Visual Analytics for Security, Safety, and Privacy:
|
|
|
- Alvin Johnston
- 10 years ago
- Views:
Transcription
1 Visual Analytics for Security, Safety, and Privacy: Approaches, Lessons Learned, Opportunities, and Challenges David S. Ebert Overview Background: Why am I here? Challenges in developing effective deployed solutions Approaches: which one to choose? Some examples and lessons Path forward 1
2 Why Am I Here? My seminal paper from VisSym 2001? Atkinson, T., Pensy, K., Nicholas, C., Ebert, D., Atkinson, A., Morris, C., "Case Study: Visualization and Information Retrieval Techniques for Network Intrusion Detection," VisSym 2001: Joint Eurographics - IEEE TCCG Symposium on Visualization, May Interactive volume visualization of network attacks projected onto know attacks Or for my experience leading VACCINE? Different safety and security (in general) Cybersecurity enters many projects SFU, JIBC UBC UW Innovation with Impact Purdue Penn St. Visual Analytics for Effictive Decision Ind U VaTech Stanford NC UNCC A&T Making Navajo Tech JSU UT UHD David S. Ebert Austin GaTech FIU U Stuttgart Swansea U 2
3 Who We Are: International Team of Experts 75+ Faculty, 26 Institutions Purdue University Georgia Institute of Technology Pennsylvania State University Stanford University University of North Carolina at Charlotte University of Washington Arizona State University Simon Fraser University University of British Columbia Justice Institute of British Columbia Ontario Institute of Technology Dalhousie University University of Victoria University of Houston, Downtown Virginia Tech Indiana University Florida International University University of Texas at Austin Morgan State University Navajo Technical College University of Stuttgart University of Swansea Oxford University University of Calgary University of Manitoba Carleton University VACCINE s Role Problem: To solve current and future homeland security problems requires exploring, analyzing, and reasoning with massive, multi-source, multi-scale, heterogeneous, streaming data BIG DATA Cuts across entire spectrum of homeland security needs We provide tools to enable end users to get the relevant information they need during any situation to make a decision or take action 3
4 VACCINE Mission Provide visual analytic and scalable solutions to 2.3 million extended homeland security personnel 185,000 DHS personnel, 350,000 law enforcement personnel, 750,000 homeland security practitioners Achieve excellence in visual analytics and visualization sciences Educate homeland security stakeholders and the next generation of talent VACCINE Value Our Value / Solution: Enable users to be more effective through innovative interactive visualization, analysis, and decision making tools Provide the right information, in the right format within the right time to solve the problem Turn data deluge into a pool of relevant, actionable knowledge Enable users to be more effective from planning to detection to response to recovery Enable effective communication of information Approach: Partner-driven solutions and research 4
5 VACCINE Value Part II Our people and partnerships Interdisciplinary world-leading team of researchers Defining and extending the new science of visual analytics driven by real-world, real-scale problems of engaged partners (local, state, federal) 9 Visual Analytic Solutions: What We Offer Improved Effectiveness: We enable users to be more effective through innovative, interactive visualization, analysis, and decision making tools Provide the right information, in the right format, within the right time to solve the problem Enable user to be more effective from planning to detection to response to recovery Enable effective communication of information Innovative Fielded Solutions: We provide innovative visual analytic and scalable solutions to the extended homeland security community People and Partnerships cgsarva Interdisciplinary has proven world-leading its worth time team and of again, researchers providing and students key analytic Actively information Engaged for Partners decision makers for large scale projects We define and extend the new science of visual analytics VADM driven Robert by real-world, Parker, 2012 real-scale MRS Keynote problems Address of engaged partners (local, state, federal) VADM Robert Parker with VACCINE student researchers (cgsarva, COAST, iopar) 5
6 Engaged End-Users Federal Operating Components: US Coast Guard US Transportation Security Agency US Customs and Immigration Service US Federal Emergency Management Agency US Customs and Border Patrol US CERT US ICE (in progress) Law Enforcement Over 40 local and state agencies (IN, IL, OH, SC, PA, NC, NY) Fusion Centers Ohio (SAIC) Indiana (IIFC) Challenges in Developing Effective Deployed Solutions: Crossing the Chasm Deployed solution Idea 6
7 Challenges in Developing Effective Deployed Solutions 1.Understanding the situation Task/problem What are they trying to find, analyze, explore? What is the final product of the system and task? User How do they conceptualize the problem? What are the natural scales/aggregation levels, features? Environment - time frame, solitary vs. collaborative, equipment Language - developing a common language Challenges in Developing Effective Deployed Solutions 2.Changing requirements How to be effective in an agile software development environment Avoiding feature creep Clear end state, goals, and deliverables 7
8 Challenges in Developing Effective Deployed Solutions 3. Trust, polices, lack of standards Trust Will you deliver and follow-through? Or, do you just want my data? What can an academic really know about what I do? Polices Legal agreements and delays Data and privacy Standards - everyone has a different schema, RMS, etc. One Potentially Useful Approach: Application-Driven Research & Development A full contact sport Increases rate of VA advances and application deployment to effectiveness Increases rate of application domain advances X 8
9 Our Application-Driven Research Approach and Plan Evolving, effective, and enduring research by tight integration with stakeholders Driven by stakeholders from initiation, through iterative development (agile software development), to deployment Visual Analytics research integrated: Interactive visual/cognitive analytic environments based on novel research in visual analytics, algorithms, information transformation, cognitive and interaction science, creating precise information environments Full-scale exercise February 2008 Research Motivation: Solving these real-world problems requires Novel theories, techniques, approaches, and adaptations of algorithms Integration of cross-disciplinary expertise Overcoming the chasm from academic idea to deployed solution Solving these real-world problems provides Compelling, publicly understandable value for your research Advances in CS and in other disciplines New publication opportunities Great collaboration partners and proponents Opportunities for new adventures 9
10 Examples of Overcoming the Chasm Public health syndromic surveillance Crime analytics US Coast Guard solutions Solutions for Spatial Temporal Decision Making Environments A Progression: The Long and Winding Road 1 Public health surveillance Fusing apparently similar data that isn t (health data) Dual domain decision making and real-world visualization and analysis for disease spread and interdiction Spatial and temporal visual analytics for law enforcement Search and rescue (SAR) and risk based visual analysis The long and winding road That leads to your door Will never disappear P. McCartney 10
11 Improving Syndromic Surveillance Interactive visual analytic environment for effective syndromic surveillance and response: System designed based on collaboration and feedback with state epidemiologists Integrated temporal, geospatial, multi-source, multi-scale analytic capability Density estimation for data exploration Syndromic control charts for temporal alerts Demographic filter controls for advanced analysis Visual Analytics for Syndromic Surveillance: Hypothesis Generation and Exploration Project Design & Workflow Impetus: Indiana State Epidemiologist, EHR researcher Best Paper Nominee, IEEE Symposium on Visual Analytics Science and Technology (VAST), October 2008, for Understanding Syndromic Hotspots A Visual Analytics Approach, (Maciejewski, R., Rudolph, S., Hafen, R., Abusalah, A., Yakout, M., Ouzzani, M., Cleveland, W., Grannis, S., Wade, M., Ebert, D.)
12 Example Decision Analysis Linked Displays Example with 3 Decisions Partnership with FAZD Differences from each decision Interactive exploration and combination of decisions Integrated Interactive Simulations and Analysis Analysis and simulation must be interactive for integration into interactive environment Need novel computational & statistical models Goal: enable improved discovery, decision making, analysis, and evaluation 12
13 Situational Surveillance and Predictive Visual Analytics Focus is on categorical spatiotemporal event data Utilizing time series and density estimations we want to create an interactive environment for predicting future event magnitudes and locations We utilize seasonal trend decomposition with Loess smoothing 3D Kernel density estimation for spatiotemporal probability distributions Predictive Visual Analytics 13
14 Crime VA The Next Curve Sheriff wanted to know how to use integrated data across the county to see If they are being more effective If crime is being reduced How officers to top-level officials can use this data for proactive and predictive policing Frequent meetings and continuous refinement of tools Now being tested by agencies in 4 states NYPD, OSHP, Il.SP, LPD, WLPD, PUPD, TCSD Visual Analytics Law Enforcement Toolkit (i)valet 14
15 VALET Visual Analytics Law Enforcement Toolkit (VALET, ivalet) Impacts: In use to analyze crime patterns in Lafayette, Indiana and to connect strings of activities Mobile version being released to public for community-based policing Investigating correlation factors Analyzing time of day problems and improving accuracy of police record management system Novel statistical predictive model incorporated for planning Incorporating predictive alerts VALET delivered: Spring 2011: WL, Lafayette Police ivalet delivered: October 2011: Purdue, WL Police 15
16 VALET Overview Menus Time Series View Clock View Twitter monitoring Time Slider Calendar View Map View Example: Drunkenness / Public Intoxication PU vs. Notre Dame PU Lost: Homecoming (Sat.) PU vs. Illinois PU Won: Football season Home Away PU vs. Iowa PU Lost: Day-of-the-Week
17 Top 10 Hot Incidents Identify unusual localized highfrequency patterns of crimes (near repeats) Each data entry is checked for other crimes with similar properties within a 1 block radius of the incident location and a 14-day time period Top 10 incidents with the most number of related incidents in this space-time window are highlighted Social Media: Real-time Twitter Monitoring and Integration into Tools (Purdue, Stuttgart, Penn St.) Topic extraction using novel STL based remainder estimation technique Dynamically linked views providing options to monitor emerging / emergent twitter feeds Topics extracted shown as a dynamic word cloud Grand Prix Weekend, Purdue University 17
18 Explosion Area in Boston Topic Analysis Keywords that have been used most often in the area Tweets Detection using the Explosion Classifier 18
19 First Response (Tweet & Picture) 1 minute right after the incident Visual Analytics of Activity During Hurricane Sandy Two weeks before Sandy 10/14 (Sunday), 12:00 ~ 16:00 One week before Sandy 10/21 (Sunday), 12:00 ~ 16:00 Supermarket Park Shelter 19
20 Visual Analytics of Activity During Hurricane Sandy After the evacuation order 10/28 (Sunday), 12:00 ~ 16:00 Evacuation order: 10/28, 10:30 AM Hurricane Sandy s Arrival at NYC: 10/29, 8:00 PM Supermarket Park Shelter ivalet Explore criminal, traffic and civil data on-the-go Risk assessment Use current spatial + temporal context into analysis 20
21 MERGE ivalet Interactive Plume Visualization and Evacuation Planning Chemical release plume modeling identifies census tracts with the highest number of expected people affected The Next Bend: US Coast Guard 21
22 Visual Analytics Uses for Risk-Based Decision Making Risk visualization and analysis Predictive analytics Uncertain decision making Alternative evaluation and consequence investigation Trend analysis, clustering, anomaly detection Interactive, multi-day, month, type investigation Multisource, multimedia data integration & analysis USCG: Effective Risk-based Decision Making and Resource Allocation Visual Analytics Evaluate current and historical mission area: Demands Risks (total, mitigated, residual) Resource allocation Return on investment Evaluate courses of action Evaluate above at both Strategic and Tactical/Operational level 22
23 Risk-Based Allocations Comparative visual analysis of mission cases/hours vs. staffing hours Comparative visualization of resources vs. risk Trend visual analytics Increase/decrease in resource allocation Increase/decrease in risk (total, mitigated, residual) Increase/decrease in incidents Exploration of alternatives and effect on risk Predictive analytics based on historical data (STL and EWMA) VA For Risk-Based Decision Making Process 23
24 U.S. Coast Guard Search and Rescue VA (cgsarva) Partners: USCG LANT 7, USCG D9, USCG D5, USCG HQ 771 IMPACTS: Analyzed impact of CG auxiliary stations on search and rescue mission in Great Lakes Used for resource allocation for SAR Provided new insights to SAR mission Hurricanes Sandy and Irene resource allocation decisions based on cgsarva analysis and visualization Informed Commandant s budget testimony to Congress Key component of USCG D9 reallocation plan for Key component of Coastal Operations Allocation Suite of Tools (COAST) USCG HQ Example: Risks and Consequences From Sandy: SAR Cases November 2011 NJ/NYC Area 24
25 Response Efficiency Possible Asset Allocation 1-station (90-min response) 2-station (90-min response) 3-station (90-min response) 4-station (90-min response) Software Accredited for Decision Making April 22, 2013 cgsarva VV&A d for US Coast Guard system-wide use 25
26 Chasm Update Crossed And Survived Lessons Learned Extremely worthwhile Communication and interaction are key Continually ask questions Many surprises around each turn (e.g., we need to VV&A the software) A growth and learning experience for everyone a lot of acquired wisdom 26
27 Example VACCINE Team Work in Cybersecurity Visual Analytics for Security Application (VASA) Corporate Insider Threat Detection (Oxford, Leicester, Cardiff) Sensor Forensics (Purdue) SemanticPrism (Purdue) Multiscreen, Multiview, Interactive Cyber Investigation (VaTech, PNNL) Log Visualization (Purdue) Cascading Critical Infrastructure Resiliency Modeling and Analytics (VASA) Purpose: Apply visual analytics to the problem of monitoring and understanding cyber networks and critical infrastructures during detrimental cascading effects, and to the management of the ensuing crisis response. Collaborating Institution(s): Purdue, UNC Charlotte, U. Minn. (NCFPD), U. Konstanz, U. Stuttgart, Fraunhofer IGD, Siemens, German utilities End-User(s): Power Suppliers (e.g., Duke Energy), Cyber Community (e.g., Cisco), Quick Service Restaurants and suppliers, food supply 27
28 VASA: Visual Analytics for Security Applications Collaborating Institution(s): Purdue, Minnesota, UTexas, UNCC + German universities End-User(s): Fast-food restaurant chain, emergency management and planning personnel Impacts and Accomplishments: Support decision-making for extreme weather and disaster (natural, man-made) scenarios Combine real and simulation data Allow what-if exploration System of systems: binds together multiple simulations models from collaborators into coherent whole Minnesota: food distribution model Texas: simulated and historical weather (hurricanes, storms) UNCC: critical infrastructure Purdue: roads + interaction visual analytics tool Challenge: combine interactive VA with complex simulation models for effective decision making Corporate Insider Threat Detection: Cyber Security Inside and Out (Universities of Oxford, Leicester, and Cardiff) Sponsor: Centre for the Protection of National Infrastructure Academics: Sadie Creese (PI), Min Chen, Michael Goldsmith, Michael Levi, David Upton and Monica Whitty Combined Expertise in cyber security, psychology, criminology, visual analytics, enterprise operations management and executive education Objectives: Develop a model, Understand psychological indicators Identify the most effective algorithms Understand enterprise culture and common practices Provide a visual analytical interface Develop an understanding of both the various organisational roles and awareness raising and educational methods URL: Oxford Cybersecurity Centre: 28
29 Sensor Forensics (Purdue Delp) Forensic characterization Observe device output which device produced it? Exploit how the device makes its output Device authentication Performed using forensic characterization Identify device type, make, model, configuration Can the sensor be trusted? Detection of data forgery or alteration Fingerprint and trace SemanticPrism: A Multi-aspect View of Large High-dimensional Data (Purdue University) VAST 2012 Mini Challenge 1 Award: Outstanding Integrated Analysis and Visualization Geo-Temporal Time-serial Pixel-based Semantic Zoom Victor Yingjie Chen, Ahmad M Razip, Sungahn Ko, Cheryl Zhenyu Qian, David S.Ebert 29
30 SemanticPrism Time Serial Curves Pixel-based IP space Geo-Temporal Zoom-in IP space Zoom-in VA for Cybersecurity Analysts (VaTech North, Endert) 30
31 Server Cluster Log File Visualization (Elmqvist, Purdue) Log file visualization for Purdue s ECN group 200+ servers, 30 TB of storage, 6 million hits per month User-centered, interview-based design Applied stack zooming to quantitative log data CPU load, network hits, storage usage, Users navigate in data Very long time periods Limited deployment in Fall 2010 Very positive, powerful 2013 VAST Challenge MC2 Award Outstanding Creative Design 31
32 2. Network health issues 1. Non-routine and crisis security issues 4. Some networks are out of reach. Possibly due to power outage caused by a hurricane 3. March 2013 Undersea Cable Cut incident to demonstrate performance issues Application-Driven Visualization for Cybersecurity Should we be driving the research based on what different users goals are? Interesting survey article Taxonomy of use-case classes: Host-server monitoring Internal/external monitoring Port activity Attack patterns Routing behavior Shiravi, et al., A survey of visualization systems for network security, IEEE TVCG Do citation counts show real-world value? Example image from TNV, Goodall, et al. providing focused view of packet-level data in the high-level network traffic context 32
33 VizSec Papers - My Analysis Expert users engaged: 3 of 9 (e.g., law enforcement, network analysts) Evaluation performance most common; a few informal user studies Data 4 with actual data, 1 using public dataset Users involved from the start Nunnally, et al. 1 paper Training of Novices based on experts Hao, 1 et paper al. Directions Forward, Keys to Success & Challenges 33
34 Cybersecurity Education How do we train practitioners in the field? Varied backgrounds, varied tasks, communication to public Short time to learn Visualization is key Approaches: How people learn framework Personalizing learning - Community of practice training How do we educate the public? Again, visualization is key Cyber attacks Some Challenges for Cybersecurity 1. Understanding the task and workflow, access to expert users, actual problems, environments 2. Creating decision making environments for analysts with realtime data and decision making constraints at real-world scale (computerhuman visual cognition environments) 3. Solving specific scale issues (scalability) and cross-scale issues (machine, intranet, internet) 4. Managing uncertainty and time 5. Enabling risk-based decision making environments 34
35 Keys for Success User and problem driven Balance human cognition and automated analysis and modeling Interactivity and easy interaction Intuitive and scalable solutions vital Understandability Intuitive visual cognition Not overloaded with features For Further Information 35
Predictive Interactive Visual Analytics for CCI: Planning, Response, and Resiliency
Predictive Interactive Visual Analytics for CCI: Planning, Response, and Resiliency SFU, JIBC UBC UW Purdue Penn St. Stanford Ind U VaTech NC UNCC A&T Navajo Tech UT Austin UHD JSU GaTech FIU U Stuttgart
Visual Analytics Law Enforcement Toolkit
Visual Analytics Law Enforcement Toolkit Abish Malik, Ross Maciejewski, Timothy F. Collins, David S. Ebert Purdue University Visualization and Analytics Center Purdue University West Lafayette, IN 47906
An ESRI White Paper May 2007 GIS Supporting the Homeland Security Mission
An ESRI White Paper May 2007 GIS Supporting the Homeland Security Mission ESRI 380 New York St., Redlands, CA 92373-8100 USA TEL 909-793-2853 FAX 909-793-5953 E-MAIL [email protected] WEB www.esri.com Copyright
How To Create An Insight Analysis For Cyber Security
IBM i2 Enterprise Insight Analysis for Cyber Analysis Protect your organization with cyber intelligence Highlights Quickly identify threats, threat actors and hidden connections with multidimensional analytics
Information Visualization WS 2013/14 11 Visual Analytics
1 11.1 Definitions and Motivation Lot of research and papers in this emerging field: Visual Analytics: Scope and Challenges of Keim et al. Illuminating the path of Thomas and Cook 2 11.1 Definitions and
Integrating a Big Data Platform into Government:
Integrating a Big Data Platform into Government: Drive Better Decisions for Policy and Program Outcomes John Haddad, Senior Director Product Marketing, Informatica Digital Government Institute s Government
EL Program: Smart Manufacturing Systems Design and Analysis
EL Program: Smart Manufacturing Systems Design and Analysis Program Manager: Dr. Sudarsan Rachuri Associate Program Manager: K C Morris Strategic Goal: Smart Manufacturing, Construction, and Cyber-Physical
Rapid Response, Total Support. Homeland Security Solutions that Keep America Safe
Rapid Response, Total Support Homeland Security Solutions that Keep America Safe Solutions on the Front Lines of Homeland Security For the homeland security community, there are no second chances. Critical
Demystifying Big Data Government Agencies & The Big Data Phenomenon
Demystifying Big Data Government Agencies & The Big Data Phenomenon Today s Discussion If you only remember four things 1 Intensifying business challenges coupled with an explosion in data have pushed
Data Driven Assessment of Cyber Risk:
Data Driven Assessment of Cyber Risk: Challenges in Assessing and Mitigating Cyber Risk Mustaque Ahamad, Saby Mitra and Paul Royal Georgia Tech InformationSecurity Center Georgia Tech Research Institute
PUBLIC SAFETY. Industry Solutions Harness the Power of GIS for Public Safety
PUBLIC SAFETY Industry Solutions Harness the Power of GIS for Public Safety Esri has thousands of customers worldwide who are using the transforming power of GIS technology to respond to disasters and
Fast Facts About The Cyber Security Job Market
Cybersecurity Cybersecurity is the measures taken to protect a computer or computer system (as on the Internet) against unauthorized access or attack. Cybersecurity is the faster growing IT job, growing
The Comprehensive National Cybersecurity Initiative
The Comprehensive National Cybersecurity Initiative President Obama has identified cybersecurity as one of the most serious economic and national security challenges we face as a nation, but one that we
Setting the Standard for Safe City Projects in the United States
Leading Safe Cities Setting the Standard for Safe City Projects in the United States Edge360 is a provider of Safe City solutions to State & Local governments, helping our clients ensure they have a secure,
Cyber Security. BDS PhantomWorks. Boeing Energy. Copyright 2011 Boeing. All rights reserved.
Cyber Security Automation of energy systems provides attack surfaces that previously did not exist Cyber attacks have matured from teenage hackers to organized crime to nation states Centralized control
A Primer on Cyber Threat Intelligence
A Primer on Cyber Threat Intelligence AS ADVERTISED 2 BUZZWORD BINGO! 3 TODAY S CYBER SECURITY CHALLENGES CISOs finding it difficult to define security ROI to executives Short shelf life for CISOs Vastly
HSIN: Effective and Secure Collaboration in Critical Situations
HSIN: Effective and Secure Collaboration in Critical Situations Presented by Mission Advocate Hanh Truong Texas Emergency Management and Homeland Security Conference May 14, 2015 The Front Door to Homeland
BIG DATA IN THE CLOUD : CHALLENGES AND OPPORTUNITIES MARY- JANE SULE & PROF. MAOZHEN LI BRUNEL UNIVERSITY, LONDON
BIG DATA IN THE CLOUD : CHALLENGES AND OPPORTUNITIES MARY- JANE SULE & PROF. MAOZHEN LI BRUNEL UNIVERSITY, LONDON Overview * Introduction * Multiple faces of Big Data * Challenges of Big Data * Cloud Computing
PALANTIR CYBER An End-to-End Cyber Intelligence Platform for Analysis & Knowledge Management
PALANTIR CYBER An End-to-End Cyber Intelligence Platform for Analysis & Knowledge Management INTRODUCTION Traditional perimeter defense solutions fail against sophisticated adversaries who target their
Graduate School Rankings By U.S. News & World Report: ACCOUNTING PROGRAMS
2 University of Illinois, Urbana-Champaign 2 University of Michigan, Ann Arbor 4 Indiana University, Bloomington 6 University of California, Berkeley 7 Michigan State University 8 Ohio State University
Cybersecurity Delivering Confidence in the Cyber Domain
Cybersecurity Delivering Confidence in the Cyber Domain With decades of intelligence and cyber expertise, Raytheon offers unmatched, full-spectrum, end-to-end cyber solutions that help you secure your
Data Fusion Centers. Transforming Public Safety Information into Actionable Knowledge
Data Fusion Centers Transforming Public Safety Information into Actionable Knowledge Defining Geospatial Data Fusion Homeland security relies on fusion the ability to capture and analyze data from multiple
TEXAS HOMELAND SECURITY STRATEGIC PLAN 2015-2020: PRIORITY ACTIONS
TEXAS HOMELAND SECURITY STRATEGIC PLAN 2015-2020: PRIORITY ACTIONS INTRODUCTION The purpose of this document is to list the aligned with each in the Texas Homeland Security Strategic Plan 2015-2020 (THSSP).
CyberSecurity Solutions. Delivering
CyberSecurity Solutions Delivering Confidence Staying One Step Ahead Cyber attacks pose a real and growing threat to nations, corporations and individuals globally. As a trusted leader in cyber solutions
Simple Tabletop Exercise, Interdependency Natural Disaster Scenario Scenario #8 Facilitator s Guide
Simple Tabletop Exercise, Interdependency Natural Disaster Scenario Scenario #8 Facilitator s Guide Scenario Summary Background: It is March in Zenith City and the residents are experiencing a cold spring.
This Symposium brought to you by www.ttcus.com
This Symposium brought to you by www.ttcus.com Linkedin/Group: Technology Training Corporation @Techtrain Technology Training Corporation www.ttcus.com Big Data Analytics as a Service (BDAaaS) Big Data
Situational Awareness Through Network Visualization
CYBER SECURITY DIVISION 2014 R&D SHOWCASE AND TECHNICAL WORKSHOP Situational Awareness Through Network Visualization Pacific Northwest National Laboratory Daniel M. Best Bryan Olsen 11/25/2014 Introduction
The University of Alabama Cyber Research Initiatives. Cyber Forensics Research Cyber Security Research
The University of Alabama Cyber Research Initiatives Cyber Forensics Research Cyber Security Research Cyber Forensics Research Department of Criminal Justice College of Arts and Sciences Cyber Crime Research
Cyber Security Metrics Dashboards & Analytics
Cyber Security Metrics Dashboards & Analytics Feb, 2014 Robert J. Michalsky Principal, Cyber Security NJVC, LLC Proprietary Data UNCLASSIFIED Agenda Healthcare Sector Threats Recent History Security Metrics
POWERFUL SOFTWARE. FIGHTING HIGH CONSEQUENCE CYBER CRIME. KEY SOLUTION HIGHLIGHTS
ADVANCED CYBER THREAT ANALYTICS POWERFUL SOFTWARE. FIGHTING HIGH CONSEQUENCE CYBER CRIME. Wynyard Advanced Cyber Threat Analytics (ACTA) is a Pro-active Cyber Forensics solution that helps protect organisations
JIBC Intelligence Analysis and Tactical Criminal Analysis Graduate Certificate Program Overview
JIBC Intelligence Analysis and Tactical Criminal Analysis Graduate Certificate Program Overview Each graduate certificate program consists of five courses which are delivered entirely online in sequential
Understanding the Electric Power Industry s Response and Restoration Process
Understanding the Electric Power Industry s Response and Restoration Process Electricity is a crucial product many of us take for granted. We scarcely think about it, unless we don t have it. Because electricity
El Camino College Homeland Security Spring 2016 Courses
El Camino College Homeland Security Spring 2016 Courses With over 250,000 federal positions in Homeland Security and associated divisions, students may find good career opportunities in this field. Explore
ICT Perspectives on Big Data: Well Sorted Materials
ICT Perspectives on Big Data: Well Sorted Materials 3 March 2015 Contents Introduction 1 Dendrogram 2 Tree Map 3 Heat Map 4 Raw Group Data 5 For an online, interactive version of the visualisations in
NIST CYBERSECURITY FRAMEWORK COMPLIANCE WITH OBSERVEIT
NIST CYBERSECURITY FRAMEWORK COMPLIANCE WITH OBSERVEIT OVERVIEW The National Institute of Standards of Technology Framework for Improving Critical Infrastructure Cybersecurity (The NIST Framework) is a
3rd International Symposium on Big Data and Cloud Computing Challenges (ISBCC-2016) March 10-11, 2016 VIT University, Chennai, India
3rd International Symposium on Big Data and Cloud Computing Challenges (ISBCC-2016) March 10-11, 2016 VIT University, Chennai, India Call for Papers Cloud computing has emerged as a de facto computing
Big Data Driven Knowledge Discovery for Autonomic Future Internet
Big Data Driven Knowledge Discovery for Autonomic Future Internet Professor Geyong Min Chair in High Performance Computing and Networking Department of Mathematics and Computer Science College of Engineering,
Cybersecurity Converged Resilience :
Cybersecurity Converged Resilience : The cybersecurity of critical infrastructure 2 AECOM Port Authority of New York and New Jersey (PANYNJ), New York, New York, United States. AECOM, working with the
Six Days in the Network Security Trenches at SC14. A Cray Graph Analytics Case Study
Six Days in the Network Security Trenches at SC14 A Cray Graph Analytics Case Study WP-NetworkSecurity-0315 www.cray.com Table of Contents Introduction... 3 Analytics Mission and Source Data... 3 Analytics
Big Data R&D Initiative
Big Data R&D Initiative Howard Wactlar CISE Directorate National Science Foundation NIST Big Data Meeting June, 2012 Image Credit: Exploratorium. The Landscape: Smart Sensing, Reasoning and Decision Environment
Spatio-Temporal Networks:
Spatio-Temporal Networks: Analyzing Change Across Time and Place WHITE PAPER By: Jeremy Peters, Principal Consultant, Digital Commerce Professional Services, Pitney Bowes ABSTRACT ORGANIZATIONS ARE GENERATING
Introduction to Data Mining
Introduction to Data Mining 1 Why Data Mining? Explosive Growth of Data Data collection and data availability Automated data collection tools, Internet, smartphones, Major sources of abundant data Business:
Advanced Visibility. Moving Beyond a Log Centric View. Matthew Gardiner, RSA & Richard Nichols, RSA
Advanced Visibility Moving Beyond a Log Centric View Matthew Gardiner, RSA & Richard Nichols, RSA 1 Security is getting measurability worse Percent of breaches where time to compromise (red)/time to Discovery
IBM Security. 2013 IBM Corporation. 2013 IBM Corporation
IBM Security Security Intelligence What is Security Intelligence? Security Intelligence --noun 1.the real-time collection, normalization and analytics of the data generated by users, applications and infrastructure
Applying machine learning techniques to achieve resilient, accurate, high-speed malware detection
White Paper: Applying machine learning techniques to achieve resilient, accurate, high-speed malware detection Prepared by: Northrop Grumman Corporation Information Systems Sector Cyber Solutions Division
SITUATIONAL AWARENESS MITIGATE CYBERTHREATS
Gaining the SITUATIONAL AWARENESS needed to MITIGATE CYBERTHREATS Industry Perspective EXECUTIVE SUMMARY To become more resilient against cyberthreats, agencies must improve visibility and understand events
Preventing and Defending Against Cyber Attacks June 2011
Preventing and Defending Against Cyber Attacks June 2011 The Department of Homeland Security (DHS) is responsible for helping Federal Executive Branch civilian departments and agencies secure their unclassified
Software Engineering for Big Data. CS846 Paulo Alencar David R. Cheriton School of Computer Science University of Waterloo
Software Engineering for Big Data CS846 Paulo Alencar David R. Cheriton School of Computer Science University of Waterloo Big Data Big data technologies describe a new generation of technologies that aim
DATA ANALYTICS SERVICES. G-CLOUD SERVICE DEFINITION.
DATA ANALYTICS SERVICES. G-CLOUD SERVICE DEFINITION. Table of contents 1 Introduction...3 2 Services Overview...4 2.1 Rapid KPI Reporting Delivery Services...4 2.2 Data Discovery & Exploitation Services...5
Big Data Analytics: 14 November 2013
www.pwc.com CSM-ACE 2013 Big Data Analytics: Take it to the next level in building innovation, differentiation and growth 14 About me Data analytics in the UK Forensic technology and data analytics in
ICT SECURITY SECURE ICT SYSTEMS OF THE FUTURE
OVERVIEW Critial infrastructures are increasingly dependent on information and communication technology. ICT-systems are getting more and more complex, and to enable the implementation of secure applications
Craig McWilliams Craig Burrell. Bringing Smarter, Safer Transport to NZ
Craig McWilliams Craig Burrell Bringing Smarter, Safer Transport to NZ World Class Transport. Smarter, Stronger, Safer. Bringing Smarter Safer Transport to NZ Craig Burrell Infrastructure Advisory Director
How To Write A Book On Risk Management
National Center for Risk and Economic Analysis of Terrorism Events CREATE FY2015 (Year 11) Call for White Papers CREATE, the DHS-sponsored Center of Excellence at the University of Southern California,
Integrated Physical Security and Incident Management
IT Enterprise Services Integrated Physical Security and Incident Management Every organisation needs to be confident about its physical security and its ability to respond to unexpected incidents. Protecting
Ahead of the Curve with Intelligent. Transportation
Ahead of the Curve with Intelligent Transportation Advanced technologies to ensure the safe, efficient, and secure movement of passengers and freight. Intelligent transportation is changing the way America
Cyber Resilience Implementing the Right Strategy. Grant Brown Security specialist, CISSP @TheGrantBrown
Cyber Resilience Implementing the Right Strategy Grant Brown specialist, CISSP @TheGrantBrown 1 2 Network + Technology + Customers = $$ 3 Perfect Storm? 1) Increase in Bandwidth (extended reach) 2) Available
Real World Application and Usage of IBM Advanced Analytics Technology
Real World Application and Usage of IBM Advanced Analytics Technology Anthony J. Young Pre-Sales Architect for IBM Advanced Analytics February 21, 2014 Welcome Anthony J. Young Lives in Austin, TX Focused
North Carolina Emergency Management. Preparedness, Response & Long-Term Recovery
North Carolina Emergency Management Preparedness, Response & Long-Term Recovery Status of Recovery from Hurricane Irene Individual Assistance 35 counties declared 29,936 people registered $21,182,252 disbursed
Microsoft s cybersecurity commitment
Microsoft s cybersecurity commitment Published January 2015 At Microsoft, we take the security and privacy of our customers data seriously. This focus has been core to our culture for more than a decade
Concept and Project Objectives
3.1 Publishable summary Concept and Project Objectives Proactive and dynamic QoS management, network intrusion detection and early detection of network congestion problems among other applications in the
The Value of Visualization for Understanding Data and Making Decisions
September 24, 2014 The Value of Visualization for Understanding Data and Making Decisions John Stasko School of Interactive Computing Georgia Institute of Technology [email protected] JISIC 2014 Data
Visualization and Analytics Centers
Visualization and Analytics Centers Pacific Rim Australia Hawaii Alaska New Zealand Consortium Scholars RVAC Stanford University RVAC University of Washington IVAC IDS-UAC University of Southern California
This Conference brought to you by www.ttcus.com
This Conference brought to you by www.ttcus.com Linkedin/Group: Technology Training Corporation @Techtrain Technology Training Corporation www.ttcus.com U.S. Army Intelligence and Security Command Army
APPLICATION OF MULTI-AGENT SYSTEMS FOR NETWORK AND INFORMATION PROTECTION
18-19 September 2014, BULGARIA 137 Proceedings of the International Conference on Information Technologies (InfoTech-2014) 18-19 September 2014, Bulgaria APPLICATION OF MULTI-AGENT SYSTEMS FOR NETWORK
Big Data and Analytics: Getting Started with ArcGIS. Mike Park Erik Hoel
Big Data and Analytics: Getting Started with ArcGIS Mike Park Erik Hoel Agenda Overview of big data Distributed computation User experience Data management Big data What is it? Big Data is a loosely defined
Threat and Hazard Identification and Risk Assessment
Threat and Hazard Identification and Risk Assessment Background/Overview and Process Briefing Homeland Security Preparedness Technical Assistance Program May 2012 PPD-8 Background A linking together of
NStreamAware: Real-Time Visual Analytics for Data Streams to Enhance Situational Awareness
Symposium on Visualization for Cyber Security (VizSec 2014) 10th November 2014, Paris, France NStreamAware: Real-Time Visual Analytics for Data Streams to Enhance Situational Awareness Fabian Fischer and
1 st Symposium on Colossal Data and Networking (CDAN-2016) March 18-19, 2016 Medicaps Group of Institutions, Indore, India
1 st Symposium on Colossal Data and Networking (CDAN-2016) March 18-19, 2016 Medicaps Group of Institutions, Indore, India Call for Papers Colossal Data Analysis and Networking has emerged as a de facto
The Geospatial Approach to Cybersecurity: An Executive Overview. An Esri White Paper January 2014
The Geospatial Approach to Cybersecurity: An Executive Overview An Esri White Paper January 2014 Copyright 2014 Esri All rights reserved. Printed in the United States of America. The information contained
Full-Context Forensic Analysis Using the SecureVue Unified Situational Awareness Platform
Full-Context Forensic Analysis Using the SecureVue Unified Situational Awareness Platform Solution Brief Full-Context Forensic Analysis Using the SecureVue Unified Situational Awareness Platform Finding
Preventing and Defending Against Cyber Attacks November 2010
Preventing and Defending Against Cyber Attacks November 2010 The Nation s first ever Quadrennial Homeland Security Review (QHSR), delivered to Congress in February 2010, identified safeguarding and securing
Data Centric Systems (DCS)
Data Centric Systems (DCS) Architecture and Solutions for High Performance Computing, Big Data and High Performance Analytics High Performance Computing with Data Centric Systems 1 Data Centric Systems
Intel Business Continuity Practices
Intel Business Continuity Practices As a global corporation with locations and suppliers all over the world, Intel requires every designated Intel organization to embed business continuity as a core business
White Paper: Leveraging Web Intelligence to Enhance Cyber Security
White Paper: Leveraging Web Intelligence to Enhance Cyber Security October 2013 Inside: New context on Web Intelligence The need for external data in enterprise context Making better use of web intelligence
Emergency Management Planning Criteria for Nursing Home Facilities (Criteria)
Emergency Management Planning Criteria for Nursing Home Facilities (Criteria) The following minimum criteria are to be used when developing Comprehensive Emergency Management Plans (CEMP) for all Nursing
How To Make Data Streaming A Real Time Intelligence
REAL-TIME OPERATIONAL INTELLIGENCE Competitive advantage from unstructured, high-velocity log and machine Big Data 2 SQLstream: Our s-streaming products unlock the value of high-velocity unstructured log
DATA ANALYTICS AND REAL TIME CRIME TOOLS INTELLIGENCE LED POLICING
DATA ANALYTICS AND REAL TIME CRIME TOOLS INTELLIGENCE LED POLICING STEVE BEACH, ENGAGEMENT MANAGER MOTOROLA SOLUTIONS NOVEMBER 4, 2014 1 TRENDS IN PUBLIC SAFETY HOW THE PUBLIC SAFETY LANDSCAPE IS CHANGING
How To Monitor Your Entire It Environment
Preparing for FISMA 2.0 and Continuous Monitoring Requirements Symantec's Continuous Monitoring Solution White Paper: Preparing for FISMA 2.0 and Continuous Monitoring Requirements Contents Introduction............................................................................................
Flexible Web Visualization for Alert-Based Network Security Analytics
Flexible Web Visualization for Alert-Based Network Security Analytics Lihua Hao 1, Christopher G. Healey 1, Steve E. Hutchinson 2 1 North Carolina State University, 2 U.S. Army Research Laboratory [email protected]
AGILE SOFTWARE TESTING
AGILE SOFTWARE TESTING Business environments continue to rapidly evolve, leaving many IT organizations struggling to keep up. This need for speed has led to an increased interest in the Agile software
Information Visualisation and Visual Analytics for Governance and Policy Modelling
Information Visualisation and Visual Analytics for Governance and Policy Modelling Jörn Kohlhammer 1, Tobias Ruppert 1, James Davey 1, Florian Mansmann 2, Daniel Keim 2 1 Fraunhofer IGD, Fraunhoferstr.
Enhancing Cybersecurity with Big Data: Challenges & Opportunities
Enhancing Cybersecurity with Big Data: Challenges & Opportunities Independently Conducted by Ponemon Institute LLC Sponsored by Microsoft Corporation November 2014 CONTENTS 2 3 6 9 10 Introduction The
