dataviz for cyber security

57
DataViz in Cyber Security Awalin Sopan @awalinsopan Senior Software Engineer, Analysis Team, FireEye, Inc

Upload: awalin-sopan

Post on 17-Mar-2018

279 views

Category:

Data & Analytics


2 download

TRANSCRIPT

Page 1: Dataviz For Cyber Security

DataViz in Cyber Security

Awalin Sopan@awalinsopan

Senior Software Engineer,

Analysis Team, FireEye, Inc

Page 2: Dataviz For Cyber Security

Over 200 attacks on major industrial

control systems in 2013.

“Cyber threat is one of the most serious

economic and national security

challenges we face as a nation”- White

House Press release, May 29, 2009

Page 3: Dataviz For Cyber Security

FireEye Report 2014

Page 4: Dataviz For Cyber Security

Cyber Attack

Lifecycle

FireEye Report 2017

Page 5: Dataviz For Cyber Security
Page 6: Dataviz For Cyber Security

DEFENSE AGAINST CYBER ATTACK:

Role of a Human (Cyber Analyst)

• Detect intrusion

• Recommend solution

• Threat insight

• Gather evidence

• Prevent intrusion

• Find vulnerability in the system

• Block suspected traffic

• Forensic analysis:

• Create rules to detect future attack

• Nature of attack

Page 7: Dataviz For Cyber Security

Multivariate:

Packet Capture/TCP dump, (ip, port, pkt size, time, etc.

multiple features) from network sensors.

Logs

OS

Servers

Applications

Firewalls

SECURITY DATA:DATA CAPTURED THROUGH SENSORS

Page 8: Dataviz For Cyber Security
Page 9: Dataviz For Cyber Security

Relational:

Flow data through Network: can be collected from routers:

connection between IPs, hosts.

SECURITY DATA:DATA CAPTURED THROUGH SENSORS

Page 10: Dataviz For Cyber Security
Page 11: Dataviz For Cyber Security
Page 12: Dataviz For Cyber Security
Page 13: Dataviz For Cyber Security

Temporal:

Log Files/Activity/Events: Host/endpoint events over time

SECURITY DATA:DATA CAPTURED THROUGH SENSORS

Page 14: Dataviz For Cyber Security

• Communicate findings

• Overview

• Analyze:

• Compare and Relate

• Find trend/ pattern

• Predict

• Find anomaly

WHY VISUALIZATION

Page 15: Dataviz For Cyber Security

VISUAL ANALYTICS:

INTERACTIVE VISUAL INTERFACE

FOR DECISION MAKING

Page 16: Dataviz For Cyber Security

Visual Information Seeking “Mantra”-Ben Shneiderman

• Overview data using charts, dashboard, tables: see

all relevant data

• Find pattern, trend, outlier, correlation

• Sort by rank

• Group similar features

• Zoom and filter: select only interesting ones

• Details on Demand: details of the selected alert

Page 17: Dataviz For Cyber Security

DATA -> VISUALIZATION

Mu

ltiv

aria

te Packet capture, tcp dump from network

sensors, server logs, operating system logs,

firewall logs: Host based Intrusion Detection

System. Data with multiple variables like ip,

port, packet size, time, etc.

Table, scatter plot,

bubble chart, parallel

coordinate

Re

latio

na

l/

Hie

rarc

hic

al

Network data flow from routers, connection

between ips, hosts. Top-down hierarchy of the

system: Network Based Intrusion Detection

System.

Node-link diagram,

matrix diagram.

Pie chart, treemap.

Te

mp

or al

Log file, activity events over time Line chart, time series,

timeline, histogram,

sparklines

Designing the User Interface 4th Edition: Ben Shneiderman and Catherine Plaisant

Page 18: Dataviz For Cyber Security

NETWORK

Page 19: Dataviz For Cyber Security

VAST 2012 Challenge Data: 2 days of Flow data

Nodes sized by in-degree

Sized by in-degree

Page 20: Dataviz For Cyber Security
Page 21: Dataviz For Cyber Security

Color coded: showing only top 25% strong links

Links color coded by strength: red low, green high

Page 22: Dataviz For Cyber Security

Color coded: showing only top 10% strong links

Filtered out weak links to declutter network

Page 23: Dataviz For Cyber Security

Color coded: showing only top 5% strong links

DDoS attack ?

Page 24: Dataviz For Cyber Security

wikipedia

DDoS attack

Page 25: Dataviz For Cyber Security

CONTENT OF PACKETS

Page 26: Dataviz For Cyber Security

Network Packet Sensing Rule

Page 27: Dataviz For Cyber Security

Network Packet

Page 28: Dataviz For Cyber Security
Page 29: Dataviz For Cyber Security

PACKET LABELING

Page 30: Dataviz For Cyber Security
Page 31: Dataviz For Cyber Security
Page 32: Dataviz For Cyber Security

Distraction !

Real target!

Page 33: Dataviz For Cyber Security

PORT ANALYSIS

Page 34: Dataviz For Cyber Security

Target IP

Source IP

Page 35: Dataviz For Cyber Security

Target IP

Source IP

Page 36: Dataviz For Cyber Security
Page 37: Dataviz For Cyber Security

EVENT LOG

Page 38: Dataviz For Cyber Security

System events log

Page 39: Dataviz For Cyber Security

Event timeline

Page 40: Dataviz For Cyber Security

Details on demand

Page 41: Dataviz For Cyber Security

TIME SERIES OF EVENTS

Page 42: Dataviz For Cyber Security
Page 43: Dataviz For Cyber Security

Events in Network (rendered using Grafana)

ANOMALY DETECTION

Login attempts in the system

Page 44: Dataviz For Cyber Security

MODES OF OPERATIONS

Put it all together in analysts workflow:

• Contextual views

• Dashboard for overview

• Visual analytics with multiple coordinated views

• Situational awareness for immediate assessment

Page 45: Dataviz For Cyber Security

DASHBOARDS

Page 46: Dataviz For Cyber Security

Example: SPLUNK

Page 47: Dataviz For Cyber Security
Page 48: Dataviz For Cyber Security

MULTIPLE COORDINATED

VISUALIZATIONS

Page 49: Dataviz For Cyber Security

TempoViz

Page 50: Dataviz For Cyber Security

Low priority

High priority

Mid priority

Alerts aggregated over time

Page 51: Dataviz For Cyber Security

SITUATIONAL AWARENESS

Page 52: Dataviz For Cyber Security

Situation awareness is the ability to :

•assess data

•evaluate options

•make decisions in a timely manner.

Page 53: Dataviz For Cyber Security

VIZSEC:

WORKSHOP ON SECURITY VISUALIZATION

Page 54: Dataviz For Cyber Security

http://ieeexplore.ieee.org/xpl/articleDetails.jsp?reload=true&arnumber=7312763

OCELOT

Page 55: Dataviz For Cyber Security

CYNOMIXGOVE ET A.L, VIZSEC 2014

Find similar malwares

Page 56: Dataviz For Cyber Security

Visualizing the Insider Threathttp://ieeexplore.ieee.org/xpl/login.jsp?tp=&arnumber=7312772&url=http%3A%2F%2Fieeexplore.ieee.org%2Fiel7%2F7310645%2F7312757%2F0731 2772.pdf%3Farnumber%

3D7312772

Interactive PCA of user activity

Anomalous cluster

Page 57: Dataviz For Cyber Security

• Allow humans and machines to work together.

• Bridge the gap btwn security experts & dataviz experts.

• Provide contextual clues to the analysts.

• Integrate visual analytics in analyst workflow.

• Make room for scalability and efficiency.

• Avoid visual representations requiring lot of explanation.

• Choose the network layout that avoids edge crossing or

node overlapping.

• Aggregation of data should be obvious.

TAKE AWAY

[email protected]