The Heatmap
 - Why is Security Visualization so Hard?

Raffael Marty
Raffael MartyGeneralManager Cybersecurity at ConnectWise
Security Visualization 
Raffael Marty, CEO 
Why is It So Hard? 
ISF, Shanghai, China 
November, 2014
2 Secur i ty. Analyt ics . Ins ight . 
Visualization - Heatmaps
3 Secur i ty. Analyt ics . Ins ight . 
Visualization - Graphs
4 Secur i ty. Analyt ics . Ins ight . 
I am Raffy - I do Viz! 
IBM Research
27 days 
229 days 
Average time to resolve a cyber attack 
1.4 
$7.2M 
5 Secur i ty. Analyt ics . Ins ight . 
How Compromises Are Detected 
Mandiant M Trends Report 2014 Threat Report 
Attackers in networks before detection 
Successful attacks per company per week 
Average cost per company per year
6 Secur i ty. Analyt ics . Ins ight . 
Our Security Goals 
Find Intruders and ‘New Attacks’ 
Discover Exposure Early 
Communicate Findings
7 Secur i ty. Analyt ics . Ins ight . 
Why Visualization? 
the stats ... 
http://en.wikipedia.org/wiki/Anscombe%27s_quartet 
the data...
8 Secur i ty. Analyt ics . Ins ight . 
Why Visualization? 
http://en.wikipedia.org/wiki/Anscombe%27s_quartet
9 Secur i ty. Analyt ics . Ins ight . 
Visualize Me Lots (>1TB) of Data
9 Secur i ty. Analyt ics . Ins ight . 
Visualize Me Lots (>1TB) of Data
9 Secur i ty. Analyt ics . Ins ight . 
Visualize Me Lots (>1TB) of Data 
SecViz is Hard!
? 
10 Secur i ty. Analyt ics . Ins ight . 
It’s Hard - Understanding Data 
• We don’t understand the data / logs 
• Single log entry: 
Mar 16 08:09:48 kernel: [0.00000] Normal 1048576 -> 1048576 
• Absence of logs? Logging configuration? 
• Collection of logs 
• Understanding context (setup, business processes) 
• Is this normal? 
2011-07-22 20:34:51 282 ce6de14af68ce198 - - - OBSERVED 
"unavailable" http://www.surfjunky.com/members/sj-a.php? 
r=44864 200 TCP_NC_MISS GET text/html http www.surfjunky.com 
80 /members/sj-a.php ?r=66556 php "Mozilla/5.0 (Windows NT 
6.1; WOW64) AppleWebKit/534.24 (KHTML, like Gecko) Chrome/ 
11.0.696.65 Safari/534.24" 82.137.200.42 1395 663 -
Situational Awareness 
11 Secur i ty. Analyt ics . Ins ight . 
It’s Hard - The Right Data 
Security Monitoring 
Data Exfiltration 
‣ DNS traffic 
Fraud 
‣ HTTP header sequences 
‣ Application logs 
‣ DB logs 
‣ context feeds! 
‣ Application logs 
‣ DLP 
‣ Proxies 
Phishing et al. 
‣ email logs 
‣ Are we focusing on the right data sources? 
‣ Everyone focuses on 
‣Traffic flows 
‣ IDS data 
Zero Days 
Botnet / Malware infections
It’s Hard - Mapping the Data 
Oct 13 20:00:05.680894 rule 57/0(match): pass in on xl1: 195.141.69.45.1030 > 
217.12.4.104.53: 7040 [1au] A? mx1.mail.yahoo.com. (47) (DF) 
1. Understand all elements 
2. Which fields are important? 
3. Do we need more context? 
4. What do we want to see? 
- Time-behavior? 
- Relationships? 
5. How much data do we have? What graph will scale to that? 
12 Secur i ty. Analyt ics . Ins ight .
Visualize 1TB of Data - What Graph? 
13 Secur i ty. Analyt ics . Ins ight . 
drop reject NONE ctl accept DNS Update Failed 
Log In 
IP Fragments 
Max Flows Initiated 
Packet Flood 
UDP Flood 
Aggressive Aging 
Bootp 
Renew 
Log Out 
Release 
NACK 
Conflict 
DNS Update Successful 
DNS record not deleted 
DNS Update Request 
Port Flood 
1 10000 100000000 
How much information does each of the graphs convey?
14 Secur i ty. Analyt ics . Ins ight . 
It Is Hard - IP Addresses 
FOCUS 
Info-Viz = 
Sec-Viz =
An Approach - And The Challenges 
15
16 Secur i ty. Analyt ics . Ins ight . 
Data Visualization Workflow 
Overview Zoom / Filter Details on Demand
16 Secur i ty. Analyt ics . Ins ight . 
Data Visualization Workflow 
Overview Zoom / Filter Details on Demand
16 Secur i ty. Analyt ics . Ins ight . 
Data Visualization Workflow 
Overview Zoom / Filter Details on Demand
Overview - The Heatmap 
Matrix A, where aij are integer values mapped to a color scale. 
17 Secur i ty. Analyt ics . Ins ight . 
aij = 1 10 20 30 40 50 60 70 80 >90 
42 
rows 
columns
Mapping Log Records to Heatmaps 
May 5 23:57:50 pixl-ram sudo: pam_unix(sudo:session): 
session opened for user root by ram(uid=0) 
t .. time bin time 
18 Secur i ty. Analyt ics . Ins ight . 
root 
ram 
peg 
sue 
}Δ
Mapping Log Records to Heatmaps 
May 5 23:57:50 pixl-ram sudo: pam_unix(sudo:session): 
session opened for user root by ram(uid=0) 
t .. time bin time 
18 Secur i ty. Analyt ics . Ins ight . 
root 
ram 
peg 
sue 
}Δ
Mapping Log Records to Heatmaps 
May 5 23:57:50 pixl-ram sudo: pam_unix(sudo:session): 
session opened for user root by ram(uid=0) 
18 Secur i ty. Analyt ics . Ins ight . 
root 
ram 
peg 
sue 
}Δ 
⨍()=+1 
t .. time bin 
time
• Scales well to a lot of data (can aggregate ad infinitum) 
• Shows more information than a bar chart 
• Flexible ‘measure’ mapping 
• frequency count 
• sum(variable) [avg(), stddev(), …] 
• distinct count(variable) 
19 Secur i ty. Analyt ics . Ins ight . 
Why Heatmaps?
• Scales well to a lot of data (can aggregate ad infinitum) 
• Shows more information than a bar chart 
• Flexible ‘measure’ mapping 
• frequency count 
• sum(variable) [avg(), stddev(), …] 
• distinct count(variable) 
19 Secur i ty. Analyt ics . Ins ight . 
Why Heatmaps? 
• BUT information content is limited! 
• Aggregates too highly in time and potentially value dimensions
random row order 
20 Secur i ty. Analyt ics . Ins ight . 
HeatMap Challenges - Sorting 
• Random 
• Alphabetically 
• Based on values 
• Similarity 
• What algorithm? 
• What distance metric? 
• Leverage third data field / context? 
rows clustered 
user
What’s the HeatMap Not Good At 
21 Secur i ty. Analyt ics . Ins ight . 
• Showing relationships 
-> link graphs 
• Showing multiple dimensions and their inter-relatedness 
-> || coords
color = Port 
22 Secur i ty. Analyt ics . Ins ight . 
Graphs 
SourceIP DestIP
23 Secur i ty. Analyt ics . Ins ight . 
Graphs To Show Relationships
destIP 
URL 
user 
destIP 
user 
sourceport 
destIP 
user 
24 Secur i ty. Analyt ics . Ins ight . 
Some Graph Challenges 
• How to map data to graph 
• Don’t scale to few hundred (thousand) nodes 
• What layout algorithm to chose? 
• Node placement should be semantically motivated 
• Graph metrics don’t mean anything in security (centrality, etc.) 
• Analytics needs 
• interactive features 
• linked views 
• Analytics is not a linear process 
source event destination destport 
sourceIP 
action 
destPort
25 Secur i ty. Analyt ics . Ins ight . 
Backend Challenges 
Different backend technologies (big data) 
• Key-value store 
• Search engine 
• GraphDB 
• RDBMS 
• Columnar - can answer analytical questions 
• Hadoop (Map Reduce) 
• good for operations on ALL data 
Other things to consider: 
• Caching 
• Joins
Raffael . Marty @ pixlcloud . com 
26 
Examples
27 Secur i ty. Analyt ics . Ins ight . 
Vincent 
Th i s heatmap s hows 
behavior over time. 
In this case, we see activity 
per user. We can see that 
‘vincent’ is visually different 
from all of the other users. 
He shows up very lightly 
over the ent i re t ime 
period. This seems to be 
something to look into. 
Purely visual, without 
understanding the data 
were we able to find this.
Security. Analytics. Insight. 
Attribution 
Authentication Events: users over time 
Who is behind these scans? 
Challenges 
• Finding meaningful patterns 
Graph credit: Tye Wells
Security. Analytics. Insight. 
Same Pattern For Sources From 4 Countries 
Graph credit: Tye Wells
30 Secur i ty. Analyt ics . Ins ight . 
Firewall Heatmap
Intra-Role Anomaly - Random Order 
users 
time 
dc(machines) 
31 Secur i ty. Analyt ics . Ins ight .
Intra-Role Anomaly - With Seriation 
32 Secur i ty. Analyt ics . Ins ight .
Intra-Role Anomaly - Sorted by User Role 
33 Secur i ty. Analyt ics . Ins ight .
Intra-Role Anomaly - Sorted by User Role 
Administrator 
Sales 
Development 
Finance 
33 Secur i ty. Analyt ics . Ins ight .
Intra-Role Anomaly - Sorted by User Role 
Administrator 
Admin??? 
Sales 
Development 
Finance 
33 Secur i ty. Analyt ics . Ins ight .
34 Secur i ty. Analyt ics . Ins ight . 
Graphs - A Story
34 Secur i ty. Analyt ics . Ins ight . 
Graphs - A Story
34 Secur i ty. Analyt ics . Ins ight . 
Graphs - A Story 
This looks interesting 
• What is it? 
• Green -> Port 53 
• Only port 53? 
• What IPs? 
• What’s the time behavior? 
The graph doesn’t answer these 
questions
35 Secur i ty. Analyt ics . Ins ight . 
Graphs - A Story 
• Adding a port 
histogram 
• Select DNS traffic 
and see if other 
ports light up.
36 Secur i ty. Analyt ics . Ins ight . 
DNS Traffic - A Closer Look 
Linked Views 
- Histograms for 
Source 
Port (Source) 
Destination 
- ||-coord
37 Secur i ty. Analyt ics . Ins ight .
37 Secur i ty. Analyt ics . Ins ight . 
select port 1900
37 Secur i ty. Analyt ics . Ins ight . 
select port 1900
38 Secur i ty. Analyt ics . Ins ight . 
port 80
Security. Analytics. Insight. 
After some exploration …
40 Secur i ty. Analyt ics . Ins ight . 
Firewall Time Behavior 
source 
10.0.0.1 
10.0.0.2 
10.0.0.3 
10.0.0.4
40 Secur i ty. Analyt ics . Ins ight . 
Firewall Time Behavior 
source 
10.0.0.1 
10.0.0.2 
10.0.0.3 
10.0.0.4 
block & 
pass 
color mapping: pass block
40 Secur i ty. Analyt ics . Ins ight . 
Firewall Time Behavior 
}Δ 
t .. time bin - aggregation 
source 
10.0.0.1 
10.0.0.2 
10.0.0.3 
10.0.0.4 
block & 
pass 
color mapping: pass block
High Frequency Sources Over Time 
block & 
pass 
pass block 
41 Secur i ty. Analyt ics . Ins ight .
42 Secur i ty. Analyt ics . Ins ight . 
High Frequency Traffic Split Up 
inbound outbound 
192.168.0.201 
195.141.69.42 
195.141.69.43 
195.141.69.44 
195.141.69.45 
195.141.69.46 
212.254.110.100 
212.254.110.101 
212.254.110.107 
212.254.110.108 
212.254.110.109 
212.254.110.110 
212.254.110.98 
212.254.110.99 
62.245.245.139
Outbound Traffic - Some Questions To Ask 
• What happened mid-way through? 
• Why is anything outbound blocked? 
• What are the top and bottom machines doing? 
• Did we get a new machine into the network? 
• Some machines went away? 
43 Secur i ty. Analyt ics . Ins ight .
Outbound Traffic - Some Questions To Ask 
• What happened mid-way through? 
• Why is anything outbound blocked? 
• What are the top and bottom machines doing? 
• Did we get a new machine into the network? 
• Some machines went away? 
43 Secur i ty. Analyt ics . Ins ight . 
195.141.69.42
44 Secur i ty. Analyt ics . Ins ight . 
195.141.69.42 - Interactions 
action 
port 
dest
44 Secur i ty. Analyt ics . Ins ight . 
195.141.69.42 - Interactions 
action 
port 
dest
44 Secur i ty. Analyt ics . Ins ight . 
195.141.69.42 - Interactions 
action 
port 
dest
Inbound - Zooming in on Top Rows 
45 Secur i ty. Analyt ics . Ins ight . 
rows 0,300
Inbound - Zooming in on Top Rows 
45 Secur i ty. Analyt ics . Ins ight . 
rows 0,300 
rows 200,260
46 Secur i ty. Analyt ics . Ins ight . 
Zooming in on Top Rows 
• Hardly any pass-block
46 Secur i ty. Analyt ics . Ins ight . 
Zooming in on Top Rows 
212.254.110.100 
212.254.110.101 
212.254.110.102 
212.254.110.103 
212.254.110.104 
212.254.110.105 
212.254.110.106 
212.254.110.107 
212.254.110.108 
212.254.110.109 
212.254.110.110 
212.254.110.111 
212.254.110.112 
212.254.110.113 
212.254.110.114 
212.254.110.115 
212.254.110.116 
212.254.110.117 
212.254.110.118 
212.254.110.119 
212.254.110.120 
212.254.110.121 
212.254.110.122 
212.254.110.123 
212.254.110.124 
212.254.110.125 
212.254.110.126 
212.254.110.127 
212.254.110.66 
212.254.110.96 
212.254.110.97 
212.254.110.98 
212.254.110.99 
• Hardly any pass-block
46 Secur i ty. Analyt ics . Ins ight . 
Zooming in on Top Rows 
212.254.110.100 
212.254.110.101 
212.254.110.102 
212.254.110.103 
212.254.110.104 
212.254.110.105 
212.254.110.106 
212.254.110.107 
212.254.110.108 
212.254.110.109 
212.254.110.110 
212.254.110.111 
212.254.110.112 
212.254.110.113 
212.254.110.114 
212.254.110.115 
212.254.110.116 
212.254.110.117 
212.254.110.118 
212.254.110.119 
212.254.110.120 
212.254.110.121 
212.254.110.122 
212.254.110.123 
212.254.110.124 
212.254.110.125 
212.254.110.126 
212.254.110.127 
212.254.110.66 
212.254.110.96 
212.254.110.97 
212.254.110.98 
212.254.110.99 
• Hardly any pass-block 
Oct 22 14:20:08.351202 rule 237/0(match): block in on xl0: 66.220.17.151.80 > 
212.254.110.103.1881: S 1451746674:1451746678(4) ack 1137377281 win 16384 (DF) 
ao.lop.com: 66.220.17.151 - Spyware Gang (LOP) 
http://www.freedomlist.com/forum/viewtopic.php?t=15724
46 Secur i ty. Analyt ics . Ins ight . 
Zooming in on Top Rows 
212.254.110.100 
212.254.110.101 
212.254.110.102 
212.254.110.103 
212.254.110.104 
212.254.110.105 
212.254.110.106 
212.254.110.107 
212.254.110.108 
212.254.110.109 
212.254.110.110 
212.254.110.111 
212.254.110.112 
212.254.110.113 
212.254.110.114 
212.254.110.115 
212.254.110.116 
212.254.110.117 
212.254.110.118 
212.254.110.119 
212.254.110.120 
212.254.110.121 
212.254.110.122 
212.254.110.123 
212.254.110.124 
212.254.110.125 
212.254.110.126 
212.254.110.127 
212.254.110.66 
212.254.110.96 
212.254.110.97 
212.254.110.98 
212.254.110.99 
• Hardly any pass-block
46 Secur i ty. Analyt ics . Ins ight . 
Zooming in on Top Rows 
212.254.110.100 
212.254.110.101 
212.254.110.102 
212.254.110.103 
212.254.110.104 
212.254.110.105 
212.254.110.106 
212.254.110.107 
212.254.110.108 
212.254.110.109 
212.254.110.110 
212.254.110.111 
212.254.110.112 
212.254.110.113 
212.254.110.114 
212.254.110.115 
212.254.110.116 
212.254.110.117 
212.254.110.118 
212.254.110.119 
212.254.110.120 
212.254.110.121 
212.254.110.122 
212.254.110.123 
212.254.110.124 
212.254.110.125 
212.254.110.126 
212.254.110.127 
212.254.110.66 
212.254.110.96 
212.254.110.97 
212.254.110.98 
212.254.110.99 
• Hardly any pass-block
46 Secur i ty. Analyt ics . Ins ight . 
Zooming in on Top Rows 
212.254.110.100 
212.254.110.101 
212.254.110.102 
212.254.110.103 
212.254.110.104 
212.254.110.105 
212.254.110.106 
212.254.110.107 
212.254.110.108 
212.254.110.109 
212.254.110.110 
212.254.110.111 
212.254.110.112 
212.254.110.113 
212.254.110.114 
212.254.110.115 
212.254.110.116 
212.254.110.117 
212.254.110.118 
212.254.110.119 
212.254.110.120 
212.254.110.121 
212.254.110.122 
212.254.110.123 
212.254.110.124 
212.254.110.125 
212.254.110.126 
212.254.110.127 
212.254.110.66 
212.254.110.96 
212.254.110.97 
212.254.110.98 
212.254.110.99 
• Hardly any pass-block 
212.254.110.102 
Oct 16 13:14:05.627835 rule 0/0(match): pass in on xl0: 66.220.17.151.80 > 
212.254.110.102.1977: S 1841864015:1841864019(4) ack 1308753921 win 16384 (DF) 
pass in log quick on $ext from any to $honey
47 Secur i ty. Analyt ics . Ins ight . 
This Guy Sure Keeps Busy 
212.254.144.40
47 Secur i ty. Analyt ics . Ins ight . 
This Guy Sure Keeps Busy 
212.254.144.40 
dest port
48 Secur i ty. Analyt ics . Ins ight . 
Recap 
• Attackers are very successful 
• Data can reveal adversaries 
• We have a big data analytics problem 
• We need the right analytics and visualizations 
• Security visualization is hard 
• Data visualization workflow is a promising approach 
• Analytics is not a linear process
49 
raffael.marty@pixlcloud.com
1 of 74

Recommended

RSA 2006 - Visual Security Event Analysis by
RSA 2006 - Visual Security Event AnalysisRSA 2006 - Visual Security Event Analysis
RSA 2006 - Visual Security Event AnalysisRaffael Marty
1.8K views43 slides
Visualization for Security by
Visualization for SecurityVisualization for Security
Visualization for SecurityRaffael Marty
7.7K views43 slides
The Heatmap
 - Why is Security Visualization so Hard? by
The Heatmap
 - Why is Security Visualization so Hard?The Heatmap
 - Why is Security Visualization so Hard?
The Heatmap
 - Why is Security Visualization so Hard?Raffael Marty
8K views58 slides
Cloud - Security - Big Data by
Cloud - Security - Big DataCloud - Security - Big Data
Cloud - Security - Big DataRaffael Marty
2.1K views13 slides
AI & ML in Cyber Security - Why Algorithms are Dangerous by
AI & ML in Cyber Security - Why Algorithms are DangerousAI & ML in Cyber Security - Why Algorithms are Dangerous
AI & ML in Cyber Security - Why Algorithms are DangerousRaffael Marty
7.2K views41 slides
Creating Your Own Threat Intel Through Hunting & Visualization by
Creating Your Own Threat Intel Through Hunting & VisualizationCreating Your Own Threat Intel Through Hunting & Visualization
Creating Your Own Threat Intel Through Hunting & VisualizationRaffael Marty
25.2K views36 slides

More Related Content

What's hot

How To Drive Value with Security Data by
How To Drive Value with Security DataHow To Drive Value with Security Data
How To Drive Value with Security DataRaffael Marty
3.4K views7 slides
Insider Threat Visualization - HITB 2007, Kuala Lumpur by
Insider Threat Visualization - HITB 2007, Kuala LumpurInsider Threat Visualization - HITB 2007, Kuala Lumpur
Insider Threat Visualization - HITB 2007, Kuala LumpurRaffael Marty
902 views36 slides
AI & ML in Cyber Security - Welcome Back to 1999 - Security Hasn't Changed by
AI & ML in Cyber Security - Welcome Back to 1999 - Security Hasn't ChangedAI & ML in Cyber Security - Welcome Back to 1999 - Security Hasn't Changed
AI & ML in Cyber Security - Welcome Back to 1999 - Security Hasn't ChangedRaffael Marty
4.5K views29 slides
How to Hunt for Lateral Movement on Your Network by
How to Hunt for Lateral Movement on Your NetworkHow to Hunt for Lateral Movement on Your Network
How to Hunt for Lateral Movement on Your NetworkSqrrl
2.8K views48 slides
Creating Your Own Threat Intel Through Hunting & Visualization by
Creating Your Own Threat Intel Through Hunting & VisualizationCreating Your Own Threat Intel Through Hunting & Visualization
Creating Your Own Threat Intel Through Hunting & VisualizationRaffael Marty
2.7K views25 slides
Threat Hunting with Elastic at SpectorOps: Welcome to HELK by
Threat Hunting with Elastic at SpectorOps: Welcome to HELKThreat Hunting with Elastic at SpectorOps: Welcome to HELK
Threat Hunting with Elastic at SpectorOps: Welcome to HELKElasticsearch
20.3K views62 slides

What's hot(20)

How To Drive Value with Security Data by Raffael Marty
How To Drive Value with Security DataHow To Drive Value with Security Data
How To Drive Value with Security Data
Raffael Marty3.4K views
Insider Threat Visualization - HITB 2007, Kuala Lumpur by Raffael Marty
Insider Threat Visualization - HITB 2007, Kuala LumpurInsider Threat Visualization - HITB 2007, Kuala Lumpur
Insider Threat Visualization - HITB 2007, Kuala Lumpur
Raffael Marty902 views
AI & ML in Cyber Security - Welcome Back to 1999 - Security Hasn't Changed by Raffael Marty
AI & ML in Cyber Security - Welcome Back to 1999 - Security Hasn't ChangedAI & ML in Cyber Security - Welcome Back to 1999 - Security Hasn't Changed
AI & ML in Cyber Security - Welcome Back to 1999 - Security Hasn't Changed
Raffael Marty4.5K views
How to Hunt for Lateral Movement on Your Network by Sqrrl
How to Hunt for Lateral Movement on Your NetworkHow to Hunt for Lateral Movement on Your Network
How to Hunt for Lateral Movement on Your Network
Sqrrl2.8K views
Creating Your Own Threat Intel Through Hunting & Visualization by Raffael Marty
Creating Your Own Threat Intel Through Hunting & VisualizationCreating Your Own Threat Intel Through Hunting & Visualization
Creating Your Own Threat Intel Through Hunting & Visualization
Raffael Marty2.7K views
Threat Hunting with Elastic at SpectorOps: Welcome to HELK by Elasticsearch
Threat Hunting with Elastic at SpectorOps: Welcome to HELKThreat Hunting with Elastic at SpectorOps: Welcome to HELK
Threat Hunting with Elastic at SpectorOps: Welcome to HELK
Elasticsearch20.3K views
Security Insights at Scale by Raffael Marty
Security Insights at ScaleSecurity Insights at Scale
Security Insights at Scale
Raffael Marty2.5K views
Delivering Security Insights with Data Analytics and Visualization by Raffael Marty
Delivering Security Insights with Data Analytics and VisualizationDelivering Security Insights with Data Analytics and Visualization
Delivering Security Insights with Data Analytics and Visualization
Raffael Marty3.7K views
Hunting: Defense Against The Dark Arts by Spyglass Security
Hunting: Defense Against The Dark ArtsHunting: Defense Against The Dark Arts
Hunting: Defense Against The Dark Arts
Spyglass Security3.4K views
MITRE ATT&CKcon 2.0: Using Threat Intelligence to Focus ATT&CK Activities; Da... by MITRE - ATT&CKcon
MITRE ATT&CKcon 2.0: Using Threat Intelligence to Focus ATT&CK Activities; Da...MITRE ATT&CKcon 2.0: Using Threat Intelligence to Focus ATT&CK Activities; Da...
MITRE ATT&CKcon 2.0: Using Threat Intelligence to Focus ATT&CK Activities; Da...
MITRE - ATT&CKcon2.6K views
Hunting: Defense Against The Dark Arts - BSides Philadelphia - 2016 by Danny Akacki
Hunting: Defense Against The Dark Arts - BSides Philadelphia - 2016Hunting: Defense Against The Dark Arts - BSides Philadelphia - 2016
Hunting: Defense Against The Dark Arts - BSides Philadelphia - 2016
Danny Akacki981 views
Detecting Hacks: Anomaly Detection on Networking Data by James Sirota
Detecting Hacks: Anomaly Detection on Networking DataDetecting Hacks: Anomaly Detection on Networking Data
Detecting Hacks: Anomaly Detection on Networking Data
James Sirota6.9K views
Cyber Threat Hunting with Phirelight by Hostway|HOSTING
Cyber Threat Hunting with PhirelightCyber Threat Hunting with Phirelight
Cyber Threat Hunting with Phirelight
Hostway|HOSTING1.4K views
Hunting: Defense Against The Dark Arts v2 by Spyglass Security
Hunting: Defense Against The Dark Arts v2Hunting: Defense Against The Dark Arts v2
Hunting: Defense Against The Dark Arts v2
Spyglass Security840 views
Avoiding the Pitfalls of Hunting - BSides Charm 2016 by Tony Cook
Avoiding the Pitfalls of Hunting - BSides Charm 2016Avoiding the Pitfalls of Hunting - BSides Charm 2016
Avoiding the Pitfalls of Hunting - BSides Charm 2016
Tony Cook1.3K views
Big data Visualization and Dashboards by Mia Yuan Cao
Big data Visualization and DashboardsBig data Visualization and Dashboards
Big data Visualization and Dashboards
Mia Yuan Cao978 views
Windows Threat Hunting by GIBIN JOHN
Windows Threat HuntingWindows Threat Hunting
Windows Threat Hunting
GIBIN JOHN1.4K views
MITRE ATTACKCon Power Hour - December by MITRE - ATT&CKcon
MITRE ATTACKCon Power Hour - DecemberMITRE ATTACKCon Power Hour - December
MITRE ATTACKCon Power Hour - December
MITRE - ATT&CKcon1.1K views
Artificial Intelligence – Time Bomb or The Promised Land? by Raffael Marty
Artificial Intelligence – Time Bomb or The Promised Land?Artificial Intelligence – Time Bomb or The Promised Land?
Artificial Intelligence – Time Bomb or The Promised Land?
Raffael Marty1K views

Similar to The Heatmap
 - Why is Security Visualization so Hard?

Workshop: Big Data Visualization for Security by
Workshop: Big Data Visualization for SecurityWorkshop: Big Data Visualization for Security
Workshop: Big Data Visualization for SecurityRaffael Marty
22.1K views59 slides
breed_python_tx_redacted by
breed_python_tx_redactedbreed_python_tx_redacted
breed_python_tx_redactedRyan Breed
188 views34 slides
Approaches for application request throttling - dotNetCologne by
Approaches for application request throttling - dotNetCologneApproaches for application request throttling - dotNetCologne
Approaches for application request throttling - dotNetCologneMaarten Balliauw
246 views52 slides
Neo4j: What's Under the Hood & How Knowing This Can Help You by
Neo4j: What's Under the Hood & How Knowing This Can Help You Neo4j: What's Under the Hood & How Knowing This Can Help You
Neo4j: What's Under the Hood & How Knowing This Can Help You Neo4j
806 views55 slides
Provenance for Data Munging Environments by
Provenance for Data Munging EnvironmentsProvenance for Data Munging Environments
Provenance for Data Munging EnvironmentsPaul Groth
1.7K views73 slides
Approaches for application request throttling - Cloud Developer Days Poland by
Approaches for application request throttling - Cloud Developer Days PolandApproaches for application request throttling - Cloud Developer Days Poland
Approaches for application request throttling - Cloud Developer Days PolandMaarten Balliauw
1.1K views55 slides

Similar to The Heatmap
 - Why is Security Visualization so Hard?(20)

Workshop: Big Data Visualization for Security by Raffael Marty
Workshop: Big Data Visualization for SecurityWorkshop: Big Data Visualization for Security
Workshop: Big Data Visualization for Security
Raffael Marty22.1K views
breed_python_tx_redacted by Ryan Breed
breed_python_tx_redactedbreed_python_tx_redacted
breed_python_tx_redacted
Ryan Breed188 views
Approaches for application request throttling - dotNetCologne by Maarten Balliauw
Approaches for application request throttling - dotNetCologneApproaches for application request throttling - dotNetCologne
Approaches for application request throttling - dotNetCologne
Maarten Balliauw246 views
Neo4j: What's Under the Hood & How Knowing This Can Help You by Neo4j
Neo4j: What's Under the Hood & How Knowing This Can Help You Neo4j: What's Under the Hood & How Knowing This Can Help You
Neo4j: What's Under the Hood & How Knowing This Can Help You
Neo4j806 views
Provenance for Data Munging Environments by Paul Groth
Provenance for Data Munging EnvironmentsProvenance for Data Munging Environments
Provenance for Data Munging Environments
Paul Groth1.7K views
Approaches for application request throttling - Cloud Developer Days Poland by Maarten Balliauw
Approaches for application request throttling - Cloud Developer Days PolandApproaches for application request throttling - Cloud Developer Days Poland
Approaches for application request throttling - Cloud Developer Days Poland
Maarten Balliauw1.1K views
Data Summer Conf 2018, “How we build Computer vision as a service (ENG)” — Ro... by Provectus
Data Summer Conf 2018, “How we build Computer vision as a service (ENG)” — Ro...Data Summer Conf 2018, “How we build Computer vision as a service (ENG)” — Ro...
Data Summer Conf 2018, “How we build Computer vision as a service (ENG)” — Ro...
Provectus675 views
Application Monitoring using Open Source: VictoriaMetrics - ClickHouse by VictoriaMetrics
Application Monitoring using Open Source: VictoriaMetrics - ClickHouseApplication Monitoring using Open Source: VictoriaMetrics - ClickHouse
Application Monitoring using Open Source: VictoriaMetrics - ClickHouse
VictoriaMetrics180 views
Application Monitoring using Open Source - VictoriaMetrics & Altinity ClickHo... by Altinity Ltd
Application Monitoring using Open Source - VictoriaMetrics & Altinity ClickHo...Application Monitoring using Open Source - VictoriaMetrics & Altinity ClickHo...
Application Monitoring using Open Source - VictoriaMetrics & Altinity ClickHo...
Altinity Ltd396 views
Data Democratization at Nubank by Databricks
 Data Democratization at Nubank Data Democratization at Nubank
Data Democratization at Nubank
Databricks1.4K views
The State of Stream Processing by confluent
The State of Stream ProcessingThe State of Stream Processing
The State of Stream Processing
confluent748 views
Big Data Visualization by Raffael Marty
Big Data VisualizationBig Data Visualization
Big Data Visualization
Raffael Marty41.5K views
ConFoo Montreal - Approaches for application request throttling by Maarten Balliauw
ConFoo Montreal - Approaches for application request throttlingConFoo Montreal - Approaches for application request throttling
ConFoo Montreal - Approaches for application request throttling
Maarten Balliauw1.2K views
Managing your Black Friday Logs NDC Oslo by David Pilato
Managing your  Black Friday Logs NDC OsloManaging your  Black Friday Logs NDC Oslo
Managing your Black Friday Logs NDC Oslo
David Pilato286 views
Managing your Black Friday Logs - Antonio Bonuccelli - Codemotion Rome 2018 by Codemotion
Managing your Black Friday Logs - Antonio Bonuccelli - Codemotion Rome 2018Managing your Black Friday Logs - Antonio Bonuccelli - Codemotion Rome 2018
Managing your Black Friday Logs - Antonio Bonuccelli - Codemotion Rome 2018
Codemotion171 views
Managing your black friday logs - Code Europe by David Pilato
Managing your black friday logs - Code EuropeManaging your black friday logs - Code Europe
Managing your black friday logs - Code Europe
David Pilato321 views
MITRE ATT&CKcon 2018: Hunters ATT&CKing with the Data, Roberto Rodriguez, Spe... by MITRE - ATT&CKcon
MITRE ATT&CKcon 2018: Hunters ATT&CKing with the Data, Roberto Rodriguez, Spe...MITRE ATT&CKcon 2018: Hunters ATT&CKing with the Data, Roberto Rodriguez, Spe...
MITRE ATT&CKcon 2018: Hunters ATT&CKing with the Data, Roberto Rodriguez, Spe...
MITRE - ATT&CKcon5.2K views
Continuous Intelligence - Intersecting Event-Based Business Logic and ML by Paris Carbone
Continuous Intelligence - Intersecting Event-Based Business Logic and MLContinuous Intelligence - Intersecting Event-Based Business Logic and ML
Continuous Intelligence - Intersecting Event-Based Business Logic and ML
Paris Carbone317 views
How to teach your data scientist to leverage an analytics cluster with Presto... by Alluxio, Inc.
How to teach your data scientist to leverage an analytics cluster with Presto...How to teach your data scientist to leverage an analytics cluster with Presto...
How to teach your data scientist to leverage an analytics cluster with Presto...
Alluxio, Inc.104 views

More from Raffael Marty

Exploring the Defender's Advantage by
Exploring the Defender's AdvantageExploring the Defender's Advantage
Exploring the Defender's AdvantageRaffael Marty
137 views36 slides
Extended Detection and Response (XDR) An Overhyped Product Category With Ulti... by
Extended Detection and Response (XDR)An Overhyped Product Category With Ulti...Extended Detection and Response (XDR)An Overhyped Product Category With Ulti...
Extended Detection and Response (XDR) An Overhyped Product Category With Ulti...Raffael Marty
978 views19 slides
Cyber Security Beyond 2020 – Will We Learn From Our Mistakes? by
Cyber Security Beyond 2020 – Will We Learn From Our Mistakes?Cyber Security Beyond 2020 – Will We Learn From Our Mistakes?
Cyber Security Beyond 2020 – Will We Learn From Our Mistakes?Raffael Marty
6.4K views30 slides
Understanding the "Intelligence" in AI by
Understanding the "Intelligence" in AIUnderstanding the "Intelligence" in AI
Understanding the "Intelligence" in AIRaffael Marty
942 views12 slides
AI & ML in Cyber Security - Why Algorithms Are Dangerous by
AI & ML in Cyber Security - Why Algorithms Are DangerousAI & ML in Cyber Security - Why Algorithms Are Dangerous
AI & ML in Cyber Security - Why Algorithms Are DangerousRaffael Marty
13.9K views32 slides
DAVIX - Data Analysis and Visualization Linux by
DAVIX - Data Analysis and Visualization LinuxDAVIX - Data Analysis and Visualization Linux
DAVIX - Data Analysis and Visualization LinuxRaffael Marty
4.2K views13 slides

More from Raffael Marty(14)

Exploring the Defender's Advantage by Raffael Marty
Exploring the Defender's AdvantageExploring the Defender's Advantage
Exploring the Defender's Advantage
Raffael Marty137 views
Extended Detection and Response (XDR) An Overhyped Product Category With Ulti... by Raffael Marty
Extended Detection and Response (XDR)An Overhyped Product Category With Ulti...Extended Detection and Response (XDR)An Overhyped Product Category With Ulti...
Extended Detection and Response (XDR) An Overhyped Product Category With Ulti...
Raffael Marty978 views
Cyber Security Beyond 2020 – Will We Learn From Our Mistakes? by Raffael Marty
Cyber Security Beyond 2020 – Will We Learn From Our Mistakes?Cyber Security Beyond 2020 – Will We Learn From Our Mistakes?
Cyber Security Beyond 2020 – Will We Learn From Our Mistakes?
Raffael Marty6.4K views
Understanding the "Intelligence" in AI by Raffael Marty
Understanding the "Intelligence" in AIUnderstanding the "Intelligence" in AI
Understanding the "Intelligence" in AI
Raffael Marty942 views
AI & ML in Cyber Security - Why Algorithms Are Dangerous by Raffael Marty
AI & ML in Cyber Security - Why Algorithms Are DangerousAI & ML in Cyber Security - Why Algorithms Are Dangerous
AI & ML in Cyber Security - Why Algorithms Are Dangerous
Raffael Marty13.9K views
DAVIX - Data Analysis and Visualization Linux by Raffael Marty
DAVIX - Data Analysis and Visualization LinuxDAVIX - Data Analysis and Visualization Linux
DAVIX - Data Analysis and Visualization Linux
Raffael Marty4.2K views
Cyber Security – How Visual Analytics Unlock Insight by Raffael Marty
Cyber Security – How Visual Analytics Unlock InsightCyber Security – How Visual Analytics Unlock Insight
Cyber Security – How Visual Analytics Unlock Insight
Raffael Marty33K views
Supercharging Visualization with Data Mining by Raffael Marty
Supercharging Visualization with Data MiningSupercharging Visualization with Data Mining
Supercharging Visualization with Data Mining
Raffael Marty5K views
Security Visualization - Let's Take A Step Back by Raffael Marty
Security Visualization - Let's Take A Step BackSecurity Visualization - Let's Take A Step Back
Security Visualization - Let's Take A Step Back
Raffael Marty3K views
Visual Analytics and Security Intelligence by Raffael Marty
Visual Analytics and Security IntelligenceVisual Analytics and Security Intelligence
Visual Analytics and Security Intelligence
Raffael Marty2.6K views
Log Visualization - Bellua BCS 2006 by Raffael Marty
Log Visualization - Bellua BCS 2006Log Visualization - Bellua BCS 2006
Log Visualization - Bellua BCS 2006
Raffael Marty1.6K views
Event Graphs - EUSecWest 2006 by Raffael Marty
Event Graphs - EUSecWest 2006Event Graphs - EUSecWest 2006
Event Graphs - EUSecWest 2006
Raffael Marty951 views
Insider Threat Visualization - HackInTheBox 2007 by Raffael Marty
Insider Threat Visualization - HackInTheBox 2007Insider Threat Visualization - HackInTheBox 2007
Insider Threat Visualization - HackInTheBox 2007
Raffael Marty2.1K views

Recently uploaded

"Package management in monorepos", Zoltan Kochan by
"Package management in monorepos", Zoltan Kochan"Package management in monorepos", Zoltan Kochan
"Package management in monorepos", Zoltan KochanFwdays
34 views18 slides
Redefining the book supply chain: A glimpse into the future - Tech Forum 2023 by
Redefining the book supply chain: A glimpse into the future - Tech Forum 2023Redefining the book supply chain: A glimpse into the future - Tech Forum 2023
Redefining the book supply chain: A glimpse into the future - Tech Forum 2023BookNet Canada
44 views19 slides
AI + Memoori = AIM by
AI + Memoori = AIMAI + Memoori = AIM
AI + Memoori = AIMMemoori
14 views9 slides
PCCC23:日本AMD株式会社 テーマ2「AMD EPYC™ プロセッサーを用いたAIソリューション」 by
PCCC23:日本AMD株式会社 テーマ2「AMD EPYC™ プロセッサーを用いたAIソリューション」PCCC23:日本AMD株式会社 テーマ2「AMD EPYC™ プロセッサーを用いたAIソリューション」
PCCC23:日本AMD株式会社 テーマ2「AMD EPYC™ プロセッサーを用いたAIソリューション」PC Cluster Consortium
25 views12 slides
MVP and prioritization.pdf by
MVP and prioritization.pdfMVP and prioritization.pdf
MVP and prioritization.pdfrahuldharwal141
39 views8 slides
"Surviving highload with Node.js", Andrii Shumada by
"Surviving highload with Node.js", Andrii Shumada "Surviving highload with Node.js", Andrii Shumada
"Surviving highload with Node.js", Andrii Shumada Fwdays
58 views29 slides

Recently uploaded(20)

"Package management in monorepos", Zoltan Kochan by Fwdays
"Package management in monorepos", Zoltan Kochan"Package management in monorepos", Zoltan Kochan
"Package management in monorepos", Zoltan Kochan
Fwdays34 views
Redefining the book supply chain: A glimpse into the future - Tech Forum 2023 by BookNet Canada
Redefining the book supply chain: A glimpse into the future - Tech Forum 2023Redefining the book supply chain: A glimpse into the future - Tech Forum 2023
Redefining the book supply chain: A glimpse into the future - Tech Forum 2023
BookNet Canada44 views
AI + Memoori = AIM by Memoori
AI + Memoori = AIMAI + Memoori = AIM
AI + Memoori = AIM
Memoori14 views
PCCC23:日本AMD株式会社 テーマ2「AMD EPYC™ プロセッサーを用いたAIソリューション」 by PC Cluster Consortium
PCCC23:日本AMD株式会社 テーマ2「AMD EPYC™ プロセッサーを用いたAIソリューション」PCCC23:日本AMD株式会社 テーマ2「AMD EPYC™ プロセッサーを用いたAIソリューション」
PCCC23:日本AMD株式会社 テーマ2「AMD EPYC™ プロセッサーを用いたAIソリューション」
"Surviving highload with Node.js", Andrii Shumada by Fwdays
"Surviving highload with Node.js", Andrii Shumada "Surviving highload with Node.js", Andrii Shumada
"Surviving highload with Node.js", Andrii Shumada
Fwdays58 views
Enabling DPU Hardware Accelerators in XCP-ng Cloud Platform Environment - And... by ShapeBlue
Enabling DPU Hardware Accelerators in XCP-ng Cloud Platform Environment - And...Enabling DPU Hardware Accelerators in XCP-ng Cloud Platform Environment - And...
Enabling DPU Hardware Accelerators in XCP-ng Cloud Platform Environment - And...
ShapeBlue108 views
Don’t Make A Human Do A Robot’s Job! : 6 Reasons Why AI Will Save Us & Not De... by Moses Kemibaro
Don’t Make A Human Do A Robot’s Job! : 6 Reasons Why AI Will Save Us & Not De...Don’t Make A Human Do A Robot’s Job! : 6 Reasons Why AI Will Save Us & Not De...
Don’t Make A Human Do A Robot’s Job! : 6 Reasons Why AI Will Save Us & Not De...
Moses Kemibaro35 views
LLMs in Production: Tooling, Process, and Team Structure by Aggregage
LLMs in Production: Tooling, Process, and Team StructureLLMs in Production: Tooling, Process, and Team Structure
LLMs in Production: Tooling, Process, and Team Structure
Aggregage57 views
Initiating and Advancing Your Strategic GIS Governance Strategy by Safe Software
Initiating and Advancing Your Strategic GIS Governance StrategyInitiating and Advancing Your Strategic GIS Governance Strategy
Initiating and Advancing Your Strategic GIS Governance Strategy
Safe Software184 views
"Node.js vs workers — A comparison of two JavaScript runtimes", James M Snell by Fwdays
"Node.js vs workers — A comparison of two JavaScript runtimes", James M Snell"Node.js vs workers — A comparison of two JavaScript runtimes", James M Snell
"Node.js vs workers — A comparison of two JavaScript runtimes", James M Snell
Fwdays14 views
Webinar : Desperately Seeking Transformation - Part 2: Insights from leading... by The Digital Insurer
Webinar : Desperately Seeking Transformation - Part 2:  Insights from leading...Webinar : Desperately Seeking Transformation - Part 2:  Insights from leading...
Webinar : Desperately Seeking Transformation - Part 2: Insights from leading...
Innovation & Entrepreneurship strategies in Dairy Industry by PervaizDar1
Innovation & Entrepreneurship strategies in Dairy IndustryInnovation & Entrepreneurship strategies in Dairy Industry
Innovation & Entrepreneurship strategies in Dairy Industry
PervaizDar135 views
Measurecamp Brussels - Synthetic data.pdf by Human37
Measurecamp Brussels - Synthetic data.pdfMeasurecamp Brussels - Synthetic data.pdf
Measurecamp Brussels - Synthetic data.pdf
Human37 26 views
Adopting Karpenter for Cost and Simplicity at Grafana Labs.pdf by MichaelOLeary82
Adopting Karpenter for Cost and Simplicity at Grafana Labs.pdfAdopting Karpenter for Cost and Simplicity at Grafana Labs.pdf
Adopting Karpenter for Cost and Simplicity at Grafana Labs.pdf
MichaelOLeary8213 views
Deep Tech and the Amplified Organisation: Core Concepts by Holonomics
Deep Tech and the Amplified Organisation: Core ConceptsDeep Tech and the Amplified Organisation: Core Concepts
Deep Tech and the Amplified Organisation: Core Concepts
Holonomics17 views
"Running students' code in isolation. The hard way", Yurii Holiuk by Fwdays
"Running students' code in isolation. The hard way", Yurii Holiuk "Running students' code in isolation. The hard way", Yurii Holiuk
"Running students' code in isolation. The hard way", Yurii Holiuk
Fwdays36 views
Discover Aura Workshop (12.5.23).pdf by Neo4j
Discover Aura Workshop (12.5.23).pdfDiscover Aura Workshop (12.5.23).pdf
Discover Aura Workshop (12.5.23).pdf
Neo4j15 views

The Heatmap
 - Why is Security Visualization so Hard?

  • 1. Security Visualization Raffael Marty, CEO Why is It So Hard? ISF, Shanghai, China November, 2014
  • 2. 2 Secur i ty. Analyt ics . Ins ight . Visualization - Heatmaps
  • 3. 3 Secur i ty. Analyt ics . Ins ight . Visualization - Graphs
  • 4. 4 Secur i ty. Analyt ics . Ins ight . I am Raffy - I do Viz! IBM Research
  • 5. 27 days 229 days Average time to resolve a cyber attack 1.4 $7.2M 5 Secur i ty. Analyt ics . Ins ight . How Compromises Are Detected Mandiant M Trends Report 2014 Threat Report Attackers in networks before detection Successful attacks per company per week Average cost per company per year
  • 6. 6 Secur i ty. Analyt ics . Ins ight . Our Security Goals Find Intruders and ‘New Attacks’ Discover Exposure Early Communicate Findings
  • 7. 7 Secur i ty. Analyt ics . Ins ight . Why Visualization? the stats ... http://en.wikipedia.org/wiki/Anscombe%27s_quartet the data...
  • 8. 8 Secur i ty. Analyt ics . Ins ight . Why Visualization? http://en.wikipedia.org/wiki/Anscombe%27s_quartet
  • 9. 9 Secur i ty. Analyt ics . Ins ight . Visualize Me Lots (>1TB) of Data
  • 10. 9 Secur i ty. Analyt ics . Ins ight . Visualize Me Lots (>1TB) of Data
  • 11. 9 Secur i ty. Analyt ics . Ins ight . Visualize Me Lots (>1TB) of Data SecViz is Hard!
  • 12. ? 10 Secur i ty. Analyt ics . Ins ight . It’s Hard - Understanding Data • We don’t understand the data / logs • Single log entry: Mar 16 08:09:48 kernel: [0.00000] Normal 1048576 -> 1048576 • Absence of logs? Logging configuration? • Collection of logs • Understanding context (setup, business processes) • Is this normal? 2011-07-22 20:34:51 282 ce6de14af68ce198 - - - OBSERVED "unavailable" http://www.surfjunky.com/members/sj-a.php? r=44864 200 TCP_NC_MISS GET text/html http www.surfjunky.com 80 /members/sj-a.php ?r=66556 php "Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.24 (KHTML, like Gecko) Chrome/ 11.0.696.65 Safari/534.24" 82.137.200.42 1395 663 -
  • 13. Situational Awareness 11 Secur i ty. Analyt ics . Ins ight . It’s Hard - The Right Data Security Monitoring Data Exfiltration ‣ DNS traffic Fraud ‣ HTTP header sequences ‣ Application logs ‣ DB logs ‣ context feeds! ‣ Application logs ‣ DLP ‣ Proxies Phishing et al. ‣ email logs ‣ Are we focusing on the right data sources? ‣ Everyone focuses on ‣Traffic flows ‣ IDS data Zero Days Botnet / Malware infections
  • 14. It’s Hard - Mapping the Data Oct 13 20:00:05.680894 rule 57/0(match): pass in on xl1: 195.141.69.45.1030 > 217.12.4.104.53: 7040 [1au] A? mx1.mail.yahoo.com. (47) (DF) 1. Understand all elements 2. Which fields are important? 3. Do we need more context? 4. What do we want to see? - Time-behavior? - Relationships? 5. How much data do we have? What graph will scale to that? 12 Secur i ty. Analyt ics . Ins ight .
  • 15. Visualize 1TB of Data - What Graph? 13 Secur i ty. Analyt ics . Ins ight . drop reject NONE ctl accept DNS Update Failed Log In IP Fragments Max Flows Initiated Packet Flood UDP Flood Aggressive Aging Bootp Renew Log Out Release NACK Conflict DNS Update Successful DNS record not deleted DNS Update Request Port Flood 1 10000 100000000 How much information does each of the graphs convey?
  • 16. 14 Secur i ty. Analyt ics . Ins ight . It Is Hard - IP Addresses FOCUS Info-Viz = Sec-Viz =
  • 17. An Approach - And The Challenges 15
  • 18. 16 Secur i ty. Analyt ics . Ins ight . Data Visualization Workflow Overview Zoom / Filter Details on Demand
  • 19. 16 Secur i ty. Analyt ics . Ins ight . Data Visualization Workflow Overview Zoom / Filter Details on Demand
  • 20. 16 Secur i ty. Analyt ics . Ins ight . Data Visualization Workflow Overview Zoom / Filter Details on Demand
  • 21. Overview - The Heatmap Matrix A, where aij are integer values mapped to a color scale. 17 Secur i ty. Analyt ics . Ins ight . aij = 1 10 20 30 40 50 60 70 80 >90 42 rows columns
  • 22. Mapping Log Records to Heatmaps May 5 23:57:50 pixl-ram sudo: pam_unix(sudo:session): session opened for user root by ram(uid=0) t .. time bin time 18 Secur i ty. Analyt ics . Ins ight . root ram peg sue }Δ
  • 23. Mapping Log Records to Heatmaps May 5 23:57:50 pixl-ram sudo: pam_unix(sudo:session): session opened for user root by ram(uid=0) t .. time bin time 18 Secur i ty. Analyt ics . Ins ight . root ram peg sue }Δ
  • 24. Mapping Log Records to Heatmaps May 5 23:57:50 pixl-ram sudo: pam_unix(sudo:session): session opened for user root by ram(uid=0) 18 Secur i ty. Analyt ics . Ins ight . root ram peg sue }Δ ⨍()=+1 t .. time bin time
  • 25. • Scales well to a lot of data (can aggregate ad infinitum) • Shows more information than a bar chart • Flexible ‘measure’ mapping • frequency count • sum(variable) [avg(), stddev(), …] • distinct count(variable) 19 Secur i ty. Analyt ics . Ins ight . Why Heatmaps?
  • 26. • Scales well to a lot of data (can aggregate ad infinitum) • Shows more information than a bar chart • Flexible ‘measure’ mapping • frequency count • sum(variable) [avg(), stddev(), …] • distinct count(variable) 19 Secur i ty. Analyt ics . Ins ight . Why Heatmaps? • BUT information content is limited! • Aggregates too highly in time and potentially value dimensions
  • 27. random row order 20 Secur i ty. Analyt ics . Ins ight . HeatMap Challenges - Sorting • Random • Alphabetically • Based on values • Similarity • What algorithm? • What distance metric? • Leverage third data field / context? rows clustered user
  • 28. What’s the HeatMap Not Good At 21 Secur i ty. Analyt ics . Ins ight . • Showing relationships -> link graphs • Showing multiple dimensions and their inter-relatedness -> || coords
  • 29. color = Port 22 Secur i ty. Analyt ics . Ins ight . Graphs SourceIP DestIP
  • 30. 23 Secur i ty. Analyt ics . Ins ight . Graphs To Show Relationships
  • 31. destIP URL user destIP user sourceport destIP user 24 Secur i ty. Analyt ics . Ins ight . Some Graph Challenges • How to map data to graph • Don’t scale to few hundred (thousand) nodes • What layout algorithm to chose? • Node placement should be semantically motivated • Graph metrics don’t mean anything in security (centrality, etc.) • Analytics needs • interactive features • linked views • Analytics is not a linear process source event destination destport sourceIP action destPort
  • 32. 25 Secur i ty. Analyt ics . Ins ight . Backend Challenges Different backend technologies (big data) • Key-value store • Search engine • GraphDB • RDBMS • Columnar - can answer analytical questions • Hadoop (Map Reduce) • good for operations on ALL data Other things to consider: • Caching • Joins
  • 33. Raffael . Marty @ pixlcloud . com 26 Examples
  • 34. 27 Secur i ty. Analyt ics . Ins ight . Vincent Th i s heatmap s hows behavior over time. In this case, we see activity per user. We can see that ‘vincent’ is visually different from all of the other users. He shows up very lightly over the ent i re t ime period. This seems to be something to look into. Purely visual, without understanding the data were we able to find this.
  • 35. Security. Analytics. Insight. Attribution Authentication Events: users over time Who is behind these scans? Challenges • Finding meaningful patterns Graph credit: Tye Wells
  • 36. Security. Analytics. Insight. Same Pattern For Sources From 4 Countries Graph credit: Tye Wells
  • 37. 30 Secur i ty. Analyt ics . Ins ight . Firewall Heatmap
  • 38. Intra-Role Anomaly - Random Order users time dc(machines) 31 Secur i ty. Analyt ics . Ins ight .
  • 39. Intra-Role Anomaly - With Seriation 32 Secur i ty. Analyt ics . Ins ight .
  • 40. Intra-Role Anomaly - Sorted by User Role 33 Secur i ty. Analyt ics . Ins ight .
  • 41. Intra-Role Anomaly - Sorted by User Role Administrator Sales Development Finance 33 Secur i ty. Analyt ics . Ins ight .
  • 42. Intra-Role Anomaly - Sorted by User Role Administrator Admin??? Sales Development Finance 33 Secur i ty. Analyt ics . Ins ight .
  • 43. 34 Secur i ty. Analyt ics . Ins ight . Graphs - A Story
  • 44. 34 Secur i ty. Analyt ics . Ins ight . Graphs - A Story
  • 45. 34 Secur i ty. Analyt ics . Ins ight . Graphs - A Story This looks interesting • What is it? • Green -> Port 53 • Only port 53? • What IPs? • What’s the time behavior? The graph doesn’t answer these questions
  • 46. 35 Secur i ty. Analyt ics . Ins ight . Graphs - A Story • Adding a port histogram • Select DNS traffic and see if other ports light up.
  • 47. 36 Secur i ty. Analyt ics . Ins ight . DNS Traffic - A Closer Look Linked Views - Histograms for Source Port (Source) Destination - ||-coord
  • 48. 37 Secur i ty. Analyt ics . Ins ight .
  • 49. 37 Secur i ty. Analyt ics . Ins ight . select port 1900
  • 50. 37 Secur i ty. Analyt ics . Ins ight . select port 1900
  • 51. 38 Secur i ty. Analyt ics . Ins ight . port 80
  • 52. Security. Analytics. Insight. After some exploration …
  • 53. 40 Secur i ty. Analyt ics . Ins ight . Firewall Time Behavior source 10.0.0.1 10.0.0.2 10.0.0.3 10.0.0.4
  • 54. 40 Secur i ty. Analyt ics . Ins ight . Firewall Time Behavior source 10.0.0.1 10.0.0.2 10.0.0.3 10.0.0.4 block & pass color mapping: pass block
  • 55. 40 Secur i ty. Analyt ics . Ins ight . Firewall Time Behavior }Δ t .. time bin - aggregation source 10.0.0.1 10.0.0.2 10.0.0.3 10.0.0.4 block & pass color mapping: pass block
  • 56. High Frequency Sources Over Time block & pass pass block 41 Secur i ty. Analyt ics . Ins ight .
  • 57. 42 Secur i ty. Analyt ics . Ins ight . High Frequency Traffic Split Up inbound outbound 192.168.0.201 195.141.69.42 195.141.69.43 195.141.69.44 195.141.69.45 195.141.69.46 212.254.110.100 212.254.110.101 212.254.110.107 212.254.110.108 212.254.110.109 212.254.110.110 212.254.110.98 212.254.110.99 62.245.245.139
  • 58. Outbound Traffic - Some Questions To Ask • What happened mid-way through? • Why is anything outbound blocked? • What are the top and bottom machines doing? • Did we get a new machine into the network? • Some machines went away? 43 Secur i ty. Analyt ics . Ins ight .
  • 59. Outbound Traffic - Some Questions To Ask • What happened mid-way through? • Why is anything outbound blocked? • What are the top and bottom machines doing? • Did we get a new machine into the network? • Some machines went away? 43 Secur i ty. Analyt ics . Ins ight . 195.141.69.42
  • 60. 44 Secur i ty. Analyt ics . Ins ight . 195.141.69.42 - Interactions action port dest
  • 61. 44 Secur i ty. Analyt ics . Ins ight . 195.141.69.42 - Interactions action port dest
  • 62. 44 Secur i ty. Analyt ics . Ins ight . 195.141.69.42 - Interactions action port dest
  • 63. Inbound - Zooming in on Top Rows 45 Secur i ty. Analyt ics . Ins ight . rows 0,300
  • 64. Inbound - Zooming in on Top Rows 45 Secur i ty. Analyt ics . Ins ight . rows 0,300 rows 200,260
  • 65. 46 Secur i ty. Analyt ics . Ins ight . Zooming in on Top Rows • Hardly any pass-block
  • 66. 46 Secur i ty. Analyt ics . Ins ight . Zooming in on Top Rows 212.254.110.100 212.254.110.101 212.254.110.102 212.254.110.103 212.254.110.104 212.254.110.105 212.254.110.106 212.254.110.107 212.254.110.108 212.254.110.109 212.254.110.110 212.254.110.111 212.254.110.112 212.254.110.113 212.254.110.114 212.254.110.115 212.254.110.116 212.254.110.117 212.254.110.118 212.254.110.119 212.254.110.120 212.254.110.121 212.254.110.122 212.254.110.123 212.254.110.124 212.254.110.125 212.254.110.126 212.254.110.127 212.254.110.66 212.254.110.96 212.254.110.97 212.254.110.98 212.254.110.99 • Hardly any pass-block
  • 67. 46 Secur i ty. Analyt ics . Ins ight . Zooming in on Top Rows 212.254.110.100 212.254.110.101 212.254.110.102 212.254.110.103 212.254.110.104 212.254.110.105 212.254.110.106 212.254.110.107 212.254.110.108 212.254.110.109 212.254.110.110 212.254.110.111 212.254.110.112 212.254.110.113 212.254.110.114 212.254.110.115 212.254.110.116 212.254.110.117 212.254.110.118 212.254.110.119 212.254.110.120 212.254.110.121 212.254.110.122 212.254.110.123 212.254.110.124 212.254.110.125 212.254.110.126 212.254.110.127 212.254.110.66 212.254.110.96 212.254.110.97 212.254.110.98 212.254.110.99 • Hardly any pass-block Oct 22 14:20:08.351202 rule 237/0(match): block in on xl0: 66.220.17.151.80 > 212.254.110.103.1881: S 1451746674:1451746678(4) ack 1137377281 win 16384 (DF) ao.lop.com: 66.220.17.151 - Spyware Gang (LOP) http://www.freedomlist.com/forum/viewtopic.php?t=15724
  • 68. 46 Secur i ty. Analyt ics . Ins ight . Zooming in on Top Rows 212.254.110.100 212.254.110.101 212.254.110.102 212.254.110.103 212.254.110.104 212.254.110.105 212.254.110.106 212.254.110.107 212.254.110.108 212.254.110.109 212.254.110.110 212.254.110.111 212.254.110.112 212.254.110.113 212.254.110.114 212.254.110.115 212.254.110.116 212.254.110.117 212.254.110.118 212.254.110.119 212.254.110.120 212.254.110.121 212.254.110.122 212.254.110.123 212.254.110.124 212.254.110.125 212.254.110.126 212.254.110.127 212.254.110.66 212.254.110.96 212.254.110.97 212.254.110.98 212.254.110.99 • Hardly any pass-block
  • 69. 46 Secur i ty. Analyt ics . Ins ight . Zooming in on Top Rows 212.254.110.100 212.254.110.101 212.254.110.102 212.254.110.103 212.254.110.104 212.254.110.105 212.254.110.106 212.254.110.107 212.254.110.108 212.254.110.109 212.254.110.110 212.254.110.111 212.254.110.112 212.254.110.113 212.254.110.114 212.254.110.115 212.254.110.116 212.254.110.117 212.254.110.118 212.254.110.119 212.254.110.120 212.254.110.121 212.254.110.122 212.254.110.123 212.254.110.124 212.254.110.125 212.254.110.126 212.254.110.127 212.254.110.66 212.254.110.96 212.254.110.97 212.254.110.98 212.254.110.99 • Hardly any pass-block
  • 70. 46 Secur i ty. Analyt ics . Ins ight . Zooming in on Top Rows 212.254.110.100 212.254.110.101 212.254.110.102 212.254.110.103 212.254.110.104 212.254.110.105 212.254.110.106 212.254.110.107 212.254.110.108 212.254.110.109 212.254.110.110 212.254.110.111 212.254.110.112 212.254.110.113 212.254.110.114 212.254.110.115 212.254.110.116 212.254.110.117 212.254.110.118 212.254.110.119 212.254.110.120 212.254.110.121 212.254.110.122 212.254.110.123 212.254.110.124 212.254.110.125 212.254.110.126 212.254.110.127 212.254.110.66 212.254.110.96 212.254.110.97 212.254.110.98 212.254.110.99 • Hardly any pass-block 212.254.110.102 Oct 16 13:14:05.627835 rule 0/0(match): pass in on xl0: 66.220.17.151.80 > 212.254.110.102.1977: S 1841864015:1841864019(4) ack 1308753921 win 16384 (DF) pass in log quick on $ext from any to $honey
  • 71. 47 Secur i ty. Analyt ics . Ins ight . This Guy Sure Keeps Busy 212.254.144.40
  • 72. 47 Secur i ty. Analyt ics . Ins ight . This Guy Sure Keeps Busy 212.254.144.40 dest port
  • 73. 48 Secur i ty. Analyt ics . Ins ight . Recap • Attackers are very successful • Data can reveal adversaries • We have a big data analytics problem • We need the right analytics and visualizations • Security visualization is hard • Data visualization workflow is a promising approach • Analytics is not a linear process