IT Data Visualization



Similar documents
DAVIX Visualization. Workshop

Cloud-based Log Analysis and Visualization

DAVIX Visualization Bootcamp 25C3

Aqua Connect Load Balancer User Manual (Linux)

DAVIX Visualization Workshop

Network visualization

ΕΠΛ 674: Εργαστήριο 5 Firewalls

ΕΠΛ 475: Εργαστήριο 9 Firewalls Τοίχοι πυρασφάλειας. University of Cyprus Department of Computer Science

Insider Threat The Visual Conviction

Subnetting and Network Management Omer F. Rana. Networks and Data Communications 1

Chapter 11 Cloud Application Development

What IT Auditors Need to Know About Secure Shell. SSH Communications Security

Network Monitoring. By: Delbert Thompson Network & Network Security Supervisor Basin Electric Power Cooperative

CS2107 Introduction to Information and System Security (Slid. (Slide set 8)

Pandora FMS 3.0 Quick User's Guide: Network Monitoring. Pandora FMS 3.0 Quick User's Guide

Hillstone T-Series Intelligent Next-Generation Firewall Whitepaper: Abnormal Behavior Analysis

CS 665: Computer System Security. Network Security. Usage environment. Sources of vulnerabilities. Information Assurance Module

Network & Agent Based Intrusion Detection Systems

SOLUTION BRIEF. TIBCO LogLogic A Splunk Management Solution

CMPT 471 Networking II

Network Forensics Network Traffic Analysis

Unit 3 Research Project. Eddie S. Jackson. Kaplan University. IT540: Management of Information Security. Kenneth L. Flick, Ph.D.

Implementation of a Department Local Area Network Management System

CSSIA CompTIA Security+ Domain. Network Security. Network Security. Network Security. Network Security. Network Security

Intrusion Detection System Visualization of Network Alerts

Intrusion Detection & SNORT. Fakrul Alam fakrul@bdhbu.com

Presented by: Aaron Bossert, Cray Inc. Network Security Analytics, HPC Platforms, Hadoop, and Graphs Oh, My

D. Grzetich 6/26/2013. The Problem We Face Today

A Survey on Cloud Security Issues and Techniques

Reverse Shells Enable Attackers To Operate From Your Network. Richard Hammer August 2006

Security Correlation Server Quick Installation Guide

Savvius Insight Initial Configuration

Glossary of Technical Terms Related to IPv6

Avaya TM G700 Media Gateway Security. White Paper

Avaya G700 Media Gateway Security - Issue 1.0

IBM Tivoli Monitoring for Network Performance

Detecting rogue systems

Certificates and Application Resigning

Make a folder named Lab3. We will be using Unix redirection commands to create several output files in that folder.

Directory and File Transfer Services. Chapter 7

RSA Authentication Manager

Log Analysis: Overall Issues p. 1 Introduction p. 2 IT Budgets and Results: Leveraging OSS Solutions at Little Cost p. 2 Reporting Security

Study of Network Security along with Network Security Tools and Network Simulators

Backup & Disaster Recovery Appliance User Guide

Report of Independent Auditors

A SURVEY OF CLOUD COMPUTING: NETWORK BASED ISSUES PERFORMANCE AND ANALYSIS

Network Management. Jaakko Kotimäki. Department of Computer Science Aalto University, School of Science. 21. maaliskuuta 2016

How To Use Mindarray For Business

Internet infrastructure. Prof. dr. ir. André Mariën

A Model Design of Network Security for Private and Public Data Transmission

CS197U: A Hands on Introduction to Unix

Second-generation (GenII) honeypots

Using VDOMs to host two FortiOS instances on a single FortiGate unit

Kevin Hayes, CISSP, CISM MULTIPLY SECURITY EFFECTIVENESS WITH SIEM

Safe network analysis

W H I T E P A P E R. Best Practices for Building Virtual Appliances

Using Monitoring, Logging, and Alerting to Improve ICS Security ICSJWG 2015 Fall Meeting October 27, 2015

The Internet, Intranets, and Extranets. What is the Internet. What is the Internet cont d.

Maintaining Non-Stop Services with Multi Layer Monitoring

Protecting and controlling Virtual LANs by Linux router-firewall

MANAGING NETWORK COMPONENTS USING SNMP

Edge Configuration Series Reporting Overview

Question Name C 1.1 Do all users and administrators have a unique ID and password? Yes

INTERNET SECURITY: THE ROLE OF FIREWALL SYSTEM

CTS2134 Introduction to Networking. Module Network Security

Nixu SNS Security White Paper May 2007 Version 1.2

Network Management and Monitoring Software

CDS and Clearing Limited Thapathali, Kathmandu 7 th Level (Technical) Syllabus

Bridging the gap between COTS tool alerting and raw data analysis

IndusGuard Web Application Firewall Test Drive User Registration

Lab Objectives & Turn In

SOLUTION BRIEF. An ArcSight Management Solution

Firewalls. Basic Firewall Concept. Why firewalls? Firewall goals. Two Separable Topics. Firewall Design & Architecture Issues

Security visualisation

Security Correlation Server Quick Installation Guide

ZEN LOAD BALANCER EE v3.04 DATASHEET The Load Balancing made easy

When Recognition Matters THE COMPARISON OF PROGRAMS FOR NETWORK MONITORING.

Department of Veterans Affairs VistA Integration Adapter Release Enhancement Manual

Where every interaction matters.

0DQDJLQJ#0XOWLVHUYLFH#1HWZRUNV

CONNECTING TO DEPARTMENT OF COMPUTER SCIENCE SERVERS BOTH FROM ON AND OFF CAMPUS USING TUNNELING, PuTTY, AND VNC Client Utilities

CERT/CSIRT Operation Operation. ADLI WAHID

Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs

Volume SYSLOG JUNCTION. User s Guide. User s Guide

Network Monitoring and Forensics

Detection of illegal gateways in protected networks

Approach to Information Security Architecture. Kaapro Kanto Chief Architect, Security and Privacy TeliaSonera

The syslog-ng Store Box 3 F2

Centralized Logging in a Decentralized World

SANS Top 20 Critical Controls for Effective Cyber Defense

Data Center Virtualization and Cloud QA Expertise

finger, ftp, host, hostname, mesg, rcp, rlogin, rsh, scp, sftp, slogin, ssh, talk, telnet, users, w, walla, who, write,...

A43. Modern Hacking Techniques and IP Security. By Shawn Mullen. Las Vegas, NV IBM TRAINING. IBM Corporation 2006

Last Updated: July STATISTICA Enterprise Server Security


Windows PowerShell Cookbook

Suricata IDS. What is it and how to enable it

Linux VPS with cpanel. Getting Started Guide

Transcription:

IT Data Visualization Raffael Marty, GCIA, CISSP Chief Security Strategist @ Splunk> SUMIT, Michigan - October 08

Raffael Marty Chief Security Strategist @ Splunk> Looked at logs/it data for over 10 years - IBM Research - Conference boards / committees Presenting around the world on SecViz Passion for Visualization - http://secviz.org - http://afterglow.sourceforge.net Applied Security Visualization Paperback: 552 pages Publisher: Addison Wesley (August, 2008) ISBN: 0321510100

Agenda IT Data Visualization - Security Visualization Dichotomy - Research Dichotomy IT Data Management - A shifted crime landscape Perimeter Threat Visualization is a more effective way of IT data management and analysis. Insider Threat Security Visualization Community 3

Visualization Questions Who analyzes logs? Who uses visualization for log analysis? Who has used DAVIX? Have you heard of SecViz.org? What tools are you using for log analysis? 4

IT Data Visualization Applied Security Visualization, Chapter 3

What is Visualization? Generate a picture from IT data A picture is worth a thousand log records. Explore and Discover Inspire Answer a Pose a New Increase Communicate Support Question Question Efficiency Information Decisions 6

Information Visualization Process Capture Process Visualize 7

The 1st Dichotomy Security security data types of data networking protocols two domains perception routing protocols (the Internet) optics security impact color theory depth cue theory security policy jargon use-cases are the end-users Visualization Security & Visualization interaction theory types of graphs human computer interaction 8

9 The Failure - New Graphs

10 The Right Thing - Reuse Graphs

11 The Failure - The Wrong Graph

12 The Right Thing - Adequate Graphs

The Failure - The Wrong Integration Using proprietary data format Provide parsers for various data formats does not scale is probably buggy / incomplete Use wrong data access paradigm complex configuration e.g., needs an SSH connection /usr/share/man/man5/launchd.plist.5 <?xml version="1.0" encoding="utf-8"?> <!DOCTYPE plist PUBLIC "-//Apple Computer//DTD PLIST 1.0//EN" "http://www.apple.com/dtds/propertylist-1.0.dtd"> <plist version="1.0"> <dict> <key>_name</key> <dict> <key>_iscolumn</key> <string>yes</string> <key>_isoutlinecolumn</key> <string>yes</string> <key>_order</key> <string>0</string> </dict> <key>bsd_name</key> <dict> <key>_order</key> <string>62</string> </dict> <key>detachable_drive</key> <dict> <key>_order</key> <string>59</string> </dict> <key>device_manufacturer</key> <dict> <key>_order</key> <string>41</string> </dict> <key>device_model</key> <dict> <key>_order</key> <string>42</string> </dict> <key>device_revision</key> 13

The Right Thing - KISS Keep It Simple Stupid Use CSV input Use files as input Offload to other tools parsers data conversions /usr/share/man/man5/launchd.plist.5 <?xml version="1.0" encoding="utf-8"?> <!DOCTYPE plist PUBLIC "-//Apple Computer//DTD PLIST 1.0//EN" "http://www.apple.com/dtds/propertylist-1.0.dtd"> <plist version="1.0"> <dict> <key>_name</key> <dict> <key>_iscolumn</key> <string>yes</string> <key>_isoutlinecolumn</key> <string>yes</string> <key>_order</key> <string>0</string> </dict> <key>bsd_name</key> <dict> <key>_order</key> <string>62</string> </dict> <key>detachable_drive</key> <dict> <key>_order</key> <string>59</string> </dict> <key>device_manufacturer</key> <dict> <key>_order</key> <string>41</string> </dict> <key>device_model</key> <dict> <key>_order</key> <string>42</string> </dict> <key>device_revision</key> # Using node sizes: size.source=1; size.target=200 maxnodesize=0.2 14

15 The Failure - Unnecessary Ink

The Right Thing - Apply Good Visualization Practices Don't use graphics to decorate a few numbers Reduce data ink ratio Visualization principles 16

Industry don t understand the real impact get the 70% solution don t think big no time/money for real research can t scale work based off of a few customer s input The 2nd Dichotomy Academia Some comments are based on paper reviews from RAID 2007/08, VizSec 2007/08 don t know what s been done in industry don t understand the use-cases two worlds Industry & Academia don t understand the environments / data / domain work on simulated data construct their own problems use overly complicated, impractical solutions use graphs / visualization where it is not needed 17

The Way Forward Building a secviz discipline Bridging the gap Learning the other discipline More academia / industry collaboration Security Visualization SecViz 18

My Focus Areas Use-case oriented visualization IT data management Perimeter Threat Governance Risk Compliance (GRC) Insider Threat IT data visualization SecViz.Org DAVIX 19

IT Data Management

A Shifted Crime Landscape Crimes are moving up the stack Insider crime Large-scale spread of many small attacks Application Layer Transport Layer Are you prepared? Are you monitoring enough? Questions are not known in advance! Have the data when you need it! Network Layer Link Layer Physical Layer 21

What Is IT Data? Logs /var/log/messags /opt/log/* multi-line files Configurations Traps & Alerts Scripts & Code Change Events /etc/syslog.conf /etc/hosts 1.3.6.1.2.1.25.3.3.1.2.2 iso. org. dod. internet. mgmt. mib-2. host. hrdevice. hrprocessortable. hrprocessorentry. hrprocessorload ps netstat File system changes Windows Registry entire files multi-line structures multi-line table format hooks into the OS The IT Search Company

Perimeter Threat Applied Security Visualization, Chapter 6

Sparklines "Data-intense, design-simple, word-sized graphics". Edward Tufte (2006). Beautiful Evidence. Graphics Press. Average } Standard Deviation Examples: - stock price over a day - access to port 80 over the last week Java Script Implementation: http://omnipotent.net/jquery.sparkline/ 24

Sparklines Port Source IP Destination IP 25

Insider Threat Applied Security Visualization, Chapter 8

Three Types of Insider Threats Fraud Information Leak Sabotage 27

Example - Insider Threat Visualization More and other data sources than for the traditional security use-cases Insiders often have legitimate access to machines and data. You need to log more than the exceptions Insider crimes are often executed on the application layer. You need transaction data and chatty application logs The questions are not known in advance! Visualization provokes questions and helps find answers Dynamic nature of fraud Problem for static algorithms Bandits quickly adapt to fixed thresholdbased detection systems Looking for any unusual patterns 28

User Activity Color indicates failed logins High ratio of failed logins 29

30

Security Visualization Community

SecViz - Security Visualization This is a place to share, discuss, challenge, and learn about security visualization.

V D X Data Analysis and Visualization Linux davix.secviz.org

Tools Capture - Network tools Argus Snort Wireshark - Logging syslog-ng - Fetching data wget ftp scp Processing - Shell tools awk, grep, sed - Graphic preprocessing Afterglow LGL - Date enrichment geoiplookup whois/gwhois Visualization - Network Traffic EtherApe InetVis tnv - Generic Afterglow Treemap Mondrian R Project * Non-concluding list of tools

Thank You! raffy @ splunk. com