visualization for security

43
Raffael Marty, CEO Visualization for Security Blue Coat - Sunnyvale August, 2014

Upload: raffael-marty

Post on 31-Oct-2014

3.518 views

Category:

Internet


4 download

DESCRIPTION

Vision is a human’s dominant sense. It is the communication channel with the highest bandwidth into the human brain. Security tools and applications need to make better use of information visualization to enhance human computer interactions and information exchange. In this talk we will explore a few basic principles of information visualization to see how they apply to cyber security. We will explore both visualization as a data presentation, as well as a data discovery tool. We will address questions like: What makes for effective visualizations? What are some core principles to follow when designing a dashboard? How do you go about visually exploring a terabyte of data? And what role do big data and data mining play in security visualization? The presentation is filled with visualizations of security data to help translate the theoretical concepts into tangible applications.

TRANSCRIPT

Page 1: Visualization for Security

Raffael Marty, CEO

Visualization for Security

Blue Coat - Sunnyvale August, 2014

Page 2: Visualization for Security

Secur i ty. Analyt ics . Ins ight .2

I am Raffy - I do Viz!

IBM Research

Page 3: Visualization for Security

Secur i ty. Analyt ics . Ins ight .3

What is Security Visualization?

Treemap of a Firewall Log

• if found(machine)

• connect on port 135

• ping scan machines (echo requests)

Showing MS Blaster:

Page 4: Visualization for Security

Secur i ty. Analyt ics . Ins ight .4

Security Visualization Can Be Beautiful

Part of Enron Email dataset

sender recipient

Page 5: Visualization for Security

Secur i ty. Analyt ics . Ins ight .5

Security Visualization - Sometimes Abstract

Parallel Coordinates of an IDS log

Can you find anythinginteresting?

Page 6: Visualization for Security

Secur i ty. Analyt ics . Ins ight .6

Security Visualization

One destinations isgetting hammered!

Parallel Coordinates of an IDS log

Page 7: Visualization for Security

Secur i ty. Analyt ics . Ins ight .7

Security Visualization

One destinations isgetting hammered! !

Maybe a false positive?

Page 8: Visualization for Security

Visualization

Page 9: Visualization for Security

Secur i ty. Analyt ics . Ins ight .9

Basic Visualization Principles

How many 9’s?

Page 10: Visualization for Security

Secur i ty. Analyt ics . Ins ight .10

How Many Nines?

Page 11: Visualization for Security

Secur i ty. Analyt ics . Ins ight .11

What Product has Highest Profit? And Which has Worst Sales?

Page 12: Visualization for Security

Secur i ty. Analyt ics . Ins ight .12

Table Charts

• The exact values are not important

• Comparisons • Highlights

Page 13: Visualization for Security

Secur i ty. Analyt ics . Ins ight .13

Show Context

42

Page 14: Visualization for Security

Secur i ty. Analyt ics . Ins ight .14

Show Context

42 is just a number

and means nothing without context

Page 15: Visualization for Security
Page 16: Visualization for Security

Secur i ty. Analyt ics . Ins ight .16

Use Numbers To Highlight Most Important Parts of Data

NumbersSummaries

Page 17: Visualization for Security

Secur i ty. Analyt ics . Ins ight .17

Visualization Creates Context

Visualization Puts Numbers (Data) in Context!

Page 18: Visualization for Security

Secur i ty. Analyt ics . Ins ight .18

Visualization To …

Present / Communicate Discover / Explore

Page 19: Visualization for Security

Data Presentation

Page 20: Visualization for Security

Secur i ty. Analyt ics . Ins ight .20

• Show  comparisons, contrasts, differences • Show  causality, mechanism, explanation, systematic

structure. • Show  multivariate data; that is, show more than 1 or 2

variables. !

by Edward Tufte

Principals of Analytic Design

Page 21: Visualization for Security

Secur i ty. Analyt ics . Ins ight .21

Comparison (to Normal)

DNS Reflection • 1:100 Amplification with DNS zone transfer for ripe.net domain • 309Gbps for 28 minutes, 30956 open resolver IPs, 3 networks that allowed

spoofing, 5-7 compromised servers 

March 20, 2013

Page 22: Visualization for Security

Secur i ty. Analyt ics . Ins ight .22

Causality / Explanation

Page 23: Visualization for Security

Secur i ty. Analyt ics . Ins ight .23

Multi-Variate Data

Page 24: Visualization for Security

Secur i ty. Analyt ics . Ins ight .24

Choosing Visualizations

Objective AudienceData

Page 25: Visualization for Security

25

Page 26: Visualization for Security

Charts

26

Page 27: Visualization for Security

Secur i ty. Analyt ics . Ins ight .27

More Advanced Graphs

• Parallel Coordinates • Treemaps • Link Graphs • etc.

Page 28: Visualization for Security

Secur i ty. Analyt ics . Ins ight .28

Additional information about objects, such as:

• machine • roles • criticality • location • owner • …

• user • roles • office location • …

Add Context

source destination

machine and user context

machine role

user role

Page 29: Visualization for Security

Secur i ty. Analyt ics . Ins ight .29

Traffic Flow Analysis With Context

Page 30: Visualization for Security

Secur i ty. Analyt ics . Ins ight .30

Intra-Role Anomaly - Random Order

users

time

dc(machines)

Page 31: Visualization for Security

Secur i ty. Analyt ics . Ins ight .31

Add Context - User Roles

Administrator

Sales

Development

Finance

Admin???

Page 32: Visualization for Security

Secur i ty. Analyt ics . Ins ight .32

http://www.scifiinterfaces.com/

• Black background • Blue or green colors • Glow

Aesthetics Matter

Page 33: Visualization for Security

Dashboards

Page 34: Visualization for Security

Secur i ty. Analyt ics . Ins ight .34

• Audience, audience, audience!

• Comprehensive Information (enough context)

• Highlight important data

• Use graphics when appropriate

• Good choice of graphics and design

• Aesthetically pleasing

• Enough information to decide if action is necessary

• No scrolling

• Real-time vs. batch? (Refresh-rates)

• Clear organization

Dashboard Design Principles

Page 35: Visualization for Security

Secur i ty. Analyt ics . Ins ight .35

Netflix Dashboard

http://blog.fusioncharts.com/2014/04/how-netflix-plans-to-improve-its-operational-visibility-with-real-time-data-visualization/#more-7243

Page 36: Visualization for Security

Secur i ty. Analyt ics . Ins ight .36

Page 37: Visualization for Security

37

Data Discovery & Exploration

Page 38: Visualization for Security

Secur i ty. Analyt ics . Ins ight .38

Visualize Me Lots (>1TB) of Data

Page 39: Visualization for Security

Secur i ty. Analyt ics . Ins ight .39

Data Visualization Workflow

Overview Zoom / Filter Details on Demand

Principle by Ben Shneiderman

Page 40: Visualization for Security

Secur i ty. Analyt ics . Ins ight .40

This visualization process requires:

• Low latency, scalable backend (columnar, distributed data store)

• Efficient client-server communications and caching

• Assistance of data mining to

• Reduce overall data to look at

• Highlight relationships, patterns, and outliers

• Assist analyst in focussing on ‘important’ areas

Backend Support

Page 41: Visualization for Security

Secur i ty. Analyt ics . Ins ight .41

What I am Working On

Data Stores Analytics Forensics Models Admin

10.9.79.109 --> 3.16.204.150 10.8.24.80 --> 192.168.148.19310.8.50.85 --> 192.168.148.19310.8.48.128 --> 192.168.148.19310.9.79.6 --> 192.168.148.193

10.9.79.6

10.8.48.128

80

538.8.8.8

127.0.0.1

Anomalies

Decomposition

Data

Seasonal

Trend

Anomaly Details

“Hunt” ExplainCommunicate

Page 42: Visualization for Security

Secur i ty. Analyt ics . Ins ight .42

Visualization Principles

• Use numbers to highlight most important data

• Use visualizations to put data in context

• Show comparisons, causality, and multivariate data

• To find the right visualization, focus on: Objective, Data, Audience

• Use data context to augment data and tell a story

Visualization can be used for for presentation and/or exploration

• Exploration paradigm: Overview first, zoom and filter, details on demand

Recap