
@ProjectOpenSOC
How should we anonymize data
*without losing their multi-variate statistical significance?
Anonymization vs. Summarization
Summarization
D
Model
M1
M2
M3
…
Pipeline
Data
Models
Regenerate
M’1
M’2
M’3
…
Data
Lab
Analysis
Anonymization vs. Summarization
Anonymization
D
Transformation
M1
M2
M3
…
Pipeline
D’
Lab
Analysis
Modern Methods of Data Summarization
Generalization
0
1
2
3
4
5
6
7
0 1 2 3 4 5 6 7
ObservableVariable1
Observable Variable 2
Comparison of Observable Values
If it has webbed feet like a duck,
has a bill like a duck,
eats the same things as a duck,
it is probably…
You know you meant to say platypus…
Classical Methods of Data Anonymization
Redaction
Credit: https://nsarchive.wordpress.com/2010/07/23/what-if-nixon-had-become-a-g-man/
http://versewisconsin.org/wiprotests/media/redactGovernorWalker.png
Classical Methods of Data Anonymization
Encryption
Ciphertext
Encryption
Method
Plaintext
Key
Plaintext
Decryption
Method
Ciphertext
Key
Transmission
Encryption Decryption
Classical Methods of Data Anonymization
Steganography
Credit: http://opticalengineering.spiedigitallibrary.org/article.aspx?articleid=1096199
Modern Methods of Data Anonymization
Perturbation
Credit: http://dsp.stackexchange.com/questions/24430/generate-fourier-transform-signal
0
5
10
15
20
25
30
35
Observation1
Observation3
Observation5
Observation7
Observation9
Observation11
Observation13
Observation15
Observation17
Observation19
Observation21
Observation23
Observation25
Observation27
Observation29
Perturbed
Original
Linear (Perturbed)
Modern Methods of Data Anonymization/Summarization
(not covered here)
• Anonymization
• k-anonymity and l-diversity
• Generalization and suppression
• Condensation
• Blocking based technique
• Value class membership and distorted value
• Distributed privacy preservation
• Summarization
• Association rules
• Decision trees
• MixSim
• Stat Tests
• Other classifiers
Credit: https://carlsimmonslive.files.wordpress.com/2012/01/overstuffed-suitcase1.jpg
Data
Modern Methods of Data Anonymization
Substitution
Substitution
Map
DATA’
Substitution Mapping
Join the Conversation #WolframDataSummit
@ParrottSquawk
@ProjectOpenSOC
How should we anonymize data using substitution?
Modern Methods of Data Anonymization
Substitution
SourceIP DestIP SourcePort DestPort Protocol
192.168.1.5 172.158.42.12 80 80 HTTP
Type InputValue OutputValue
IP 192.168.1.5 A
IP 192.168.1.34 B
Port 80 48
SourceIP DestIP SourcePort DestPort Protocol
A C 48 48 HTTP
DATA
SCALABLE
SUBSTITUTION
MAP
DATA’
Modern Methods of Data Anonymization
Substitution
SourceIP DestIP SourcePort DestPort Protocol
192.168.1.5 172.158.42.12 80 80 HTTP
Type InputValue OutputValue
IP 192.168.1.5 A
IP 192.168.1.34 B
Port 80 48
SourceIP DestIP SourcePort DestPort Protocol
A C 48 48 HTTP
DATA
SCALABLE
SUBSTITUTION
MAP
DATA’
Modern Methods of Data Anonymization
Substitution
ID Height (cm) Weight (kg) Salary (USD) Age
1440788848 180 80 $18,000 23
Unit ScalingValue
cm 0.25
kg 10.00
USD 0.6734
Year 0.20
ID Height (cm) Weight (kg) Salary Age
A 45 800 12121.2 4.6
DATA
SCALABLE
SUBSTITUTION
MAP
DATA’
Modern Methods of Data Anonymization
Substitution
ID Height (cm) Weight (kg) Salary (USD) Age
1440788848 180 80 $18,000 23
Unit ScalingValue
cm 0.25
kg 10.00
USD 0.6734
Year 0.20
ID Height (cm) Weight (kg) Salary Age
A 45 800 12121.2 4.6
DATA
SCALABLE
SUBSTITUTION
MAP
DATA’
Why does this work?
0
20
40
60
80
100
120
140
Corolla Wrangler F150 Prius
Units Sold FY2014
Q1
Q2
Q3
Q4
Why does this work?
0
0.1
0.2
0.3
0.4
0.5
0.6
Product A Product B Product C Product D
Units Sold FY2014
Q1
Q2
Q3
Q4
Why does this work?
0
20
40
60
80
100
120
140
Units Sold FY2014
Q1
Q2
Q3
Q4
0
0.1
0.2
0.3
0.4
0.5
0.6
Product
A
Product
B
Product
C
Product
D
Units Sold FY2014
Q1
Q2
Q3
Q4
Why does this work?
0
20
40
60
80
100
120
140
Research Papers Started
FY2014
Q1
Q2
Q3
Q4
0
0.1
0.2
0.3
0.4
0.5
0.6
Research Papers Started
FY2014
Q1
Q2
Q3
Q4
Scalable Substitution Mapping
Join the Conversation #WolframDataSummit
@ParrottSquawk
@ProjectOpenSOC
How should we anonymize data using substitution
*in a way which horizontally scales?
Modern Methods of Data Anonymization
Substitution
Data
SSM
Data’Data’
Modern Methods of Data Anonymization
Substitution
Data
D1
SSM1
D2
SSM2
D3
SSM3
…
…
Dn
SSMn
Data’
Modern Methods of Data Anonymization
Substitution
…
SSM1
SSM2SSMn
Paxos Algorithm
What can we do with anonymized data?
• Exploratory Analysis/Statistical Analysis
• Clustering/Linear Regression
• Decision Trees/Random Forests
• Perceptrons/Neural Networks/Deep Learning
• Support Vector Machines
• Stochastic Models
• ...
Model Weaponization
Join the Conversation #WolframDataSummit
@ParrottSquawk
@ProjectOpenSOC
How should we weaponize models which use anonymized data
*in a way which horizontally scales?
Model Weaponization – Single-Tenant
Anonymized
Data
Customer
1 - n
Cisco
ATA
Research
Models
Weaponize
Models
Deploy
Models
• Boutique machine learning models are trained
• Per customer data center
• Not shared outside data center
• Private data is secure on-premise
• Private data used for on-premise models
• Models are not scalable
Model Weaponization – Multi-Tenant
Anonymized
Data
Customer
1
Customer
2
Customer
3
…
Customer
n
Cisco
ATA
Research
Models
Weaponize
Models
Deploy
Models
• Boutique machine learning models are trained
• Per customer data center
• Not shared outside data center
• Private data is secure on-premise
• Anonymized data used for R&D
• Multi-tenant anonymized data models
• Capitalize on multi-tenant threat landscape
Another story
Credit: http://mythfolklore.net/aesopica/bewick/59.htm
Further Reading
• http://www.cisco.com/web/offers/lp/2015-annual-security-report/index.html
• https://www.youtube.com/watch?v=czCuMfFv_lU
• https://www.youtube.com/watch?v=YNANI_rPyO4
• https://github.com/tdunning/log-synth
• http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=7097989
• http://www.ermt.net/docs/papers/Volume_4/4_April2015/V4N4-110A.pdf
• http://www.biomedcentral.com/content/pdf/s12874-015-0038-6.pdf
• http://www.tyronegrandison.org/uploads/1/8/8/1/18817082/ppdm_encyclopedia.pdf
• http://www.sans.org/reading-room/whitepapers/vpns/history-encryption-730
• https://equalit.ie/esecman/chapter2_4.html
• https://equalit.ie/esecman/chapter2_8.html
• http://www.harley.net.au/buscomnet/lectures/lect16.htm
• http://ijcsmc.com/docs/papers/April2015/V4I4201599a26.pdf
• https://www.cs.sfu.ca/~jpei/publications/SocialNetworkAnonymization_survey.pdf
• http://searchsecurity.techtarget.com/tip/Comparing-enterprise-data-anonymization-techniques
Thank You!
Join the Conversation #WolframDataSummit
@ParrottSquawk
@ProjectOpenSOC
Chester Parrott, Data Scientist, Cisco ATA
PhD Student, LSU

More Related Content

What's hot

How Graph Databases used in Police Department?
How Graph Databases used in Police Department?How Graph Databases used in Police Department?
How Graph Databases used in Police Department?
Samet KILICTAS
 
Building AI with Security and Privacy in mind
Building AI with Security and Privacy in mindBuilding AI with Security and Privacy in mind
Building AI with Security and Privacy in mind
geetachauhan
 
Eclipse IoT - Day 0 of thingmonk 2016
Eclipse IoT - Day 0 of  thingmonk 2016Eclipse IoT - Day 0 of  thingmonk 2016
Eclipse IoT - Day 0 of thingmonk 2016
Boris Adryan
 
Graphs in Telecommunications - Jesus Barrasa, Neo4j
Graphs in Telecommunications - Jesus Barrasa, Neo4jGraphs in Telecommunications - Jesus Barrasa, Neo4j
Graphs in Telecommunications - Jesus Barrasa, Neo4j
Neo4j
 
Large-Scale Malicious Domain Detection with Spark AI
Large-Scale Malicious Domain Detection with Spark AILarge-Scale Malicious Domain Detection with Spark AI
Large-Scale Malicious Domain Detection with Spark AI
Databricks
 
Graph Realities
Graph RealitiesGraph Realities
Graph Realities
Connected Data World
 
Neo4j Graph Data Science Training - June 9 & 10 - Slides #7 GDS Best Practices
Neo4j Graph Data Science Training - June 9 & 10 - Slides #7 GDS Best PracticesNeo4j Graph Data Science Training - June 9 & 10 - Slides #7 GDS Best Practices
Neo4j Graph Data Science Training - June 9 & 10 - Slides #7 GDS Best Practices
Neo4j
 
Industry of Things World - Berlin 19-09-16
Industry of Things World - Berlin 19-09-16Industry of Things World - Berlin 19-09-16
Industry of Things World - Berlin 19-09-16
Boris Adryan
 
Ashrith Barthur, Security Scientist, H2o.ai, at MLconf 2017
Ashrith Barthur, Security Scientist, H2o.ai, at MLconf 2017Ashrith Barthur, Security Scientist, H2o.ai, at MLconf 2017
Ashrith Barthur, Security Scientist, H2o.ai, at MLconf 2017
MLconf
 
Classification of Big Data Use Cases by different Facets
Classification of Big Data Use Cases by different FacetsClassification of Big Data Use Cases by different Facets
Classification of Big Data Use Cases by different Facets
Geoffrey Fox
 
DataStax | Meaningful User Experience with Graph Data (Chris Lacava, Expero) ...
DataStax | Meaningful User Experience with Graph Data (Chris Lacava, Expero) ...DataStax | Meaningful User Experience with Graph Data (Chris Lacava, Expero) ...
DataStax | Meaningful User Experience with Graph Data (Chris Lacava, Expero) ...
DataStax
 
Explain Yourself: Why You Get the Recommendations You Do
Explain Yourself: Why You Get the Recommendations You DoExplain Yourself: Why You Get the Recommendations You Do
Explain Yourself: Why You Get the Recommendations You Do
Databricks
 
Just because you can doesn't mean that you should - thingmonk 2016
Just because you can doesn't mean that you should - thingmonk 2016Just because you can doesn't mean that you should - thingmonk 2016
Just because you can doesn't mean that you should - thingmonk 2016
Boris Adryan
 
Outlier and fraud detection using Hadoop
Outlier and fraud detection using HadoopOutlier and fraud detection using Hadoop
Outlier and fraud detection using Hadoop
Pranab Ghosh
 
Graph Gurus Episode 27: Using Graph Algorithms for Advanced Analytics Part 2
Graph Gurus Episode 27: Using Graph Algorithms for Advanced Analytics Part 2Graph Gurus Episode 27: Using Graph Algorithms for Advanced Analytics Part 2
Graph Gurus Episode 27: Using Graph Algorithms for Advanced Analytics Part 2
TigerGraph
 
Using Graph Algorithms for Advanced Analytics - Part 2 Centrality
Using Graph Algorithms for Advanced Analytics - Part 2 CentralityUsing Graph Algorithms for Advanced Analytics - Part 2 Centrality
Using Graph Algorithms for Advanced Analytics - Part 2 Centrality
TigerGraph
 
Graph Gurus 23: Best Practices To Model Your Data Using A Graph Database
Graph Gurus 23: Best Practices To Model Your Data Using A Graph DatabaseGraph Gurus 23: Best Practices To Model Your Data Using A Graph Database
Graph Gurus 23: Best Practices To Model Your Data Using A Graph Database
TigerGraph
 
Graph Gurus Episode 26: Using Graph Algorithms for Advanced Analytics Part 1
Graph Gurus Episode 26: Using Graph Algorithms for Advanced Analytics Part 1Graph Gurus Episode 26: Using Graph Algorithms for Advanced Analytics Part 1
Graph Gurus Episode 26: Using Graph Algorithms for Advanced Analytics Part 1
TigerGraph
 
Chapter - 8.1 Data Mining Concepts and Techniques 2nd Ed slides Han & Kamber
Chapter - 8.1 Data Mining Concepts and Techniques 2nd Ed slides Han & KamberChapter - 8.1 Data Mining Concepts and Techniques 2nd Ed slides Han & Kamber
Chapter - 8.1 Data Mining Concepts and Techniques 2nd Ed slides Han & Kamber
error007
 
Mehr und schneller ist nicht automatisch besser - data2day, 06.10.16
Mehr und schneller ist nicht automatisch besser - data2day, 06.10.16Mehr und schneller ist nicht automatisch besser - data2day, 06.10.16
Mehr und schneller ist nicht automatisch besser - data2day, 06.10.16
Boris Adryan
 

What's hot (20)

How Graph Databases used in Police Department?
How Graph Databases used in Police Department?How Graph Databases used in Police Department?
How Graph Databases used in Police Department?
 
Building AI with Security and Privacy in mind
Building AI with Security and Privacy in mindBuilding AI with Security and Privacy in mind
Building AI with Security and Privacy in mind
 
Eclipse IoT - Day 0 of thingmonk 2016
Eclipse IoT - Day 0 of  thingmonk 2016Eclipse IoT - Day 0 of  thingmonk 2016
Eclipse IoT - Day 0 of thingmonk 2016
 
Graphs in Telecommunications - Jesus Barrasa, Neo4j
Graphs in Telecommunications - Jesus Barrasa, Neo4jGraphs in Telecommunications - Jesus Barrasa, Neo4j
Graphs in Telecommunications - Jesus Barrasa, Neo4j
 
Large-Scale Malicious Domain Detection with Spark AI
Large-Scale Malicious Domain Detection with Spark AILarge-Scale Malicious Domain Detection with Spark AI
Large-Scale Malicious Domain Detection with Spark AI
 
Graph Realities
Graph RealitiesGraph Realities
Graph Realities
 
Neo4j Graph Data Science Training - June 9 & 10 - Slides #7 GDS Best Practices
Neo4j Graph Data Science Training - June 9 & 10 - Slides #7 GDS Best PracticesNeo4j Graph Data Science Training - June 9 & 10 - Slides #7 GDS Best Practices
Neo4j Graph Data Science Training - June 9 & 10 - Slides #7 GDS Best Practices
 
Industry of Things World - Berlin 19-09-16
Industry of Things World - Berlin 19-09-16Industry of Things World - Berlin 19-09-16
Industry of Things World - Berlin 19-09-16
 
Ashrith Barthur, Security Scientist, H2o.ai, at MLconf 2017
Ashrith Barthur, Security Scientist, H2o.ai, at MLconf 2017Ashrith Barthur, Security Scientist, H2o.ai, at MLconf 2017
Ashrith Barthur, Security Scientist, H2o.ai, at MLconf 2017
 
Classification of Big Data Use Cases by different Facets
Classification of Big Data Use Cases by different FacetsClassification of Big Data Use Cases by different Facets
Classification of Big Data Use Cases by different Facets
 
DataStax | Meaningful User Experience with Graph Data (Chris Lacava, Expero) ...
DataStax | Meaningful User Experience with Graph Data (Chris Lacava, Expero) ...DataStax | Meaningful User Experience with Graph Data (Chris Lacava, Expero) ...
DataStax | Meaningful User Experience with Graph Data (Chris Lacava, Expero) ...
 
Explain Yourself: Why You Get the Recommendations You Do
Explain Yourself: Why You Get the Recommendations You DoExplain Yourself: Why You Get the Recommendations You Do
Explain Yourself: Why You Get the Recommendations You Do
 
Just because you can doesn't mean that you should - thingmonk 2016
Just because you can doesn't mean that you should - thingmonk 2016Just because you can doesn't mean that you should - thingmonk 2016
Just because you can doesn't mean that you should - thingmonk 2016
 
Outlier and fraud detection using Hadoop
Outlier and fraud detection using HadoopOutlier and fraud detection using Hadoop
Outlier and fraud detection using Hadoop
 
Graph Gurus Episode 27: Using Graph Algorithms for Advanced Analytics Part 2
Graph Gurus Episode 27: Using Graph Algorithms for Advanced Analytics Part 2Graph Gurus Episode 27: Using Graph Algorithms for Advanced Analytics Part 2
Graph Gurus Episode 27: Using Graph Algorithms for Advanced Analytics Part 2
 
Using Graph Algorithms for Advanced Analytics - Part 2 Centrality
Using Graph Algorithms for Advanced Analytics - Part 2 CentralityUsing Graph Algorithms for Advanced Analytics - Part 2 Centrality
Using Graph Algorithms for Advanced Analytics - Part 2 Centrality
 
Graph Gurus 23: Best Practices To Model Your Data Using A Graph Database
Graph Gurus 23: Best Practices To Model Your Data Using A Graph DatabaseGraph Gurus 23: Best Practices To Model Your Data Using A Graph Database
Graph Gurus 23: Best Practices To Model Your Data Using A Graph Database
 
Graph Gurus Episode 26: Using Graph Algorithms for Advanced Analytics Part 1
Graph Gurus Episode 26: Using Graph Algorithms for Advanced Analytics Part 1Graph Gurus Episode 26: Using Graph Algorithms for Advanced Analytics Part 1
Graph Gurus Episode 26: Using Graph Algorithms for Advanced Analytics Part 1
 
Chapter - 8.1 Data Mining Concepts and Techniques 2nd Ed slides Han & Kamber
Chapter - 8.1 Data Mining Concepts and Techniques 2nd Ed slides Han & KamberChapter - 8.1 Data Mining Concepts and Techniques 2nd Ed slides Han & Kamber
Chapter - 8.1 Data Mining Concepts and Techniques 2nd Ed slides Han & Kamber
 
Mehr und schneller ist nicht automatisch besser - data2day, 06.10.16
Mehr und schneller ist nicht automatisch besser - data2day, 06.10.16Mehr und schneller ist nicht automatisch besser - data2day, 06.10.16
Mehr und schneller ist nicht automatisch besser - data2day, 06.10.16
 

Similar to Big Brother Vs. Big Data: Privacy-Preserving Threat Analytics at Scale

Accelerating Insight - Smart Data Lake Customer Success Stories
Accelerating Insight - Smart Data Lake Customer Success StoriesAccelerating Insight - Smart Data Lake Customer Success Stories
Accelerating Insight - Smart Data Lake Customer Success Stories
Cambridge Semantics
 
Advanced Analytics and Machine Learning with Data Virtualization
Advanced Analytics and Machine Learning with Data VirtualizationAdvanced Analytics and Machine Learning with Data Virtualization
Advanced Analytics and Machine Learning with Data Virtualization
Denodo
 
Knowledge Discovery in Production
Knowledge Discovery in ProductionKnowledge Discovery in Production
Knowledge Discovery in Production
André Karpištšenko
 
Big Data : Risks and Opportunities
Big Data : Risks and OpportunitiesBig Data : Risks and Opportunities
Big Data : Risks and Opportunities
Kenny Huang Ph.D.
 
Azure Databricks for Data Scientists
Azure Databricks for Data ScientistsAzure Databricks for Data Scientists
Azure Databricks for Data Scientists
Richard Garris
 
Deep Learning for Autonomous Driving
Deep Learning for Autonomous DrivingDeep Learning for Autonomous Driving
Deep Learning for Autonomous Driving
Jan Wiegelmann
 
AI meets Big Data
AI meets Big DataAI meets Big Data
AI meets Big Data
Jan Wiegelmann
 
All thingspython@pivotal
All thingspython@pivotalAll thingspython@pivotal
All thingspython@pivotal
Srivatsan Ramanujam
 
Scaling up with Cisco Big Data: Data + Science = Data Science
Scaling up with Cisco Big Data: Data + Science = Data ScienceScaling up with Cisco Big Data: Data + Science = Data Science
Scaling up with Cisco Big Data: Data + Science = Data Science
eRic Choo
 
The future of data security and blockchain
The future of data security and blockchainThe future of data security and blockchain
The future of data security and blockchain
Ulf Mattsson
 
Microsoft Dryad
Microsoft DryadMicrosoft Dryad
Microsoft Dryad
Colin Clark
 
Analytics&IoT
Analytics&IoTAnalytics&IoT
Analytics&IoT
Selvaraj Kesavan
 
Real time streaming analytics
Real time streaming analyticsReal time streaming analytics
Real time streaming analytics
Anirudh
 
WPS Application Patterns
WPS Application PatternsWPS Application Patterns
WPS Application Patterns
Daniel Nüst
 
20160000 Cloud Discovery Event - Cloud Access Security Brokers
20160000 Cloud Discovery Event - Cloud Access Security Brokers20160000 Cloud Discovery Event - Cloud Access Security Brokers
20160000 Cloud Discovery Event - Cloud Access Security Brokers
Robin Vermeirsch
 
Bitkom Cray presentation - on HPC affecting big data analytics in FS
Bitkom Cray presentation - on HPC affecting big data analytics in FSBitkom Cray presentation - on HPC affecting big data analytics in FS
Bitkom Cray presentation - on HPC affecting big data analytics in FS
Philip Filleul
 
A Journey Through The Far Side Of Data Science
A Journey Through The Far Side Of Data ScienceA Journey Through The Far Side Of Data Science
A Journey Through The Far Side Of Data Science
tlcj97
 
Solve Big Data Security Issues
Solve Big Data Security IssuesSolve Big Data Security Issues
Solve Big Data Security Issues
Editor IJCATR
 
Streaming Cyber Security into Graph: Accelerating Data into DataStax Graph an...
Streaming Cyber Security into Graph: Accelerating Data into DataStax Graph an...Streaming Cyber Security into Graph: Accelerating Data into DataStax Graph an...
Streaming Cyber Security into Graph: Accelerating Data into DataStax Graph an...
Keith Kraus
 
FIWARE Global Summit - Advanced ML/AI Techniques with FIWARE and Connected Io...
FIWARE Global Summit - Advanced ML/AI Techniques with FIWARE and Connected Io...FIWARE Global Summit - Advanced ML/AI Techniques with FIWARE and Connected Io...
FIWARE Global Summit - Advanced ML/AI Techniques with FIWARE and Connected Io...
FIWARE
 

Similar to Big Brother Vs. Big Data: Privacy-Preserving Threat Analytics at Scale (20)

Accelerating Insight - Smart Data Lake Customer Success Stories
Accelerating Insight - Smart Data Lake Customer Success StoriesAccelerating Insight - Smart Data Lake Customer Success Stories
Accelerating Insight - Smart Data Lake Customer Success Stories
 
Advanced Analytics and Machine Learning with Data Virtualization
Advanced Analytics and Machine Learning with Data VirtualizationAdvanced Analytics and Machine Learning with Data Virtualization
Advanced Analytics and Machine Learning with Data Virtualization
 
Knowledge Discovery in Production
Knowledge Discovery in ProductionKnowledge Discovery in Production
Knowledge Discovery in Production
 
Big Data : Risks and Opportunities
Big Data : Risks and OpportunitiesBig Data : Risks and Opportunities
Big Data : Risks and Opportunities
 
Azure Databricks for Data Scientists
Azure Databricks for Data ScientistsAzure Databricks for Data Scientists
Azure Databricks for Data Scientists
 
Deep Learning for Autonomous Driving
Deep Learning for Autonomous DrivingDeep Learning for Autonomous Driving
Deep Learning for Autonomous Driving
 
AI meets Big Data
AI meets Big DataAI meets Big Data
AI meets Big Data
 
All thingspython@pivotal
All thingspython@pivotalAll thingspython@pivotal
All thingspython@pivotal
 
Scaling up with Cisco Big Data: Data + Science = Data Science
Scaling up with Cisco Big Data: Data + Science = Data ScienceScaling up with Cisco Big Data: Data + Science = Data Science
Scaling up with Cisco Big Data: Data + Science = Data Science
 
The future of data security and blockchain
The future of data security and blockchainThe future of data security and blockchain
The future of data security and blockchain
 
Microsoft Dryad
Microsoft DryadMicrosoft Dryad
Microsoft Dryad
 
Analytics&IoT
Analytics&IoTAnalytics&IoT
Analytics&IoT
 
Real time streaming analytics
Real time streaming analyticsReal time streaming analytics
Real time streaming analytics
 
WPS Application Patterns
WPS Application PatternsWPS Application Patterns
WPS Application Patterns
 
20160000 Cloud Discovery Event - Cloud Access Security Brokers
20160000 Cloud Discovery Event - Cloud Access Security Brokers20160000 Cloud Discovery Event - Cloud Access Security Brokers
20160000 Cloud Discovery Event - Cloud Access Security Brokers
 
Bitkom Cray presentation - on HPC affecting big data analytics in FS
Bitkom Cray presentation - on HPC affecting big data analytics in FSBitkom Cray presentation - on HPC affecting big data analytics in FS
Bitkom Cray presentation - on HPC affecting big data analytics in FS
 
A Journey Through The Far Side Of Data Science
A Journey Through The Far Side Of Data ScienceA Journey Through The Far Side Of Data Science
A Journey Through The Far Side Of Data Science
 
Solve Big Data Security Issues
Solve Big Data Security IssuesSolve Big Data Security Issues
Solve Big Data Security Issues
 
Streaming Cyber Security into Graph: Accelerating Data into DataStax Graph an...
Streaming Cyber Security into Graph: Accelerating Data into DataStax Graph an...Streaming Cyber Security into Graph: Accelerating Data into DataStax Graph an...
Streaming Cyber Security into Graph: Accelerating Data into DataStax Graph an...
 
FIWARE Global Summit - Advanced ML/AI Techniques with FIWARE and Connected Io...
FIWARE Global Summit - Advanced ML/AI Techniques with FIWARE and Connected Io...FIWARE Global Summit - Advanced ML/AI Techniques with FIWARE and Connected Io...
FIWARE Global Summit - Advanced ML/AI Techniques with FIWARE and Connected Io...
 

Recently uploaded

How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
danishmna97
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
Neo4j
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
nkrafacyberclub
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems S.M.S.A.
 
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofszkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
Alex Pruden
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
KAMESHS29
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
Neo4j
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
DianaGray10
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
ThomasParaiso2
 

Recently uploaded (20)

How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
 
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofszkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
 

Big Brother Vs. Big Data: Privacy-Preserving Threat Analytics at Scale

  • 1. Big Data vs. Big Brother: Join the Conversation #WolframDataSummit @ParrottSquawk @ProjectOpenSOC Privacy-Preserving Advanced Threat Analytics at Scale Chester Parrott, Data Scientist, Cisco ATA PhD Student, LSU
  • 2. Research ML/DM/AI Security Game Theory Graph Theory Anomaly Detection Access Control Automated Testing System Simulation Stochastic Models Software Engineering Scalable Data Platforms Background Skillset Application
  • 3. Work Research • Threats • Models • Algorithms Prototype • Threats • Algorithms • Systems Weaponize • Systems • Architecture • Algorithms Managed Security Services Advanced Threat Analytics
  • 4. Conway’s Data Science Venn Diagram Credit: http://drewconway.com/zia/2013/3/26/the-data-science-venn-diagram
  • 5. Joel Grus’ Post-Prism Data Science Venn Diagram Credit: http://joelgrus.com/2013/06/09/post-prism-data-science-venn-diagram/
  • 8.
  • 9. Unbalanced between two extremes Credit: http://ecx.images-amazon.com/images/I/51se5x3zlxL.jpg http://blog.gabrielsaldana.org/how-orwells-1984-novel-is-very-accurate-for-2013
  • 10. Necessity is the mother of reinvention Credit: http://i.stack.imgur.com/9eHIv.png
  • 11. Lack of communication Credit: http://rhinestonearmadillo.typepad.com/the_rhinestone_bookmark/2013/04/the-blind-men-and-the-elephant-fairy-tale-art.html
  • 12. Data Anonymization Join the Conversation #WolframDataSummit @ParrottSquawk @ProjectOpenSOC How should we anonymize data *without losing their multi-variate statistical significance?
  • 15. Modern Methods of Data Summarization Generalization 0 1 2 3 4 5 6 7 0 1 2 3 4 5 6 7 ObservableVariable1 Observable Variable 2 Comparison of Observable Values
  • 16. If it has webbed feet like a duck, has a bill like a duck, eats the same things as a duck, it is probably…
  • 17. You know you meant to say platypus…
  • 18. Classical Methods of Data Anonymization Redaction Credit: https://nsarchive.wordpress.com/2010/07/23/what-if-nixon-had-become-a-g-man/ http://versewisconsin.org/wiprotests/media/redactGovernorWalker.png
  • 19. Classical Methods of Data Anonymization Encryption Ciphertext Encryption Method Plaintext Key Plaintext Decryption Method Ciphertext Key Transmission Encryption Decryption
  • 20. Classical Methods of Data Anonymization Steganography Credit: http://opticalengineering.spiedigitallibrary.org/article.aspx?articleid=1096199
  • 21. Modern Methods of Data Anonymization Perturbation Credit: http://dsp.stackexchange.com/questions/24430/generate-fourier-transform-signal 0 5 10 15 20 25 30 35 Observation1 Observation3 Observation5 Observation7 Observation9 Observation11 Observation13 Observation15 Observation17 Observation19 Observation21 Observation23 Observation25 Observation27 Observation29 Perturbed Original Linear (Perturbed)
  • 22. Modern Methods of Data Anonymization/Summarization (not covered here) • Anonymization • k-anonymity and l-diversity • Generalization and suppression • Condensation • Blocking based technique • Value class membership and distorted value • Distributed privacy preservation • Summarization • Association rules • Decision trees • MixSim • Stat Tests • Other classifiers Credit: https://carlsimmonslive.files.wordpress.com/2012/01/overstuffed-suitcase1.jpg
  • 23. Data Modern Methods of Data Anonymization Substitution Substitution Map DATA’
  • 24. Substitution Mapping Join the Conversation #WolframDataSummit @ParrottSquawk @ProjectOpenSOC How should we anonymize data using substitution?
  • 25. Modern Methods of Data Anonymization Substitution SourceIP DestIP SourcePort DestPort Protocol 192.168.1.5 172.158.42.12 80 80 HTTP Type InputValue OutputValue IP 192.168.1.5 A IP 192.168.1.34 B Port 80 48 SourceIP DestIP SourcePort DestPort Protocol A C 48 48 HTTP DATA SCALABLE SUBSTITUTION MAP DATA’
  • 26. Modern Methods of Data Anonymization Substitution SourceIP DestIP SourcePort DestPort Protocol 192.168.1.5 172.158.42.12 80 80 HTTP Type InputValue OutputValue IP 192.168.1.5 A IP 192.168.1.34 B Port 80 48 SourceIP DestIP SourcePort DestPort Protocol A C 48 48 HTTP DATA SCALABLE SUBSTITUTION MAP DATA’
  • 27. Modern Methods of Data Anonymization Substitution ID Height (cm) Weight (kg) Salary (USD) Age 1440788848 180 80 $18,000 23 Unit ScalingValue cm 0.25 kg 10.00 USD 0.6734 Year 0.20 ID Height (cm) Weight (kg) Salary Age A 45 800 12121.2 4.6 DATA SCALABLE SUBSTITUTION MAP DATA’
  • 28. Modern Methods of Data Anonymization Substitution ID Height (cm) Weight (kg) Salary (USD) Age 1440788848 180 80 $18,000 23 Unit ScalingValue cm 0.25 kg 10.00 USD 0.6734 Year 0.20 ID Height (cm) Weight (kg) Salary Age A 45 800 12121.2 4.6 DATA SCALABLE SUBSTITUTION MAP DATA’
  • 29. Why does this work? 0 20 40 60 80 100 120 140 Corolla Wrangler F150 Prius Units Sold FY2014 Q1 Q2 Q3 Q4
  • 30. Why does this work? 0 0.1 0.2 0.3 0.4 0.5 0.6 Product A Product B Product C Product D Units Sold FY2014 Q1 Q2 Q3 Q4
  • 31. Why does this work? 0 20 40 60 80 100 120 140 Units Sold FY2014 Q1 Q2 Q3 Q4 0 0.1 0.2 0.3 0.4 0.5 0.6 Product A Product B Product C Product D Units Sold FY2014 Q1 Q2 Q3 Q4
  • 32. Why does this work? 0 20 40 60 80 100 120 140 Research Papers Started FY2014 Q1 Q2 Q3 Q4 0 0.1 0.2 0.3 0.4 0.5 0.6 Research Papers Started FY2014 Q1 Q2 Q3 Q4
  • 33. Scalable Substitution Mapping Join the Conversation #WolframDataSummit @ParrottSquawk @ProjectOpenSOC How should we anonymize data using substitution *in a way which horizontally scales?
  • 34. Modern Methods of Data Anonymization Substitution Data SSM Data’Data’
  • 35. Modern Methods of Data Anonymization Substitution Data D1 SSM1 D2 SSM2 D3 SSM3 … … Dn SSMn Data’
  • 36. Modern Methods of Data Anonymization Substitution … SSM1 SSM2SSMn Paxos Algorithm
  • 37. What can we do with anonymized data? • Exploratory Analysis/Statistical Analysis • Clustering/Linear Regression • Decision Trees/Random Forests • Perceptrons/Neural Networks/Deep Learning • Support Vector Machines • Stochastic Models • ...
  • 38. Model Weaponization Join the Conversation #WolframDataSummit @ParrottSquawk @ProjectOpenSOC How should we weaponize models which use anonymized data *in a way which horizontally scales?
  • 39. Model Weaponization – Single-Tenant Anonymized Data Customer 1 - n Cisco ATA Research Models Weaponize Models Deploy Models • Boutique machine learning models are trained • Per customer data center • Not shared outside data center • Private data is secure on-premise • Private data used for on-premise models • Models are not scalable
  • 40. Model Weaponization – Multi-Tenant Anonymized Data Customer 1 Customer 2 Customer 3 … Customer n Cisco ATA Research Models Weaponize Models Deploy Models • Boutique machine learning models are trained • Per customer data center • Not shared outside data center • Private data is secure on-premise • Anonymized data used for R&D • Multi-tenant anonymized data models • Capitalize on multi-tenant threat landscape
  • 42. Further Reading • http://www.cisco.com/web/offers/lp/2015-annual-security-report/index.html • https://www.youtube.com/watch?v=czCuMfFv_lU • https://www.youtube.com/watch?v=YNANI_rPyO4 • https://github.com/tdunning/log-synth • http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=7097989 • http://www.ermt.net/docs/papers/Volume_4/4_April2015/V4N4-110A.pdf • http://www.biomedcentral.com/content/pdf/s12874-015-0038-6.pdf • http://www.tyronegrandison.org/uploads/1/8/8/1/18817082/ppdm_encyclopedia.pdf • http://www.sans.org/reading-room/whitepapers/vpns/history-encryption-730 • https://equalit.ie/esecman/chapter2_4.html • https://equalit.ie/esecman/chapter2_8.html • http://www.harley.net.au/buscomnet/lectures/lect16.htm • http://ijcsmc.com/docs/papers/April2015/V4I4201599a26.pdf • https://www.cs.sfu.ca/~jpei/publications/SocialNetworkAnonymization_survey.pdf • http://searchsecurity.techtarget.com/tip/Comparing-enterprise-data-anonymization-techniques
  • 43. Thank You! Join the Conversation #WolframDataSummit @ParrottSquawk @ProjectOpenSOC Chester Parrott, Data Scientist, Cisco ATA PhD Student, LSU

Editor's Notes

  1. 1
  2. 2
  3. 3
  4. 4
  5. 5
  6. 6
  7. 7
  8. 8
  9. 9
  10. 10
  11. 11
  12. 12
  13. 13
  14. 14
  15. 15
  16. 16
  17. 17
  18. 18
  19. 19
  20. 20
  21. 21
  22. 22
  23. 23
  24. 24
  25. 25
  26. 26
  27. 27
  28. 28
  29. 29
  30. 30
  31. 31
  32. 32
  33. 33
  34. 34
  35. 35
  36. 36
  37. 37
  38. 38
  39. 39
  40. 40
  41. 41
  42. 42
  43. 43