SlideShare a Scribd company logo
1 of 74
Download to read offline
Security Visualization 
Raffael Marty, CEO 
Why is It So Hard? 
ISF, Shanghai, China 
November, 2014
2 Secur i ty. Analyt ics . Ins ight . 
Visualization - Heatmaps
3 Secur i ty. Analyt ics . Ins ight . 
Visualization - Graphs
4 Secur i ty. Analyt ics . Ins ight . 
I am Raffy - I do Viz! 
IBM Research
27 days 
229 days 
Average time to resolve a cyber attack 
1.4 
$7.2M 
5 Secur i ty. Analyt ics . Ins ight . 
How Compromises Are Detected 
Mandiant M Trends Report 2014 Threat Report 
Attackers in networks before detection 
Successful attacks per company per week 
Average cost per company per year
6 Secur i ty. Analyt ics . Ins ight . 
Our Security Goals 
Find Intruders and ‘New Attacks’ 
Discover Exposure Early 
Communicate Findings
7 Secur i ty. Analyt ics . Ins ight . 
Why Visualization? 
the stats ... 
http://en.wikipedia.org/wiki/Anscombe%27s_quartet 
the data...
8 Secur i ty. Analyt ics . Ins ight . 
Why Visualization? 
http://en.wikipedia.org/wiki/Anscombe%27s_quartet
9 Secur i ty. Analyt ics . Ins ight . 
Visualize Me Lots (>1TB) of Data
9 Secur i ty. Analyt ics . Ins ight . 
Visualize Me Lots (>1TB) of Data
9 Secur i ty. Analyt ics . Ins ight . 
Visualize Me Lots (>1TB) of Data 
SecViz is Hard!
? 
10 Secur i ty. Analyt ics . Ins ight . 
It’s Hard - Understanding Data 
• We don’t understand the data / logs 
• Single log entry: 
Mar 16 08:09:48 kernel: [0.00000] Normal 1048576 -> 1048576 
• Absence of logs? Logging configuration? 
• Collection of logs 
• Understanding context (setup, business processes) 
• Is this normal? 
2011-07-22 20:34:51 282 ce6de14af68ce198 - - - OBSERVED 
"unavailable" http://www.surfjunky.com/members/sj-a.php? 
r=44864 200 TCP_NC_MISS GET text/html http www.surfjunky.com 
80 /members/sj-a.php ?r=66556 php "Mozilla/5.0 (Windows NT 
6.1; WOW64) AppleWebKit/534.24 (KHTML, like Gecko) Chrome/ 
11.0.696.65 Safari/534.24" 82.137.200.42 1395 663 -
Situational Awareness 
11 Secur i ty. Analyt ics . Ins ight . 
It’s Hard - The Right Data 
Security Monitoring 
Data Exfiltration 
‣ DNS traffic 
Fraud 
‣ HTTP header sequences 
‣ Application logs 
‣ DB logs 
‣ context feeds! 
‣ Application logs 
‣ DLP 
‣ Proxies 
Phishing et al. 
‣ email logs 
‣ Are we focusing on the right data sources? 
‣ Everyone focuses on 
‣Traffic flows 
‣ IDS data 
Zero Days 
Botnet / Malware infections
It’s Hard - Mapping the Data 
Oct 13 20:00:05.680894 rule 57/0(match): pass in on xl1: 195.141.69.45.1030 > 
217.12.4.104.53: 7040 [1au] A? mx1.mail.yahoo.com. (47) (DF) 
1. Understand all elements 
2. Which fields are important? 
3. Do we need more context? 
4. What do we want to see? 
- Time-behavior? 
- Relationships? 
5. How much data do we have? What graph will scale to that? 
12 Secur i ty. Analyt ics . Ins ight .
Visualize 1TB of Data - What Graph? 
13 Secur i ty. Analyt ics . Ins ight . 
drop reject NONE ctl accept DNS Update Failed 
Log In 
IP Fragments 
Max Flows Initiated 
Packet Flood 
UDP Flood 
Aggressive Aging 
Bootp 
Renew 
Log Out 
Release 
NACK 
Conflict 
DNS Update Successful 
DNS record not deleted 
DNS Update Request 
Port Flood 
1 10000 100000000 
How much information does each of the graphs convey?
14 Secur i ty. Analyt ics . Ins ight . 
It Is Hard - IP Addresses 
FOCUS 
Info-Viz = 
Sec-Viz =
An Approach - And The Challenges 
15
16 Secur i ty. Analyt ics . Ins ight . 
Data Visualization Workflow 
Overview Zoom / Filter Details on Demand
16 Secur i ty. Analyt ics . Ins ight . 
Data Visualization Workflow 
Overview Zoom / Filter Details on Demand
16 Secur i ty. Analyt ics . Ins ight . 
Data Visualization Workflow 
Overview Zoom / Filter Details on Demand
Overview - The Heatmap 
Matrix A, where aij are integer values mapped to a color scale. 
17 Secur i ty. Analyt ics . Ins ight . 
aij = 1 10 20 30 40 50 60 70 80 >90 
42 
rows 
columns
Mapping Log Records to Heatmaps 
May 5 23:57:50 pixl-ram sudo: pam_unix(sudo:session): 
session opened for user root by ram(uid=0) 
t .. time bin time 
18 Secur i ty. Analyt ics . Ins ight . 
root 
ram 
peg 
sue 
}Δ
Mapping Log Records to Heatmaps 
May 5 23:57:50 pixl-ram sudo: pam_unix(sudo:session): 
session opened for user root by ram(uid=0) 
t .. time bin time 
18 Secur i ty. Analyt ics . Ins ight . 
root 
ram 
peg 
sue 
}Δ
Mapping Log Records to Heatmaps 
May 5 23:57:50 pixl-ram sudo: pam_unix(sudo:session): 
session opened for user root by ram(uid=0) 
18 Secur i ty. Analyt ics . Ins ight . 
root 
ram 
peg 
sue 
}Δ 
⨍()=+1 
t .. time bin 
time
• Scales well to a lot of data (can aggregate ad infinitum) 
• Shows more information than a bar chart 
• Flexible ‘measure’ mapping 
• frequency count 
• sum(variable) [avg(), stddev(), …] 
• distinct count(variable) 
19 Secur i ty. Analyt ics . Ins ight . 
Why Heatmaps?
• Scales well to a lot of data (can aggregate ad infinitum) 
• Shows more information than a bar chart 
• Flexible ‘measure’ mapping 
• frequency count 
• sum(variable) [avg(), stddev(), …] 
• distinct count(variable) 
19 Secur i ty. Analyt ics . Ins ight . 
Why Heatmaps? 
• BUT information content is limited! 
• Aggregates too highly in time and potentially value dimensions
random row order 
20 Secur i ty. Analyt ics . Ins ight . 
HeatMap Challenges - Sorting 
• Random 
• Alphabetically 
• Based on values 
• Similarity 
• What algorithm? 
• What distance metric? 
• Leverage third data field / context? 
rows clustered 
user
What’s the HeatMap Not Good At 
21 Secur i ty. Analyt ics . Ins ight . 
• Showing relationships 
-> link graphs 
• Showing multiple dimensions and their inter-relatedness 
-> || coords
color = Port 
22 Secur i ty. Analyt ics . Ins ight . 
Graphs 
SourceIP DestIP
23 Secur i ty. Analyt ics . Ins ight . 
Graphs To Show Relationships
destIP 
URL 
user 
destIP 
user 
sourceport 
destIP 
user 
24 Secur i ty. Analyt ics . Ins ight . 
Some Graph Challenges 
• How to map data to graph 
• Don’t scale to few hundred (thousand) nodes 
• What layout algorithm to chose? 
• Node placement should be semantically motivated 
• Graph metrics don’t mean anything in security (centrality, etc.) 
• Analytics needs 
• interactive features 
• linked views 
• Analytics is not a linear process 
source event destination destport 
sourceIP 
action 
destPort
25 Secur i ty. Analyt ics . Ins ight . 
Backend Challenges 
Different backend technologies (big data) 
• Key-value store 
• Search engine 
• GraphDB 
• RDBMS 
• Columnar - can answer analytical questions 
• Hadoop (Map Reduce) 
• good for operations on ALL data 
Other things to consider: 
• Caching 
• Joins
Raffael . Marty @ pixlcloud . com 
26 
Examples
27 Secur i ty. Analyt ics . Ins ight . 
Vincent 
Th i s heatmap s hows 
behavior over time. 
In this case, we see activity 
per user. We can see that 
‘vincent’ is visually different 
from all of the other users. 
He shows up very lightly 
over the ent i re t ime 
period. This seems to be 
something to look into. 
Purely visual, without 
understanding the data 
were we able to find this.
Security. Analytics. Insight. 
Attribution 
Authentication Events: users over time 
Who is behind these scans? 
Challenges 
• Finding meaningful patterns 
Graph credit: Tye Wells
Security. Analytics. Insight. 
Same Pattern For Sources From 4 Countries 
Graph credit: Tye Wells
30 Secur i ty. Analyt ics . Ins ight . 
Firewall Heatmap
Intra-Role Anomaly - Random Order 
users 
time 
dc(machines) 
31 Secur i ty. Analyt ics . Ins ight .
Intra-Role Anomaly - With Seriation 
32 Secur i ty. Analyt ics . Ins ight .
Intra-Role Anomaly - Sorted by User Role 
33 Secur i ty. Analyt ics . Ins ight .
Intra-Role Anomaly - Sorted by User Role 
Administrator 
Sales 
Development 
Finance 
33 Secur i ty. Analyt ics . Ins ight .
Intra-Role Anomaly - Sorted by User Role 
Administrator 
Admin??? 
Sales 
Development 
Finance 
33 Secur i ty. Analyt ics . Ins ight .
34 Secur i ty. Analyt ics . Ins ight . 
Graphs - A Story
34 Secur i ty. Analyt ics . Ins ight . 
Graphs - A Story
34 Secur i ty. Analyt ics . Ins ight . 
Graphs - A Story 
This looks interesting 
• What is it? 
• Green -> Port 53 
• Only port 53? 
• What IPs? 
• What’s the time behavior? 
The graph doesn’t answer these 
questions
35 Secur i ty. Analyt ics . Ins ight . 
Graphs - A Story 
• Adding a port 
histogram 
• Select DNS traffic 
and see if other 
ports light up.
36 Secur i ty. Analyt ics . Ins ight . 
DNS Traffic - A Closer Look 
Linked Views 
- Histograms for 
Source 
Port (Source) 
Destination 
- ||-coord
37 Secur i ty. Analyt ics . Ins ight .
37 Secur i ty. Analyt ics . Ins ight . 
select port 1900
37 Secur i ty. Analyt ics . Ins ight . 
select port 1900
38 Secur i ty. Analyt ics . Ins ight . 
port 80
Security. Analytics. Insight. 
After some exploration …
40 Secur i ty. Analyt ics . Ins ight . 
Firewall Time Behavior 
source 
10.0.0.1 
10.0.0.2 
10.0.0.3 
10.0.0.4
40 Secur i ty. Analyt ics . Ins ight . 
Firewall Time Behavior 
source 
10.0.0.1 
10.0.0.2 
10.0.0.3 
10.0.0.4 
block & 
pass 
color mapping: pass block
40 Secur i ty. Analyt ics . Ins ight . 
Firewall Time Behavior 
}Δ 
t .. time bin - aggregation 
source 
10.0.0.1 
10.0.0.2 
10.0.0.3 
10.0.0.4 
block & 
pass 
color mapping: pass block
High Frequency Sources Over Time 
block & 
pass 
pass block 
41 Secur i ty. Analyt ics . Ins ight .
42 Secur i ty. Analyt ics . Ins ight . 
High Frequency Traffic Split Up 
inbound outbound 
192.168.0.201 
195.141.69.42 
195.141.69.43 
195.141.69.44 
195.141.69.45 
195.141.69.46 
212.254.110.100 
212.254.110.101 
212.254.110.107 
212.254.110.108 
212.254.110.109 
212.254.110.110 
212.254.110.98 
212.254.110.99 
62.245.245.139
Outbound Traffic - Some Questions To Ask 
• What happened mid-way through? 
• Why is anything outbound blocked? 
• What are the top and bottom machines doing? 
• Did we get a new machine into the network? 
• Some machines went away? 
43 Secur i ty. Analyt ics . Ins ight .
Outbound Traffic - Some Questions To Ask 
• What happened mid-way through? 
• Why is anything outbound blocked? 
• What are the top and bottom machines doing? 
• Did we get a new machine into the network? 
• Some machines went away? 
43 Secur i ty. Analyt ics . Ins ight . 
195.141.69.42
44 Secur i ty. Analyt ics . Ins ight . 
195.141.69.42 - Interactions 
action 
port 
dest
44 Secur i ty. Analyt ics . Ins ight . 
195.141.69.42 - Interactions 
action 
port 
dest
44 Secur i ty. Analyt ics . Ins ight . 
195.141.69.42 - Interactions 
action 
port 
dest
Inbound - Zooming in on Top Rows 
45 Secur i ty. Analyt ics . Ins ight . 
rows 0,300
Inbound - Zooming in on Top Rows 
45 Secur i ty. Analyt ics . Ins ight . 
rows 0,300 
rows 200,260
46 Secur i ty. Analyt ics . Ins ight . 
Zooming in on Top Rows 
• Hardly any pass-block
46 Secur i ty. Analyt ics . Ins ight . 
Zooming in on Top Rows 
212.254.110.100 
212.254.110.101 
212.254.110.102 
212.254.110.103 
212.254.110.104 
212.254.110.105 
212.254.110.106 
212.254.110.107 
212.254.110.108 
212.254.110.109 
212.254.110.110 
212.254.110.111 
212.254.110.112 
212.254.110.113 
212.254.110.114 
212.254.110.115 
212.254.110.116 
212.254.110.117 
212.254.110.118 
212.254.110.119 
212.254.110.120 
212.254.110.121 
212.254.110.122 
212.254.110.123 
212.254.110.124 
212.254.110.125 
212.254.110.126 
212.254.110.127 
212.254.110.66 
212.254.110.96 
212.254.110.97 
212.254.110.98 
212.254.110.99 
• Hardly any pass-block
46 Secur i ty. Analyt ics . Ins ight . 
Zooming in on Top Rows 
212.254.110.100 
212.254.110.101 
212.254.110.102 
212.254.110.103 
212.254.110.104 
212.254.110.105 
212.254.110.106 
212.254.110.107 
212.254.110.108 
212.254.110.109 
212.254.110.110 
212.254.110.111 
212.254.110.112 
212.254.110.113 
212.254.110.114 
212.254.110.115 
212.254.110.116 
212.254.110.117 
212.254.110.118 
212.254.110.119 
212.254.110.120 
212.254.110.121 
212.254.110.122 
212.254.110.123 
212.254.110.124 
212.254.110.125 
212.254.110.126 
212.254.110.127 
212.254.110.66 
212.254.110.96 
212.254.110.97 
212.254.110.98 
212.254.110.99 
• Hardly any pass-block 
Oct 22 14:20:08.351202 rule 237/0(match): block in on xl0: 66.220.17.151.80 > 
212.254.110.103.1881: S 1451746674:1451746678(4) ack 1137377281 win 16384 (DF) 
ao.lop.com: 66.220.17.151 - Spyware Gang (LOP) 
http://www.freedomlist.com/forum/viewtopic.php?t=15724
46 Secur i ty. Analyt ics . Ins ight . 
Zooming in on Top Rows 
212.254.110.100 
212.254.110.101 
212.254.110.102 
212.254.110.103 
212.254.110.104 
212.254.110.105 
212.254.110.106 
212.254.110.107 
212.254.110.108 
212.254.110.109 
212.254.110.110 
212.254.110.111 
212.254.110.112 
212.254.110.113 
212.254.110.114 
212.254.110.115 
212.254.110.116 
212.254.110.117 
212.254.110.118 
212.254.110.119 
212.254.110.120 
212.254.110.121 
212.254.110.122 
212.254.110.123 
212.254.110.124 
212.254.110.125 
212.254.110.126 
212.254.110.127 
212.254.110.66 
212.254.110.96 
212.254.110.97 
212.254.110.98 
212.254.110.99 
• Hardly any pass-block
46 Secur i ty. Analyt ics . Ins ight . 
Zooming in on Top Rows 
212.254.110.100 
212.254.110.101 
212.254.110.102 
212.254.110.103 
212.254.110.104 
212.254.110.105 
212.254.110.106 
212.254.110.107 
212.254.110.108 
212.254.110.109 
212.254.110.110 
212.254.110.111 
212.254.110.112 
212.254.110.113 
212.254.110.114 
212.254.110.115 
212.254.110.116 
212.254.110.117 
212.254.110.118 
212.254.110.119 
212.254.110.120 
212.254.110.121 
212.254.110.122 
212.254.110.123 
212.254.110.124 
212.254.110.125 
212.254.110.126 
212.254.110.127 
212.254.110.66 
212.254.110.96 
212.254.110.97 
212.254.110.98 
212.254.110.99 
• Hardly any pass-block
46 Secur i ty. Analyt ics . Ins ight . 
Zooming in on Top Rows 
212.254.110.100 
212.254.110.101 
212.254.110.102 
212.254.110.103 
212.254.110.104 
212.254.110.105 
212.254.110.106 
212.254.110.107 
212.254.110.108 
212.254.110.109 
212.254.110.110 
212.254.110.111 
212.254.110.112 
212.254.110.113 
212.254.110.114 
212.254.110.115 
212.254.110.116 
212.254.110.117 
212.254.110.118 
212.254.110.119 
212.254.110.120 
212.254.110.121 
212.254.110.122 
212.254.110.123 
212.254.110.124 
212.254.110.125 
212.254.110.126 
212.254.110.127 
212.254.110.66 
212.254.110.96 
212.254.110.97 
212.254.110.98 
212.254.110.99 
• Hardly any pass-block 
212.254.110.102 
Oct 16 13:14:05.627835 rule 0/0(match): pass in on xl0: 66.220.17.151.80 > 
212.254.110.102.1977: S 1841864015:1841864019(4) ack 1308753921 win 16384 (DF) 
pass in log quick on $ext from any to $honey
47 Secur i ty. Analyt ics . Ins ight . 
This Guy Sure Keeps Busy 
212.254.144.40
47 Secur i ty. Analyt ics . Ins ight . 
This Guy Sure Keeps Busy 
212.254.144.40 
dest port
48 Secur i ty. Analyt ics . Ins ight . 
Recap 
• Attackers are very successful 
• Data can reveal adversaries 
• We have a big data analytics problem 
• We need the right analytics and visualizations 
• Security visualization is hard 
• Data visualization workflow is a promising approach 
• Analytics is not a linear process
49 
raffael.marty@pixlcloud.com

More Related Content

What's hot

How To Drive Value with Security Data
How To Drive Value with Security DataHow To Drive Value with Security Data
How To Drive Value with Security DataRaffael Marty
 
Insider Threat Visualization - HITB 2007, Kuala Lumpur
Insider Threat Visualization - HITB 2007, Kuala LumpurInsider Threat Visualization - HITB 2007, Kuala Lumpur
Insider Threat Visualization - HITB 2007, Kuala LumpurRaffael Marty
 
AI & ML in Cyber Security - Welcome Back to 1999 - Security Hasn't Changed
AI & ML in Cyber Security - Welcome Back to 1999 - Security Hasn't ChangedAI & ML in Cyber Security - Welcome Back to 1999 - Security Hasn't Changed
AI & ML in Cyber Security - Welcome Back to 1999 - Security Hasn't ChangedRaffael Marty
 
How to Hunt for Lateral Movement on Your Network
How to Hunt for Lateral Movement on Your NetworkHow to Hunt for Lateral Movement on Your Network
How to Hunt for Lateral Movement on Your NetworkSqrrl
 
Creating Your Own Threat Intel Through Hunting & Visualization
Creating Your Own Threat Intel Through Hunting & VisualizationCreating Your Own Threat Intel Through Hunting & Visualization
Creating Your Own Threat Intel Through Hunting & VisualizationRaffael Marty
 
Threat Hunting with Elastic at SpectorOps: Welcome to HELK
Threat Hunting with Elastic at SpectorOps: Welcome to HELKThreat Hunting with Elastic at SpectorOps: Welcome to HELK
Threat Hunting with Elastic at SpectorOps: Welcome to HELKElasticsearch
 
Security Insights at Scale
Security Insights at ScaleSecurity Insights at Scale
Security Insights at ScaleRaffael Marty
 
Delivering Security Insights with Data Analytics and Visualization
Delivering Security Insights with Data Analytics and VisualizationDelivering Security Insights with Data Analytics and Visualization
Delivering Security Insights with Data Analytics and VisualizationRaffael Marty
 
Hunting: Defense Against The Dark Arts
Hunting: Defense Against The Dark ArtsHunting: Defense Against The Dark Arts
Hunting: Defense Against The Dark ArtsSpyglass Security
 
MITRE ATT&CKcon 2.0: Using Threat Intelligence to Focus ATT&CK Activities; Da...
MITRE ATT&CKcon 2.0: Using Threat Intelligence to Focus ATT&CK Activities; Da...MITRE ATT&CKcon 2.0: Using Threat Intelligence to Focus ATT&CK Activities; Da...
MITRE ATT&CKcon 2.0: Using Threat Intelligence to Focus ATT&CK Activities; Da...MITRE - ATT&CKcon
 
Hunting: Defense Against The Dark Arts - BSides Philadelphia - 2016
Hunting: Defense Against The Dark Arts - BSides Philadelphia - 2016Hunting: Defense Against The Dark Arts - BSides Philadelphia - 2016
Hunting: Defense Against The Dark Arts - BSides Philadelphia - 2016Danny Akacki
 
Detecting Hacks: Anomaly Detection on Networking Data
Detecting Hacks: Anomaly Detection on Networking DataDetecting Hacks: Anomaly Detection on Networking Data
Detecting Hacks: Anomaly Detection on Networking DataJames Sirota
 
Cyber Threat Hunting with Phirelight
Cyber Threat Hunting with PhirelightCyber Threat Hunting with Phirelight
Cyber Threat Hunting with PhirelightHostway|HOSTING
 
Hunting: Defense Against The Dark Arts v2
Hunting: Defense Against The Dark Arts v2Hunting: Defense Against The Dark Arts v2
Hunting: Defense Against The Dark Arts v2Spyglass Security
 
Avoiding the Pitfalls of Hunting - BSides Charm 2016
Avoiding the Pitfalls of Hunting - BSides Charm 2016Avoiding the Pitfalls of Hunting - BSides Charm 2016
Avoiding the Pitfalls of Hunting - BSides Charm 2016Tony Cook
 
Big data Visualization and Dashboards
Big data Visualization and DashboardsBig data Visualization and Dashboards
Big data Visualization and DashboardsMia Yuan Cao
 
Windows Threat Hunting
Windows Threat HuntingWindows Threat Hunting
Windows Threat HuntingGIBIN JOHN
 
MITRE ATTACKCon Power Hour - December
MITRE ATTACKCon Power Hour - DecemberMITRE ATTACKCon Power Hour - December
MITRE ATTACKCon Power Hour - DecemberMITRE - ATT&CKcon
 
Artificial Intelligence – Time Bomb or The Promised Land?
Artificial Intelligence – Time Bomb or The Promised Land?Artificial Intelligence – Time Bomb or The Promised Land?
Artificial Intelligence – Time Bomb or The Promised Land?Raffael Marty
 

What's hot (20)

How To Drive Value with Security Data
How To Drive Value with Security DataHow To Drive Value with Security Data
How To Drive Value with Security Data
 
Insider Threat Visualization - HITB 2007, Kuala Lumpur
Insider Threat Visualization - HITB 2007, Kuala LumpurInsider Threat Visualization - HITB 2007, Kuala Lumpur
Insider Threat Visualization - HITB 2007, Kuala Lumpur
 
AI & ML in Cyber Security - Welcome Back to 1999 - Security Hasn't Changed
AI & ML in Cyber Security - Welcome Back to 1999 - Security Hasn't ChangedAI & ML in Cyber Security - Welcome Back to 1999 - Security Hasn't Changed
AI & ML in Cyber Security - Welcome Back to 1999 - Security Hasn't Changed
 
How to Hunt for Lateral Movement on Your Network
How to Hunt for Lateral Movement on Your NetworkHow to Hunt for Lateral Movement on Your Network
How to Hunt for Lateral Movement on Your Network
 
Creating Your Own Threat Intel Through Hunting & Visualization
Creating Your Own Threat Intel Through Hunting & VisualizationCreating Your Own Threat Intel Through Hunting & Visualization
Creating Your Own Threat Intel Through Hunting & Visualization
 
Threat Hunting with Elastic at SpectorOps: Welcome to HELK
Threat Hunting with Elastic at SpectorOps: Welcome to HELKThreat Hunting with Elastic at SpectorOps: Welcome to HELK
Threat Hunting with Elastic at SpectorOps: Welcome to HELK
 
Security Insights at Scale
Security Insights at ScaleSecurity Insights at Scale
Security Insights at Scale
 
Delivering Security Insights with Data Analytics and Visualization
Delivering Security Insights with Data Analytics and VisualizationDelivering Security Insights with Data Analytics and Visualization
Delivering Security Insights with Data Analytics and Visualization
 
Hunting: Defense Against The Dark Arts
Hunting: Defense Against The Dark ArtsHunting: Defense Against The Dark Arts
Hunting: Defense Against The Dark Arts
 
MITRE ATT&CKcon 2.0: Using Threat Intelligence to Focus ATT&CK Activities; Da...
MITRE ATT&CKcon 2.0: Using Threat Intelligence to Focus ATT&CK Activities; Da...MITRE ATT&CKcon 2.0: Using Threat Intelligence to Focus ATT&CK Activities; Da...
MITRE ATT&CKcon 2.0: Using Threat Intelligence to Focus ATT&CK Activities; Da...
 
Hunting: Defense Against The Dark Arts - BSides Philadelphia - 2016
Hunting: Defense Against The Dark Arts - BSides Philadelphia - 2016Hunting: Defense Against The Dark Arts - BSides Philadelphia - 2016
Hunting: Defense Against The Dark Arts - BSides Philadelphia - 2016
 
Detecting Hacks: Anomaly Detection on Networking Data
Detecting Hacks: Anomaly Detection on Networking DataDetecting Hacks: Anomaly Detection on Networking Data
Detecting Hacks: Anomaly Detection on Networking Data
 
Cyber Threat Hunting with Phirelight
Cyber Threat Hunting with PhirelightCyber Threat Hunting with Phirelight
Cyber Threat Hunting with Phirelight
 
Hunting: Defense Against The Dark Arts v2
Hunting: Defense Against The Dark Arts v2Hunting: Defense Against The Dark Arts v2
Hunting: Defense Against The Dark Arts v2
 
Avoiding the Pitfalls of Hunting - BSides Charm 2016
Avoiding the Pitfalls of Hunting - BSides Charm 2016Avoiding the Pitfalls of Hunting - BSides Charm 2016
Avoiding the Pitfalls of Hunting - BSides Charm 2016
 
Big data Visualization and Dashboards
Big data Visualization and DashboardsBig data Visualization and Dashboards
Big data Visualization and Dashboards
 
Windows Threat Hunting
Windows Threat HuntingWindows Threat Hunting
Windows Threat Hunting
 
MITRE ATTACKCon Power Hour - December
MITRE ATTACKCon Power Hour - DecemberMITRE ATTACKCon Power Hour - December
MITRE ATTACKCon Power Hour - December
 
Artificial Intelligence – Time Bomb or The Promised Land?
Artificial Intelligence – Time Bomb or The Promised Land?Artificial Intelligence – Time Bomb or The Promised Land?
Artificial Intelligence – Time Bomb or The Promised Land?
 
Security Chat 5.0
Security Chat 5.0Security Chat 5.0
Security Chat 5.0
 

Similar to The Heatmap
 - Why is Security Visualization so Hard?

Workshop: Big Data Visualization for Security
Workshop: Big Data Visualization for SecurityWorkshop: Big Data Visualization for Security
Workshop: Big Data Visualization for SecurityRaffael Marty
 
breed_python_tx_redacted
breed_python_tx_redactedbreed_python_tx_redacted
breed_python_tx_redactedRyan Breed
 
Approaches for application request throttling - dotNetCologne
Approaches for application request throttling - dotNetCologneApproaches for application request throttling - dotNetCologne
Approaches for application request throttling - dotNetCologneMaarten Balliauw
 
Neo4j: What's Under the Hood & How Knowing This Can Help You
Neo4j: What's Under the Hood & How Knowing This Can Help You Neo4j: What's Under the Hood & How Knowing This Can Help You
Neo4j: What's Under the Hood & How Knowing This Can Help You Neo4j
 
Provenance for Data Munging Environments
Provenance for Data Munging EnvironmentsProvenance for Data Munging Environments
Provenance for Data Munging EnvironmentsPaul Groth
 
Approaches for application request throttling - Cloud Developer Days Poland
Approaches for application request throttling - Cloud Developer Days PolandApproaches for application request throttling - Cloud Developer Days Poland
Approaches for application request throttling - Cloud Developer Days PolandMaarten Balliauw
 
Data Summer Conf 2018, “How we build Computer vision as a service (ENG)” — Ro...
Data Summer Conf 2018, “How we build Computer vision as a service (ENG)” — Ro...Data Summer Conf 2018, “How we build Computer vision as a service (ENG)” — Ro...
Data Summer Conf 2018, “How we build Computer vision as a service (ENG)” — Ro...Provectus
 
Application Monitoring using Open Source: VictoriaMetrics - ClickHouse
Application Monitoring using Open Source: VictoriaMetrics - ClickHouseApplication Monitoring using Open Source: VictoriaMetrics - ClickHouse
Application Monitoring using Open Source: VictoriaMetrics - ClickHouseVictoriaMetrics
 
Application Monitoring using Open Source - VictoriaMetrics & Altinity ClickHo...
Application Monitoring using Open Source - VictoriaMetrics & Altinity ClickHo...Application Monitoring using Open Source - VictoriaMetrics & Altinity ClickHo...
Application Monitoring using Open Source - VictoriaMetrics & Altinity ClickHo...Altinity Ltd
 
Data Democratization at Nubank
 Data Democratization at Nubank Data Democratization at Nubank
Data Democratization at NubankDatabricks
 
The State of Stream Processing
The State of Stream ProcessingThe State of Stream Processing
The State of Stream Processingconfluent
 
Big Data Visualization
Big Data VisualizationBig Data Visualization
Big Data VisualizationRaffael Marty
 
ConFoo Montreal - Approaches for application request throttling
ConFoo Montreal - Approaches for application request throttlingConFoo Montreal - Approaches for application request throttling
ConFoo Montreal - Approaches for application request throttlingMaarten Balliauw
 
Managing your Black Friday Logs NDC Oslo
Managing your  Black Friday Logs NDC OsloManaging your  Black Friday Logs NDC Oslo
Managing your Black Friday Logs NDC OsloDavid Pilato
 
Managing your Black Friday Logs - Antonio Bonuccelli - Codemotion Rome 2018
Managing your Black Friday Logs - Antonio Bonuccelli - Codemotion Rome 2018Managing your Black Friday Logs - Antonio Bonuccelli - Codemotion Rome 2018
Managing your Black Friday Logs - Antonio Bonuccelli - Codemotion Rome 2018Codemotion
 
Managing your black friday logs - Code Europe
Managing your black friday logs - Code EuropeManaging your black friday logs - Code Europe
Managing your black friday logs - Code EuropeDavid Pilato
 
MITRE ATT&CKcon 2018: Hunters ATT&CKing with the Data, Roberto Rodriguez, Spe...
MITRE ATT&CKcon 2018: Hunters ATT&CKing with the Data, Roberto Rodriguez, Spe...MITRE ATT&CKcon 2018: Hunters ATT&CKing with the Data, Roberto Rodriguez, Spe...
MITRE ATT&CKcon 2018: Hunters ATT&CKing with the Data, Roberto Rodriguez, Spe...MITRE - ATT&CKcon
 
Continuous Intelligence - Intersecting Event-Based Business Logic and ML
Continuous Intelligence - Intersecting Event-Based Business Logic and MLContinuous Intelligence - Intersecting Event-Based Business Logic and ML
Continuous Intelligence - Intersecting Event-Based Business Logic and MLParis Carbone
 
How to teach your data scientist to leverage an analytics cluster with Presto...
How to teach your data scientist to leverage an analytics cluster with Presto...How to teach your data scientist to leverage an analytics cluster with Presto...
How to teach your data scientist to leverage an analytics cluster with Presto...Alluxio, Inc.
 

Similar to The Heatmap
 - Why is Security Visualization so Hard? (20)

Workshop: Big Data Visualization for Security
Workshop: Big Data Visualization for SecurityWorkshop: Big Data Visualization for Security
Workshop: Big Data Visualization for Security
 
breed_python_tx_redacted
breed_python_tx_redactedbreed_python_tx_redacted
breed_python_tx_redacted
 
Approaches for application request throttling - dotNetCologne
Approaches for application request throttling - dotNetCologneApproaches for application request throttling - dotNetCologne
Approaches for application request throttling - dotNetCologne
 
Neo4j: What's Under the Hood & How Knowing This Can Help You
Neo4j: What's Under the Hood & How Knowing This Can Help You Neo4j: What's Under the Hood & How Knowing This Can Help You
Neo4j: What's Under the Hood & How Knowing This Can Help You
 
Provenance for Data Munging Environments
Provenance for Data Munging EnvironmentsProvenance for Data Munging Environments
Provenance for Data Munging Environments
 
Approaches for application request throttling - Cloud Developer Days Poland
Approaches for application request throttling - Cloud Developer Days PolandApproaches for application request throttling - Cloud Developer Days Poland
Approaches for application request throttling - Cloud Developer Days Poland
 
Data Summer Conf 2018, “How we build Computer vision as a service (ENG)” — Ro...
Data Summer Conf 2018, “How we build Computer vision as a service (ENG)” — Ro...Data Summer Conf 2018, “How we build Computer vision as a service (ENG)” — Ro...
Data Summer Conf 2018, “How we build Computer vision as a service (ENG)” — Ro...
 
Application Monitoring using Open Source: VictoriaMetrics - ClickHouse
Application Monitoring using Open Source: VictoriaMetrics - ClickHouseApplication Monitoring using Open Source: VictoriaMetrics - ClickHouse
Application Monitoring using Open Source: VictoriaMetrics - ClickHouse
 
Application Monitoring using Open Source - VictoriaMetrics & Altinity ClickHo...
Application Monitoring using Open Source - VictoriaMetrics & Altinity ClickHo...Application Monitoring using Open Source - VictoriaMetrics & Altinity ClickHo...
Application Monitoring using Open Source - VictoriaMetrics & Altinity ClickHo...
 
Data Democratization at Nubank
 Data Democratization at Nubank Data Democratization at Nubank
Data Democratization at Nubank
 
The State of Stream Processing
The State of Stream ProcessingThe State of Stream Processing
The State of Stream Processing
 
Big Data Visualization
Big Data VisualizationBig Data Visualization
Big Data Visualization
 
ConFoo Montreal - Approaches for application request throttling
ConFoo Montreal - Approaches for application request throttlingConFoo Montreal - Approaches for application request throttling
ConFoo Montreal - Approaches for application request throttling
 
Managing your Black Friday Logs NDC Oslo
Managing your  Black Friday Logs NDC OsloManaging your  Black Friday Logs NDC Oslo
Managing your Black Friday Logs NDC Oslo
 
Managing your Black Friday Logs - Antonio Bonuccelli - Codemotion Rome 2018
Managing your Black Friday Logs - Antonio Bonuccelli - Codemotion Rome 2018Managing your Black Friday Logs - Antonio Bonuccelli - Codemotion Rome 2018
Managing your Black Friday Logs - Antonio Bonuccelli - Codemotion Rome 2018
 
Managing your black friday logs - Code Europe
Managing your black friday logs - Code EuropeManaging your black friday logs - Code Europe
Managing your black friday logs - Code Europe
 
MITRE ATT&CKcon 2018: Hunters ATT&CKing with the Data, Roberto Rodriguez, Spe...
MITRE ATT&CKcon 2018: Hunters ATT&CKing with the Data, Roberto Rodriguez, Spe...MITRE ATT&CKcon 2018: Hunters ATT&CKing with the Data, Roberto Rodriguez, Spe...
MITRE ATT&CKcon 2018: Hunters ATT&CKing with the Data, Roberto Rodriguez, Spe...
 
Continuous Intelligence - Intersecting Event-Based Business Logic and ML
Continuous Intelligence - Intersecting Event-Based Business Logic and MLContinuous Intelligence - Intersecting Event-Based Business Logic and ML
Continuous Intelligence - Intersecting Event-Based Business Logic and ML
 
How to teach your data scientist to leverage an analytics cluster with Presto...
How to teach your data scientist to leverage an analytics cluster with Presto...How to teach your data scientist to leverage an analytics cluster with Presto...
How to teach your data scientist to leverage an analytics cluster with Presto...
 
Analytics&IoT
Analytics&IoTAnalytics&IoT
Analytics&IoT
 

More from Raffael Marty

Exploring the Defender's Advantage
Exploring the Defender's AdvantageExploring the Defender's Advantage
Exploring the Defender's AdvantageRaffael Marty
 
Extended Detection and Response (XDR) An Overhyped Product Category With Ulti...
Extended Detection and Response (XDR)An Overhyped Product Category With Ulti...Extended Detection and Response (XDR)An Overhyped Product Category With Ulti...
Extended Detection and Response (XDR) An Overhyped Product Category With Ulti...Raffael Marty
 
Cyber Security Beyond 2020 – Will We Learn From Our Mistakes?
Cyber Security Beyond 2020 – Will We Learn From Our Mistakes?Cyber Security Beyond 2020 – Will We Learn From Our Mistakes?
Cyber Security Beyond 2020 – Will We Learn From Our Mistakes?Raffael Marty
 
Understanding the "Intelligence" in AI
Understanding the "Intelligence" in AIUnderstanding the "Intelligence" in AI
Understanding the "Intelligence" in AIRaffael Marty
 
AI & ML in Cyber Security - Why Algorithms Are Dangerous
AI & ML in Cyber Security - Why Algorithms Are DangerousAI & ML in Cyber Security - Why Algorithms Are Dangerous
AI & ML in Cyber Security - Why Algorithms Are DangerousRaffael Marty
 
DAVIX - Data Analysis and Visualization Linux
DAVIX - Data Analysis and Visualization LinuxDAVIX - Data Analysis and Visualization Linux
DAVIX - Data Analysis and Visualization LinuxRaffael Marty
 
Cyber Security – How Visual Analytics Unlock Insight
Cyber Security – How Visual Analytics Unlock InsightCyber Security – How Visual Analytics Unlock Insight
Cyber Security – How Visual Analytics Unlock InsightRaffael Marty
 
Supercharging Visualization with Data Mining
Supercharging Visualization with Data MiningSupercharging Visualization with Data Mining
Supercharging Visualization with Data MiningRaffael Marty
 
Security Visualization - Let's Take A Step Back
Security Visualization - Let's Take A Step BackSecurity Visualization - Let's Take A Step Back
Security Visualization - Let's Take A Step BackRaffael Marty
 
Visual Analytics and Security Intelligence
Visual Analytics and Security IntelligenceVisual Analytics and Security Intelligence
Visual Analytics and Security IntelligenceRaffael Marty
 
Log Visualization - Bellua BCS 2006
Log Visualization - Bellua BCS 2006Log Visualization - Bellua BCS 2006
Log Visualization - Bellua BCS 2006Raffael Marty
 
Event Graphs - EUSecWest 2006
Event Graphs - EUSecWest 2006Event Graphs - EUSecWest 2006
Event Graphs - EUSecWest 2006Raffael Marty
 
Insider Threat Visualization - HackInTheBox 2007
Insider Threat Visualization - HackInTheBox 2007Insider Threat Visualization - HackInTheBox 2007
Insider Threat Visualization - HackInTheBox 2007Raffael Marty
 

More from Raffael Marty (14)

Exploring the Defender's Advantage
Exploring the Defender's AdvantageExploring the Defender's Advantage
Exploring the Defender's Advantage
 
Extended Detection and Response (XDR) An Overhyped Product Category With Ulti...
Extended Detection and Response (XDR)An Overhyped Product Category With Ulti...Extended Detection and Response (XDR)An Overhyped Product Category With Ulti...
Extended Detection and Response (XDR) An Overhyped Product Category With Ulti...
 
Cyber Security Beyond 2020 – Will We Learn From Our Mistakes?
Cyber Security Beyond 2020 – Will We Learn From Our Mistakes?Cyber Security Beyond 2020 – Will We Learn From Our Mistakes?
Cyber Security Beyond 2020 – Will We Learn From Our Mistakes?
 
Understanding the "Intelligence" in AI
Understanding the "Intelligence" in AIUnderstanding the "Intelligence" in AI
Understanding the "Intelligence" in AI
 
AI & ML in Cyber Security - Why Algorithms Are Dangerous
AI & ML in Cyber Security - Why Algorithms Are DangerousAI & ML in Cyber Security - Why Algorithms Are Dangerous
AI & ML in Cyber Security - Why Algorithms Are Dangerous
 
DAVIX - Data Analysis and Visualization Linux
DAVIX - Data Analysis and Visualization LinuxDAVIX - Data Analysis and Visualization Linux
DAVIX - Data Analysis and Visualization Linux
 
Cyber Security – How Visual Analytics Unlock Insight
Cyber Security – How Visual Analytics Unlock InsightCyber Security – How Visual Analytics Unlock Insight
Cyber Security – How Visual Analytics Unlock Insight
 
AfterGlow
AfterGlowAfterGlow
AfterGlow
 
Supercharging Visualization with Data Mining
Supercharging Visualization with Data MiningSupercharging Visualization with Data Mining
Supercharging Visualization with Data Mining
 
Security Visualization - Let's Take A Step Back
Security Visualization - Let's Take A Step BackSecurity Visualization - Let's Take A Step Back
Security Visualization - Let's Take A Step Back
 
Visual Analytics and Security Intelligence
Visual Analytics and Security IntelligenceVisual Analytics and Security Intelligence
Visual Analytics and Security Intelligence
 
Log Visualization - Bellua BCS 2006
Log Visualization - Bellua BCS 2006Log Visualization - Bellua BCS 2006
Log Visualization - Bellua BCS 2006
 
Event Graphs - EUSecWest 2006
Event Graphs - EUSecWest 2006Event Graphs - EUSecWest 2006
Event Graphs - EUSecWest 2006
 
Insider Threat Visualization - HackInTheBox 2007
Insider Threat Visualization - HackInTheBox 2007Insider Threat Visualization - HackInTheBox 2007
Insider Threat Visualization - HackInTheBox 2007
 

Recently uploaded

Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfThe Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfSeasiaInfotech2
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 

Recently uploaded (20)

Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfThe Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdf
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 

The Heatmap
 - Why is Security Visualization so Hard?

  • 1. Security Visualization Raffael Marty, CEO Why is It So Hard? ISF, Shanghai, China November, 2014
  • 2. 2 Secur i ty. Analyt ics . Ins ight . Visualization - Heatmaps
  • 3. 3 Secur i ty. Analyt ics . Ins ight . Visualization - Graphs
  • 4. 4 Secur i ty. Analyt ics . Ins ight . I am Raffy - I do Viz! IBM Research
  • 5. 27 days 229 days Average time to resolve a cyber attack 1.4 $7.2M 5 Secur i ty. Analyt ics . Ins ight . How Compromises Are Detected Mandiant M Trends Report 2014 Threat Report Attackers in networks before detection Successful attacks per company per week Average cost per company per year
  • 6. 6 Secur i ty. Analyt ics . Ins ight . Our Security Goals Find Intruders and ‘New Attacks’ Discover Exposure Early Communicate Findings
  • 7. 7 Secur i ty. Analyt ics . Ins ight . Why Visualization? the stats ... http://en.wikipedia.org/wiki/Anscombe%27s_quartet the data...
  • 8. 8 Secur i ty. Analyt ics . Ins ight . Why Visualization? http://en.wikipedia.org/wiki/Anscombe%27s_quartet
  • 9. 9 Secur i ty. Analyt ics . Ins ight . Visualize Me Lots (>1TB) of Data
  • 10. 9 Secur i ty. Analyt ics . Ins ight . Visualize Me Lots (>1TB) of Data
  • 11. 9 Secur i ty. Analyt ics . Ins ight . Visualize Me Lots (>1TB) of Data SecViz is Hard!
  • 12. ? 10 Secur i ty. Analyt ics . Ins ight . It’s Hard - Understanding Data • We don’t understand the data / logs • Single log entry: Mar 16 08:09:48 kernel: [0.00000] Normal 1048576 -> 1048576 • Absence of logs? Logging configuration? • Collection of logs • Understanding context (setup, business processes) • Is this normal? 2011-07-22 20:34:51 282 ce6de14af68ce198 - - - OBSERVED "unavailable" http://www.surfjunky.com/members/sj-a.php? r=44864 200 TCP_NC_MISS GET text/html http www.surfjunky.com 80 /members/sj-a.php ?r=66556 php "Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.24 (KHTML, like Gecko) Chrome/ 11.0.696.65 Safari/534.24" 82.137.200.42 1395 663 -
  • 13. Situational Awareness 11 Secur i ty. Analyt ics . Ins ight . It’s Hard - The Right Data Security Monitoring Data Exfiltration ‣ DNS traffic Fraud ‣ HTTP header sequences ‣ Application logs ‣ DB logs ‣ context feeds! ‣ Application logs ‣ DLP ‣ Proxies Phishing et al. ‣ email logs ‣ Are we focusing on the right data sources? ‣ Everyone focuses on ‣Traffic flows ‣ IDS data Zero Days Botnet / Malware infections
  • 14. It’s Hard - Mapping the Data Oct 13 20:00:05.680894 rule 57/0(match): pass in on xl1: 195.141.69.45.1030 > 217.12.4.104.53: 7040 [1au] A? mx1.mail.yahoo.com. (47) (DF) 1. Understand all elements 2. Which fields are important? 3. Do we need more context? 4. What do we want to see? - Time-behavior? - Relationships? 5. How much data do we have? What graph will scale to that? 12 Secur i ty. Analyt ics . Ins ight .
  • 15. Visualize 1TB of Data - What Graph? 13 Secur i ty. Analyt ics . Ins ight . drop reject NONE ctl accept DNS Update Failed Log In IP Fragments Max Flows Initiated Packet Flood UDP Flood Aggressive Aging Bootp Renew Log Out Release NACK Conflict DNS Update Successful DNS record not deleted DNS Update Request Port Flood 1 10000 100000000 How much information does each of the graphs convey?
  • 16. 14 Secur i ty. Analyt ics . Ins ight . It Is Hard - IP Addresses FOCUS Info-Viz = Sec-Viz =
  • 17. An Approach - And The Challenges 15
  • 18. 16 Secur i ty. Analyt ics . Ins ight . Data Visualization Workflow Overview Zoom / Filter Details on Demand
  • 19. 16 Secur i ty. Analyt ics . Ins ight . Data Visualization Workflow Overview Zoom / Filter Details on Demand
  • 20. 16 Secur i ty. Analyt ics . Ins ight . Data Visualization Workflow Overview Zoom / Filter Details on Demand
  • 21. Overview - The Heatmap Matrix A, where aij are integer values mapped to a color scale. 17 Secur i ty. Analyt ics . Ins ight . aij = 1 10 20 30 40 50 60 70 80 >90 42 rows columns
  • 22. Mapping Log Records to Heatmaps May 5 23:57:50 pixl-ram sudo: pam_unix(sudo:session): session opened for user root by ram(uid=0) t .. time bin time 18 Secur i ty. Analyt ics . Ins ight . root ram peg sue }Δ
  • 23. Mapping Log Records to Heatmaps May 5 23:57:50 pixl-ram sudo: pam_unix(sudo:session): session opened for user root by ram(uid=0) t .. time bin time 18 Secur i ty. Analyt ics . Ins ight . root ram peg sue }Δ
  • 24. Mapping Log Records to Heatmaps May 5 23:57:50 pixl-ram sudo: pam_unix(sudo:session): session opened for user root by ram(uid=0) 18 Secur i ty. Analyt ics . Ins ight . root ram peg sue }Δ ⨍()=+1 t .. time bin time
  • 25. • Scales well to a lot of data (can aggregate ad infinitum) • Shows more information than a bar chart • Flexible ‘measure’ mapping • frequency count • sum(variable) [avg(), stddev(), …] • distinct count(variable) 19 Secur i ty. Analyt ics . Ins ight . Why Heatmaps?
  • 26. • Scales well to a lot of data (can aggregate ad infinitum) • Shows more information than a bar chart • Flexible ‘measure’ mapping • frequency count • sum(variable) [avg(), stddev(), …] • distinct count(variable) 19 Secur i ty. Analyt ics . Ins ight . Why Heatmaps? • BUT information content is limited! • Aggregates too highly in time and potentially value dimensions
  • 27. random row order 20 Secur i ty. Analyt ics . Ins ight . HeatMap Challenges - Sorting • Random • Alphabetically • Based on values • Similarity • What algorithm? • What distance metric? • Leverage third data field / context? rows clustered user
  • 28. What’s the HeatMap Not Good At 21 Secur i ty. Analyt ics . Ins ight . • Showing relationships -> link graphs • Showing multiple dimensions and their inter-relatedness -> || coords
  • 29. color = Port 22 Secur i ty. Analyt ics . Ins ight . Graphs SourceIP DestIP
  • 30. 23 Secur i ty. Analyt ics . Ins ight . Graphs To Show Relationships
  • 31. destIP URL user destIP user sourceport destIP user 24 Secur i ty. Analyt ics . Ins ight . Some Graph Challenges • How to map data to graph • Don’t scale to few hundred (thousand) nodes • What layout algorithm to chose? • Node placement should be semantically motivated • Graph metrics don’t mean anything in security (centrality, etc.) • Analytics needs • interactive features • linked views • Analytics is not a linear process source event destination destport sourceIP action destPort
  • 32. 25 Secur i ty. Analyt ics . Ins ight . Backend Challenges Different backend technologies (big data) • Key-value store • Search engine • GraphDB • RDBMS • Columnar - can answer analytical questions • Hadoop (Map Reduce) • good for operations on ALL data Other things to consider: • Caching • Joins
  • 33. Raffael . Marty @ pixlcloud . com 26 Examples
  • 34. 27 Secur i ty. Analyt ics . Ins ight . Vincent Th i s heatmap s hows behavior over time. In this case, we see activity per user. We can see that ‘vincent’ is visually different from all of the other users. He shows up very lightly over the ent i re t ime period. This seems to be something to look into. Purely visual, without understanding the data were we able to find this.
  • 35. Security. Analytics. Insight. Attribution Authentication Events: users over time Who is behind these scans? Challenges • Finding meaningful patterns Graph credit: Tye Wells
  • 36. Security. Analytics. Insight. Same Pattern For Sources From 4 Countries Graph credit: Tye Wells
  • 37. 30 Secur i ty. Analyt ics . Ins ight . Firewall Heatmap
  • 38. Intra-Role Anomaly - Random Order users time dc(machines) 31 Secur i ty. Analyt ics . Ins ight .
  • 39. Intra-Role Anomaly - With Seriation 32 Secur i ty. Analyt ics . Ins ight .
  • 40. Intra-Role Anomaly - Sorted by User Role 33 Secur i ty. Analyt ics . Ins ight .
  • 41. Intra-Role Anomaly - Sorted by User Role Administrator Sales Development Finance 33 Secur i ty. Analyt ics . Ins ight .
  • 42. Intra-Role Anomaly - Sorted by User Role Administrator Admin??? Sales Development Finance 33 Secur i ty. Analyt ics . Ins ight .
  • 43. 34 Secur i ty. Analyt ics . Ins ight . Graphs - A Story
  • 44. 34 Secur i ty. Analyt ics . Ins ight . Graphs - A Story
  • 45. 34 Secur i ty. Analyt ics . Ins ight . Graphs - A Story This looks interesting • What is it? • Green -> Port 53 • Only port 53? • What IPs? • What’s the time behavior? The graph doesn’t answer these questions
  • 46. 35 Secur i ty. Analyt ics . Ins ight . Graphs - A Story • Adding a port histogram • Select DNS traffic and see if other ports light up.
  • 47. 36 Secur i ty. Analyt ics . Ins ight . DNS Traffic - A Closer Look Linked Views - Histograms for Source Port (Source) Destination - ||-coord
  • 48. 37 Secur i ty. Analyt ics . Ins ight .
  • 49. 37 Secur i ty. Analyt ics . Ins ight . select port 1900
  • 50. 37 Secur i ty. Analyt ics . Ins ight . select port 1900
  • 51. 38 Secur i ty. Analyt ics . Ins ight . port 80
  • 52. Security. Analytics. Insight. After some exploration …
  • 53. 40 Secur i ty. Analyt ics . Ins ight . Firewall Time Behavior source 10.0.0.1 10.0.0.2 10.0.0.3 10.0.0.4
  • 54. 40 Secur i ty. Analyt ics . Ins ight . Firewall Time Behavior source 10.0.0.1 10.0.0.2 10.0.0.3 10.0.0.4 block & pass color mapping: pass block
  • 55. 40 Secur i ty. Analyt ics . Ins ight . Firewall Time Behavior }Δ t .. time bin - aggregation source 10.0.0.1 10.0.0.2 10.0.0.3 10.0.0.4 block & pass color mapping: pass block
  • 56. High Frequency Sources Over Time block & pass pass block 41 Secur i ty. Analyt ics . Ins ight .
  • 57. 42 Secur i ty. Analyt ics . Ins ight . High Frequency Traffic Split Up inbound outbound 192.168.0.201 195.141.69.42 195.141.69.43 195.141.69.44 195.141.69.45 195.141.69.46 212.254.110.100 212.254.110.101 212.254.110.107 212.254.110.108 212.254.110.109 212.254.110.110 212.254.110.98 212.254.110.99 62.245.245.139
  • 58. Outbound Traffic - Some Questions To Ask • What happened mid-way through? • Why is anything outbound blocked? • What are the top and bottom machines doing? • Did we get a new machine into the network? • Some machines went away? 43 Secur i ty. Analyt ics . Ins ight .
  • 59. Outbound Traffic - Some Questions To Ask • What happened mid-way through? • Why is anything outbound blocked? • What are the top and bottom machines doing? • Did we get a new machine into the network? • Some machines went away? 43 Secur i ty. Analyt ics . Ins ight . 195.141.69.42
  • 60. 44 Secur i ty. Analyt ics . Ins ight . 195.141.69.42 - Interactions action port dest
  • 61. 44 Secur i ty. Analyt ics . Ins ight . 195.141.69.42 - Interactions action port dest
  • 62. 44 Secur i ty. Analyt ics . Ins ight . 195.141.69.42 - Interactions action port dest
  • 63. Inbound - Zooming in on Top Rows 45 Secur i ty. Analyt ics . Ins ight . rows 0,300
  • 64. Inbound - Zooming in on Top Rows 45 Secur i ty. Analyt ics . Ins ight . rows 0,300 rows 200,260
  • 65. 46 Secur i ty. Analyt ics . Ins ight . Zooming in on Top Rows • Hardly any pass-block
  • 66. 46 Secur i ty. Analyt ics . Ins ight . Zooming in on Top Rows 212.254.110.100 212.254.110.101 212.254.110.102 212.254.110.103 212.254.110.104 212.254.110.105 212.254.110.106 212.254.110.107 212.254.110.108 212.254.110.109 212.254.110.110 212.254.110.111 212.254.110.112 212.254.110.113 212.254.110.114 212.254.110.115 212.254.110.116 212.254.110.117 212.254.110.118 212.254.110.119 212.254.110.120 212.254.110.121 212.254.110.122 212.254.110.123 212.254.110.124 212.254.110.125 212.254.110.126 212.254.110.127 212.254.110.66 212.254.110.96 212.254.110.97 212.254.110.98 212.254.110.99 • Hardly any pass-block
  • 67. 46 Secur i ty. Analyt ics . Ins ight . Zooming in on Top Rows 212.254.110.100 212.254.110.101 212.254.110.102 212.254.110.103 212.254.110.104 212.254.110.105 212.254.110.106 212.254.110.107 212.254.110.108 212.254.110.109 212.254.110.110 212.254.110.111 212.254.110.112 212.254.110.113 212.254.110.114 212.254.110.115 212.254.110.116 212.254.110.117 212.254.110.118 212.254.110.119 212.254.110.120 212.254.110.121 212.254.110.122 212.254.110.123 212.254.110.124 212.254.110.125 212.254.110.126 212.254.110.127 212.254.110.66 212.254.110.96 212.254.110.97 212.254.110.98 212.254.110.99 • Hardly any pass-block Oct 22 14:20:08.351202 rule 237/0(match): block in on xl0: 66.220.17.151.80 > 212.254.110.103.1881: S 1451746674:1451746678(4) ack 1137377281 win 16384 (DF) ao.lop.com: 66.220.17.151 - Spyware Gang (LOP) http://www.freedomlist.com/forum/viewtopic.php?t=15724
  • 68. 46 Secur i ty. Analyt ics . Ins ight . Zooming in on Top Rows 212.254.110.100 212.254.110.101 212.254.110.102 212.254.110.103 212.254.110.104 212.254.110.105 212.254.110.106 212.254.110.107 212.254.110.108 212.254.110.109 212.254.110.110 212.254.110.111 212.254.110.112 212.254.110.113 212.254.110.114 212.254.110.115 212.254.110.116 212.254.110.117 212.254.110.118 212.254.110.119 212.254.110.120 212.254.110.121 212.254.110.122 212.254.110.123 212.254.110.124 212.254.110.125 212.254.110.126 212.254.110.127 212.254.110.66 212.254.110.96 212.254.110.97 212.254.110.98 212.254.110.99 • Hardly any pass-block
  • 69. 46 Secur i ty. Analyt ics . Ins ight . Zooming in on Top Rows 212.254.110.100 212.254.110.101 212.254.110.102 212.254.110.103 212.254.110.104 212.254.110.105 212.254.110.106 212.254.110.107 212.254.110.108 212.254.110.109 212.254.110.110 212.254.110.111 212.254.110.112 212.254.110.113 212.254.110.114 212.254.110.115 212.254.110.116 212.254.110.117 212.254.110.118 212.254.110.119 212.254.110.120 212.254.110.121 212.254.110.122 212.254.110.123 212.254.110.124 212.254.110.125 212.254.110.126 212.254.110.127 212.254.110.66 212.254.110.96 212.254.110.97 212.254.110.98 212.254.110.99 • Hardly any pass-block
  • 70. 46 Secur i ty. Analyt ics . Ins ight . Zooming in on Top Rows 212.254.110.100 212.254.110.101 212.254.110.102 212.254.110.103 212.254.110.104 212.254.110.105 212.254.110.106 212.254.110.107 212.254.110.108 212.254.110.109 212.254.110.110 212.254.110.111 212.254.110.112 212.254.110.113 212.254.110.114 212.254.110.115 212.254.110.116 212.254.110.117 212.254.110.118 212.254.110.119 212.254.110.120 212.254.110.121 212.254.110.122 212.254.110.123 212.254.110.124 212.254.110.125 212.254.110.126 212.254.110.127 212.254.110.66 212.254.110.96 212.254.110.97 212.254.110.98 212.254.110.99 • Hardly any pass-block 212.254.110.102 Oct 16 13:14:05.627835 rule 0/0(match): pass in on xl0: 66.220.17.151.80 > 212.254.110.102.1977: S 1841864015:1841864019(4) ack 1308753921 win 16384 (DF) pass in log quick on $ext from any to $honey
  • 71. 47 Secur i ty. Analyt ics . Ins ight . This Guy Sure Keeps Busy 212.254.144.40
  • 72. 47 Secur i ty. Analyt ics . Ins ight . This Guy Sure Keeps Busy 212.254.144.40 dest port
  • 73. 48 Secur i ty. Analyt ics . Ins ight . Recap • Attackers are very successful • Data can reveal adversaries • We have a big data analytics problem • We need the right analytics and visualizations • Security visualization is hard • Data visualization workflow is a promising approach • Analytics is not a linear process