SlideShare a Scribd company logo
Supercharged graph visualization
for cyber security
5th May 2016
Corey Lanum / Ed Wood
09:00 am PDT
12:00 noon EDT
17:00 BST
18:00 CEST
Supercharged graph visualization
for cyber security
5th May 2016
Corey Lanum / Ed Wood
Agenda
● Introductions
● Some Challenges of Cyber Data
● Live Demos
● Hints and Tips
● Your Questions
Webinar will be recorded.
Video will be shared tomorrow.
Please submit questions via Citrix panel!
Cambridge Intelligence
• Founded in 2011
• Cambridge UK & Boston US
• We help organizations to
understand connected
data:
– Award-winning products
– Developer services
– Expert know-how
• Cross-browser compatibility
• Works on any device
• A fast developer experience
• Rapid deployment
• Easy maintenance
• Full customization
• Powerful functionality
Introducing KeyLines
KeyLines is a powerful SDK for building network
visualization web applications:
‘Graph’ data
Enron email traffic
Nodes are people
Links (or ‘Edges’) are
emails exchanged
Scale and colour Node
using Social Network
algorithms
Betweenness = number
of shortest paths Nodes
are on ; indicates
seniority
Links scaled proportional
to volume of email
Cyber Security Data
“Cybersecurity is the body of technologies, processes and
practices designed to protect networks, computers, programs
and data from attack, damage or unauthorized access.”
Cyber Security data structures often fit very well with Graph
entities and visualisations….
E.g. NODES
● Machines
● People
● Data Centres
● Malware Families
● Applications
● Credentials
E.g. LINKS
● Attack Vectors
● Data Packets
● Emails
● Credentials
● Vulnerabilities
● Exfiltrated Data
A visual and interactive representation can efficiently uncover
patterns, trends and anomalies in complex data-sets
Size / Volume
• Huge number of security events generated by SIEM and other
systems...
Challenges of Cyber Data (I)
Generated at millisecond levels of resolution;
Typically stored in disparate silos that can be
unwieldy to manage.
Challenge is to detect unusual behavior inside
terabytes of event and attribute data,
including:
● IP logs – detecting indications of infected machines
or botnet zombies
● Network logs – uncover applications or users that
hog bandwidth so they can optimize systems and
prioritize business critical applications.
● Communications logs – for performing analysis to
uncover sabotage, espionage or other unwanted
activities.
● Web server logs – managing and prevent external
threats, such as DDoS attacks.
Complexity
• Combination of machine and human
actors
• Subtle interactions of the When and
the Where
Noise
• Significant events and patterns can
be hidden in a sea of data
• Attackers will attempt to hide their
behaviour !
Challenges of Cyber Data (II)
● How to visualize cyber security data:
○ Performance demo
○ Malware demo
○ Data Breach demo
○ Combinations/Grouping demo
○ Geo/TimeBar demo
Demos
KeyLines 3.0!
• Supercharge your charts with (Alpha)
○ Rendering speed up to 10x faster
○ Supported by ‘Big 4’ Browser brands
and most devices
○ Improves fluidity & responsiveness
with larger datasets
• Three new cyber-security demos
○ Inspire creative use of KeyLines
• New Angular directive
○ Performance and compatibility
Your Questions (I)
“Can KeyLines work with real-time data? If so, what visual
model / techniques would you recommend?”
• Yes, it does.
• The Time Bar and Tweak Layouts are designed for this.
• Try to limit the volume of data being communicated at any one
time. Techniques like combos or ghosting can help.
“What is the maximum number of nodes/links you can
handle?”
● HTML5 Canvas - a few thousand.
● WebGL - many tens of thousands.
● Using show/hide, around 1 million. BUT this is rarely useful.
“How easy it is to change the shape, design and layout
of nodes and edges?”
• Very easy.
• Shapes, image nodes, font icons and other designs possible.
• 6 extensible & customizable automated layouts available.
“Does WebGL handle rendering thousands of nodes and
edges well on machine with say Intel HD 3000?”
• WebGL harnesses machine’s GPU and performance will vary
• For reference, demos today were using Mac Book Air on Intel
HD 5000.
Your Questions (II)
Your Questions
+ Live Questions…!
● Cyber Security data is big, complex and noisy.
● A good cyber security visualization needs:
➔ A well thought-out visual model and defined question
➔ Functionality to overcome complexity and noise
◆ Good layouts, filtering, combos, time bar, geospatial
➔ Power to work with data at scale
● Graph visualization is the ideal tool.
We’d love to help!
Summary
Thanks for joining us!
@CambridgeIntel Cambridge-Intelligence.com
info@cambridge-intelligence.com

More Related Content

What's hot

II-SDV 14 Product Presentations Cambridge Intelligence
II-SDV 14 Product Presentations Cambridge IntelligenceII-SDV 14 Product Presentations Cambridge Intelligence
II-SDV 14 Product Presentations Cambridge IntelligenceDr. Haxel Consult
 
MDEC Fintech Conference - Demystifying Fintech in the SMAC Era, Darien Nagle ...
MDEC Fintech Conference - Demystifying Fintech in the SMAC Era, Darien Nagle ...MDEC Fintech Conference - Demystifying Fintech in the SMAC Era, Darien Nagle ...
MDEC Fintech Conference - Demystifying Fintech in the SMAC Era, Darien Nagle ...
iTrain
 
Internet of Things
Internet of ThingsInternet of Things
Internet of Things
Chetan Gadgil
 
Introduction to Internet of Things
Introduction to Internet of ThingsIntroduction to Internet of Things
Introduction to Internet of Things
Nikhil Patankar
 
Internet of things getting started
Internet of things   getting startedInternet of things   getting started
Internet of things getting started
Omkar Khair
 
20 Latest Computer Science Seminar Topics on Emerging Technologies
20 Latest Computer Science Seminar Topics on Emerging Technologies20 Latest Computer Science Seminar Topics on Emerging Technologies
20 Latest Computer Science Seminar Topics on Emerging Technologies
Seminar Links
 
Software training courses
Software training coursesSoftware training courses
Software training courses
mingglelabs
 
SMAC
SMACSMAC
SMAC
Mphasis
 
Creating a team of DevOps “Super Sentai”
Creating a team of DevOps “Super Sentai”Creating a team of DevOps “Super Sentai”
Creating a team of DevOps “Super Sentai”
Rakuten Group, Inc.
 
ITCamp 2018 - Magnus Mårtensson - Azure Global Application Perspectives
ITCamp 2018 - Magnus Mårtensson - Azure Global Application PerspectivesITCamp 2018 - Magnus Mårtensson - Azure Global Application Perspectives
ITCamp 2018 - Magnus Mårtensson - Azure Global Application Perspectives
ITCamp
 
Developing io t applications in the fog a distributed dataflow approach
Developing io t applications in the fog  a distributed dataflow approachDeveloping io t applications in the fog  a distributed dataflow approach
Developing io t applications in the fog a distributed dataflow approach
Nam Giang
 
SMAC talk for the enterprise
SMAC talk for the enterpriseSMAC talk for the enterprise
SMAC talk for the enterprise
3Sixty Insights
 
Go real-time with the InternetOfThings
Go real-time with the InternetOfThingsGo real-time with the InternetOfThings
Go real-time with the InternetOfThings
Uffe Björklund
 
IoT World - creating a secure robust IoT reference architecture
IoT World - creating a secure robust IoT reference architectureIoT World - creating a secure robust IoT reference architecture
IoT World - creating a secure robust IoT reference architecture
Paul Fremantle
 
May 2013 Federal Cloud Computing Summit Presentation
May 2013 Federal Cloud Computing Summit PresentationMay 2013 Federal Cloud Computing Summit Presentation
May 2013 Federal Cloud Computing Summit Presentation
Tim Harvey
 
Edge intelligence slide share
Edge intelligence slide shareEdge intelligence slide share
Edge intelligence slide share
Bit Stew Systems
 
Internet of Things
Internet of ThingsInternet of Things
Internet of Things
Mphasis
 
Internet of things
Internet of thingsInternet of things
Internet of things
sarahalrawi90
 
A chip to protect IOT
A chip to protect IOTA chip to protect IOT
A chip to protect IOT
NarayanlalMenariya
 
May 2013 Federal Cloud Computing Summit Welcome by Dr. David McClure
May 2013 Federal Cloud Computing Summit Welcome by Dr. David McClureMay 2013 Federal Cloud Computing Summit Welcome by Dr. David McClure
May 2013 Federal Cloud Computing Summit Welcome by Dr. David McClure
Tim Harvey
 

What's hot (20)

II-SDV 14 Product Presentations Cambridge Intelligence
II-SDV 14 Product Presentations Cambridge IntelligenceII-SDV 14 Product Presentations Cambridge Intelligence
II-SDV 14 Product Presentations Cambridge Intelligence
 
MDEC Fintech Conference - Demystifying Fintech in the SMAC Era, Darien Nagle ...
MDEC Fintech Conference - Demystifying Fintech in the SMAC Era, Darien Nagle ...MDEC Fintech Conference - Demystifying Fintech in the SMAC Era, Darien Nagle ...
MDEC Fintech Conference - Demystifying Fintech in the SMAC Era, Darien Nagle ...
 
Internet of Things
Internet of ThingsInternet of Things
Internet of Things
 
Introduction to Internet of Things
Introduction to Internet of ThingsIntroduction to Internet of Things
Introduction to Internet of Things
 
Internet of things getting started
Internet of things   getting startedInternet of things   getting started
Internet of things getting started
 
20 Latest Computer Science Seminar Topics on Emerging Technologies
20 Latest Computer Science Seminar Topics on Emerging Technologies20 Latest Computer Science Seminar Topics on Emerging Technologies
20 Latest Computer Science Seminar Topics on Emerging Technologies
 
Software training courses
Software training coursesSoftware training courses
Software training courses
 
SMAC
SMACSMAC
SMAC
 
Creating a team of DevOps “Super Sentai”
Creating a team of DevOps “Super Sentai”Creating a team of DevOps “Super Sentai”
Creating a team of DevOps “Super Sentai”
 
ITCamp 2018 - Magnus Mårtensson - Azure Global Application Perspectives
ITCamp 2018 - Magnus Mårtensson - Azure Global Application PerspectivesITCamp 2018 - Magnus Mårtensson - Azure Global Application Perspectives
ITCamp 2018 - Magnus Mårtensson - Azure Global Application Perspectives
 
Developing io t applications in the fog a distributed dataflow approach
Developing io t applications in the fog  a distributed dataflow approachDeveloping io t applications in the fog  a distributed dataflow approach
Developing io t applications in the fog a distributed dataflow approach
 
SMAC talk for the enterprise
SMAC talk for the enterpriseSMAC talk for the enterprise
SMAC talk for the enterprise
 
Go real-time with the InternetOfThings
Go real-time with the InternetOfThingsGo real-time with the InternetOfThings
Go real-time with the InternetOfThings
 
IoT World - creating a secure robust IoT reference architecture
IoT World - creating a secure robust IoT reference architectureIoT World - creating a secure robust IoT reference architecture
IoT World - creating a secure robust IoT reference architecture
 
May 2013 Federal Cloud Computing Summit Presentation
May 2013 Federal Cloud Computing Summit PresentationMay 2013 Federal Cloud Computing Summit Presentation
May 2013 Federal Cloud Computing Summit Presentation
 
Edge intelligence slide share
Edge intelligence slide shareEdge intelligence slide share
Edge intelligence slide share
 
Internet of Things
Internet of ThingsInternet of Things
Internet of Things
 
Internet of things
Internet of thingsInternet of things
Internet of things
 
A chip to protect IOT
A chip to protect IOTA chip to protect IOT
A chip to protect IOT
 
May 2013 Federal Cloud Computing Summit Welcome by Dr. David McClure
May 2013 Federal Cloud Computing Summit Welcome by Dr. David McClureMay 2013 Federal Cloud Computing Summit Welcome by Dr. David McClure
May 2013 Federal Cloud Computing Summit Welcome by Dr. David McClure
 

Viewers also liked

Actividades portuarias
Actividades portuariasActividades portuarias
Actividades portuarias
Stalyn Macias
 
Filosofia de la historia de max weber.
Filosofia de la historia de max weber.Filosofia de la historia de max weber.
Filosofia de la historia de max weber.deretv1
 
Clean room system tarkett
Clean room system tarkettClean room system tarkett
Clean room system tarkett
Cutting Corners
 
Global Internet TV Industry
Global Internet TV IndustryGlobal Internet TV Industry
Global Internet TV Industry
ReportLinker.com
 
123458_Atlas_de_Bolsillo_de_fisiologia
123458_Atlas_de_Bolsillo_de_fisiologia123458_Atlas_de_Bolsillo_de_fisiologia
123458_Atlas_de_Bolsillo_de_fisiologia
Adlem Dutra
 
Newton Paiva - DI - Aula 03
Newton Paiva - DI - Aula 03Newton Paiva - DI - Aula 03
Newton Paiva - DI - Aula 03
Marcello Cardoso
 
Perl6: Interfaces und Factories für Testdriven Development
Perl6: Interfaces und Factories für Testdriven DevelopmentPerl6: Interfaces und Factories für Testdriven Development
Perl6: Interfaces und Factories für Testdriven Development
Ralf Peine
 
iData Insights Report Store
iData Insights Report StoreiData Insights Report Store
iData Insights Report Store
iData Insights
 
Accelerate your sales performance.
Accelerate your sales performance.  Accelerate your sales performance.
Accelerate your sales performance. Safe Rise
 
GaliciaWifi.com
GaliciaWifi.com
GaliciaWifi.com
GaliciaWifi.com
demonicportal5926
 
FXDaily.pdf
FXDaily.pdfFXDaily.pdf
The Pensions 2015 Guide, 2015 Pension Guide, Pension Information, 2015 Pensi...
The Pensions 2015 Guide,  2015 Pension Guide, Pension Information, 2015 Pensi...The Pensions 2015 Guide,  2015 Pension Guide, Pension Information, 2015 Pensi...
The Pensions 2015 Guide, 2015 Pension Guide, Pension Information, 2015 Pensi...
Corp LiveWire
 
Invitación a la feria IMEX Madrid (24 y 25 de abril). País invitado USA. LIFI...
Invitación a la feria IMEX Madrid (24 y 25 de abril). País invitado USA. LIFI...Invitación a la feria IMEX Madrid (24 y 25 de abril). País invitado USA. LIFI...
Invitación a la feria IMEX Madrid (24 y 25 de abril). País invitado USA. LIFI...
Carmen Urbano
 
LA MADERA Y SUS NO TAN GRATAS CONSECUENCIAS.
LA MADERA Y SUS NO TAN GRATAS CONSECUENCIAS.LA MADERA Y SUS NO TAN GRATAS CONSECUENCIAS.
LA MADERA Y SUS NO TAN GRATAS CONSECUENCIAS.
KINGKONG301
 
Owasp top 10_-_2013_final_-_español
Owasp top 10_-_2013_final_-_españolOwasp top 10_-_2013_final_-_español
Owasp top 10_-_2013_final_-_español
fosoSSS
 
Accesorios para vacio kf
Accesorios para vacio kfAccesorios para vacio kf
Accesorios para vacio kf
Rolando Alvarado
 
Oportunidades JUNIO - JAFRA 2015
Oportunidades JUNIO - JAFRA 2015Oportunidades JUNIO - JAFRA 2015
Oportunidades JUNIO - JAFRA 2015
Linaje Jafra Sin Limite
 
Tecnología sin zanja para la instalación y rehabilitación de redes de acueduc...
Tecnología sin zanja para la instalación y rehabilitación de redes de acueduc...Tecnología sin zanja para la instalación y rehabilitación de redes de acueduc...
Tecnología sin zanja para la instalación y rehabilitación de redes de acueduc...
Andesco
 
Guia del docente_religion_5_basico_edebe
Guia del docente_religion_5_basico_edebeGuia del docente_religion_5_basico_edebe
Guia del docente_religion_5_basico_edebeMireya Burgos Peredo
 

Viewers also liked (20)

Actividades portuarias
Actividades portuariasActividades portuarias
Actividades portuarias
 
Filosofia de la historia de max weber.
Filosofia de la historia de max weber.Filosofia de la historia de max weber.
Filosofia de la historia de max weber.
 
Clean room system tarkett
Clean room system tarkettClean room system tarkett
Clean room system tarkett
 
Global Internet TV Industry
Global Internet TV IndustryGlobal Internet TV Industry
Global Internet TV Industry
 
123458_Atlas_de_Bolsillo_de_fisiologia
123458_Atlas_de_Bolsillo_de_fisiologia123458_Atlas_de_Bolsillo_de_fisiologia
123458_Atlas_de_Bolsillo_de_fisiologia
 
Newton Paiva - DI - Aula 03
Newton Paiva - DI - Aula 03Newton Paiva - DI - Aula 03
Newton Paiva - DI - Aula 03
 
WinterCatalog
WinterCatalogWinterCatalog
WinterCatalog
 
Perl6: Interfaces und Factories für Testdriven Development
Perl6: Interfaces und Factories für Testdriven DevelopmentPerl6: Interfaces und Factories für Testdriven Development
Perl6: Interfaces und Factories für Testdriven Development
 
iData Insights Report Store
iData Insights Report StoreiData Insights Report Store
iData Insights Report Store
 
Accelerate your sales performance.
Accelerate your sales performance.  Accelerate your sales performance.
Accelerate your sales performance.
 
GaliciaWifi.com
GaliciaWifi.com
GaliciaWifi.com
GaliciaWifi.com
 
FXDaily.pdf
FXDaily.pdfFXDaily.pdf
FXDaily.pdf
 
The Pensions 2015 Guide, 2015 Pension Guide, Pension Information, 2015 Pensi...
The Pensions 2015 Guide,  2015 Pension Guide, Pension Information, 2015 Pensi...The Pensions 2015 Guide,  2015 Pension Guide, Pension Information, 2015 Pensi...
The Pensions 2015 Guide, 2015 Pension Guide, Pension Information, 2015 Pensi...
 
Invitación a la feria IMEX Madrid (24 y 25 de abril). País invitado USA. LIFI...
Invitación a la feria IMEX Madrid (24 y 25 de abril). País invitado USA. LIFI...Invitación a la feria IMEX Madrid (24 y 25 de abril). País invitado USA. LIFI...
Invitación a la feria IMEX Madrid (24 y 25 de abril). País invitado USA. LIFI...
 
LA MADERA Y SUS NO TAN GRATAS CONSECUENCIAS.
LA MADERA Y SUS NO TAN GRATAS CONSECUENCIAS.LA MADERA Y SUS NO TAN GRATAS CONSECUENCIAS.
LA MADERA Y SUS NO TAN GRATAS CONSECUENCIAS.
 
Owasp top 10_-_2013_final_-_español
Owasp top 10_-_2013_final_-_españolOwasp top 10_-_2013_final_-_español
Owasp top 10_-_2013_final_-_español
 
Accesorios para vacio kf
Accesorios para vacio kfAccesorios para vacio kf
Accesorios para vacio kf
 
Oportunidades JUNIO - JAFRA 2015
Oportunidades JUNIO - JAFRA 2015Oportunidades JUNIO - JAFRA 2015
Oportunidades JUNIO - JAFRA 2015
 
Tecnología sin zanja para la instalación y rehabilitación de redes de acueduc...
Tecnología sin zanja para la instalación y rehabilitación de redes de acueduc...Tecnología sin zanja para la instalación y rehabilitación de redes de acueduc...
Tecnología sin zanja para la instalación y rehabilitación de redes de acueduc...
 
Guia del docente_religion_5_basico_edebe
Guia del docente_religion_5_basico_edebeGuia del docente_religion_5_basico_edebe
Guia del docente_religion_5_basico_edebe
 

Similar to Supercharged graph visualization for cyber security

Choosing the right Technologies for your next unicorn.
Choosing the right Technologies for your next unicorn.Choosing the right Technologies for your next unicorn.
Choosing the right Technologies for your next unicorn.
Gladson DSouza
 
Bridging the Gap: Analyzing Data in and Below the Cloud
Bridging the Gap: Analyzing Data in and Below the CloudBridging the Gap: Analyzing Data in and Below the Cloud
Bridging the Gap: Analyzing Data in and Below the Cloud
Inside Analysis
 
Big Data made easy in the era of the Cloud - Demi Ben-Ari
Big Data made easy in the era of the Cloud - Demi Ben-AriBig Data made easy in the era of the Cloud - Demi Ben-Ari
Big Data made easy in the era of the Cloud - Demi Ben-Ari
Demi Ben-Ari
 
Emerging trends in information technology
Emerging trends in information technologyEmerging trends in information technology
Emerging trends in information technology
Shiv Mehmi
 
Career Domain 2022-23.pptx
Career Domain 2022-23.pptxCareer Domain 2022-23.pptx
Career Domain 2022-23.pptx
Janani S
 
Why defensive research is sexy too.. … and a real sign of skill
Why defensive research is sexy too.. … and a real sign of skillWhy defensive research is sexy too.. … and a real sign of skill
Why defensive research is sexy too.. … and a real sign of skill
Ollie Whitehouse
 
Deep dive in to modern it technology
Deep dive in to modern it technologyDeep dive in to modern it technology
Deep dive in to modern it technology
Viknaraj Manogararajah
 
How Precisely and Splunk Can Help You Better Manage Your IBM Z and IBM i Envi...
How Precisely and Splunk Can Help You Better Manage Your IBM Z and IBM i Envi...How Precisely and Splunk Can Help You Better Manage Your IBM Z and IBM i Envi...
How Precisely and Splunk Can Help You Better Manage Your IBM Z and IBM i Envi...
Precisely
 
fields of technology and computer .pptx
fields of technology and computer  .pptxfields of technology and computer  .pptx
fields of technology and computer .pptx
Home
 
How Cloud Computing will change how you and your team will run IT
How Cloud Computing will change how you and your team will run ITHow Cloud Computing will change how you and your team will run IT
How Cloud Computing will change how you and your team will run IT
Peter HJ van Eijk
 
System Security on Cloud
System Security on CloudSystem Security on Cloud
System Security on Cloud
Tu Pham
 
.Net Microservices with Event Sourcing, CQRS, Docker and... Windows Server 20...
.Net Microservices with Event Sourcing, CQRS, Docker and... Windows Server 20....Net Microservices with Event Sourcing, CQRS, Docker and... Windows Server 20...
.Net Microservices with Event Sourcing, CQRS, Docker and... Windows Server 20...
Javier García Magna
 
Microservices - opportunities, dilemmas and problems
Microservices - opportunities, dilemmas and problemsMicroservices - opportunities, dilemmas and problems
Microservices - opportunities, dilemmas and problems
Łukasz Sowa
 
Microservices - when, why and how incontrodevops.it
Microservices  - when, why and how incontrodevops.itMicroservices  - when, why and how incontrodevops.it
Microservices - when, why and how incontrodevops.it
Giuseppe Lavagetto
 
A non-technical introduction to Cloud Computing
A non-technical introduction to Cloud ComputingA non-technical introduction to Cloud Computing
A non-technical introduction to Cloud Computing
William Pourmajidi
 
apidays LIVE Paris - Serverless security: how to protect what you don't see? ...
apidays LIVE Paris - Serverless security: how to protect what you don't see? ...apidays LIVE Paris - Serverless security: how to protect what you don't see? ...
apidays LIVE Paris - Serverless security: how to protect what you don't see? ...
apidays
 
Hac IT 4. Emerging Technologies (1).pdf
Hac IT 4. Emerging Technologies  (1).pdfHac IT 4. Emerging Technologies  (1).pdf
Hac IT 4. Emerging Technologies (1).pdf
AAFREEN SHAIKH
 
Cybersecurity Legos - We're all part of something bigger
Cybersecurity Legos - We're all part of something biggerCybersecurity Legos - We're all part of something bigger
Cybersecurity Legos - We're all part of something bigger
Ben Boyd
 
Cloud computing
Cloud computingCloud computing
Cloud computing
Amit Kumar
 
AI for Manufacturing (Machine Vision, Edge AI, Federated Learning)
AI for Manufacturing (Machine Vision, Edge AI, Federated Learning)AI for Manufacturing (Machine Vision, Edge AI, Federated Learning)
AI for Manufacturing (Machine Vision, Edge AI, Federated Learning)
byteLAKE
 

Similar to Supercharged graph visualization for cyber security (20)

Choosing the right Technologies for your next unicorn.
Choosing the right Technologies for your next unicorn.Choosing the right Technologies for your next unicorn.
Choosing the right Technologies for your next unicorn.
 
Bridging the Gap: Analyzing Data in and Below the Cloud
Bridging the Gap: Analyzing Data in and Below the CloudBridging the Gap: Analyzing Data in and Below the Cloud
Bridging the Gap: Analyzing Data in and Below the Cloud
 
Big Data made easy in the era of the Cloud - Demi Ben-Ari
Big Data made easy in the era of the Cloud - Demi Ben-AriBig Data made easy in the era of the Cloud - Demi Ben-Ari
Big Data made easy in the era of the Cloud - Demi Ben-Ari
 
Emerging trends in information technology
Emerging trends in information technologyEmerging trends in information technology
Emerging trends in information technology
 
Career Domain 2022-23.pptx
Career Domain 2022-23.pptxCareer Domain 2022-23.pptx
Career Domain 2022-23.pptx
 
Why defensive research is sexy too.. … and a real sign of skill
Why defensive research is sexy too.. … and a real sign of skillWhy defensive research is sexy too.. … and a real sign of skill
Why defensive research is sexy too.. … and a real sign of skill
 
Deep dive in to modern it technology
Deep dive in to modern it technologyDeep dive in to modern it technology
Deep dive in to modern it technology
 
How Precisely and Splunk Can Help You Better Manage Your IBM Z and IBM i Envi...
How Precisely and Splunk Can Help You Better Manage Your IBM Z and IBM i Envi...How Precisely and Splunk Can Help You Better Manage Your IBM Z and IBM i Envi...
How Precisely and Splunk Can Help You Better Manage Your IBM Z and IBM i Envi...
 
fields of technology and computer .pptx
fields of technology and computer  .pptxfields of technology and computer  .pptx
fields of technology and computer .pptx
 
How Cloud Computing will change how you and your team will run IT
How Cloud Computing will change how you and your team will run ITHow Cloud Computing will change how you and your team will run IT
How Cloud Computing will change how you and your team will run IT
 
System Security on Cloud
System Security on CloudSystem Security on Cloud
System Security on Cloud
 
.Net Microservices with Event Sourcing, CQRS, Docker and... Windows Server 20...
.Net Microservices with Event Sourcing, CQRS, Docker and... Windows Server 20....Net Microservices with Event Sourcing, CQRS, Docker and... Windows Server 20...
.Net Microservices with Event Sourcing, CQRS, Docker and... Windows Server 20...
 
Microservices - opportunities, dilemmas and problems
Microservices - opportunities, dilemmas and problemsMicroservices - opportunities, dilemmas and problems
Microservices - opportunities, dilemmas and problems
 
Microservices - when, why and how incontrodevops.it
Microservices  - when, why and how incontrodevops.itMicroservices  - when, why and how incontrodevops.it
Microservices - when, why and how incontrodevops.it
 
A non-technical introduction to Cloud Computing
A non-technical introduction to Cloud ComputingA non-technical introduction to Cloud Computing
A non-technical introduction to Cloud Computing
 
apidays LIVE Paris - Serverless security: how to protect what you don't see? ...
apidays LIVE Paris - Serverless security: how to protect what you don't see? ...apidays LIVE Paris - Serverless security: how to protect what you don't see? ...
apidays LIVE Paris - Serverless security: how to protect what you don't see? ...
 
Hac IT 4. Emerging Technologies (1).pdf
Hac IT 4. Emerging Technologies  (1).pdfHac IT 4. Emerging Technologies  (1).pdf
Hac IT 4. Emerging Technologies (1).pdf
 
Cybersecurity Legos - We're all part of something bigger
Cybersecurity Legos - We're all part of something biggerCybersecurity Legos - We're all part of something bigger
Cybersecurity Legos - We're all part of something bigger
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
AI for Manufacturing (Machine Vision, Edge AI, Federated Learning)
AI for Manufacturing (Machine Vision, Edge AI, Federated Learning)AI for Manufacturing (Machine Vision, Edge AI, Federated Learning)
AI for Manufacturing (Machine Vision, Edge AI, Federated Learning)
 

Recently uploaded

GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Product School
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Product School
 

Recently uploaded (20)

GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 

Supercharged graph visualization for cyber security

  • 1. Supercharged graph visualization for cyber security 5th May 2016 Corey Lanum / Ed Wood 09:00 am PDT 12:00 noon EDT 17:00 BST 18:00 CEST
  • 2. Supercharged graph visualization for cyber security 5th May 2016 Corey Lanum / Ed Wood
  • 3. Agenda ● Introductions ● Some Challenges of Cyber Data ● Live Demos ● Hints and Tips ● Your Questions Webinar will be recorded. Video will be shared tomorrow. Please submit questions via Citrix panel!
  • 4. Cambridge Intelligence • Founded in 2011 • Cambridge UK & Boston US • We help organizations to understand connected data: – Award-winning products – Developer services – Expert know-how
  • 5. • Cross-browser compatibility • Works on any device • A fast developer experience • Rapid deployment • Easy maintenance • Full customization • Powerful functionality Introducing KeyLines KeyLines is a powerful SDK for building network visualization web applications:
  • 6. ‘Graph’ data Enron email traffic Nodes are people Links (or ‘Edges’) are emails exchanged Scale and colour Node using Social Network algorithms Betweenness = number of shortest paths Nodes are on ; indicates seniority Links scaled proportional to volume of email
  • 7. Cyber Security Data “Cybersecurity is the body of technologies, processes and practices designed to protect networks, computers, programs and data from attack, damage or unauthorized access.” Cyber Security data structures often fit very well with Graph entities and visualisations…. E.g. NODES ● Machines ● People ● Data Centres ● Malware Families ● Applications ● Credentials E.g. LINKS ● Attack Vectors ● Data Packets ● Emails ● Credentials ● Vulnerabilities ● Exfiltrated Data A visual and interactive representation can efficiently uncover patterns, trends and anomalies in complex data-sets
  • 8. Size / Volume • Huge number of security events generated by SIEM and other systems... Challenges of Cyber Data (I) Generated at millisecond levels of resolution; Typically stored in disparate silos that can be unwieldy to manage. Challenge is to detect unusual behavior inside terabytes of event and attribute data, including: ● IP logs – detecting indications of infected machines or botnet zombies ● Network logs – uncover applications or users that hog bandwidth so they can optimize systems and prioritize business critical applications. ● Communications logs – for performing analysis to uncover sabotage, espionage or other unwanted activities. ● Web server logs – managing and prevent external threats, such as DDoS attacks.
  • 9. Complexity • Combination of machine and human actors • Subtle interactions of the When and the Where Noise • Significant events and patterns can be hidden in a sea of data • Attackers will attempt to hide their behaviour ! Challenges of Cyber Data (II)
  • 10. ● How to visualize cyber security data: ○ Performance demo ○ Malware demo ○ Data Breach demo ○ Combinations/Grouping demo ○ Geo/TimeBar demo Demos
  • 11. KeyLines 3.0! • Supercharge your charts with (Alpha) ○ Rendering speed up to 10x faster ○ Supported by ‘Big 4’ Browser brands and most devices ○ Improves fluidity & responsiveness with larger datasets • Three new cyber-security demos ○ Inspire creative use of KeyLines • New Angular directive ○ Performance and compatibility
  • 12. Your Questions (I) “Can KeyLines work with real-time data? If so, what visual model / techniques would you recommend?” • Yes, it does. • The Time Bar and Tweak Layouts are designed for this. • Try to limit the volume of data being communicated at any one time. Techniques like combos or ghosting can help. “What is the maximum number of nodes/links you can handle?” ● HTML5 Canvas - a few thousand. ● WebGL - many tens of thousands. ● Using show/hide, around 1 million. BUT this is rarely useful.
  • 13. “How easy it is to change the shape, design and layout of nodes and edges?” • Very easy. • Shapes, image nodes, font icons and other designs possible. • 6 extensible & customizable automated layouts available. “Does WebGL handle rendering thousands of nodes and edges well on machine with say Intel HD 3000?” • WebGL harnesses machine’s GPU and performance will vary • For reference, demos today were using Mac Book Air on Intel HD 5000. Your Questions (II)
  • 14. Your Questions + Live Questions…!
  • 15. ● Cyber Security data is big, complex and noisy. ● A good cyber security visualization needs: ➔ A well thought-out visual model and defined question ➔ Functionality to overcome complexity and noise ◆ Good layouts, filtering, combos, time bar, geospatial ➔ Power to work with data at scale ● Graph visualization is the ideal tool. We’d love to help! Summary
  • 16. Thanks for joining us! @CambridgeIntel Cambridge-Intelligence.com info@cambridge-intelligence.com