SlideShare ist ein Scribd-Unternehmen logo
1 von 16
Downloaden Sie, um offline zu lesen
Supercharged graph visualization
for cyber security
5th May 2016
Corey Lanum / Ed Wood
09:00 am PDT
12:00 noon EDT
17:00 BST
18:00 CEST
Supercharged graph visualization
for cyber security
5th May 2016
Corey Lanum / Ed Wood
Agenda
● Introductions
● Some Challenges of Cyber Data
● Live Demos
● Hints and Tips
● Your Questions
Webinar will be recorded.
Video will be shared tomorrow.
Please submit questions via Citrix panel!
Cambridge Intelligence
• Founded in 2011
• Cambridge UK & Boston US
• We help organizations to
understand connected
data:
– Award-winning products
– Developer services
– Expert know-how
• Cross-browser compatibility
• Works on any device
• A fast developer experience
• Rapid deployment
• Easy maintenance
• Full customization
• Powerful functionality
Introducing KeyLines
KeyLines is a powerful SDK for building network
visualization web applications:
‘Graph’ data
Enron email traffic
Nodes are people
Links (or ‘Edges’) are
emails exchanged
Scale and colour Node
using Social Network
algorithms
Betweenness = number
of shortest paths Nodes
are on ; indicates
seniority
Links scaled proportional
to volume of email
Cyber Security Data
“Cybersecurity is the body of technologies, processes and
practices designed to protect networks, computers, programs
and data from attack, damage or unauthorized access.”
Cyber Security data structures often fit very well with Graph
entities and visualisations….
E.g. NODES
● Machines
● People
● Data Centres
● Malware Families
● Applications
● Credentials
E.g. LINKS
● Attack Vectors
● Data Packets
● Emails
● Credentials
● Vulnerabilities
● Exfiltrated Data
A visual and interactive representation can efficiently uncover
patterns, trends and anomalies in complex data-sets
Size / Volume
• Huge number of security events generated by SIEM and other
systems...
Challenges of Cyber Data (I)
Generated at millisecond levels of resolution;
Typically stored in disparate silos that can be
unwieldy to manage.
Challenge is to detect unusual behavior inside
terabytes of event and attribute data,
including:
● IP logs – detecting indications of infected machines
or botnet zombies
● Network logs – uncover applications or users that
hog bandwidth so they can optimize systems and
prioritize business critical applications.
● Communications logs – for performing analysis to
uncover sabotage, espionage or other unwanted
activities.
● Web server logs – managing and prevent external
threats, such as DDoS attacks.
Complexity
• Combination of machine and human
actors
• Subtle interactions of the When and
the Where
Noise
• Significant events and patterns can
be hidden in a sea of data
• Attackers will attempt to hide their
behaviour !
Challenges of Cyber Data (II)
● How to visualize cyber security data:
○ Performance demo
○ Malware demo
○ Data Breach demo
○ Combinations/Grouping demo
○ Geo/TimeBar demo
Demos
KeyLines 3.0!
• Supercharge your charts with (Alpha)
○ Rendering speed up to 10x faster
○ Supported by ‘Big 4’ Browser brands
and most devices
○ Improves fluidity & responsiveness
with larger datasets
• Three new cyber-security demos
○ Inspire creative use of KeyLines
• New Angular directive
○ Performance and compatibility
Your Questions (I)
“Can KeyLines work with real-time data? If so, what visual
model / techniques would you recommend?”
• Yes, it does.
• The Time Bar and Tweak Layouts are designed for this.
• Try to limit the volume of data being communicated at any one
time. Techniques like combos or ghosting can help.
“What is the maximum number of nodes/links you can
handle?”
● HTML5 Canvas - a few thousand.
● WebGL - many tens of thousands.
● Using show/hide, around 1 million. BUT this is rarely useful.
“How easy it is to change the shape, design and layout
of nodes and edges?”
• Very easy.
• Shapes, image nodes, font icons and other designs possible.
• 6 extensible & customizable automated layouts available.
“Does WebGL handle rendering thousands of nodes and
edges well on machine with say Intel HD 3000?”
• WebGL harnesses machine’s GPU and performance will vary
• For reference, demos today were using Mac Book Air on Intel
HD 5000.
Your Questions (II)
Your Questions
+ Live Questions…!
● Cyber Security data is big, complex and noisy.
● A good cyber security visualization needs:
➔ A well thought-out visual model and defined question
➔ Functionality to overcome complexity and noise
◆ Good layouts, filtering, combos, time bar, geospatial
➔ Power to work with data at scale
● Graph visualization is the ideal tool.
We’d love to help!
Summary
Thanks for joining us!
@CambridgeIntel Cambridge-Intelligence.com
info@cambridge-intelligence.com

Weitere ähnliche Inhalte

Was ist angesagt?

II-SDV 14 Product Presentations Cambridge Intelligence
II-SDV 14 Product Presentations Cambridge IntelligenceII-SDV 14 Product Presentations Cambridge Intelligence
II-SDV 14 Product Presentations Cambridge Intelligence
Dr. Haxel Consult
 
IoT World - creating a secure robust IoT reference architecture
IoT World - creating a secure robust IoT reference architectureIoT World - creating a secure robust IoT reference architecture
IoT World - creating a secure robust IoT reference architecture
Paul Fremantle
 

Was ist angesagt? (20)

II-SDV 14 Product Presentations Cambridge Intelligence
II-SDV 14 Product Presentations Cambridge IntelligenceII-SDV 14 Product Presentations Cambridge Intelligence
II-SDV 14 Product Presentations Cambridge Intelligence
 
MDEC Fintech Conference - Demystifying Fintech in the SMAC Era, Darien Nagle ...
MDEC Fintech Conference - Demystifying Fintech in the SMAC Era, Darien Nagle ...MDEC Fintech Conference - Demystifying Fintech in the SMAC Era, Darien Nagle ...
MDEC Fintech Conference - Demystifying Fintech in the SMAC Era, Darien Nagle ...
 
Internet of Things
Internet of ThingsInternet of Things
Internet of Things
 
Introduction to Internet of Things
Introduction to Internet of ThingsIntroduction to Internet of Things
Introduction to Internet of Things
 
Internet of things getting started
Internet of things   getting startedInternet of things   getting started
Internet of things getting started
 
20 Latest Computer Science Seminar Topics on Emerging Technologies
20 Latest Computer Science Seminar Topics on Emerging Technologies20 Latest Computer Science Seminar Topics on Emerging Technologies
20 Latest Computer Science Seminar Topics on Emerging Technologies
 
Software training courses
Software training coursesSoftware training courses
Software training courses
 
SMAC
SMACSMAC
SMAC
 
Creating a team of DevOps “Super Sentai”
Creating a team of DevOps “Super Sentai”Creating a team of DevOps “Super Sentai”
Creating a team of DevOps “Super Sentai”
 
ITCamp 2018 - Magnus Mårtensson - Azure Global Application Perspectives
ITCamp 2018 - Magnus Mårtensson - Azure Global Application PerspectivesITCamp 2018 - Magnus Mårtensson - Azure Global Application Perspectives
ITCamp 2018 - Magnus Mårtensson - Azure Global Application Perspectives
 
Developing io t applications in the fog a distributed dataflow approach
Developing io t applications in the fog  a distributed dataflow approachDeveloping io t applications in the fog  a distributed dataflow approach
Developing io t applications in the fog a distributed dataflow approach
 
SMAC talk for the enterprise
SMAC talk for the enterpriseSMAC talk for the enterprise
SMAC talk for the enterprise
 
Go real-time with the InternetOfThings
Go real-time with the InternetOfThingsGo real-time with the InternetOfThings
Go real-time with the InternetOfThings
 
IoT World - creating a secure robust IoT reference architecture
IoT World - creating a secure robust IoT reference architectureIoT World - creating a secure robust IoT reference architecture
IoT World - creating a secure robust IoT reference architecture
 
May 2013 Federal Cloud Computing Summit Presentation
May 2013 Federal Cloud Computing Summit PresentationMay 2013 Federal Cloud Computing Summit Presentation
May 2013 Federal Cloud Computing Summit Presentation
 
Edge intelligence slide share
Edge intelligence slide shareEdge intelligence slide share
Edge intelligence slide share
 
Internet of Things
Internet of ThingsInternet of Things
Internet of Things
 
Internet of things
Internet of thingsInternet of things
Internet of things
 
A chip to protect IOT
A chip to protect IOTA chip to protect IOT
A chip to protect IOT
 
May 2013 Federal Cloud Computing Summit Welcome by Dr. David McClure
May 2013 Federal Cloud Computing Summit Welcome by Dr. David McClureMay 2013 Federal Cloud Computing Summit Welcome by Dr. David McClure
May 2013 Federal Cloud Computing Summit Welcome by Dr. David McClure
 

Andere mochten auch

Filosofia de la historia de max weber.
Filosofia de la historia de max weber.Filosofia de la historia de max weber.
Filosofia de la historia de max weber.
deretv1
 
Accelerate your sales performance.
Accelerate your sales performance.  Accelerate your sales performance.
Accelerate your sales performance.
Safe Rise
 
Owasp top 10_-_2013_final_-_español
Owasp top 10_-_2013_final_-_españolOwasp top 10_-_2013_final_-_español
Owasp top 10_-_2013_final_-_español
fosoSSS
 
Guia del docente_religion_5_basico_edebe
Guia del docente_religion_5_basico_edebeGuia del docente_religion_5_basico_edebe
Guia del docente_religion_5_basico_edebe
Mireya Burgos Peredo
 

Andere mochten auch (20)

Actividades portuarias
Actividades portuariasActividades portuarias
Actividades portuarias
 
Filosofia de la historia de max weber.
Filosofia de la historia de max weber.Filosofia de la historia de max weber.
Filosofia de la historia de max weber.
 
Clean room system tarkett
Clean room system tarkettClean room system tarkett
Clean room system tarkett
 
Global Internet TV Industry
Global Internet TV IndustryGlobal Internet TV Industry
Global Internet TV Industry
 
123458_Atlas_de_Bolsillo_de_fisiologia
123458_Atlas_de_Bolsillo_de_fisiologia123458_Atlas_de_Bolsillo_de_fisiologia
123458_Atlas_de_Bolsillo_de_fisiologia
 
Newton Paiva - DI - Aula 03
Newton Paiva - DI - Aula 03Newton Paiva - DI - Aula 03
Newton Paiva - DI - Aula 03
 
WinterCatalog
WinterCatalogWinterCatalog
WinterCatalog
 
Perl6: Interfaces und Factories für Testdriven Development
Perl6: Interfaces und Factories für Testdriven DevelopmentPerl6: Interfaces und Factories für Testdriven Development
Perl6: Interfaces und Factories für Testdriven Development
 
iData Insights Report Store
iData Insights Report StoreiData Insights Report Store
iData Insights Report Store
 
Accelerate your sales performance.
Accelerate your sales performance.  Accelerate your sales performance.
Accelerate your sales performance.
 
GaliciaWifi.com
GaliciaWifi.com
GaliciaWifi.com
GaliciaWifi.com
 
FXDaily.pdf
FXDaily.pdfFXDaily.pdf
FXDaily.pdf
 
The Pensions 2015 Guide, 2015 Pension Guide, Pension Information, 2015 Pensi...
The Pensions 2015 Guide,  2015 Pension Guide, Pension Information, 2015 Pensi...The Pensions 2015 Guide,  2015 Pension Guide, Pension Information, 2015 Pensi...
The Pensions 2015 Guide, 2015 Pension Guide, Pension Information, 2015 Pensi...
 
Invitación a la feria IMEX Madrid (24 y 25 de abril). País invitado USA. LIFI...
Invitación a la feria IMEX Madrid (24 y 25 de abril). País invitado USA. LIFI...Invitación a la feria IMEX Madrid (24 y 25 de abril). País invitado USA. LIFI...
Invitación a la feria IMEX Madrid (24 y 25 de abril). País invitado USA. LIFI...
 
LA MADERA Y SUS NO TAN GRATAS CONSECUENCIAS.
LA MADERA Y SUS NO TAN GRATAS CONSECUENCIAS.LA MADERA Y SUS NO TAN GRATAS CONSECUENCIAS.
LA MADERA Y SUS NO TAN GRATAS CONSECUENCIAS.
 
Owasp top 10_-_2013_final_-_español
Owasp top 10_-_2013_final_-_españolOwasp top 10_-_2013_final_-_español
Owasp top 10_-_2013_final_-_español
 
Accesorios para vacio kf
Accesorios para vacio kfAccesorios para vacio kf
Accesorios para vacio kf
 
Oportunidades JUNIO - JAFRA 2015
Oportunidades JUNIO - JAFRA 2015Oportunidades JUNIO - JAFRA 2015
Oportunidades JUNIO - JAFRA 2015
 
Tecnología sin zanja para la instalación y rehabilitación de redes de acueduc...
Tecnología sin zanja para la instalación y rehabilitación de redes de acueduc...Tecnología sin zanja para la instalación y rehabilitación de redes de acueduc...
Tecnología sin zanja para la instalación y rehabilitación de redes de acueduc...
 
Guia del docente_religion_5_basico_edebe
Guia del docente_religion_5_basico_edebeGuia del docente_religion_5_basico_edebe
Guia del docente_religion_5_basico_edebe
 

Ähnlich wie Supercharged graph visualization for cyber security

Ähnlich wie Supercharged graph visualization for cyber security (20)

Choosing the right Technologies for your next unicorn.
Choosing the right Technologies for your next unicorn.Choosing the right Technologies for your next unicorn.
Choosing the right Technologies for your next unicorn.
 
Bridging the Gap: Analyzing Data in and Below the Cloud
Bridging the Gap: Analyzing Data in and Below the CloudBridging the Gap: Analyzing Data in and Below the Cloud
Bridging the Gap: Analyzing Data in and Below the Cloud
 
Big Data made easy in the era of the Cloud - Demi Ben-Ari
Big Data made easy in the era of the Cloud - Demi Ben-AriBig Data made easy in the era of the Cloud - Demi Ben-Ari
Big Data made easy in the era of the Cloud - Demi Ben-Ari
 
Emerging trends in information technology
Emerging trends in information technologyEmerging trends in information technology
Emerging trends in information technology
 
Career Domain 2022-23.pptx
Career Domain 2022-23.pptxCareer Domain 2022-23.pptx
Career Domain 2022-23.pptx
 
Why defensive research is sexy too.. … and a real sign of skill
Why defensive research is sexy too.. … and a real sign of skillWhy defensive research is sexy too.. … and a real sign of skill
Why defensive research is sexy too.. … and a real sign of skill
 
Deep dive in to modern it technology
Deep dive in to modern it technologyDeep dive in to modern it technology
Deep dive in to modern it technology
 
How Precisely and Splunk Can Help You Better Manage Your IBM Z and IBM i Envi...
How Precisely and Splunk Can Help You Better Manage Your IBM Z and IBM i Envi...How Precisely and Splunk Can Help You Better Manage Your IBM Z and IBM i Envi...
How Precisely and Splunk Can Help You Better Manage Your IBM Z and IBM i Envi...
 
fields of technology and computer .pptx
fields of technology and computer  .pptxfields of technology and computer  .pptx
fields of technology and computer .pptx
 
How Cloud Computing will change how you and your team will run IT
How Cloud Computing will change how you and your team will run ITHow Cloud Computing will change how you and your team will run IT
How Cloud Computing will change how you and your team will run IT
 
System Security on Cloud
System Security on CloudSystem Security on Cloud
System Security on Cloud
 
.Net Microservices with Event Sourcing, CQRS, Docker and... Windows Server 20...
.Net Microservices with Event Sourcing, CQRS, Docker and... Windows Server 20....Net Microservices with Event Sourcing, CQRS, Docker and... Windows Server 20...
.Net Microservices with Event Sourcing, CQRS, Docker and... Windows Server 20...
 
Microservices - opportunities, dilemmas and problems
Microservices - opportunities, dilemmas and problemsMicroservices - opportunities, dilemmas and problems
Microservices - opportunities, dilemmas and problems
 
Microservices - when, why and how incontrodevops.it
Microservices  - when, why and how incontrodevops.itMicroservices  - when, why and how incontrodevops.it
Microservices - when, why and how incontrodevops.it
 
A non-technical introduction to Cloud Computing
A non-technical introduction to Cloud ComputingA non-technical introduction to Cloud Computing
A non-technical introduction to Cloud Computing
 
apidays LIVE Paris - Serverless security: how to protect what you don't see? ...
apidays LIVE Paris - Serverless security: how to protect what you don't see? ...apidays LIVE Paris - Serverless security: how to protect what you don't see? ...
apidays LIVE Paris - Serverless security: how to protect what you don't see? ...
 
Hac IT 4. Emerging Technologies (1).pdf
Hac IT 4. Emerging Technologies  (1).pdfHac IT 4. Emerging Technologies  (1).pdf
Hac IT 4. Emerging Technologies (1).pdf
 
Cybersecurity Legos - We're all part of something bigger
Cybersecurity Legos - We're all part of something biggerCybersecurity Legos - We're all part of something bigger
Cybersecurity Legos - We're all part of something bigger
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
AI for Manufacturing (Machine Vision, Edge AI, Federated Learning)
AI for Manufacturing (Machine Vision, Edge AI, Federated Learning)AI for Manufacturing (Machine Vision, Edge AI, Federated Learning)
AI for Manufacturing (Machine Vision, Edge AI, Federated Learning)
 

Kürzlich hochgeladen

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 

Kürzlich hochgeladen (20)

Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 

Supercharged graph visualization for cyber security

  • 1. Supercharged graph visualization for cyber security 5th May 2016 Corey Lanum / Ed Wood 09:00 am PDT 12:00 noon EDT 17:00 BST 18:00 CEST
  • 2. Supercharged graph visualization for cyber security 5th May 2016 Corey Lanum / Ed Wood
  • 3. Agenda ● Introductions ● Some Challenges of Cyber Data ● Live Demos ● Hints and Tips ● Your Questions Webinar will be recorded. Video will be shared tomorrow. Please submit questions via Citrix panel!
  • 4. Cambridge Intelligence • Founded in 2011 • Cambridge UK & Boston US • We help organizations to understand connected data: – Award-winning products – Developer services – Expert know-how
  • 5. • Cross-browser compatibility • Works on any device • A fast developer experience • Rapid deployment • Easy maintenance • Full customization • Powerful functionality Introducing KeyLines KeyLines is a powerful SDK for building network visualization web applications:
  • 6. ‘Graph’ data Enron email traffic Nodes are people Links (or ‘Edges’) are emails exchanged Scale and colour Node using Social Network algorithms Betweenness = number of shortest paths Nodes are on ; indicates seniority Links scaled proportional to volume of email
  • 7. Cyber Security Data “Cybersecurity is the body of technologies, processes and practices designed to protect networks, computers, programs and data from attack, damage or unauthorized access.” Cyber Security data structures often fit very well with Graph entities and visualisations…. E.g. NODES ● Machines ● People ● Data Centres ● Malware Families ● Applications ● Credentials E.g. LINKS ● Attack Vectors ● Data Packets ● Emails ● Credentials ● Vulnerabilities ● Exfiltrated Data A visual and interactive representation can efficiently uncover patterns, trends and anomalies in complex data-sets
  • 8. Size / Volume • Huge number of security events generated by SIEM and other systems... Challenges of Cyber Data (I) Generated at millisecond levels of resolution; Typically stored in disparate silos that can be unwieldy to manage. Challenge is to detect unusual behavior inside terabytes of event and attribute data, including: ● IP logs – detecting indications of infected machines or botnet zombies ● Network logs – uncover applications or users that hog bandwidth so they can optimize systems and prioritize business critical applications. ● Communications logs – for performing analysis to uncover sabotage, espionage or other unwanted activities. ● Web server logs – managing and prevent external threats, such as DDoS attacks.
  • 9. Complexity • Combination of machine and human actors • Subtle interactions of the When and the Where Noise • Significant events and patterns can be hidden in a sea of data • Attackers will attempt to hide their behaviour ! Challenges of Cyber Data (II)
  • 10. ● How to visualize cyber security data: ○ Performance demo ○ Malware demo ○ Data Breach demo ○ Combinations/Grouping demo ○ Geo/TimeBar demo Demos
  • 11. KeyLines 3.0! • Supercharge your charts with (Alpha) ○ Rendering speed up to 10x faster ○ Supported by ‘Big 4’ Browser brands and most devices ○ Improves fluidity & responsiveness with larger datasets • Three new cyber-security demos ○ Inspire creative use of KeyLines • New Angular directive ○ Performance and compatibility
  • 12. Your Questions (I) “Can KeyLines work with real-time data? If so, what visual model / techniques would you recommend?” • Yes, it does. • The Time Bar and Tweak Layouts are designed for this. • Try to limit the volume of data being communicated at any one time. Techniques like combos or ghosting can help. “What is the maximum number of nodes/links you can handle?” ● HTML5 Canvas - a few thousand. ● WebGL - many tens of thousands. ● Using show/hide, around 1 million. BUT this is rarely useful.
  • 13. “How easy it is to change the shape, design and layout of nodes and edges?” • Very easy. • Shapes, image nodes, font icons and other designs possible. • 6 extensible & customizable automated layouts available. “Does WebGL handle rendering thousands of nodes and edges well on machine with say Intel HD 3000?” • WebGL harnesses machine’s GPU and performance will vary • For reference, demos today were using Mac Book Air on Intel HD 5000. Your Questions (II)
  • 14. Your Questions + Live Questions…!
  • 15. ● Cyber Security data is big, complex and noisy. ● A good cyber security visualization needs: ➔ A well thought-out visual model and defined question ➔ Functionality to overcome complexity and noise ◆ Good layouts, filtering, combos, time bar, geospatial ➔ Power to work with data at scale ● Graph visualization is the ideal tool. We’d love to help! Summary
  • 16. Thanks for joining us! @CambridgeIntel Cambridge-Intelligence.com info@cambridge-intelligence.com