Data Analysis & Visualization for Security Professionals
|
|
|
- Nicholas Gilmore
- 10 years ago
- Views:
Transcription
1 Data Analysis & Visualization for Security Professionals Jay Jacobs Verizon Bob Rudis Liberty Mutual Insurance Session ID: GRC- T18 Session Classification: Intermediate
2 Key Learning Points
3 Key Learning Points data helps our understanding of our environment
4 Key Learning Points data helps our understanding of our environment solutions are more from thinking than buying
5 Key Learning Points data helps our understanding of our environment solutions are more from thinking than buying visualizations help communicate complexity quickly
6 Key Learning Points data helps our understanding of our environment solutions are more from thinking than buying visualizations help communicate complexity quickly data visualization is not a natural skill, it must be learned
7 Key Learning Points data helps our understanding of our environment solutions are more from thinking than buying visualizations help communicate complexity quickly data visualization is not a natural skill, it must be learned be truthful: message should match the data
8 Key Learning Points data helps our understanding of our environment solutions are more from thinking than buying visualizations help communicate complexity quickly data visualization is not a natural skill, it must be learned be truthful: message should match the data simple tools can be, data scientist you need not be
9 Make decisions Visual representation of data Visualizing for analysis Helps Understanding Thinking vs buying Ocular biology Amplify cognition Gestalt Quick comprehension Visualize *to* communicate Communicates Complexity Not a natural skill Visual encoding Medium Labeling 3D EVIL Pies R Speaks Truth Uses simple tools Simple yet powerful Python Gephi Tableau Command line prototypes MongoDB Lots of data
10 Make decisions Visual representation of data Visualizing for analysis Helps Understanding Thinking vs buying Ocular biology Amplify cognition Gestalt Quick comprehension Visualize *to* communicate Communicates Complexity Not a natural skill Visual encoding Medium Labeling 3D EVIL Pies R Speaks Truth Uses simple tools Simple yet powerful Python Gephi Tableau Command line prototypes MongoDB Lots of data
11 use information to better understand our world and make more informed decisions Stephen Few
12 use information to better understand our world and make more informed decisions Data helps our understanding of our environment Stephen Few
13 Our Goal: To amplify cognition of data through visual representation and presentation.
14 Our Goal:
15 Our Goal:
16 Visualizing for Analysis
17 Visualizing for Analysis All four data sets: Mean of x: 9.0 Variance of x: 11.0 Mean of y: 7.5 Variance of y: 4.1 Correlation x,y: Linear Regression: y = 3 + 5x
18 Visualized...
19
20
21 Solutions are more from thinking than buying
22 Visualizing for Analysis: Pairs of Threat Actions
23
24 Visualizing to Communicate: The night before Hurricane Sandy... Date: OCT 2012 Hurricane-2 SANDY ADV LAT LON TIME WIND PR STAT /22/15Z TROPICAL DEPRESSION 1A /22/18Z TROPICAL DEPRESSION /22/21Z TROPICAL STORM 2A /23/00Z TROPICAL STORM /23/03Z TROPICAL STORM 3A /23/06Z TROPICAL STORM /23/09Z TROPICAL STORM 4A /23/12Z TROPICAL STORM /23/15Z TROPICAL STORM 5A /23/18Z TROPICAL STORM /23/21Z TROPICAL STORM 6A /24/00Z TROPICAL STORM /24/03Z TROPICAL STORM 7A /24/06Z TROPICAL STORM /24/09Z TROPICAL STORM 8A /24/12Z TROPICAL STORM /24/15Z HURRICANE-1 9A /24/18Z HURRICANE /24/21Z HURRICANE-1 10A /25/00Z HURRICANE /25/03Z HURRICANE-1 11A /25/06Z HURRICANE
25 Visualizing to Communicate: The night before Hurricane Sandy...
26 ...and three months later
27
28 Visualizations help communicate complexity quickly
29 [Tables and graphs] are so common many of us assume that knowledge of their effective use is common as well. I assure you, it is not. Stephen Few Show Me the Numbers: Designing Tables and Graphs to Enlighten
30 count California Attorney GeneralDatabreaches.net Dataloss DB HHS via Databreaches.net HHS via PHIPrivacy.net Media NAID PHIPrivacy.net Security Breach Letter Type CARD DISC HACK INSD PHYS PORT STAT UNKN Month
31 Make decisions Visual representation of data Visualizing for analysis Helps Understanding Thinking vs buying Ocular biology Amplify cognition Gestalt Quick comprehension Visualize *to* communicate Communicates Complexity Not a natural skill Visual encoding Medium Labeling 3D EVIL Pies R Speaks Truth Uses simple tools Simple yet powerful Python Gephi Tableau Command line prototypes MongoDB Lots of data
32 Visualizing Encoding with shape, size, color and position using categorical or quantitative variables possibly over space or time
33 Accuracy of Decoding More Position along a common scale Position on identical but nonaligned scales Length Angle / Slope Area Less Volume / Density / Saturation Hue Graphical perceptions and Graphical Methods for Analyzing Scientific Data, Cleveland and McGill, Science, Photo by Kevin Riggins,
34 Communicate Quantity with Saturation?
35 Quantity Position Length Angle Slope Area Volume Density Saturation Hue Category Position Hue Density Saturation Shape Length Angle Slope Area Volume From: Photo by Kevin Riggins,
36
37 Colorblind Safe Print friendly Photocopy-able
38 Color blindness is common
39 Print Friendly...?
40 Pop Quiz: What do you see?
41
42 Quantity (% of breaches) Category (year) Category (actor)
43 Quantity (% of breaches) Category (position) Category (color)
44 x 74 6x 94 20x length
45 x 74 6x 94 20x Position on common scale
46 x 74 6x 94 20x patterns!
47 Pop Quiz #2: Which is larger?
48 F A E B D C
49 Which is Larger? B A E F C D 0% 3% 5% 8% 10% 13% 15% 18% 20% Position and Length makes the same values easier to compare
50
51 Caution! Adding a third dimension on twodimensional medium creates perspective...
52
53 Pie Charts
54 How are we as an Industry? It seems y all need to go on a diet (too much pie) over 20 industry reports pulled -
55 How are we as an Industry? Data visualization is not a natural skill; It must be learned It seems y all need to go on a diet (too much pie) over 20 industry reports pulled -
56 Avoid them, people don t decode well Use them, people learn how to decode If you must use Pie Charts... Never in 3D Limit categories, 3 to 6 Start at 12, clockwise decreasing in quantity Avoid if angles are small or values are close
57 Slide Workload Distribution Jay Bob
58 Tufte Takeaways Chart Junk: the stuff that doesn t change when the data changes Data Ink Ratio: what percentage of your ink shows data Smallest Effective Difference: the least you can do to highlight
59 Make decisions Visual representation of data Visualizing for analysis Helps Understanding Thinking vs buying Ocular biology Amplify cognition Gestalt Quick comprehension Visualize *to* communicate Communicates Complexity Not a natural skill Visual encoding Medium Labeling 3D EVIL Pies R Speaks Truth Uses simple tools Simple yet powerful Python Gephi Tableau Command line prototypes MongoDB Lots of data
60
61 35% 39.6%
62
63 Selection Bias? [1st, 10th, 16th, and 31st month]
64 Selection Bias? Be truthful! The message should match the data. [1st, 10th, 16th, and 31st month]
65 Make decisions Visual representation of data Visualizing for analysis Helps Understanding Thinking vs buying Ocular biology Amplify cognition Gestalt Quick comprehension Visualize *to* communicate Communicates Complexity Not a natural skill Visual encoding Medium Labeling 3D EVIL Pies R Speaks Truth Uses simple tools Simple yet powerful Python Gephi Tableau Command line prototypes MongoDB Lots of data
66 :52:52 Local4.Info :Apr 13 08:52:52 PDT: %ASA- session : Built inbound TCP connection for W Workstations: / :52:52 Local4.Info ( /4873) to Servers: /135 :Apr 13 08:52:52 PDT: %ASA- session : ( /135) Built inbound TCP connection for W :52:52 Local4.Info :Apr 13 08:52:52 PDT: %ASA- session : %ASA- session : Built Teardown inbound TCP connection TCP connection for Workst for Workstations: / :52:52 Local4.Info ( /4874) to Servers: /43025 :Apr 13 08:52:52 PDT: %ASA- session : ( /43025) Built inbound TCP connection for W :52:52 Local4.Info :Apr 13 08:52:52 PDT: %ASA- session : Built inbound TCP connection for W Workstations: / :52:53 Local4.Info ( /4875) to Servers: /43032 :Apr 13 08:52:53 PDT: %ASA- session : ( /43032) Teardown TCP connection for Workst :52:52 08:52:53 Local4.Info :Apr 13 08:52:52 08:52:53 PDT: %ASA- session : Teardown TCP connection for Workst / :52:53 to Local4.Info Servers: / duration 0:00:00 :Apr 13 bytes 08:52: PDT: TCP %ASA- session : FINs Teardown TCP connection for Workst :52:52 08:52:53 Local4.Info :Apr 13 08:52:52 08:52:53 PDT: %ASA- session : %ASA- session : Built Teardown inbound TCP connection TCP connection for Workst for Workstations: / :52:53 Local4.Info ( /4876) to Servers: /135 :Apr 13 08:52:53 PDT: %ASA- session : ( /135) Teardown TCP connection for Workst :52:52 08:52:53 Local4.Info :Apr 13 08:52:52 08:52:53 PDT: %ASA- session : %ASA- session : Built Teardown inbound TCP connection TCP connection for Workst for Workstations: / :52:55 Local4.Info ( /4877) to Servers: /43025 :Apr 13 08:52:55 PDT: %ASA- session : ( /43025) Teardown TCP connection for Workst :52:53 08:52:55 Local4.Info :Apr 13 08:52:53 08:52:55 PDT: %ASA- session : Teardown TCP connection for Workst / :52:55 to Local4.Info Servers: /49155 duration :Apr 1:00: :52:55 bytes 1968 PDT: Connection %ASA- session : timeout Teardown TCP connection for Workst :52:53 08:52:55 Local4.Info :Apr 13 08:52:53 08:52:55 PDT: %ASA- session : Teardown TCP connection for Workst / :52:55 to Local4.Info Servers: / duration 1:00:01 :Apr 13 bytes 08:52: PDT: Connection %ASA- session : timeout Teardown TCP connection for Workst :52:53 08:52:55 Local4.Info :Apr 13 08:52:53 08:52:55 PDT: %ASA- session : Teardown TCP connection for Workst / :52:55 to Local4.Info Servers: / Firewall duration 0:00:58 :Apr 13 bytes 08:52: PDT: TCP %ASA- session : FINs Logs Built inbound TCP connection for W :52:53 08:52:55 Local4.Info :Apr 13 08:52:53 08:52:55 PDT: %ASA- session : Teardown TCP connection for Workst / :52:55 to Local4.Info Servers: / duration 0:00:14 :Apr bytes 13 08:52: TCP PDT: FINs %ASA- session : Teardown TCP connection for Workst :52:53 08:52:55 Local4.Info :Apr 13 08:52:53 08:52:55 PDT: %ASA- session : Teardown TCP connection for Workst / :52:56 to Local4.Info Servers: / duration 0:00:14 :Apr bytes 13 08:52: TCP PDT: FINs %ASA- session : Teardown TCP connection for Workst :52:53 08:52:56 Local4.Info :Apr 13 08:52:53 08:52:56 PDT: %ASA- session : Teardown TCP connection for Workst / :52:56 to Local4.Info Are Servers: / A duration Good 0:00:14 :Apr 13 bytes 08:52: PDT: TCP FINs %ASA- session : Example Teardown TCP connection for Workst :52:55 08:52:52 Local4.Info :Apr 13 08:52:55 08:52:52 PDT: %ASA- session : %ASA- session : Teardown Built inbound TCP connection TCP connection for Workst for W / :52:52 to Local4.Info Servers: / duration 0:00:28 :Apr bytes 13 08:52: TCP PDT: FINs %ASA- session : Built inbound TCP connection for W :52:55 08:52:52 Local4.Info :Apr 13 08:52:55 08:52:52 PDT: %ASA- session : %ASA- session : Teardown Built inbound TCP connection TCP connection for Workst for W / :52:52 to Local4.Info Servers: / duration 0:00:28 :Apr 13 bytes 08:52: PDT: TCP FINs %ASA- session : Teardown TCP connection for Workst :52:55 08:52:52 Local4.Info :Apr 13 08:52:55 08:52:52 PDT: %ASA- session : %ASA- session : Teardown Built inbound TCP connection TCP connection for Workst for W / :52:52 to Local4.Info Servers: / (Use duration 0:00:28 :Apr bytes 13 case 08:52: TCP PDT: FINs %ASA- session : #1) Built inbound TCP connection for W :52:55 08:52:53 Local4.Info :Apr 13 08:52:55 08:52:53 PDT: %ASA- session : Teardown TCP connection for Workst / :52:53 to Local4.Info Servers: / duration 0:00:28 :Apr 13 bytes 08:52: PDT: TCP FINs %ASA- session : Teardown TCP connection for Workst :52:55 08:52:53 Local4.Info :Apr 13 08:52:55 08:52:53 PDT: %ASA- session : Teardown TCP connection for Workst / :52:53 to Local4.Info Servers: / duration 0:00:11 :Apr bytes 13 08:52: TCP PDT: FINs %ASA- session : Teardown TCP connection for Workst :52:55 08:52:53 Local4.Info :Apr 13 08:52:55 08:52:53 PDT: %ASA- session : Teardown TCP connection for Workst / :52:53 to Local4.Info Servers: / duration 0:00:10 :Apr 13 bytes 08:52: PDT: TCP FINs %ASA- session : Teardown TCP connection for Workst :52:55 Local4.Info :Apr 13 08:52:55 PDT: %ASA- session : %ASA- session : Built Teardown inbound TCP connection TCP connection for Workst for Workstations: / :52:55 Local4.Info ( /1440) to Servers: /43032 :Apr 13 08:52:55 PDT: %ASA- session : ( /43032) Teardown TCP connection for Workst :52:55 Local4.Info :Apr 13 08:52:55 PDT: %ASA- session : Teardown TCP connection for Workst / :52:55 to Local4.Info Servers: / duration 0:00:00 :Apr 13 bytes 08:52: PDT: TCP FINs %ASA- session : Teardown TCP connection for Workst :52:55 Local4.Info :Apr 13 08:52:55 PDT: %ASA- session : Teardown TCP connection for Workst / :52:55 to Local4.Info Servers: / duration 1:00:01 :Apr 13 bytes 08:52: PDT: Connection %ASA- session : timeout Teardown TCP connection for Workst :52:55 Local4.Info :Apr 13 08:52:55 PDT: %ASA- session : %ASA- session : Teardown Built inbound TCP connection TCP connection for Workst for W / :52:55 to Local4.Info Servers: /49155 duration :Apr 1:00: :52:55 bytes 1941 PDT: Connection %ASA- session : timeout Teardown TCP connection for Workst :52:56 08:52:55 Local4.Info :Apr 13 08:52:56 08:52:55 PDT: %ASA- session : Teardown TCP connection for Workst / :52:55 to Local4.Info Servers: / duration 0:00:28 :Apr bytes 13 08:52: TCP PDT: FINs %ASA- session : Teardown TCP connection for Workst :52:56 Local4.Info :Apr 13 08:52:56 PDT: %ASA- session : Teardown TCP connection for Workst / :52:56 to Local4.Info Servers: / duration 0:00:28 :Apr 13 bytes 08:52: PDT: TCP FINs %ASA- session : Teardown TCP connection for Workst :52:56 Local4.Info :Apr 13 08:52:56 PDT: %ASA- session : Teardown TCP connection for Workst
67 Source: :52:52 Local4.Info :Apr 13 08:52:52 PDT: %ASA-session : Built inbound TCP connection for Workstations: /4873 ( /4873) to Servers: /135 ( /135) Normalized: Date/time,Syslog priority,operation,message code,protocol,source IP,Destination IP,Source hostname,destination hostname,source port,destination port,destination service,direction,connections built,connections torn down 13/Apr/ :52:52,Info,Built,ASA-session ,TCP, , ,(empty),(empty), 4873,135,epmap,inbound,1,0
68 $ grepfield - p Built _ _fw_log* aggregate - p - k 6 - c 6 - d \, sort - n - t, - k2 tail , , , ,10753 (empty), , , , , ,
69 10,452,115 events 1.3GB of data 4.5 hours (not even one day) 1 firewall
70 Command-line tools aren t enough
71
72 Simple, tools can be; Data scientist, you need not be.
73 [ { "Syslog priority": "Info", "Protocol": "TCP", "Destination IP": " ", "Destination port": "135", "Source IP": " ", "Connections torn down": "0", "Direction": "inbound", "Connections built": "1", "Message code": "ASA-session ", "Date/time": "13/Apr/ :52:52", "Destination service": "epmap", "Source port": "4873", "Destination hostname": "(empty)", "Source hostname": "(empty)", "Operation": "Built" }, { "Syslog priority": "Info", "Protocol": "TCP", "Destination IP": " ", "Destination port": "43025", "Source IP": " ", "Connections torn down": "0", "Direction": "inbound", "Connections built": "1", "Message code": "ASA-session ", "Date/time": "13/Apr/ :52:52", "Destination service": "43025_tcp", "Source port": "4874", "Destination hostname": "(empty)", "Source hostname": "(empty)", "Operation": "Built" } ]
74 [ { "Syslog priority": "Info", "Protocol": "TCP", "Destination IP": " ", "Destination port": "135", "Source IP": " ", "Connections torn down": "0", "Direction": "inbound", "Connections built": "1", "Message code": "ASA-session ", "Date/time": "13/Apr/ :52:52", "Destination service": "epmap", "Source port": "4873", "Destination hostname": "(empty)", "Source hostname": "(empty)", "Operation": "Built" }, { "Syslog priority": "Info", "Protocol": "TCP", "Destination IP": " ", "Destination port": "43025", "Source IP": " ", "Connections torn down": "0", "Direction": "inbound", "Connections built": "1", "Message code": "ASA-session ", "Date/time": "13/Apr/ :52:52", "Destination service": "43025_tcp", "Source port": "4874", "Destination hostname": "(empty)", "Source hostname": "(empty)", "Operation": "Built" } ] #!/usr/bin/python import csv import json import sys csv_file = open(sys.argv[1],"r") reader = csv.reader(csv_file) header = reader.next() for row in reader: jsondict = {} for i in range(len(header)): jsondict[header[i]] = row[i] print json.dumps(jsondict)
75 mongoimport db.fw.aggregate( [ { $match : { day : "13" } }, # match the first day { $group : { _id : "$src", count : { $sum : 1 } } }, # group and count source { $project : { _id : 0, src : "$_id", count: "$count" } }, # project into structure { $sort : { count : -1, _id : -1 } }, # sort by counts { $limit : 10 } ] ) # show just top 10 "ok" : 1 { "count" : , "src" : " " }, { "count" : , "src" : " " }, { "count" : , "src" : " " }, { "count" : , "src" : " " }, { "count" : , "src" : " " }, { "count" : 39931, "src" : "(empty)" }, { "count" : 10753, "src" : " " }, { "count" : 3457, "src" : " " }, { "count" : 2752, "src" : " " }, { "count" : 1558, "src" : " " }
76
77
78
79
80 Source Count , , , , , ,518 Analysis Action: Investigate 174/175
81 Packets over Time...
82 Packets over Time...
83 Use Case #2: Geo-location of IP addresses
84 Some botnets are so big you can see them from space (or at least, Google Earth).
85 F-Secure releases 140,000 ZeroAccess geolocations IN,"18.975, " TR," , " US," , " TR," , " VE,"10.5, " US," , " RO," ,24.35" RO," ,24.35" RO," ,26.9" JP,"35.685, " BR," , " IN,"15.15, " CA," , " IT,"44.8, " US," , " CO,"4.6492, " RO,"46.35,25.8" US," , " PL," , " CA," , " SE," ,17.25" US," , " US," , " CA," ,-73.4"
86 Careful How Data is Parsed
87 Google Maps
88 Not Google Maps alpha = 1/33
89 Population The Story Our Data
90 and to wrap things up...
91
92 Key Learning Points data helps our understanding of our environment solutions are more from thinking than buying visualizations help communicate complexity quickly data visualization is not a natural skill, it must be learned be truthful: message should match the data simple tools can be, data scientist you need not be
93 Bob Jay
Principles of Data Visualization for Exploratory Data Analysis. Renee M. P. Teate. SYS 6023 Cognitive Systems Engineering April 28, 2015
Principles of Data Visualization for Exploratory Data Analysis Renee M. P. Teate SYS 6023 Cognitive Systems Engineering April 28, 2015 Introduction Exploratory Data Analysis (EDA) is the phase of analysis
Mini-Challenge 3. Data Descriptions for Week 1
Data Sources Mini-Challenge 3 Data Descriptions for Week 1 The data under investigation spans a two week period. This document describes the data available for week 1. A supplementary document describes
This file contains 2 years of our interlibrary loan transactions downloaded from ILLiad. 70,000+ rows, multiple fields = an ideal file for pivot
Presented at the Southeastern Library Assessment Conference, October 22, 2013 1 2 3 This file contains 2 years of our interlibrary loan transactions downloaded from ILLiad. 70,000+ rows, multiple fields
Edge Configuration Series Reporting Overview
Reporting Edge Configuration Series Reporting Overview The Reporting portion of the Edge appliance provides a number of enhanced network monitoring and reporting capabilities. WAN Reporting Provides detailed
CSU, Fresno - Institutional Research, Assessment and Planning - Dmitri Rogulkin
My presentation is about data visualization. How to use visual graphs and charts in order to explore data, discover meaning and report findings. The goal is to show that visual displays can be very effective
Unresolved issues with the course, grades, or instructor, should be taken to the point of contact.
Graphics and Data Visualization CS1501 Fall 2013 Syllabus Course Description With the advent of powerful data-mining technologies, engineers in all disciplines are increasingly expected to be conscious
IPSEC for Windows Packet Filtering
IPSEC for Windows Packet Filtering David Taylor SR Information Security Specialist University of Pennsylvania [email protected] 215-898-1236 (Revision Date: 14 October 2005) *NOTE* This document is going
Analyzing Call Signaling
The Call Signaling Analyzer enables you to isolate faults in calls in your deployment. Call Signaling Analyzer analyzes calls at a high level and then drills down to a lower level within the components
Data journalism: what it can do for you
Data journalism: what it can do for you NCSWA workshop, January 12, 2013 Peter Aldhous, San Francisco Bureau Chief [email protected] Twitter: @paldhous From the ashes of the news industry, a phoenix?
nfdump and NfSen 18 th Annual FIRST Conference June 25-30, 2006 Baltimore Peter Haag 2006 SWITCH
18 th Annual FIRST Conference June 25-30, 2006 Baltimore Peter Haag 2006 SWITCH Some operational questions, popping up now and then: Do you see this peek on port 445 as well? What caused this peek on your
Quantitative Displays for Combining Time-Series and Part-to-Whole Relationships
Quantitative Displays for Combining Time-Series and Part-to-Whole Relationships Stephen Few, Perceptual Edge Visual Business Intelligence Newsletter January, February, and March 211 Graphical displays
Configuring NetFlow Secure Event Logging (NSEL)
73 CHAPTER This chapter describes how to configure NSEL, a security logging mechanism that is built on NetFlow Version 9 technology, and how to handle events and syslog messages through NSEL. The chapter
_Firewall. Palo Alto. How Logtrust works with Palo Alto Networks
_Firewall Palo Alto Networks is the next-generation firewalls that enhance your network security and enable any enterprises to look beyond IP addresses and packets. These innovative firewalls let you see
F-SECURE MESSAGING SECURITY GATEWAY
F-SECURE MESSAGING SECURITY GATEWAY DEFAULT SETUP GUIDE This guide describes how to set up and configure the F-Secure Messaging Security Gateway appliance in a basic e-mail server environment. AN EXAMPLE
Good Scientific Visualization Practices + Python
Good Scientific Visualization Practices + Python Kristen Thyng Python in Geosciences September 19, 2013 Kristen Thyng (Texas A&M) Visualization September 19, 2013 1 / 29 Outline Overview of Bad Plotting
1Fortinet. 2How Logtrust. Firewall technologies from Fortinet offer integrated, As your business grows and volumes of data increase,
Fortinet 1Fortinet Firewall technologies from Fortinet offer integrated, high-performance protection against today s wide range of threats targeting applications, data and users. Fortinet s firewall technology
Configuring NetFlow Secure Event Logging (NSEL)
75 CHAPTER This chapter describes how to configure NSEL, a security logging mechanism that is built on NetFlow Version 9 technology, and how to handle events and syslog messages through NSEL. The chapter
Introduction to Geographical Data Visualization
perceptual edge Introduction to Geographical Data Visualization Stephen Few, Perceptual Edge Visual Business Intelligence Newsletter March/April 2009 The important stories that numbers have to tell often
CS171 Visualization. The Visualization Alphabet: Marks and Channels. Alexander Lex [email protected]. [xkcd]
CS171 Visualization Alexander Lex [email protected] The Visualization Alphabet: Marks and Channels [xkcd] This Week Thursday: Task Abstraction, Validation Homework 1 due on Friday! Any more problems
Server Load Prediction
Server Load Prediction Suthee Chaidaroon ([email protected]) Joon Yeong Kim ([email protected]) Jonghan Seo ([email protected]) Abstract Estimating server load average is one of the methods that
Bridging the gap between COTS tool alerting and raw data analysis
Article Bridging the gap between COTS tool alerting and raw data analysis An article on how the use of metadata in cybersecurity solutions raises the situational awareness of network activity, leading
Reports and Logging. PAN-OS Administrator s Guide. Version 6.1
Reports and Logging PAN-OS Administrator s Guide Version 6.1 Contact Information Corporate Headquarters: Palo Alto Networks 4401 Great America Parkway Santa Clara, CA 95054 www.paloaltonetworks.com/company/contact-us
Introduction to Dashboards in Excel 2007. Craig W. Abbey Director of Institutional Analysis Academic Planning and Budget University at Buffalo
Introduction to Dashboards in Excel 2007 Craig W. Abbey Director of Institutional Analysis Academic Planning and Budget University at Buffalo Course Objectives 1. Learn how to layout various types of dashboards
Cisco ASA and NetFlow Using ASA NetFlow with LiveAction Flow Software
LiveAction Application Note Cisco ASA and NetFlow Using ASA NetFlow with LiveAction Flow Software January 2013 http://www.actionpacked.com Table of Contents 1. Introduction... 1 2. ASA NetFlow Security
NfSen Plugin Supporting The Virtual Network Monitoring
NfSen Plugin Supporting The Virtual Network Monitoring Vojtěch Krmíček [email protected] Pavel Čeleda [email protected] Jiří Novotný [email protected] Part I Monitoring of Virtual Network Environments
Repsheet. A Behavior Based Approach to Web Application Security. Aaron Bedra Application Security Lead Braintree Payments. tirsdag den 1.
Repsheet A Behavior Based Approach to Web Application Security Aaron Bedra Application Security Lead Braintree Payments Right now, your web applications are being attacked And it will happen again, and
Network Metrics Content Pack for VMware vrealize Log Insight
Network Metrics Content Pack for VMware vrealize Log Insight User Manual Version 2.1 June, 2015 Copyright 2012-2015 NetFlow Logic Corporation. All rights reserved. Patents Pending. Contents Introduction...
Diagrams and Graphs of Statistical Data
Diagrams and Graphs of Statistical Data One of the most effective and interesting alternative way in which a statistical data may be presented is through diagrams and graphs. There are several ways in
Choosing a successful structure for your visualization
IBM Software Business Analytics Visualization Choosing a successful structure for your visualization By Noah Iliinsky, IBM Visualization Expert 2 Choosing a successful structure for your visualization
Cisco IOS Flexible NetFlow Command Reference
Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com Tel: 408 526-4000 800 553-NETS (6387) Fax: 408 527-0883 THE SPECIFICATIONS AND INFORMATION
PAN-OS Syslog Integration
PAN-OS Syslog Integration Tech Note Revision M 2012, Palo Alto Networks, Inc. www.paloaltonetworks.com Contents Log Formats...3 TRAFFIC...3 Descriptions...3 Subtype Field...5 Action Field...6 Flags Field...6
Using TestLogServer for Web Security Troubleshooting
Using TestLogServer for Web Security Troubleshooting Topic 50330 TestLogServer Web Security Solutions Version 7.7, Updated 19-Sept- 2013 A command-line utility called TestLogServer is included as part
How To Run Statistical Tests in Excel
How To Run Statistical Tests in Excel Microsoft Excel is your best tool for storing and manipulating data, calculating basic descriptive statistics such as means and standard deviations, and conducting
Network Intrusion Detection Systems. Beyond packet filtering
Network Intrusion Detection Systems Beyond packet filtering Goal of NIDS Detect attacks as they happen: Real-time monitoring of networks Provide information about attacks that have succeeded: Forensic
Limitations of Packet Measurement
Limitations of Packet Measurement Collect and process less information: Only collect packet headers, not payload Ignore single packets (aggregate) Ignore some packets (sampling) Make collection and processing
About this Getting Started Guide. Enabling Log Management... 2 Applying a License... 4 Using Log Management... 5. How to forward logs...
Connect With Confidence Astaro Log Management Getting Started Guide About this Getting Started Guide To use Astaro Log Management, logs need to be transferred from individual systems to the cloud. This
Firewall Firewall August, 2003
Firewall August, 2003 1 Firewall and Access Control This product also serves as an Internet firewall, not only does it provide a natural firewall function (Network Address Translation, NAT), but it also
BIG-IP Access Policy Manager and Splunk Templates
BIG-IP Access Policy Manager and Splunk Templates Summary BIG-IP Access Policy Manager (APM) provides 28 reports to ease the integration of F5 BIG-IP APM logs and the Splunk reporting system. Three are
MicroStrategy Desktop
MicroStrategy Desktop Quick Start Guide MicroStrategy Desktop is designed to enable business professionals like you to explore data, simply and without needing direct support from IT. 1 Import data from
Bill Burton Albert Einstein College of Medicine [email protected] April 28, 2014 EERS: Managing the Tension Between Rigor and Resources 1
Bill Burton Albert Einstein College of Medicine [email protected] April 28, 2014 EERS: Managing the Tension Between Rigor and Resources 1 Calculate counts, means, and standard deviations Produce
What is Visualization? Information Visualization An Overview. Information Visualization. Definitions
What is Visualization? Information Visualization An Overview Jonathan I. Maletic, Ph.D. Computer Science Kent State University Visualize/Visualization: To form a mental image or vision of [some
RIFIS Ad Hoc Reports
RIFIS Ad Hoc Reports To retrieve the entire list of all Ad Hoc Reports, including the Base reports and any additional reports published to your Role, select Ad Hoc for the Type under Filter Report By and
Network Monitoring and Management NetFlow Overview
Network Monitoring and Management NetFlow Overview These materials are licensed under the Creative Commons Attribution-Noncommercial 3.0 Unported license (http://creativecommons.org/licenses/by-nc/3.0/)
HOW TO USE DATA VISUALIZATION TO WIN OVER YOUR AUDIENCE
HOW TO USE DATA VISUALIZATION TO WIN OVER YOUR AUDIENCE + TABLE OF CONTENTS HOW DATA SUPPORTS YOUR MESSAGE 1 Benefits of Data Visualization WHEN TO USE DATA VISUALIZATION HOW TO FIND THE STORY IN YOUR
Network Probe User Guide
Network Probe User Guide Network Probe User Guide Table of Contents 1. Introduction...1 2. Installation...2 Windows installation...2 Linux installation...3 Mac installation...4 License key...5 Deployment...5
1Checkpoint. 2How Logtrust. Check Point is a firewall network that offers solutions. Logtrust offers to Check Point firewall Networks
Checkpoint 1Checkpoint Check Point is a firewall network that offers solutions that addresses all your mobile security needs; like advanced threat prevention, web security, and DDoS protection. The firewall
Watch your Flows with NfSen and NFDUMP 50th RIPE Meeting May 3, 2005 Stockholm Peter Haag
Watch your Flows with NfSen and NFDUMP 50th RIPE Meeting May 3, 2005 Stockholm Peter Haag 2005 SWITCH What I am going to present: The Motivation. What are NfSen and nfdump? The Tools in Action. Outlook
Data Visualization. Scientific Principles, Design Choices and Implementation in LabKey. Cory Nathe Software Engineer, LabKey cnathe@labkey.
Data Visualization Scientific Principles, Design Choices and Implementation in LabKey Catherine Richards, PhD, MPH Staff Scientist, HICOR [email protected] Cory Nathe Software Engineer, LabKey [email protected]
Visualizing Multidimensional Data Through Time Stephen Few July 2005
Visualizing Multidimensional Data Through Time Stephen Few July 2005 This is the first of three columns that will feature the winners of DM Review's 2005 data visualization competition. I want to extend
Introduction to Netflow
Introduction to Netflow Mike Jager Network Startup Resource Center [email protected] These materials are licensed under the Creative Commons Attribution-NonCommercial 4.0 International license (http://creativecommons.org/licenses/by-nc/4.0/)
FIREWALLS. Firewall: isolates organization s internal net from larger Internet, allowing some packets to pass, blocking others
FIREWALLS FIREWALLS Firewall: isolates organization s internal net from larger Internet, allowing some packets to pass, blocking others FIREWALLS: WHY Prevent denial of service attacks: SYN flooding: attacker
TABLEAU COURSE CONTENT. Presented By 3S Business Corporation Inc www.3sbc.com Call us at : 281-823-9222 Mail us at : [email protected]
TABLEAU COURSE CONTENT Presented By 3S Business Corporation Inc www.3sbc.com Call us at : 281-823-9222 Mail us at : [email protected] Introduction and Overview Why Tableau? Why Visualization? Level Setting
Data Visualization Handbook
SAP Lumira Data Visualization Handbook www.saplumira.com 1 Table of Content 3 Introduction 20 Ranking 4 Know Your Purpose 23 Part-to-Whole 5 Know Your Data 25 Distribution 9 Crafting Your Message 29 Correlation
WHEN THE HUNTER BECOMES THE HUNTED HUNTING DOWN BOTNETS USING NETWORK TRAFFIC ANALYSIS
WHEN THE HUNTER BECOMES THE HUNTED HUNTING DOWN BOTNETS USING NETWORK TRAFFIC ANALYSIS /ABOUT/ME Thomas Chopitea - Incident handler @CertSG Digital forensics & incident response (#DFIR), malware analysis,
Tableau's data visualization software is provided through the Tableau for Teaching program.
A BEGINNER S GUIDE TO VISUALIZATION Featuring REU Site Collaborative Data Visualization Applications June 10, 2014 Vetria L. Byrd, PhD Advanced Visualization, Director REU Coordinator Visualization Scientist
Extreme Networks: A SOLUTION WHITE PAPER
Extreme Networks: The Purview Solution Integration with SIEM Integrating Application Management and Business Analytics into other IT management systems A SOLUTION WHITE PAPER WHITE PAPER Introduction Purview
Introduction to Data Visualization
Introduction to Data Visualization STAT 133 Gaston Sanchez Department of Statistics, UC Berkeley gastonsanchez.com github.com/gastonstat/stat133 Course web: gastonsanchez.com/teaching/stat133 Graphics
The importance of graphing the data: Anscombe s regression examples
The importance of graphing the data: Anscombe s regression examples Bruce Weaver Northern Health Research Conference Nipissing University, North Bay May 30-31, 2008 B. Weaver, NHRC 2008 1 The Objective
NetFlow Analytics for Splunk
NetFlow Analytics for Splunk User Manual Version 3.5.1 September, 2015 Copyright 2012-2015 NetFlow Logic Corporation. All rights reserved. Patents Pending. Contents Introduction... 3 Overview... 3 Installation...
Analyzing 6LoWPAN/ZigBeeIP networks with the Perytons Protocol Analyzer May, 2012
Analyzing 6LoWPAN/ZigBeeIP networks with the Perytons Protocol Analyzer May, 2012 Background While IP protocols are widely spread over broadband wireline and wireless communication means, transferring
Assets, Groups & Networks
Complete. Simple. Affordable Copyright 2014 AlienVault. All rights reserved. AlienVault, AlienVault Unified Security Management, AlienVault USM, AlienVault Open Threat Exchange, AlienVault OTX, Open Threat
Data sent from Firewall Analyzer is normally not encrypted and hence is readable if intercepted.
I don't have a firewall, proxy server, or Radius server. Can I still use this product? You can still use Firewall Analyzer to simulate firewall logs and see how reports will look like when real-time data
SonicWALL GMS Custom Reports
SonicWALL GMS Custom Reports Document Scope This document describes how to configure and use the SonicWALL GMS 6.0 Custom Reports feature. This document contains the following sections: Feature Overview
How To Test The Bandwidth Meter For Hyperv On Windows V2.4.2.2 (Windows) On A Hyperv Server (Windows V2) On An Uniden V2 (Amd64) Or V2A (Windows 2
BANDWIDTH METER FOR HYPER-V NEW FEATURES OF 2.0 The Bandwidth Meter is an active application now, not just a passive observer. It can send email notifications if some bandwidth threshold reached, run scripts
Capacity Management Plan
Capacity Management Plan Hughes is selected for two categories to provide service: Fixed Satellite Services Small Office/Home Office (SOHO) services In the context of those two services categories, for
Voice over IP. Demonstration 1: VoIP Protocols. Network Environment
Voice over IP Demonstration 1: VoIP Protocols Network Environment We use two Windows workstations from the production network, both with OpenPhone application (figure 1). The OpenH.323 project has developed
Offensive & Defensive & Forensic Techniques for Determining Web User Iden<ty
Offensive & Defensive & Forensic Techniques for Determining Web User Iden
A10 Networks Load Balancer
McAfee Enterprise Security Manager Data Source Configuration Guide Data Source: A10 Networks Load Balancer January 26, 2015 A10 Networks Load Balancer Page 1 of 8 Important Note: The information contained
When to use Excel. When NOT to use Excel 9/24/2014
Analyzing Quantitative Assessment Data with Excel October 2, 2014 Jeremy Penn, Ph.D. Director When to use Excel You want to quickly summarize or analyze your assessment data You want to create basic visual
Configuring Logging. Information About Logging CHAPTER
52 CHAPTER This chapter describes how to configure and manage logs for the ASASM/ASASM and includes the following sections: Information About Logging, page 52-1 Licensing Requirements for Logging, page
Designing Information Displays. Overview
Designing Information Displays Claremont Graduate University Professional Development Workshop August 23, 2015 Tarek Azzam Ph.D. 8 6 4 2 0-2 -4-6 Site 5 Site 7 Site 1 Site 4 Site 2 Site 3 Site 6 Overview
Summarizing and Displaying Categorical Data
Summarizing and Displaying Categorical Data Categorical data can be summarized in a frequency distribution which counts the number of cases, or frequency, that fall into each category, or a relative frequency
Security visualisation
Security visualisation This thesis provides a guideline of how to generate a visual representation of a given dataset and use visualisation in the evaluation of known security vulnerabilities by Marco
Common Event Format. Imperva SecureSphere July 27, 2009
Common Event Format Imperva SecureSphere July 27, 2009 CEF Connector Configuration Guide Imperva SecureSphere April 26, 2009 Revision History Date Description 04/26/2009 First edition of this Configuration
F-Secure Messaging Security Gateway. Deployment Guide
F-Secure Messaging Security Gateway Deployment Guide TOC F-Secure Messaging Security Gateway Contents Chapter 1: Deploying F-Secure Messaging Security Gateway...3 1.1 The typical product deployment model...4
Reports and Logging. Palo Alto Networks. PAN-OS Administrator s Guide Version 6.0. Copyright 2007-2015 Palo Alto Networks
Reports and Logging Palo Alto Networks PAN-OS Administrator s Guide Version 6.0 Contact Information Corporate Headquarters: Palo Alto Networks 4401 Great America Parkway Santa Clara, CA 95054 www.paloaltonetworks.com/company/contact-us
CARL : Cyberoam Aggregated Reporting and Logging :: User Guide. Table Of Contents INTRODUCTION... 4
Table Of Contents INTRODUCTION... 4 About Cyberoam Aggregated Reporting and Logging... 5 INSTALLATION AND SETUP... 6 System Requirements... 6 Prerequisites... 8 Installing and Uninstalling... 10 Starting
VISIBLY BETTER RISK AND SECURITY MANAGEMENT
VISIBLY BETTER RISK AND SECURITY MANAGEMENT Mason Hooper Practice Manager, SIEM Solutions, McAfee APAC December 13, 2012 Oct 17 10:00:27, Application=smtp, Oct 17 10:00:27, Application=smtp, Event='Email
Network at CERN. Large Scale
Monitoring i the ATLAS TDAQ Network at CERN Lucian LEAHU Brasov, 15/01/2009 Large Scale 3000 nodes, 200 edge switches, 5 core routers 6000 ports 2 1 Plus physicists! Network dimensioned to meet requirements
"Excel with Excel 2013: Pivoting with Pivot Tables" by Venu Gopalakrishna Remani. October 28, 2014
Teaching Excellence and Innovation 1 Pivot table Pivot table does calculations with criteria Data should be arranged as : Field names in the first rows, records in rows No blank rows or blank columns should
Flow Visualization Using MS-Excel
Flow Visualization Using MS-Excel Visualization for the Common Man Presented by Lee Rock and Jay Brown US-CERT Analysts Einstein Program Background US-CERT Mission Einstein Program > Large volumes of traffic
MetroBoston DataCommon Training
MetroBoston DataCommon Training Whether you are a data novice or an expert researcher, the MetroBoston DataCommon can help you get the information you need to learn more about your community, understand
Network setup and troubleshooting
ACTi Knowledge Base Category: Troubleshooting Note Sub-category: Network Model: All Firmware: All Software: NVR Author: Jane.Chen Published: 2009/12/21 Reviewed: 2010/10/11 Network setup and troubleshooting
NetFlow/IPFIX Various Thoughts
NetFlow/IPFIX Various Thoughts Paul Aitken & Benoit Claise 3 rd NMRG Workshop on NetFlow/IPFIX Usage in Network Management, July 2010 1 B #1 Application Visibility Business Case NetFlow (L3/L4) DPI Application
MARS STUDENT IMAGING PROJECT
MARS STUDENT IMAGING PROJECT Data Analysis Practice Guide Mars Education Program Arizona State University Data Analysis Practice Guide This set of activities is designed to help you organize data you collect
Part 2: Data Visualization How to communicate complex ideas with simple, efficient and accurate data graphics
Part 2: Data Visualization How to communicate complex ideas with simple, efficient and accurate data graphics Why visualize data? The human eye is extremely sensitive to differences in: Pattern Colors
Information visualization examples
Information visualization examples 350102: GenICT II 37 Information visualization examples 350102: GenICT II 38 Information visualization examples 350102: GenICT II 39 Information visualization examples
Introduction Installation firewall analyzer step by step installation Startup Syslog and SNMP setup on firewall side firewall analyzer startup
Introduction Installation firewall analyzer step by step installation Startup Syslog and SNMP setup on firewall side firewall analyzer startup Configuration Syslog server add and check Configure SNMP on
Emerald. Network Collector Version 4.0. Emerald Management Suite IEA Software, Inc.
Emerald Network Collector Version 4.0 Emerald Management Suite IEA Software, Inc. Table Of Contents Purpose... 3 Overview... 3 Modules... 3 Installation... 3 Configuration... 3 Filter Definitions... 4
Exercise 1: How to Record and Present Your Data Graphically Using Excel Dr. Chris Paradise, edited by Steven J. Price
Biology 1 Exercise 1: How to Record and Present Your Data Graphically Using Excel Dr. Chris Paradise, edited by Steven J. Price Introduction In this world of high technology and information overload scientists
VMware vcenter Log Insight User's Guide
VMware vcenter Log Insight User's Guide vcenter Log Insight 1.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition.
Visualizations and Correlations in Troubleshooting
Visualizations and Correlations in Troubleshooting Kevin Burns Comcast [email protected] 1 Comcast Technology Groups Cable CMTS, Modem, Edge Services Backbone Transport, Routing Converged Regional
Best Practices in Data Visualizations. Vihao Pham 2014
Best Practices in Data Visualizations Vihao Pham 2014 Agenda Best Practices in Data Visualizations Why We Visualize Understanding Data Visualizations Enhancing Visualizations Visualization Considerations
