Top Banner
51
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Security Research2.0 - FIT 2008

Security Research 20

Raffael Marty GCIA CISSPChief Security Strategist Splunkgt

FIT-IT Visual Computing Austria - September lsquo08

Agendabull Security Visualization Today- The SecViz Dichotomy

- The Failure

- The Way Forward

bull My Focus Areas

bull The Future

2

Agendabull Security Visualization Today- The SecViz Dichotomy

- The Failure

- The Way Forward

bull My Focus Areas

bull The Future

2

GoalProvoke thought and stir up

more questions than offering answers

bull Chief Security Strategist Splunkgt

bull Looked at logsIT data for over 10 years

- IBM Research

- Conference boards committees

bull Presenting around the world on SecViz

bull Passion for Visualization

- httpsecvizorg

- httpafterglowsourceforgenet

Applied Security VisualizationPaperback 552 pages

Publisher Addison Wesley (August 2008)ISBN 0321510100

bull Chief Security Strategist Splunkgt

bull Looked at logsIT data for over 10 years

- IBM Research

- Conference boards committees

bull Presenting around the world on SecViz

bull Passion for Visualization

- httpsecvizorg

- httpafterglowsourceforgenet

Raffael Marty

Applied Security VisualizationPaperback 552 pages

Publisher Addison Wesley (August 2008)ISBN 0321510100

Security Visualization Today

The 1st Dichotomy

5

The 1st Dichotomy

5

two domainsSecurity amp Visualization

The 1st Dichotomy

5

Security Visualization

The 1st Dichotomy

bull security databull networking protocolsbull routing protocols (the Internet)bull security impactbull security policybull jargonbull use-casesbull are the end-users

5

Security Visualization

The 1st Dichotomy

bull security databull networking protocolsbull routing protocols (the Internet)bull security impactbull security policybull jargonbull use-casesbull are the end-users

5

bull types of databull perceptionbull opticsbull color theorybull depth cue theorybull interaction theory bull types of graphsbull human computer interaction

Security Visualization

The Failure - New Graphs

6

The Right Thing - Reuse Graphs

7

The Failure - The Wrong Graph

8

The Right Thing - Adequate Graphs

9

The Right Thing - Adequate Graphs

9

The Failure - The Wrong Integration

10

bull Using proprietary data formatbull Provide parsers for various data formats

bull does not scalebull is probably buggy incomplete

bull Use wrong data access paradigm bull complex configuration

eg needs an SSH connection

usrsharemanman5launchdplist5ltxml version=10 encoding=UTF-8gtltDOCTYPE plist PUBLIC -Apple ComputerDTD PLIST 10EN httpwwwapplecomDTDsPropertyList-10dtdgtltplist version=10gtltdictgt ltkeygt_nameltkeygt ltdictgt ltkeygt_isColumnltkeygt ltstringgtYESltstringgt ltkeygt_isOutlineColumnltkeygt ltstringgtYESltstringgt ltkeygt_orderltkeygt ltstringgt0ltstringgt ltdictgt ltkeygtbsd_nameltkeygt ltdictgt ltkeygt_orderltkeygt ltstringgt62ltstringgt ltdictgt ltkeygtdetachable_driveltkeygt ltdictgt ltkeygt_orderltkeygt ltstringgt59ltstringgt ltdictgt ltkeygtdevice_manufacturerltkeygt ltdictgt ltkeygt_orderltkeygt ltstringgt41ltstringgt ltdictgt ltkeygtdevice_modelltkeygt ltdictgt ltkeygt_orderltkeygt ltstringgt42ltstringgt ltdictgt ltkeygtdevice_revisionltkeygt

bull Keep It Simple Stupidbull Use CSV inputbull Use files as inputbull Offload to other tools

bull parsersbull data conversions

The Right Thing - KISS

11

Using node sizessizesource=1sizetarget=200maxNodeSize=02

usrsharemanman5launchdplist5ltxml version=10 encoding=UTF-8gtltDOCTYPE plist PUBLIC -Apple ComputerDTD PLIST 10EN httpwwwapplecomDTDsPropertyList-10dtdgtltplist version=10gtltdictgt ltkeygt_nameltkeygt ltdictgt ltkeygt_isColumnltkeygt ltstringgtYESltstringgt ltkeygt_isOutlineColumnltkeygt ltstringgtYESltstringgt ltkeygt_orderltkeygt ltstringgt0ltstringgt ltdictgt ltkeygtbsd_nameltkeygt ltdictgt ltkeygt_orderltkeygt ltstringgt62ltstringgt ltdictgt ltkeygtdetachable_driveltkeygt ltdictgt ltkeygt_orderltkeygt ltstringgt59ltstringgt ltdictgt ltkeygtdevice_manufacturerltkeygt ltdictgt ltkeygt_orderltkeygt ltstringgt41ltstringgt ltdictgt ltkeygtdevice_modelltkeygt ltdictgt ltkeygt_orderltkeygt ltstringgt42ltstringgt ltdictgt ltkeygtdevice_revisionltkeygt

The Failure - So What

12

The Right Thing - Help The User Along

13

bull Provide use-case aligned displaysbull Meaningful legendsbull Interactive explorationbull UI design that guides the user through tasksbull Do not overload displays

The Failure - Unnecessary Ink

14

The Right Thing - Apply Good Visualization Practices

15

bull Dont use graphics to decorate a few numbersbull Reduce data ink ratiobull Visualization principles

The 2nd Dichotomy

16

The 2nd Dichotomy

16

two worldsIndustry amp Academia

The 2nd Dichotomy

16

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The 2nd Dichotomy

16

bull donrsquot understand the real impact

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The 2nd Dichotomy

16

bull donrsquot understand the real impactbull get the 70 solution

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The 2nd Dichotomy

16

bull donrsquot understand the real impactbull get the 70 solutionbull donrsquot think big

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The 2nd Dichotomy

16

bull donrsquot understand the real impactbull get the 70 solutionbull donrsquot think bigbull no timemoney for real research

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The 2nd Dichotomy

16

bull donrsquot understand the real impactbull get the 70 solutionbull donrsquot think bigbull no timemoney for real researchbull canrsquot scale

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The 2nd Dichotomy

16

bull donrsquot understand the real impactbull get the 70 solutionbull donrsquot think bigbull no timemoney for real researchbull canrsquot scalebull work based off of a few

customerrsquos input

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The 2nd Dichotomy

16

bull donrsquot understand the real impactbull get the 70 solutionbull donrsquot think bigbull no timemoney for real researchbull canrsquot scalebull work based off of a few

customerrsquos input

bull donrsquot know whatrsquos been done in industry

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The 2nd Dichotomy

16

bull donrsquot understand the real impactbull get the 70 solutionbull donrsquot think bigbull no timemoney for real researchbull canrsquot scalebull work based off of a few

customerrsquos input

bull donrsquot know whatrsquos been done in industrybull donrsquot understand the use-cases

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The 2nd Dichotomy

16

bull donrsquot understand the real impactbull get the 70 solutionbull donrsquot think bigbull no timemoney for real researchbull canrsquot scalebull work based off of a few

customerrsquos input

bull donrsquot know whatrsquos been done in industrybull donrsquot understand the use-casesbull donrsquot understand the environments

data domain

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The 2nd Dichotomy

16

bull donrsquot understand the real impactbull get the 70 solutionbull donrsquot think bigbull no timemoney for real researchbull canrsquot scalebull work based off of a few

customerrsquos input

bull donrsquot know whatrsquos been done in industrybull donrsquot understand the use-casesbull donrsquot understand the environments

data domainbull work on simulated data

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The 2nd Dichotomy

16

bull donrsquot understand the real impactbull get the 70 solutionbull donrsquot think bigbull no timemoney for real researchbull canrsquot scalebull work based off of a few

customerrsquos input

bull donrsquot know whatrsquos been done in industrybull donrsquot understand the use-casesbull donrsquot understand the environments

data domainbull work on simulated databull construct their own problems

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The 2nd Dichotomy

16

bull donrsquot understand the real impactbull get the 70 solutionbull donrsquot think bigbull no timemoney for real researchbull canrsquot scalebull work based off of a few

customerrsquos input

bull donrsquot know whatrsquos been done in industrybull donrsquot understand the use-casesbull donrsquot understand the environments

data domainbull work on simulated databull construct their own problems bull use overly complicated impractical

solutions

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The 2nd Dichotomy

16

bull donrsquot understand the real impactbull get the 70 solutionbull donrsquot think bigbull no timemoney for real researchbull canrsquot scalebull work based off of a few

customerrsquos input

bull donrsquot know whatrsquos been done in industrybull donrsquot understand the use-casesbull donrsquot understand the environments

data domainbull work on simulated databull construct their own problems bull use overly complicated impractical

solutionsbull use graphs visualization where it is not

needed

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The Way Forward

17

bull Building a secviz disciplinebull Bridging the gapbull Learning the ldquootherrdquo discipline

Security Visualization

SecViz

bull More academia industry collaboration bull Build components widgets gadgetsbull (Re-)use existing technologiesbull Focus on strengthsbull Focus on the visualization and interaction aspects

Two disciplines

Two worlds

18

bull Use-case oriented visualizationbull Perimeter Threatbull Governance Risk Compliance (GRC)bull Insider Threat bull IT data visualizationbull SecVizOrgbull DAVIX

My Focus Areas

18

bull Use-case oriented visualizationbull Perimeter Threatbull Governance Risk Compliance (GRC)bull Insider Threat bull IT data visualizationbull SecVizOrgbull DAVIX

Insider Threat Visualizationbull Huge amounts of databull More and other data sources than for the traditional security use-cases- Insiders often have legitimate access to machines and data You need to log more than the

exceptions

- Insider crimes are often executed on the application layer

bull The questions are not known in advance - Visualization provokes questions and helps find answers

bull Dynamic nature of fraud- Problem for static algorithms

- Bandits quickly adapt to fixed threshold-based detection systems

bull Looking for any unusual patterns

19

20

20

SecViz - Security VisualizationThis is a place to share discuss challenge and learn about

security visualization

Data Analysis and Visualization Linuxdavixsecvizorg

D

V

X

bull Addressing the secviz dichotomy

bull Better industry - academia collaboration

bull More and better visualization tools

- Use-case driven product development

bull We need to solve the data semantics problem

- Common Event Expression

- Entity extraction

23

The Futurebull Addressing the secviz dichotomy

bull Better industry - academia collaboration

bull More and better visualization tools

- Use-case driven product development

bull We need to solve the data semantics problem

- Common Event Expression

- Entity extraction

23

Vielen Dank

S

E

C I

V

Z

raffael marty secviz org

Page 2: Security Research2.0 - FIT 2008

Agendabull Security Visualization Today- The SecViz Dichotomy

- The Failure

- The Way Forward

bull My Focus Areas

bull The Future

2

Agendabull Security Visualization Today- The SecViz Dichotomy

- The Failure

- The Way Forward

bull My Focus Areas

bull The Future

2

GoalProvoke thought and stir up

more questions than offering answers

bull Chief Security Strategist Splunkgt

bull Looked at logsIT data for over 10 years

- IBM Research

- Conference boards committees

bull Presenting around the world on SecViz

bull Passion for Visualization

- httpsecvizorg

- httpafterglowsourceforgenet

Applied Security VisualizationPaperback 552 pages

Publisher Addison Wesley (August 2008)ISBN 0321510100

bull Chief Security Strategist Splunkgt

bull Looked at logsIT data for over 10 years

- IBM Research

- Conference boards committees

bull Presenting around the world on SecViz

bull Passion for Visualization

- httpsecvizorg

- httpafterglowsourceforgenet

Raffael Marty

Applied Security VisualizationPaperback 552 pages

Publisher Addison Wesley (August 2008)ISBN 0321510100

Security Visualization Today

The 1st Dichotomy

5

The 1st Dichotomy

5

two domainsSecurity amp Visualization

The 1st Dichotomy

5

Security Visualization

The 1st Dichotomy

bull security databull networking protocolsbull routing protocols (the Internet)bull security impactbull security policybull jargonbull use-casesbull are the end-users

5

Security Visualization

The 1st Dichotomy

bull security databull networking protocolsbull routing protocols (the Internet)bull security impactbull security policybull jargonbull use-casesbull are the end-users

5

bull types of databull perceptionbull opticsbull color theorybull depth cue theorybull interaction theory bull types of graphsbull human computer interaction

Security Visualization

The Failure - New Graphs

6

The Right Thing - Reuse Graphs

7

The Failure - The Wrong Graph

8

The Right Thing - Adequate Graphs

9

The Right Thing - Adequate Graphs

9

The Failure - The Wrong Integration

10

bull Using proprietary data formatbull Provide parsers for various data formats

bull does not scalebull is probably buggy incomplete

bull Use wrong data access paradigm bull complex configuration

eg needs an SSH connection

usrsharemanman5launchdplist5ltxml version=10 encoding=UTF-8gtltDOCTYPE plist PUBLIC -Apple ComputerDTD PLIST 10EN httpwwwapplecomDTDsPropertyList-10dtdgtltplist version=10gtltdictgt ltkeygt_nameltkeygt ltdictgt ltkeygt_isColumnltkeygt ltstringgtYESltstringgt ltkeygt_isOutlineColumnltkeygt ltstringgtYESltstringgt ltkeygt_orderltkeygt ltstringgt0ltstringgt ltdictgt ltkeygtbsd_nameltkeygt ltdictgt ltkeygt_orderltkeygt ltstringgt62ltstringgt ltdictgt ltkeygtdetachable_driveltkeygt ltdictgt ltkeygt_orderltkeygt ltstringgt59ltstringgt ltdictgt ltkeygtdevice_manufacturerltkeygt ltdictgt ltkeygt_orderltkeygt ltstringgt41ltstringgt ltdictgt ltkeygtdevice_modelltkeygt ltdictgt ltkeygt_orderltkeygt ltstringgt42ltstringgt ltdictgt ltkeygtdevice_revisionltkeygt

bull Keep It Simple Stupidbull Use CSV inputbull Use files as inputbull Offload to other tools

bull parsersbull data conversions

The Right Thing - KISS

11

Using node sizessizesource=1sizetarget=200maxNodeSize=02

usrsharemanman5launchdplist5ltxml version=10 encoding=UTF-8gtltDOCTYPE plist PUBLIC -Apple ComputerDTD PLIST 10EN httpwwwapplecomDTDsPropertyList-10dtdgtltplist version=10gtltdictgt ltkeygt_nameltkeygt ltdictgt ltkeygt_isColumnltkeygt ltstringgtYESltstringgt ltkeygt_isOutlineColumnltkeygt ltstringgtYESltstringgt ltkeygt_orderltkeygt ltstringgt0ltstringgt ltdictgt ltkeygtbsd_nameltkeygt ltdictgt ltkeygt_orderltkeygt ltstringgt62ltstringgt ltdictgt ltkeygtdetachable_driveltkeygt ltdictgt ltkeygt_orderltkeygt ltstringgt59ltstringgt ltdictgt ltkeygtdevice_manufacturerltkeygt ltdictgt ltkeygt_orderltkeygt ltstringgt41ltstringgt ltdictgt ltkeygtdevice_modelltkeygt ltdictgt ltkeygt_orderltkeygt ltstringgt42ltstringgt ltdictgt ltkeygtdevice_revisionltkeygt

The Failure - So What

12

The Right Thing - Help The User Along

13

bull Provide use-case aligned displaysbull Meaningful legendsbull Interactive explorationbull UI design that guides the user through tasksbull Do not overload displays

The Failure - Unnecessary Ink

14

The Right Thing - Apply Good Visualization Practices

15

bull Dont use graphics to decorate a few numbersbull Reduce data ink ratiobull Visualization principles

The 2nd Dichotomy

16

The 2nd Dichotomy

16

two worldsIndustry amp Academia

The 2nd Dichotomy

16

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The 2nd Dichotomy

16

bull donrsquot understand the real impact

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The 2nd Dichotomy

16

bull donrsquot understand the real impactbull get the 70 solution

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The 2nd Dichotomy

16

bull donrsquot understand the real impactbull get the 70 solutionbull donrsquot think big

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The 2nd Dichotomy

16

bull donrsquot understand the real impactbull get the 70 solutionbull donrsquot think bigbull no timemoney for real research

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The 2nd Dichotomy

16

bull donrsquot understand the real impactbull get the 70 solutionbull donrsquot think bigbull no timemoney for real researchbull canrsquot scale

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The 2nd Dichotomy

16

bull donrsquot understand the real impactbull get the 70 solutionbull donrsquot think bigbull no timemoney for real researchbull canrsquot scalebull work based off of a few

customerrsquos input

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The 2nd Dichotomy

16

bull donrsquot understand the real impactbull get the 70 solutionbull donrsquot think bigbull no timemoney for real researchbull canrsquot scalebull work based off of a few

customerrsquos input

bull donrsquot know whatrsquos been done in industry

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The 2nd Dichotomy

16

bull donrsquot understand the real impactbull get the 70 solutionbull donrsquot think bigbull no timemoney for real researchbull canrsquot scalebull work based off of a few

customerrsquos input

bull donrsquot know whatrsquos been done in industrybull donrsquot understand the use-cases

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The 2nd Dichotomy

16

bull donrsquot understand the real impactbull get the 70 solutionbull donrsquot think bigbull no timemoney for real researchbull canrsquot scalebull work based off of a few

customerrsquos input

bull donrsquot know whatrsquos been done in industrybull donrsquot understand the use-casesbull donrsquot understand the environments

data domain

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The 2nd Dichotomy

16

bull donrsquot understand the real impactbull get the 70 solutionbull donrsquot think bigbull no timemoney for real researchbull canrsquot scalebull work based off of a few

customerrsquos input

bull donrsquot know whatrsquos been done in industrybull donrsquot understand the use-casesbull donrsquot understand the environments

data domainbull work on simulated data

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The 2nd Dichotomy

16

bull donrsquot understand the real impactbull get the 70 solutionbull donrsquot think bigbull no timemoney for real researchbull canrsquot scalebull work based off of a few

customerrsquos input

bull donrsquot know whatrsquos been done in industrybull donrsquot understand the use-casesbull donrsquot understand the environments

data domainbull work on simulated databull construct their own problems

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The 2nd Dichotomy

16

bull donrsquot understand the real impactbull get the 70 solutionbull donrsquot think bigbull no timemoney for real researchbull canrsquot scalebull work based off of a few

customerrsquos input

bull donrsquot know whatrsquos been done in industrybull donrsquot understand the use-casesbull donrsquot understand the environments

data domainbull work on simulated databull construct their own problems bull use overly complicated impractical

solutions

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The 2nd Dichotomy

16

bull donrsquot understand the real impactbull get the 70 solutionbull donrsquot think bigbull no timemoney for real researchbull canrsquot scalebull work based off of a few

customerrsquos input

bull donrsquot know whatrsquos been done in industrybull donrsquot understand the use-casesbull donrsquot understand the environments

data domainbull work on simulated databull construct their own problems bull use overly complicated impractical

solutionsbull use graphs visualization where it is not

needed

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The Way Forward

17

bull Building a secviz disciplinebull Bridging the gapbull Learning the ldquootherrdquo discipline

Security Visualization

SecViz

bull More academia industry collaboration bull Build components widgets gadgetsbull (Re-)use existing technologiesbull Focus on strengthsbull Focus on the visualization and interaction aspects

Two disciplines

Two worlds

18

bull Use-case oriented visualizationbull Perimeter Threatbull Governance Risk Compliance (GRC)bull Insider Threat bull IT data visualizationbull SecVizOrgbull DAVIX

My Focus Areas

18

bull Use-case oriented visualizationbull Perimeter Threatbull Governance Risk Compliance (GRC)bull Insider Threat bull IT data visualizationbull SecVizOrgbull DAVIX

Insider Threat Visualizationbull Huge amounts of databull More and other data sources than for the traditional security use-cases- Insiders often have legitimate access to machines and data You need to log more than the

exceptions

- Insider crimes are often executed on the application layer

bull The questions are not known in advance - Visualization provokes questions and helps find answers

bull Dynamic nature of fraud- Problem for static algorithms

- Bandits quickly adapt to fixed threshold-based detection systems

bull Looking for any unusual patterns

19

20

20

SecViz - Security VisualizationThis is a place to share discuss challenge and learn about

security visualization

Data Analysis and Visualization Linuxdavixsecvizorg

D

V

X

bull Addressing the secviz dichotomy

bull Better industry - academia collaboration

bull More and better visualization tools

- Use-case driven product development

bull We need to solve the data semantics problem

- Common Event Expression

- Entity extraction

23

The Futurebull Addressing the secviz dichotomy

bull Better industry - academia collaboration

bull More and better visualization tools

- Use-case driven product development

bull We need to solve the data semantics problem

- Common Event Expression

- Entity extraction

23

Vielen Dank

S

E

C I

V

Z

raffael marty secviz org

Page 3: Security Research2.0 - FIT 2008

Agendabull Security Visualization Today- The SecViz Dichotomy

- The Failure

- The Way Forward

bull My Focus Areas

bull The Future

2

GoalProvoke thought and stir up

more questions than offering answers

bull Chief Security Strategist Splunkgt

bull Looked at logsIT data for over 10 years

- IBM Research

- Conference boards committees

bull Presenting around the world on SecViz

bull Passion for Visualization

- httpsecvizorg

- httpafterglowsourceforgenet

Applied Security VisualizationPaperback 552 pages

Publisher Addison Wesley (August 2008)ISBN 0321510100

bull Chief Security Strategist Splunkgt

bull Looked at logsIT data for over 10 years

- IBM Research

- Conference boards committees

bull Presenting around the world on SecViz

bull Passion for Visualization

- httpsecvizorg

- httpafterglowsourceforgenet

Raffael Marty

Applied Security VisualizationPaperback 552 pages

Publisher Addison Wesley (August 2008)ISBN 0321510100

Security Visualization Today

The 1st Dichotomy

5

The 1st Dichotomy

5

two domainsSecurity amp Visualization

The 1st Dichotomy

5

Security Visualization

The 1st Dichotomy

bull security databull networking protocolsbull routing protocols (the Internet)bull security impactbull security policybull jargonbull use-casesbull are the end-users

5

Security Visualization

The 1st Dichotomy

bull security databull networking protocolsbull routing protocols (the Internet)bull security impactbull security policybull jargonbull use-casesbull are the end-users

5

bull types of databull perceptionbull opticsbull color theorybull depth cue theorybull interaction theory bull types of graphsbull human computer interaction

Security Visualization

The Failure - New Graphs

6

The Right Thing - Reuse Graphs

7

The Failure - The Wrong Graph

8

The Right Thing - Adequate Graphs

9

The Right Thing - Adequate Graphs

9

The Failure - The Wrong Integration

10

bull Using proprietary data formatbull Provide parsers for various data formats

bull does not scalebull is probably buggy incomplete

bull Use wrong data access paradigm bull complex configuration

eg needs an SSH connection

usrsharemanman5launchdplist5ltxml version=10 encoding=UTF-8gtltDOCTYPE plist PUBLIC -Apple ComputerDTD PLIST 10EN httpwwwapplecomDTDsPropertyList-10dtdgtltplist version=10gtltdictgt ltkeygt_nameltkeygt ltdictgt ltkeygt_isColumnltkeygt ltstringgtYESltstringgt ltkeygt_isOutlineColumnltkeygt ltstringgtYESltstringgt ltkeygt_orderltkeygt ltstringgt0ltstringgt ltdictgt ltkeygtbsd_nameltkeygt ltdictgt ltkeygt_orderltkeygt ltstringgt62ltstringgt ltdictgt ltkeygtdetachable_driveltkeygt ltdictgt ltkeygt_orderltkeygt ltstringgt59ltstringgt ltdictgt ltkeygtdevice_manufacturerltkeygt ltdictgt ltkeygt_orderltkeygt ltstringgt41ltstringgt ltdictgt ltkeygtdevice_modelltkeygt ltdictgt ltkeygt_orderltkeygt ltstringgt42ltstringgt ltdictgt ltkeygtdevice_revisionltkeygt

bull Keep It Simple Stupidbull Use CSV inputbull Use files as inputbull Offload to other tools

bull parsersbull data conversions

The Right Thing - KISS

11

Using node sizessizesource=1sizetarget=200maxNodeSize=02

usrsharemanman5launchdplist5ltxml version=10 encoding=UTF-8gtltDOCTYPE plist PUBLIC -Apple ComputerDTD PLIST 10EN httpwwwapplecomDTDsPropertyList-10dtdgtltplist version=10gtltdictgt ltkeygt_nameltkeygt ltdictgt ltkeygt_isColumnltkeygt ltstringgtYESltstringgt ltkeygt_isOutlineColumnltkeygt ltstringgtYESltstringgt ltkeygt_orderltkeygt ltstringgt0ltstringgt ltdictgt ltkeygtbsd_nameltkeygt ltdictgt ltkeygt_orderltkeygt ltstringgt62ltstringgt ltdictgt ltkeygtdetachable_driveltkeygt ltdictgt ltkeygt_orderltkeygt ltstringgt59ltstringgt ltdictgt ltkeygtdevice_manufacturerltkeygt ltdictgt ltkeygt_orderltkeygt ltstringgt41ltstringgt ltdictgt ltkeygtdevice_modelltkeygt ltdictgt ltkeygt_orderltkeygt ltstringgt42ltstringgt ltdictgt ltkeygtdevice_revisionltkeygt

The Failure - So What

12

The Right Thing - Help The User Along

13

bull Provide use-case aligned displaysbull Meaningful legendsbull Interactive explorationbull UI design that guides the user through tasksbull Do not overload displays

The Failure - Unnecessary Ink

14

The Right Thing - Apply Good Visualization Practices

15

bull Dont use graphics to decorate a few numbersbull Reduce data ink ratiobull Visualization principles

The 2nd Dichotomy

16

The 2nd Dichotomy

16

two worldsIndustry amp Academia

The 2nd Dichotomy

16

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The 2nd Dichotomy

16

bull donrsquot understand the real impact

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The 2nd Dichotomy

16

bull donrsquot understand the real impactbull get the 70 solution

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The 2nd Dichotomy

16

bull donrsquot understand the real impactbull get the 70 solutionbull donrsquot think big

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The 2nd Dichotomy

16

bull donrsquot understand the real impactbull get the 70 solutionbull donrsquot think bigbull no timemoney for real research

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The 2nd Dichotomy

16

bull donrsquot understand the real impactbull get the 70 solutionbull donrsquot think bigbull no timemoney for real researchbull canrsquot scale

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The 2nd Dichotomy

16

bull donrsquot understand the real impactbull get the 70 solutionbull donrsquot think bigbull no timemoney for real researchbull canrsquot scalebull work based off of a few

customerrsquos input

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The 2nd Dichotomy

16

bull donrsquot understand the real impactbull get the 70 solutionbull donrsquot think bigbull no timemoney for real researchbull canrsquot scalebull work based off of a few

customerrsquos input

bull donrsquot know whatrsquos been done in industry

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The 2nd Dichotomy

16

bull donrsquot understand the real impactbull get the 70 solutionbull donrsquot think bigbull no timemoney for real researchbull canrsquot scalebull work based off of a few

customerrsquos input

bull donrsquot know whatrsquos been done in industrybull donrsquot understand the use-cases

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The 2nd Dichotomy

16

bull donrsquot understand the real impactbull get the 70 solutionbull donrsquot think bigbull no timemoney for real researchbull canrsquot scalebull work based off of a few

customerrsquos input

bull donrsquot know whatrsquos been done in industrybull donrsquot understand the use-casesbull donrsquot understand the environments

data domain

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The 2nd Dichotomy

16

bull donrsquot understand the real impactbull get the 70 solutionbull donrsquot think bigbull no timemoney for real researchbull canrsquot scalebull work based off of a few

customerrsquos input

bull donrsquot know whatrsquos been done in industrybull donrsquot understand the use-casesbull donrsquot understand the environments

data domainbull work on simulated data

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The 2nd Dichotomy

16

bull donrsquot understand the real impactbull get the 70 solutionbull donrsquot think bigbull no timemoney for real researchbull canrsquot scalebull work based off of a few

customerrsquos input

bull donrsquot know whatrsquos been done in industrybull donrsquot understand the use-casesbull donrsquot understand the environments

data domainbull work on simulated databull construct their own problems

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The 2nd Dichotomy

16

bull donrsquot understand the real impactbull get the 70 solutionbull donrsquot think bigbull no timemoney for real researchbull canrsquot scalebull work based off of a few

customerrsquos input

bull donrsquot know whatrsquos been done in industrybull donrsquot understand the use-casesbull donrsquot understand the environments

data domainbull work on simulated databull construct their own problems bull use overly complicated impractical

solutions

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The 2nd Dichotomy

16

bull donrsquot understand the real impactbull get the 70 solutionbull donrsquot think bigbull no timemoney for real researchbull canrsquot scalebull work based off of a few

customerrsquos input

bull donrsquot know whatrsquos been done in industrybull donrsquot understand the use-casesbull donrsquot understand the environments

data domainbull work on simulated databull construct their own problems bull use overly complicated impractical

solutionsbull use graphs visualization where it is not

needed

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The Way Forward

17

bull Building a secviz disciplinebull Bridging the gapbull Learning the ldquootherrdquo discipline

Security Visualization

SecViz

bull More academia industry collaboration bull Build components widgets gadgetsbull (Re-)use existing technologiesbull Focus on strengthsbull Focus on the visualization and interaction aspects

Two disciplines

Two worlds

18

bull Use-case oriented visualizationbull Perimeter Threatbull Governance Risk Compliance (GRC)bull Insider Threat bull IT data visualizationbull SecVizOrgbull DAVIX

My Focus Areas

18

bull Use-case oriented visualizationbull Perimeter Threatbull Governance Risk Compliance (GRC)bull Insider Threat bull IT data visualizationbull SecVizOrgbull DAVIX

Insider Threat Visualizationbull Huge amounts of databull More and other data sources than for the traditional security use-cases- Insiders often have legitimate access to machines and data You need to log more than the

exceptions

- Insider crimes are often executed on the application layer

bull The questions are not known in advance - Visualization provokes questions and helps find answers

bull Dynamic nature of fraud- Problem for static algorithms

- Bandits quickly adapt to fixed threshold-based detection systems

bull Looking for any unusual patterns

19

20

20

SecViz - Security VisualizationThis is a place to share discuss challenge and learn about

security visualization

Data Analysis and Visualization Linuxdavixsecvizorg

D

V

X

bull Addressing the secviz dichotomy

bull Better industry - academia collaboration

bull More and better visualization tools

- Use-case driven product development

bull We need to solve the data semantics problem

- Common Event Expression

- Entity extraction

23

The Futurebull Addressing the secviz dichotomy

bull Better industry - academia collaboration

bull More and better visualization tools

- Use-case driven product development

bull We need to solve the data semantics problem

- Common Event Expression

- Entity extraction

23

Vielen Dank

S

E

C I

V

Z

raffael marty secviz org

Page 4: Security Research2.0 - FIT 2008

bull Chief Security Strategist Splunkgt

bull Looked at logsIT data for over 10 years

- IBM Research

- Conference boards committees

bull Presenting around the world on SecViz

bull Passion for Visualization

- httpsecvizorg

- httpafterglowsourceforgenet

Applied Security VisualizationPaperback 552 pages

Publisher Addison Wesley (August 2008)ISBN 0321510100

bull Chief Security Strategist Splunkgt

bull Looked at logsIT data for over 10 years

- IBM Research

- Conference boards committees

bull Presenting around the world on SecViz

bull Passion for Visualization

- httpsecvizorg

- httpafterglowsourceforgenet

Raffael Marty

Applied Security VisualizationPaperback 552 pages

Publisher Addison Wesley (August 2008)ISBN 0321510100

Security Visualization Today

The 1st Dichotomy

5

The 1st Dichotomy

5

two domainsSecurity amp Visualization

The 1st Dichotomy

5

Security Visualization

The 1st Dichotomy

bull security databull networking protocolsbull routing protocols (the Internet)bull security impactbull security policybull jargonbull use-casesbull are the end-users

5

Security Visualization

The 1st Dichotomy

bull security databull networking protocolsbull routing protocols (the Internet)bull security impactbull security policybull jargonbull use-casesbull are the end-users

5

bull types of databull perceptionbull opticsbull color theorybull depth cue theorybull interaction theory bull types of graphsbull human computer interaction

Security Visualization

The Failure - New Graphs

6

The Right Thing - Reuse Graphs

7

The Failure - The Wrong Graph

8

The Right Thing - Adequate Graphs

9

The Right Thing - Adequate Graphs

9

The Failure - The Wrong Integration

10

bull Using proprietary data formatbull Provide parsers for various data formats

bull does not scalebull is probably buggy incomplete

bull Use wrong data access paradigm bull complex configuration

eg needs an SSH connection

usrsharemanman5launchdplist5ltxml version=10 encoding=UTF-8gtltDOCTYPE plist PUBLIC -Apple ComputerDTD PLIST 10EN httpwwwapplecomDTDsPropertyList-10dtdgtltplist version=10gtltdictgt ltkeygt_nameltkeygt ltdictgt ltkeygt_isColumnltkeygt ltstringgtYESltstringgt ltkeygt_isOutlineColumnltkeygt ltstringgtYESltstringgt ltkeygt_orderltkeygt ltstringgt0ltstringgt ltdictgt ltkeygtbsd_nameltkeygt ltdictgt ltkeygt_orderltkeygt ltstringgt62ltstringgt ltdictgt ltkeygtdetachable_driveltkeygt ltdictgt ltkeygt_orderltkeygt ltstringgt59ltstringgt ltdictgt ltkeygtdevice_manufacturerltkeygt ltdictgt ltkeygt_orderltkeygt ltstringgt41ltstringgt ltdictgt ltkeygtdevice_modelltkeygt ltdictgt ltkeygt_orderltkeygt ltstringgt42ltstringgt ltdictgt ltkeygtdevice_revisionltkeygt

bull Keep It Simple Stupidbull Use CSV inputbull Use files as inputbull Offload to other tools

bull parsersbull data conversions

The Right Thing - KISS

11

Using node sizessizesource=1sizetarget=200maxNodeSize=02

usrsharemanman5launchdplist5ltxml version=10 encoding=UTF-8gtltDOCTYPE plist PUBLIC -Apple ComputerDTD PLIST 10EN httpwwwapplecomDTDsPropertyList-10dtdgtltplist version=10gtltdictgt ltkeygt_nameltkeygt ltdictgt ltkeygt_isColumnltkeygt ltstringgtYESltstringgt ltkeygt_isOutlineColumnltkeygt ltstringgtYESltstringgt ltkeygt_orderltkeygt ltstringgt0ltstringgt ltdictgt ltkeygtbsd_nameltkeygt ltdictgt ltkeygt_orderltkeygt ltstringgt62ltstringgt ltdictgt ltkeygtdetachable_driveltkeygt ltdictgt ltkeygt_orderltkeygt ltstringgt59ltstringgt ltdictgt ltkeygtdevice_manufacturerltkeygt ltdictgt ltkeygt_orderltkeygt ltstringgt41ltstringgt ltdictgt ltkeygtdevice_modelltkeygt ltdictgt ltkeygt_orderltkeygt ltstringgt42ltstringgt ltdictgt ltkeygtdevice_revisionltkeygt

The Failure - So What

12

The Right Thing - Help The User Along

13

bull Provide use-case aligned displaysbull Meaningful legendsbull Interactive explorationbull UI design that guides the user through tasksbull Do not overload displays

The Failure - Unnecessary Ink

14

The Right Thing - Apply Good Visualization Practices

15

bull Dont use graphics to decorate a few numbersbull Reduce data ink ratiobull Visualization principles

The 2nd Dichotomy

16

The 2nd Dichotomy

16

two worldsIndustry amp Academia

The 2nd Dichotomy

16

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The 2nd Dichotomy

16

bull donrsquot understand the real impact

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The 2nd Dichotomy

16

bull donrsquot understand the real impactbull get the 70 solution

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The 2nd Dichotomy

16

bull donrsquot understand the real impactbull get the 70 solutionbull donrsquot think big

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The 2nd Dichotomy

16

bull donrsquot understand the real impactbull get the 70 solutionbull donrsquot think bigbull no timemoney for real research

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The 2nd Dichotomy

16

bull donrsquot understand the real impactbull get the 70 solutionbull donrsquot think bigbull no timemoney for real researchbull canrsquot scale

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The 2nd Dichotomy

16

bull donrsquot understand the real impactbull get the 70 solutionbull donrsquot think bigbull no timemoney for real researchbull canrsquot scalebull work based off of a few

customerrsquos input

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The 2nd Dichotomy

16

bull donrsquot understand the real impactbull get the 70 solutionbull donrsquot think bigbull no timemoney for real researchbull canrsquot scalebull work based off of a few

customerrsquos input

bull donrsquot know whatrsquos been done in industry

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The 2nd Dichotomy

16

bull donrsquot understand the real impactbull get the 70 solutionbull donrsquot think bigbull no timemoney for real researchbull canrsquot scalebull work based off of a few

customerrsquos input

bull donrsquot know whatrsquos been done in industrybull donrsquot understand the use-cases

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The 2nd Dichotomy

16

bull donrsquot understand the real impactbull get the 70 solutionbull donrsquot think bigbull no timemoney for real researchbull canrsquot scalebull work based off of a few

customerrsquos input

bull donrsquot know whatrsquos been done in industrybull donrsquot understand the use-casesbull donrsquot understand the environments

data domain

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The 2nd Dichotomy

16

bull donrsquot understand the real impactbull get the 70 solutionbull donrsquot think bigbull no timemoney for real researchbull canrsquot scalebull work based off of a few

customerrsquos input

bull donrsquot know whatrsquos been done in industrybull donrsquot understand the use-casesbull donrsquot understand the environments

data domainbull work on simulated data

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The 2nd Dichotomy

16

bull donrsquot understand the real impactbull get the 70 solutionbull donrsquot think bigbull no timemoney for real researchbull canrsquot scalebull work based off of a few

customerrsquos input

bull donrsquot know whatrsquos been done in industrybull donrsquot understand the use-casesbull donrsquot understand the environments

data domainbull work on simulated databull construct their own problems

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The 2nd Dichotomy

16

bull donrsquot understand the real impactbull get the 70 solutionbull donrsquot think bigbull no timemoney for real researchbull canrsquot scalebull work based off of a few

customerrsquos input

bull donrsquot know whatrsquos been done in industrybull donrsquot understand the use-casesbull donrsquot understand the environments

data domainbull work on simulated databull construct their own problems bull use overly complicated impractical

solutions

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The 2nd Dichotomy

16

bull donrsquot understand the real impactbull get the 70 solutionbull donrsquot think bigbull no timemoney for real researchbull canrsquot scalebull work based off of a few

customerrsquos input

bull donrsquot know whatrsquos been done in industrybull donrsquot understand the use-casesbull donrsquot understand the environments

data domainbull work on simulated databull construct their own problems bull use overly complicated impractical

solutionsbull use graphs visualization where it is not

needed

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The Way Forward

17

bull Building a secviz disciplinebull Bridging the gapbull Learning the ldquootherrdquo discipline

Security Visualization

SecViz

bull More academia industry collaboration bull Build components widgets gadgetsbull (Re-)use existing technologiesbull Focus on strengthsbull Focus on the visualization and interaction aspects

Two disciplines

Two worlds

18

bull Use-case oriented visualizationbull Perimeter Threatbull Governance Risk Compliance (GRC)bull Insider Threat bull IT data visualizationbull SecVizOrgbull DAVIX

My Focus Areas

18

bull Use-case oriented visualizationbull Perimeter Threatbull Governance Risk Compliance (GRC)bull Insider Threat bull IT data visualizationbull SecVizOrgbull DAVIX

Insider Threat Visualizationbull Huge amounts of databull More and other data sources than for the traditional security use-cases- Insiders often have legitimate access to machines and data You need to log more than the

exceptions

- Insider crimes are often executed on the application layer

bull The questions are not known in advance - Visualization provokes questions and helps find answers

bull Dynamic nature of fraud- Problem for static algorithms

- Bandits quickly adapt to fixed threshold-based detection systems

bull Looking for any unusual patterns

19

20

20

SecViz - Security VisualizationThis is a place to share discuss challenge and learn about

security visualization

Data Analysis and Visualization Linuxdavixsecvizorg

D

V

X

bull Addressing the secviz dichotomy

bull Better industry - academia collaboration

bull More and better visualization tools

- Use-case driven product development

bull We need to solve the data semantics problem

- Common Event Expression

- Entity extraction

23

The Futurebull Addressing the secviz dichotomy

bull Better industry - academia collaboration

bull More and better visualization tools

- Use-case driven product development

bull We need to solve the data semantics problem

- Common Event Expression

- Entity extraction

23

Vielen Dank

S

E

C I

V

Z

raffael marty secviz org

Page 5: Security Research2.0 - FIT 2008

bull Chief Security Strategist Splunkgt

bull Looked at logsIT data for over 10 years

- IBM Research

- Conference boards committees

bull Presenting around the world on SecViz

bull Passion for Visualization

- httpsecvizorg

- httpafterglowsourceforgenet

Raffael Marty

Applied Security VisualizationPaperback 552 pages

Publisher Addison Wesley (August 2008)ISBN 0321510100

Security Visualization Today

The 1st Dichotomy

5

The 1st Dichotomy

5

two domainsSecurity amp Visualization

The 1st Dichotomy

5

Security Visualization

The 1st Dichotomy

bull security databull networking protocolsbull routing protocols (the Internet)bull security impactbull security policybull jargonbull use-casesbull are the end-users

5

Security Visualization

The 1st Dichotomy

bull security databull networking protocolsbull routing protocols (the Internet)bull security impactbull security policybull jargonbull use-casesbull are the end-users

5

bull types of databull perceptionbull opticsbull color theorybull depth cue theorybull interaction theory bull types of graphsbull human computer interaction

Security Visualization

The Failure - New Graphs

6

The Right Thing - Reuse Graphs

7

The Failure - The Wrong Graph

8

The Right Thing - Adequate Graphs

9

The Right Thing - Adequate Graphs

9

The Failure - The Wrong Integration

10

bull Using proprietary data formatbull Provide parsers for various data formats

bull does not scalebull is probably buggy incomplete

bull Use wrong data access paradigm bull complex configuration

eg needs an SSH connection

usrsharemanman5launchdplist5ltxml version=10 encoding=UTF-8gtltDOCTYPE plist PUBLIC -Apple ComputerDTD PLIST 10EN httpwwwapplecomDTDsPropertyList-10dtdgtltplist version=10gtltdictgt ltkeygt_nameltkeygt ltdictgt ltkeygt_isColumnltkeygt ltstringgtYESltstringgt ltkeygt_isOutlineColumnltkeygt ltstringgtYESltstringgt ltkeygt_orderltkeygt ltstringgt0ltstringgt ltdictgt ltkeygtbsd_nameltkeygt ltdictgt ltkeygt_orderltkeygt ltstringgt62ltstringgt ltdictgt ltkeygtdetachable_driveltkeygt ltdictgt ltkeygt_orderltkeygt ltstringgt59ltstringgt ltdictgt ltkeygtdevice_manufacturerltkeygt ltdictgt ltkeygt_orderltkeygt ltstringgt41ltstringgt ltdictgt ltkeygtdevice_modelltkeygt ltdictgt ltkeygt_orderltkeygt ltstringgt42ltstringgt ltdictgt ltkeygtdevice_revisionltkeygt

bull Keep It Simple Stupidbull Use CSV inputbull Use files as inputbull Offload to other tools

bull parsersbull data conversions

The Right Thing - KISS

11

Using node sizessizesource=1sizetarget=200maxNodeSize=02

usrsharemanman5launchdplist5ltxml version=10 encoding=UTF-8gtltDOCTYPE plist PUBLIC -Apple ComputerDTD PLIST 10EN httpwwwapplecomDTDsPropertyList-10dtdgtltplist version=10gtltdictgt ltkeygt_nameltkeygt ltdictgt ltkeygt_isColumnltkeygt ltstringgtYESltstringgt ltkeygt_isOutlineColumnltkeygt ltstringgtYESltstringgt ltkeygt_orderltkeygt ltstringgt0ltstringgt ltdictgt ltkeygtbsd_nameltkeygt ltdictgt ltkeygt_orderltkeygt ltstringgt62ltstringgt ltdictgt ltkeygtdetachable_driveltkeygt ltdictgt ltkeygt_orderltkeygt ltstringgt59ltstringgt ltdictgt ltkeygtdevice_manufacturerltkeygt ltdictgt ltkeygt_orderltkeygt ltstringgt41ltstringgt ltdictgt ltkeygtdevice_modelltkeygt ltdictgt ltkeygt_orderltkeygt ltstringgt42ltstringgt ltdictgt ltkeygtdevice_revisionltkeygt

The Failure - So What

12

The Right Thing - Help The User Along

13

bull Provide use-case aligned displaysbull Meaningful legendsbull Interactive explorationbull UI design that guides the user through tasksbull Do not overload displays

The Failure - Unnecessary Ink

14

The Right Thing - Apply Good Visualization Practices

15

bull Dont use graphics to decorate a few numbersbull Reduce data ink ratiobull Visualization principles

The 2nd Dichotomy

16

The 2nd Dichotomy

16

two worldsIndustry amp Academia

The 2nd Dichotomy

16

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The 2nd Dichotomy

16

bull donrsquot understand the real impact

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The 2nd Dichotomy

16

bull donrsquot understand the real impactbull get the 70 solution

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The 2nd Dichotomy

16

bull donrsquot understand the real impactbull get the 70 solutionbull donrsquot think big

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The 2nd Dichotomy

16

bull donrsquot understand the real impactbull get the 70 solutionbull donrsquot think bigbull no timemoney for real research

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The 2nd Dichotomy

16

bull donrsquot understand the real impactbull get the 70 solutionbull donrsquot think bigbull no timemoney for real researchbull canrsquot scale

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The 2nd Dichotomy

16

bull donrsquot understand the real impactbull get the 70 solutionbull donrsquot think bigbull no timemoney for real researchbull canrsquot scalebull work based off of a few

customerrsquos input

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The 2nd Dichotomy

16

bull donrsquot understand the real impactbull get the 70 solutionbull donrsquot think bigbull no timemoney for real researchbull canrsquot scalebull work based off of a few

customerrsquos input

bull donrsquot know whatrsquos been done in industry

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The 2nd Dichotomy

16

bull donrsquot understand the real impactbull get the 70 solutionbull donrsquot think bigbull no timemoney for real researchbull canrsquot scalebull work based off of a few

customerrsquos input

bull donrsquot know whatrsquos been done in industrybull donrsquot understand the use-cases

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The 2nd Dichotomy

16

bull donrsquot understand the real impactbull get the 70 solutionbull donrsquot think bigbull no timemoney for real researchbull canrsquot scalebull work based off of a few

customerrsquos input

bull donrsquot know whatrsquos been done in industrybull donrsquot understand the use-casesbull donrsquot understand the environments

data domain

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The 2nd Dichotomy

16

bull donrsquot understand the real impactbull get the 70 solutionbull donrsquot think bigbull no timemoney for real researchbull canrsquot scalebull work based off of a few

customerrsquos input

bull donrsquot know whatrsquos been done in industrybull donrsquot understand the use-casesbull donrsquot understand the environments

data domainbull work on simulated data

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The 2nd Dichotomy

16

bull donrsquot understand the real impactbull get the 70 solutionbull donrsquot think bigbull no timemoney for real researchbull canrsquot scalebull work based off of a few

customerrsquos input

bull donrsquot know whatrsquos been done in industrybull donrsquot understand the use-casesbull donrsquot understand the environments

data domainbull work on simulated databull construct their own problems

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The 2nd Dichotomy

16

bull donrsquot understand the real impactbull get the 70 solutionbull donrsquot think bigbull no timemoney for real researchbull canrsquot scalebull work based off of a few

customerrsquos input

bull donrsquot know whatrsquos been done in industrybull donrsquot understand the use-casesbull donrsquot understand the environments

data domainbull work on simulated databull construct their own problems bull use overly complicated impractical

solutions

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The 2nd Dichotomy

16

bull donrsquot understand the real impactbull get the 70 solutionbull donrsquot think bigbull no timemoney for real researchbull canrsquot scalebull work based off of a few

customerrsquos input

bull donrsquot know whatrsquos been done in industrybull donrsquot understand the use-casesbull donrsquot understand the environments

data domainbull work on simulated databull construct their own problems bull use overly complicated impractical

solutionsbull use graphs visualization where it is not

needed

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The Way Forward

17

bull Building a secviz disciplinebull Bridging the gapbull Learning the ldquootherrdquo discipline

Security Visualization

SecViz

bull More academia industry collaboration bull Build components widgets gadgetsbull (Re-)use existing technologiesbull Focus on strengthsbull Focus on the visualization and interaction aspects

Two disciplines

Two worlds

18

bull Use-case oriented visualizationbull Perimeter Threatbull Governance Risk Compliance (GRC)bull Insider Threat bull IT data visualizationbull SecVizOrgbull DAVIX

My Focus Areas

18

bull Use-case oriented visualizationbull Perimeter Threatbull Governance Risk Compliance (GRC)bull Insider Threat bull IT data visualizationbull SecVizOrgbull DAVIX

Insider Threat Visualizationbull Huge amounts of databull More and other data sources than for the traditional security use-cases- Insiders often have legitimate access to machines and data You need to log more than the

exceptions

- Insider crimes are often executed on the application layer

bull The questions are not known in advance - Visualization provokes questions and helps find answers

bull Dynamic nature of fraud- Problem for static algorithms

- Bandits quickly adapt to fixed threshold-based detection systems

bull Looking for any unusual patterns

19

20

20

SecViz - Security VisualizationThis is a place to share discuss challenge and learn about

security visualization

Data Analysis and Visualization Linuxdavixsecvizorg

D

V

X

bull Addressing the secviz dichotomy

bull Better industry - academia collaboration

bull More and better visualization tools

- Use-case driven product development

bull We need to solve the data semantics problem

- Common Event Expression

- Entity extraction

23

The Futurebull Addressing the secviz dichotomy

bull Better industry - academia collaboration

bull More and better visualization tools

- Use-case driven product development

bull We need to solve the data semantics problem

- Common Event Expression

- Entity extraction

23

Vielen Dank

S

E

C I

V

Z

raffael marty secviz org

Page 6: Security Research2.0 - FIT 2008

Security Visualization Today

The 1st Dichotomy

5

The 1st Dichotomy

5

two domainsSecurity amp Visualization

The 1st Dichotomy

5

Security Visualization

The 1st Dichotomy

bull security databull networking protocolsbull routing protocols (the Internet)bull security impactbull security policybull jargonbull use-casesbull are the end-users

5

Security Visualization

The 1st Dichotomy

bull security databull networking protocolsbull routing protocols (the Internet)bull security impactbull security policybull jargonbull use-casesbull are the end-users

5

bull types of databull perceptionbull opticsbull color theorybull depth cue theorybull interaction theory bull types of graphsbull human computer interaction

Security Visualization

The Failure - New Graphs

6

The Right Thing - Reuse Graphs

7

The Failure - The Wrong Graph

8

The Right Thing - Adequate Graphs

9

The Right Thing - Adequate Graphs

9

The Failure - The Wrong Integration

10

bull Using proprietary data formatbull Provide parsers for various data formats

bull does not scalebull is probably buggy incomplete

bull Use wrong data access paradigm bull complex configuration

eg needs an SSH connection

usrsharemanman5launchdplist5ltxml version=10 encoding=UTF-8gtltDOCTYPE plist PUBLIC -Apple ComputerDTD PLIST 10EN httpwwwapplecomDTDsPropertyList-10dtdgtltplist version=10gtltdictgt ltkeygt_nameltkeygt ltdictgt ltkeygt_isColumnltkeygt ltstringgtYESltstringgt ltkeygt_isOutlineColumnltkeygt ltstringgtYESltstringgt ltkeygt_orderltkeygt ltstringgt0ltstringgt ltdictgt ltkeygtbsd_nameltkeygt ltdictgt ltkeygt_orderltkeygt ltstringgt62ltstringgt ltdictgt ltkeygtdetachable_driveltkeygt ltdictgt ltkeygt_orderltkeygt ltstringgt59ltstringgt ltdictgt ltkeygtdevice_manufacturerltkeygt ltdictgt ltkeygt_orderltkeygt ltstringgt41ltstringgt ltdictgt ltkeygtdevice_modelltkeygt ltdictgt ltkeygt_orderltkeygt ltstringgt42ltstringgt ltdictgt ltkeygtdevice_revisionltkeygt

bull Keep It Simple Stupidbull Use CSV inputbull Use files as inputbull Offload to other tools

bull parsersbull data conversions

The Right Thing - KISS

11

Using node sizessizesource=1sizetarget=200maxNodeSize=02

usrsharemanman5launchdplist5ltxml version=10 encoding=UTF-8gtltDOCTYPE plist PUBLIC -Apple ComputerDTD PLIST 10EN httpwwwapplecomDTDsPropertyList-10dtdgtltplist version=10gtltdictgt ltkeygt_nameltkeygt ltdictgt ltkeygt_isColumnltkeygt ltstringgtYESltstringgt ltkeygt_isOutlineColumnltkeygt ltstringgtYESltstringgt ltkeygt_orderltkeygt ltstringgt0ltstringgt ltdictgt ltkeygtbsd_nameltkeygt ltdictgt ltkeygt_orderltkeygt ltstringgt62ltstringgt ltdictgt ltkeygtdetachable_driveltkeygt ltdictgt ltkeygt_orderltkeygt ltstringgt59ltstringgt ltdictgt ltkeygtdevice_manufacturerltkeygt ltdictgt ltkeygt_orderltkeygt ltstringgt41ltstringgt ltdictgt ltkeygtdevice_modelltkeygt ltdictgt ltkeygt_orderltkeygt ltstringgt42ltstringgt ltdictgt ltkeygtdevice_revisionltkeygt

The Failure - So What

12

The Right Thing - Help The User Along

13

bull Provide use-case aligned displaysbull Meaningful legendsbull Interactive explorationbull UI design that guides the user through tasksbull Do not overload displays

The Failure - Unnecessary Ink

14

The Right Thing - Apply Good Visualization Practices

15

bull Dont use graphics to decorate a few numbersbull Reduce data ink ratiobull Visualization principles

The 2nd Dichotomy

16

The 2nd Dichotomy

16

two worldsIndustry amp Academia

The 2nd Dichotomy

16

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The 2nd Dichotomy

16

bull donrsquot understand the real impact

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The 2nd Dichotomy

16

bull donrsquot understand the real impactbull get the 70 solution

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The 2nd Dichotomy

16

bull donrsquot understand the real impactbull get the 70 solutionbull donrsquot think big

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The 2nd Dichotomy

16

bull donrsquot understand the real impactbull get the 70 solutionbull donrsquot think bigbull no timemoney for real research

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The 2nd Dichotomy

16

bull donrsquot understand the real impactbull get the 70 solutionbull donrsquot think bigbull no timemoney for real researchbull canrsquot scale

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The 2nd Dichotomy

16

bull donrsquot understand the real impactbull get the 70 solutionbull donrsquot think bigbull no timemoney for real researchbull canrsquot scalebull work based off of a few

customerrsquos input

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The 2nd Dichotomy

16

bull donrsquot understand the real impactbull get the 70 solutionbull donrsquot think bigbull no timemoney for real researchbull canrsquot scalebull work based off of a few

customerrsquos input

bull donrsquot know whatrsquos been done in industry

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The 2nd Dichotomy

16

bull donrsquot understand the real impactbull get the 70 solutionbull donrsquot think bigbull no timemoney for real researchbull canrsquot scalebull work based off of a few

customerrsquos input

bull donrsquot know whatrsquos been done in industrybull donrsquot understand the use-cases

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The 2nd Dichotomy

16

bull donrsquot understand the real impactbull get the 70 solutionbull donrsquot think bigbull no timemoney for real researchbull canrsquot scalebull work based off of a few

customerrsquos input

bull donrsquot know whatrsquos been done in industrybull donrsquot understand the use-casesbull donrsquot understand the environments

data domain

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The 2nd Dichotomy

16

bull donrsquot understand the real impactbull get the 70 solutionbull donrsquot think bigbull no timemoney for real researchbull canrsquot scalebull work based off of a few

customerrsquos input

bull donrsquot know whatrsquos been done in industrybull donrsquot understand the use-casesbull donrsquot understand the environments

data domainbull work on simulated data

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The 2nd Dichotomy

16

bull donrsquot understand the real impactbull get the 70 solutionbull donrsquot think bigbull no timemoney for real researchbull canrsquot scalebull work based off of a few

customerrsquos input

bull donrsquot know whatrsquos been done in industrybull donrsquot understand the use-casesbull donrsquot understand the environments

data domainbull work on simulated databull construct their own problems

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The 2nd Dichotomy

16

bull donrsquot understand the real impactbull get the 70 solutionbull donrsquot think bigbull no timemoney for real researchbull canrsquot scalebull work based off of a few

customerrsquos input

bull donrsquot know whatrsquos been done in industrybull donrsquot understand the use-casesbull donrsquot understand the environments

data domainbull work on simulated databull construct their own problems bull use overly complicated impractical

solutions

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The 2nd Dichotomy

16

bull donrsquot understand the real impactbull get the 70 solutionbull donrsquot think bigbull no timemoney for real researchbull canrsquot scalebull work based off of a few

customerrsquos input

bull donrsquot know whatrsquos been done in industrybull donrsquot understand the use-casesbull donrsquot understand the environments

data domainbull work on simulated databull construct their own problems bull use overly complicated impractical

solutionsbull use graphs visualization where it is not

needed

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The Way Forward

17

bull Building a secviz disciplinebull Bridging the gapbull Learning the ldquootherrdquo discipline

Security Visualization

SecViz

bull More academia industry collaboration bull Build components widgets gadgetsbull (Re-)use existing technologiesbull Focus on strengthsbull Focus on the visualization and interaction aspects

Two disciplines

Two worlds

18

bull Use-case oriented visualizationbull Perimeter Threatbull Governance Risk Compliance (GRC)bull Insider Threat bull IT data visualizationbull SecVizOrgbull DAVIX

My Focus Areas

18

bull Use-case oriented visualizationbull Perimeter Threatbull Governance Risk Compliance (GRC)bull Insider Threat bull IT data visualizationbull SecVizOrgbull DAVIX

Insider Threat Visualizationbull Huge amounts of databull More and other data sources than for the traditional security use-cases- Insiders often have legitimate access to machines and data You need to log more than the

exceptions

- Insider crimes are often executed on the application layer

bull The questions are not known in advance - Visualization provokes questions and helps find answers

bull Dynamic nature of fraud- Problem for static algorithms

- Bandits quickly adapt to fixed threshold-based detection systems

bull Looking for any unusual patterns

19

20

20

SecViz - Security VisualizationThis is a place to share discuss challenge and learn about

security visualization

Data Analysis and Visualization Linuxdavixsecvizorg

D

V

X

bull Addressing the secviz dichotomy

bull Better industry - academia collaboration

bull More and better visualization tools

- Use-case driven product development

bull We need to solve the data semantics problem

- Common Event Expression

- Entity extraction

23

The Futurebull Addressing the secviz dichotomy

bull Better industry - academia collaboration

bull More and better visualization tools

- Use-case driven product development

bull We need to solve the data semantics problem

- Common Event Expression

- Entity extraction

23

Vielen Dank

S

E

C I

V

Z

raffael marty secviz org

Page 7: Security Research2.0 - FIT 2008

The 1st Dichotomy

5

The 1st Dichotomy

5

two domainsSecurity amp Visualization

The 1st Dichotomy

5

Security Visualization

The 1st Dichotomy

bull security databull networking protocolsbull routing protocols (the Internet)bull security impactbull security policybull jargonbull use-casesbull are the end-users

5

Security Visualization

The 1st Dichotomy

bull security databull networking protocolsbull routing protocols (the Internet)bull security impactbull security policybull jargonbull use-casesbull are the end-users

5

bull types of databull perceptionbull opticsbull color theorybull depth cue theorybull interaction theory bull types of graphsbull human computer interaction

Security Visualization

The Failure - New Graphs

6

The Right Thing - Reuse Graphs

7

The Failure - The Wrong Graph

8

The Right Thing - Adequate Graphs

9

The Right Thing - Adequate Graphs

9

The Failure - The Wrong Integration

10

bull Using proprietary data formatbull Provide parsers for various data formats

bull does not scalebull is probably buggy incomplete

bull Use wrong data access paradigm bull complex configuration

eg needs an SSH connection

usrsharemanman5launchdplist5ltxml version=10 encoding=UTF-8gtltDOCTYPE plist PUBLIC -Apple ComputerDTD PLIST 10EN httpwwwapplecomDTDsPropertyList-10dtdgtltplist version=10gtltdictgt ltkeygt_nameltkeygt ltdictgt ltkeygt_isColumnltkeygt ltstringgtYESltstringgt ltkeygt_isOutlineColumnltkeygt ltstringgtYESltstringgt ltkeygt_orderltkeygt ltstringgt0ltstringgt ltdictgt ltkeygtbsd_nameltkeygt ltdictgt ltkeygt_orderltkeygt ltstringgt62ltstringgt ltdictgt ltkeygtdetachable_driveltkeygt ltdictgt ltkeygt_orderltkeygt ltstringgt59ltstringgt ltdictgt ltkeygtdevice_manufacturerltkeygt ltdictgt ltkeygt_orderltkeygt ltstringgt41ltstringgt ltdictgt ltkeygtdevice_modelltkeygt ltdictgt ltkeygt_orderltkeygt ltstringgt42ltstringgt ltdictgt ltkeygtdevice_revisionltkeygt

bull Keep It Simple Stupidbull Use CSV inputbull Use files as inputbull Offload to other tools

bull parsersbull data conversions

The Right Thing - KISS

11

Using node sizessizesource=1sizetarget=200maxNodeSize=02

usrsharemanman5launchdplist5ltxml version=10 encoding=UTF-8gtltDOCTYPE plist PUBLIC -Apple ComputerDTD PLIST 10EN httpwwwapplecomDTDsPropertyList-10dtdgtltplist version=10gtltdictgt ltkeygt_nameltkeygt ltdictgt ltkeygt_isColumnltkeygt ltstringgtYESltstringgt ltkeygt_isOutlineColumnltkeygt ltstringgtYESltstringgt ltkeygt_orderltkeygt ltstringgt0ltstringgt ltdictgt ltkeygtbsd_nameltkeygt ltdictgt ltkeygt_orderltkeygt ltstringgt62ltstringgt ltdictgt ltkeygtdetachable_driveltkeygt ltdictgt ltkeygt_orderltkeygt ltstringgt59ltstringgt ltdictgt ltkeygtdevice_manufacturerltkeygt ltdictgt ltkeygt_orderltkeygt ltstringgt41ltstringgt ltdictgt ltkeygtdevice_modelltkeygt ltdictgt ltkeygt_orderltkeygt ltstringgt42ltstringgt ltdictgt ltkeygtdevice_revisionltkeygt

The Failure - So What

12

The Right Thing - Help The User Along

13

bull Provide use-case aligned displaysbull Meaningful legendsbull Interactive explorationbull UI design that guides the user through tasksbull Do not overload displays

The Failure - Unnecessary Ink

14

The Right Thing - Apply Good Visualization Practices

15

bull Dont use graphics to decorate a few numbersbull Reduce data ink ratiobull Visualization principles

The 2nd Dichotomy

16

The 2nd Dichotomy

16

two worldsIndustry amp Academia

The 2nd Dichotomy

16

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The 2nd Dichotomy

16

bull donrsquot understand the real impact

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The 2nd Dichotomy

16

bull donrsquot understand the real impactbull get the 70 solution

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The 2nd Dichotomy

16

bull donrsquot understand the real impactbull get the 70 solutionbull donrsquot think big

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The 2nd Dichotomy

16

bull donrsquot understand the real impactbull get the 70 solutionbull donrsquot think bigbull no timemoney for real research

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The 2nd Dichotomy

16

bull donrsquot understand the real impactbull get the 70 solutionbull donrsquot think bigbull no timemoney for real researchbull canrsquot scale

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The 2nd Dichotomy

16

bull donrsquot understand the real impactbull get the 70 solutionbull donrsquot think bigbull no timemoney for real researchbull canrsquot scalebull work based off of a few

customerrsquos input

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The 2nd Dichotomy

16

bull donrsquot understand the real impactbull get the 70 solutionbull donrsquot think bigbull no timemoney for real researchbull canrsquot scalebull work based off of a few

customerrsquos input

bull donrsquot know whatrsquos been done in industry

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The 2nd Dichotomy

16

bull donrsquot understand the real impactbull get the 70 solutionbull donrsquot think bigbull no timemoney for real researchbull canrsquot scalebull work based off of a few

customerrsquos input

bull donrsquot know whatrsquos been done in industrybull donrsquot understand the use-cases

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The 2nd Dichotomy

16

bull donrsquot understand the real impactbull get the 70 solutionbull donrsquot think bigbull no timemoney for real researchbull canrsquot scalebull work based off of a few

customerrsquos input

bull donrsquot know whatrsquos been done in industrybull donrsquot understand the use-casesbull donrsquot understand the environments

data domain

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The 2nd Dichotomy

16

bull donrsquot understand the real impactbull get the 70 solutionbull donrsquot think bigbull no timemoney for real researchbull canrsquot scalebull work based off of a few

customerrsquos input

bull donrsquot know whatrsquos been done in industrybull donrsquot understand the use-casesbull donrsquot understand the environments

data domainbull work on simulated data

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The 2nd Dichotomy

16

bull donrsquot understand the real impactbull get the 70 solutionbull donrsquot think bigbull no timemoney for real researchbull canrsquot scalebull work based off of a few

customerrsquos input

bull donrsquot know whatrsquos been done in industrybull donrsquot understand the use-casesbull donrsquot understand the environments

data domainbull work on simulated databull construct their own problems

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The 2nd Dichotomy

16

bull donrsquot understand the real impactbull get the 70 solutionbull donrsquot think bigbull no timemoney for real researchbull canrsquot scalebull work based off of a few

customerrsquos input

bull donrsquot know whatrsquos been done in industrybull donrsquot understand the use-casesbull donrsquot understand the environments

data domainbull work on simulated databull construct their own problems bull use overly complicated impractical

solutions

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The 2nd Dichotomy

16

bull donrsquot understand the real impactbull get the 70 solutionbull donrsquot think bigbull no timemoney for real researchbull canrsquot scalebull work based off of a few

customerrsquos input

bull donrsquot know whatrsquos been done in industrybull donrsquot understand the use-casesbull donrsquot understand the environments

data domainbull work on simulated databull construct their own problems bull use overly complicated impractical

solutionsbull use graphs visualization where it is not

needed

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The Way Forward

17

bull Building a secviz disciplinebull Bridging the gapbull Learning the ldquootherrdquo discipline

Security Visualization

SecViz

bull More academia industry collaboration bull Build components widgets gadgetsbull (Re-)use existing technologiesbull Focus on strengthsbull Focus on the visualization and interaction aspects

Two disciplines

Two worlds

18

bull Use-case oriented visualizationbull Perimeter Threatbull Governance Risk Compliance (GRC)bull Insider Threat bull IT data visualizationbull SecVizOrgbull DAVIX

My Focus Areas

18

bull Use-case oriented visualizationbull Perimeter Threatbull Governance Risk Compliance (GRC)bull Insider Threat bull IT data visualizationbull SecVizOrgbull DAVIX

Insider Threat Visualizationbull Huge amounts of databull More and other data sources than for the traditional security use-cases- Insiders often have legitimate access to machines and data You need to log more than the

exceptions

- Insider crimes are often executed on the application layer

bull The questions are not known in advance - Visualization provokes questions and helps find answers

bull Dynamic nature of fraud- Problem for static algorithms

- Bandits quickly adapt to fixed threshold-based detection systems

bull Looking for any unusual patterns

19

20

20

SecViz - Security VisualizationThis is a place to share discuss challenge and learn about

security visualization

Data Analysis and Visualization Linuxdavixsecvizorg

D

V

X

bull Addressing the secviz dichotomy

bull Better industry - academia collaboration

bull More and better visualization tools

- Use-case driven product development

bull We need to solve the data semantics problem

- Common Event Expression

- Entity extraction

23

The Futurebull Addressing the secviz dichotomy

bull Better industry - academia collaboration

bull More and better visualization tools

- Use-case driven product development

bull We need to solve the data semantics problem

- Common Event Expression

- Entity extraction

23

Vielen Dank

S

E

C I

V

Z

raffael marty secviz org

Page 8: Security Research2.0 - FIT 2008

The 1st Dichotomy

5

two domainsSecurity amp Visualization

The 1st Dichotomy

5

Security Visualization

The 1st Dichotomy

bull security databull networking protocolsbull routing protocols (the Internet)bull security impactbull security policybull jargonbull use-casesbull are the end-users

5

Security Visualization

The 1st Dichotomy

bull security databull networking protocolsbull routing protocols (the Internet)bull security impactbull security policybull jargonbull use-casesbull are the end-users

5

bull types of databull perceptionbull opticsbull color theorybull depth cue theorybull interaction theory bull types of graphsbull human computer interaction

Security Visualization

The Failure - New Graphs

6

The Right Thing - Reuse Graphs

7

The Failure - The Wrong Graph

8

The Right Thing - Adequate Graphs

9

The Right Thing - Adequate Graphs

9

The Failure - The Wrong Integration

10

bull Using proprietary data formatbull Provide parsers for various data formats

bull does not scalebull is probably buggy incomplete

bull Use wrong data access paradigm bull complex configuration

eg needs an SSH connection

usrsharemanman5launchdplist5ltxml version=10 encoding=UTF-8gtltDOCTYPE plist PUBLIC -Apple ComputerDTD PLIST 10EN httpwwwapplecomDTDsPropertyList-10dtdgtltplist version=10gtltdictgt ltkeygt_nameltkeygt ltdictgt ltkeygt_isColumnltkeygt ltstringgtYESltstringgt ltkeygt_isOutlineColumnltkeygt ltstringgtYESltstringgt ltkeygt_orderltkeygt ltstringgt0ltstringgt ltdictgt ltkeygtbsd_nameltkeygt ltdictgt ltkeygt_orderltkeygt ltstringgt62ltstringgt ltdictgt ltkeygtdetachable_driveltkeygt ltdictgt ltkeygt_orderltkeygt ltstringgt59ltstringgt ltdictgt ltkeygtdevice_manufacturerltkeygt ltdictgt ltkeygt_orderltkeygt ltstringgt41ltstringgt ltdictgt ltkeygtdevice_modelltkeygt ltdictgt ltkeygt_orderltkeygt ltstringgt42ltstringgt ltdictgt ltkeygtdevice_revisionltkeygt

bull Keep It Simple Stupidbull Use CSV inputbull Use files as inputbull Offload to other tools

bull parsersbull data conversions

The Right Thing - KISS

11

Using node sizessizesource=1sizetarget=200maxNodeSize=02

usrsharemanman5launchdplist5ltxml version=10 encoding=UTF-8gtltDOCTYPE plist PUBLIC -Apple ComputerDTD PLIST 10EN httpwwwapplecomDTDsPropertyList-10dtdgtltplist version=10gtltdictgt ltkeygt_nameltkeygt ltdictgt ltkeygt_isColumnltkeygt ltstringgtYESltstringgt ltkeygt_isOutlineColumnltkeygt ltstringgtYESltstringgt ltkeygt_orderltkeygt ltstringgt0ltstringgt ltdictgt ltkeygtbsd_nameltkeygt ltdictgt ltkeygt_orderltkeygt ltstringgt62ltstringgt ltdictgt ltkeygtdetachable_driveltkeygt ltdictgt ltkeygt_orderltkeygt ltstringgt59ltstringgt ltdictgt ltkeygtdevice_manufacturerltkeygt ltdictgt ltkeygt_orderltkeygt ltstringgt41ltstringgt ltdictgt ltkeygtdevice_modelltkeygt ltdictgt ltkeygt_orderltkeygt ltstringgt42ltstringgt ltdictgt ltkeygtdevice_revisionltkeygt

The Failure - So What

12

The Right Thing - Help The User Along

13

bull Provide use-case aligned displaysbull Meaningful legendsbull Interactive explorationbull UI design that guides the user through tasksbull Do not overload displays

The Failure - Unnecessary Ink

14

The Right Thing - Apply Good Visualization Practices

15

bull Dont use graphics to decorate a few numbersbull Reduce data ink ratiobull Visualization principles

The 2nd Dichotomy

16

The 2nd Dichotomy

16

two worldsIndustry amp Academia

The 2nd Dichotomy

16

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The 2nd Dichotomy

16

bull donrsquot understand the real impact

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The 2nd Dichotomy

16

bull donrsquot understand the real impactbull get the 70 solution

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The 2nd Dichotomy

16

bull donrsquot understand the real impactbull get the 70 solutionbull donrsquot think big

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The 2nd Dichotomy

16

bull donrsquot understand the real impactbull get the 70 solutionbull donrsquot think bigbull no timemoney for real research

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The 2nd Dichotomy

16

bull donrsquot understand the real impactbull get the 70 solutionbull donrsquot think bigbull no timemoney for real researchbull canrsquot scale

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The 2nd Dichotomy

16

bull donrsquot understand the real impactbull get the 70 solutionbull donrsquot think bigbull no timemoney for real researchbull canrsquot scalebull work based off of a few

customerrsquos input

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The 2nd Dichotomy

16

bull donrsquot understand the real impactbull get the 70 solutionbull donrsquot think bigbull no timemoney for real researchbull canrsquot scalebull work based off of a few

customerrsquos input

bull donrsquot know whatrsquos been done in industry

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The 2nd Dichotomy

16

bull donrsquot understand the real impactbull get the 70 solutionbull donrsquot think bigbull no timemoney for real researchbull canrsquot scalebull work based off of a few

customerrsquos input

bull donrsquot know whatrsquos been done in industrybull donrsquot understand the use-cases

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The 2nd Dichotomy

16

bull donrsquot understand the real impactbull get the 70 solutionbull donrsquot think bigbull no timemoney for real researchbull canrsquot scalebull work based off of a few

customerrsquos input

bull donrsquot know whatrsquos been done in industrybull donrsquot understand the use-casesbull donrsquot understand the environments

data domain

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The 2nd Dichotomy

16

bull donrsquot understand the real impactbull get the 70 solutionbull donrsquot think bigbull no timemoney for real researchbull canrsquot scalebull work based off of a few

customerrsquos input

bull donrsquot know whatrsquos been done in industrybull donrsquot understand the use-casesbull donrsquot understand the environments

data domainbull work on simulated data

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The 2nd Dichotomy

16

bull donrsquot understand the real impactbull get the 70 solutionbull donrsquot think bigbull no timemoney for real researchbull canrsquot scalebull work based off of a few

customerrsquos input

bull donrsquot know whatrsquos been done in industrybull donrsquot understand the use-casesbull donrsquot understand the environments

data domainbull work on simulated databull construct their own problems

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The 2nd Dichotomy

16

bull donrsquot understand the real impactbull get the 70 solutionbull donrsquot think bigbull no timemoney for real researchbull canrsquot scalebull work based off of a few

customerrsquos input

bull donrsquot know whatrsquos been done in industrybull donrsquot understand the use-casesbull donrsquot understand the environments

data domainbull work on simulated databull construct their own problems bull use overly complicated impractical

solutions

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The 2nd Dichotomy

16

bull donrsquot understand the real impactbull get the 70 solutionbull donrsquot think bigbull no timemoney for real researchbull canrsquot scalebull work based off of a few

customerrsquos input

bull donrsquot know whatrsquos been done in industrybull donrsquot understand the use-casesbull donrsquot understand the environments

data domainbull work on simulated databull construct their own problems bull use overly complicated impractical

solutionsbull use graphs visualization where it is not

needed

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The Way Forward

17

bull Building a secviz disciplinebull Bridging the gapbull Learning the ldquootherrdquo discipline

Security Visualization

SecViz

bull More academia industry collaboration bull Build components widgets gadgetsbull (Re-)use existing technologiesbull Focus on strengthsbull Focus on the visualization and interaction aspects

Two disciplines

Two worlds

18

bull Use-case oriented visualizationbull Perimeter Threatbull Governance Risk Compliance (GRC)bull Insider Threat bull IT data visualizationbull SecVizOrgbull DAVIX

My Focus Areas

18

bull Use-case oriented visualizationbull Perimeter Threatbull Governance Risk Compliance (GRC)bull Insider Threat bull IT data visualizationbull SecVizOrgbull DAVIX

Insider Threat Visualizationbull Huge amounts of databull More and other data sources than for the traditional security use-cases- Insiders often have legitimate access to machines and data You need to log more than the

exceptions

- Insider crimes are often executed on the application layer

bull The questions are not known in advance - Visualization provokes questions and helps find answers

bull Dynamic nature of fraud- Problem for static algorithms

- Bandits quickly adapt to fixed threshold-based detection systems

bull Looking for any unusual patterns

19

20

20

SecViz - Security VisualizationThis is a place to share discuss challenge and learn about

security visualization

Data Analysis and Visualization Linuxdavixsecvizorg

D

V

X

bull Addressing the secviz dichotomy

bull Better industry - academia collaboration

bull More and better visualization tools

- Use-case driven product development

bull We need to solve the data semantics problem

- Common Event Expression

- Entity extraction

23

The Futurebull Addressing the secviz dichotomy

bull Better industry - academia collaboration

bull More and better visualization tools

- Use-case driven product development

bull We need to solve the data semantics problem

- Common Event Expression

- Entity extraction

23

Vielen Dank

S

E

C I

V

Z

raffael marty secviz org

Page 9: Security Research2.0 - FIT 2008

The 1st Dichotomy

5

Security Visualization

The 1st Dichotomy

bull security databull networking protocolsbull routing protocols (the Internet)bull security impactbull security policybull jargonbull use-casesbull are the end-users

5

Security Visualization

The 1st Dichotomy

bull security databull networking protocolsbull routing protocols (the Internet)bull security impactbull security policybull jargonbull use-casesbull are the end-users

5

bull types of databull perceptionbull opticsbull color theorybull depth cue theorybull interaction theory bull types of graphsbull human computer interaction

Security Visualization

The Failure - New Graphs

6

The Right Thing - Reuse Graphs

7

The Failure - The Wrong Graph

8

The Right Thing - Adequate Graphs

9

The Right Thing - Adequate Graphs

9

The Failure - The Wrong Integration

10

bull Using proprietary data formatbull Provide parsers for various data formats

bull does not scalebull is probably buggy incomplete

bull Use wrong data access paradigm bull complex configuration

eg needs an SSH connection

usrsharemanman5launchdplist5ltxml version=10 encoding=UTF-8gtltDOCTYPE plist PUBLIC -Apple ComputerDTD PLIST 10EN httpwwwapplecomDTDsPropertyList-10dtdgtltplist version=10gtltdictgt ltkeygt_nameltkeygt ltdictgt ltkeygt_isColumnltkeygt ltstringgtYESltstringgt ltkeygt_isOutlineColumnltkeygt ltstringgtYESltstringgt ltkeygt_orderltkeygt ltstringgt0ltstringgt ltdictgt ltkeygtbsd_nameltkeygt ltdictgt ltkeygt_orderltkeygt ltstringgt62ltstringgt ltdictgt ltkeygtdetachable_driveltkeygt ltdictgt ltkeygt_orderltkeygt ltstringgt59ltstringgt ltdictgt ltkeygtdevice_manufacturerltkeygt ltdictgt ltkeygt_orderltkeygt ltstringgt41ltstringgt ltdictgt ltkeygtdevice_modelltkeygt ltdictgt ltkeygt_orderltkeygt ltstringgt42ltstringgt ltdictgt ltkeygtdevice_revisionltkeygt

bull Keep It Simple Stupidbull Use CSV inputbull Use files as inputbull Offload to other tools

bull parsersbull data conversions

The Right Thing - KISS

11

Using node sizessizesource=1sizetarget=200maxNodeSize=02

usrsharemanman5launchdplist5ltxml version=10 encoding=UTF-8gtltDOCTYPE plist PUBLIC -Apple ComputerDTD PLIST 10EN httpwwwapplecomDTDsPropertyList-10dtdgtltplist version=10gtltdictgt ltkeygt_nameltkeygt ltdictgt ltkeygt_isColumnltkeygt ltstringgtYESltstringgt ltkeygt_isOutlineColumnltkeygt ltstringgtYESltstringgt ltkeygt_orderltkeygt ltstringgt0ltstringgt ltdictgt ltkeygtbsd_nameltkeygt ltdictgt ltkeygt_orderltkeygt ltstringgt62ltstringgt ltdictgt ltkeygtdetachable_driveltkeygt ltdictgt ltkeygt_orderltkeygt ltstringgt59ltstringgt ltdictgt ltkeygtdevice_manufacturerltkeygt ltdictgt ltkeygt_orderltkeygt ltstringgt41ltstringgt ltdictgt ltkeygtdevice_modelltkeygt ltdictgt ltkeygt_orderltkeygt ltstringgt42ltstringgt ltdictgt ltkeygtdevice_revisionltkeygt

The Failure - So What

12

The Right Thing - Help The User Along

13

bull Provide use-case aligned displaysbull Meaningful legendsbull Interactive explorationbull UI design that guides the user through tasksbull Do not overload displays

The Failure - Unnecessary Ink

14

The Right Thing - Apply Good Visualization Practices

15

bull Dont use graphics to decorate a few numbersbull Reduce data ink ratiobull Visualization principles

The 2nd Dichotomy

16

The 2nd Dichotomy

16

two worldsIndustry amp Academia

The 2nd Dichotomy

16

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The 2nd Dichotomy

16

bull donrsquot understand the real impact

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The 2nd Dichotomy

16

bull donrsquot understand the real impactbull get the 70 solution

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The 2nd Dichotomy

16

bull donrsquot understand the real impactbull get the 70 solutionbull donrsquot think big

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The 2nd Dichotomy

16

bull donrsquot understand the real impactbull get the 70 solutionbull donrsquot think bigbull no timemoney for real research

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The 2nd Dichotomy

16

bull donrsquot understand the real impactbull get the 70 solutionbull donrsquot think bigbull no timemoney for real researchbull canrsquot scale

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The 2nd Dichotomy

16

bull donrsquot understand the real impactbull get the 70 solutionbull donrsquot think bigbull no timemoney for real researchbull canrsquot scalebull work based off of a few

customerrsquos input

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The 2nd Dichotomy

16

bull donrsquot understand the real impactbull get the 70 solutionbull donrsquot think bigbull no timemoney for real researchbull canrsquot scalebull work based off of a few

customerrsquos input

bull donrsquot know whatrsquos been done in industry

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The 2nd Dichotomy

16

bull donrsquot understand the real impactbull get the 70 solutionbull donrsquot think bigbull no timemoney for real researchbull canrsquot scalebull work based off of a few

customerrsquos input

bull donrsquot know whatrsquos been done in industrybull donrsquot understand the use-cases

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The 2nd Dichotomy

16

bull donrsquot understand the real impactbull get the 70 solutionbull donrsquot think bigbull no timemoney for real researchbull canrsquot scalebull work based off of a few

customerrsquos input

bull donrsquot know whatrsquos been done in industrybull donrsquot understand the use-casesbull donrsquot understand the environments

data domain

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The 2nd Dichotomy

16

bull donrsquot understand the real impactbull get the 70 solutionbull donrsquot think bigbull no timemoney for real researchbull canrsquot scalebull work based off of a few

customerrsquos input

bull donrsquot know whatrsquos been done in industrybull donrsquot understand the use-casesbull donrsquot understand the environments

data domainbull work on simulated data

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The 2nd Dichotomy

16

bull donrsquot understand the real impactbull get the 70 solutionbull donrsquot think bigbull no timemoney for real researchbull canrsquot scalebull work based off of a few

customerrsquos input

bull donrsquot know whatrsquos been done in industrybull donrsquot understand the use-casesbull donrsquot understand the environments

data domainbull work on simulated databull construct their own problems

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The 2nd Dichotomy

16

bull donrsquot understand the real impactbull get the 70 solutionbull donrsquot think bigbull no timemoney for real researchbull canrsquot scalebull work based off of a few

customerrsquos input

bull donrsquot know whatrsquos been done in industrybull donrsquot understand the use-casesbull donrsquot understand the environments

data domainbull work on simulated databull construct their own problems bull use overly complicated impractical

solutions

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The 2nd Dichotomy

16

bull donrsquot understand the real impactbull get the 70 solutionbull donrsquot think bigbull no timemoney for real researchbull canrsquot scalebull work based off of a few

customerrsquos input

bull donrsquot know whatrsquos been done in industrybull donrsquot understand the use-casesbull donrsquot understand the environments

data domainbull work on simulated databull construct their own problems bull use overly complicated impractical

solutionsbull use graphs visualization where it is not

needed

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The Way Forward

17

bull Building a secviz disciplinebull Bridging the gapbull Learning the ldquootherrdquo discipline

Security Visualization

SecViz

bull More academia industry collaboration bull Build components widgets gadgetsbull (Re-)use existing technologiesbull Focus on strengthsbull Focus on the visualization and interaction aspects

Two disciplines

Two worlds

18

bull Use-case oriented visualizationbull Perimeter Threatbull Governance Risk Compliance (GRC)bull Insider Threat bull IT data visualizationbull SecVizOrgbull DAVIX

My Focus Areas

18

bull Use-case oriented visualizationbull Perimeter Threatbull Governance Risk Compliance (GRC)bull Insider Threat bull IT data visualizationbull SecVizOrgbull DAVIX

Insider Threat Visualizationbull Huge amounts of databull More and other data sources than for the traditional security use-cases- Insiders often have legitimate access to machines and data You need to log more than the

exceptions

- Insider crimes are often executed on the application layer

bull The questions are not known in advance - Visualization provokes questions and helps find answers

bull Dynamic nature of fraud- Problem for static algorithms

- Bandits quickly adapt to fixed threshold-based detection systems

bull Looking for any unusual patterns

19

20

20

SecViz - Security VisualizationThis is a place to share discuss challenge and learn about

security visualization

Data Analysis and Visualization Linuxdavixsecvizorg

D

V

X

bull Addressing the secviz dichotomy

bull Better industry - academia collaboration

bull More and better visualization tools

- Use-case driven product development

bull We need to solve the data semantics problem

- Common Event Expression

- Entity extraction

23

The Futurebull Addressing the secviz dichotomy

bull Better industry - academia collaboration

bull More and better visualization tools

- Use-case driven product development

bull We need to solve the data semantics problem

- Common Event Expression

- Entity extraction

23

Vielen Dank

S

E

C I

V

Z

raffael marty secviz org

Page 10: Security Research2.0 - FIT 2008

The 1st Dichotomy

bull security databull networking protocolsbull routing protocols (the Internet)bull security impactbull security policybull jargonbull use-casesbull are the end-users

5

Security Visualization

The 1st Dichotomy

bull security databull networking protocolsbull routing protocols (the Internet)bull security impactbull security policybull jargonbull use-casesbull are the end-users

5

bull types of databull perceptionbull opticsbull color theorybull depth cue theorybull interaction theory bull types of graphsbull human computer interaction

Security Visualization

The Failure - New Graphs

6

The Right Thing - Reuse Graphs

7

The Failure - The Wrong Graph

8

The Right Thing - Adequate Graphs

9

The Right Thing - Adequate Graphs

9

The Failure - The Wrong Integration

10

bull Using proprietary data formatbull Provide parsers for various data formats

bull does not scalebull is probably buggy incomplete

bull Use wrong data access paradigm bull complex configuration

eg needs an SSH connection

usrsharemanman5launchdplist5ltxml version=10 encoding=UTF-8gtltDOCTYPE plist PUBLIC -Apple ComputerDTD PLIST 10EN httpwwwapplecomDTDsPropertyList-10dtdgtltplist version=10gtltdictgt ltkeygt_nameltkeygt ltdictgt ltkeygt_isColumnltkeygt ltstringgtYESltstringgt ltkeygt_isOutlineColumnltkeygt ltstringgtYESltstringgt ltkeygt_orderltkeygt ltstringgt0ltstringgt ltdictgt ltkeygtbsd_nameltkeygt ltdictgt ltkeygt_orderltkeygt ltstringgt62ltstringgt ltdictgt ltkeygtdetachable_driveltkeygt ltdictgt ltkeygt_orderltkeygt ltstringgt59ltstringgt ltdictgt ltkeygtdevice_manufacturerltkeygt ltdictgt ltkeygt_orderltkeygt ltstringgt41ltstringgt ltdictgt ltkeygtdevice_modelltkeygt ltdictgt ltkeygt_orderltkeygt ltstringgt42ltstringgt ltdictgt ltkeygtdevice_revisionltkeygt

bull Keep It Simple Stupidbull Use CSV inputbull Use files as inputbull Offload to other tools

bull parsersbull data conversions

The Right Thing - KISS

11

Using node sizessizesource=1sizetarget=200maxNodeSize=02

usrsharemanman5launchdplist5ltxml version=10 encoding=UTF-8gtltDOCTYPE plist PUBLIC -Apple ComputerDTD PLIST 10EN httpwwwapplecomDTDsPropertyList-10dtdgtltplist version=10gtltdictgt ltkeygt_nameltkeygt ltdictgt ltkeygt_isColumnltkeygt ltstringgtYESltstringgt ltkeygt_isOutlineColumnltkeygt ltstringgtYESltstringgt ltkeygt_orderltkeygt ltstringgt0ltstringgt ltdictgt ltkeygtbsd_nameltkeygt ltdictgt ltkeygt_orderltkeygt ltstringgt62ltstringgt ltdictgt ltkeygtdetachable_driveltkeygt ltdictgt ltkeygt_orderltkeygt ltstringgt59ltstringgt ltdictgt ltkeygtdevice_manufacturerltkeygt ltdictgt ltkeygt_orderltkeygt ltstringgt41ltstringgt ltdictgt ltkeygtdevice_modelltkeygt ltdictgt ltkeygt_orderltkeygt ltstringgt42ltstringgt ltdictgt ltkeygtdevice_revisionltkeygt

The Failure - So What

12

The Right Thing - Help The User Along

13

bull Provide use-case aligned displaysbull Meaningful legendsbull Interactive explorationbull UI design that guides the user through tasksbull Do not overload displays

The Failure - Unnecessary Ink

14

The Right Thing - Apply Good Visualization Practices

15

bull Dont use graphics to decorate a few numbersbull Reduce data ink ratiobull Visualization principles

The 2nd Dichotomy

16

The 2nd Dichotomy

16

two worldsIndustry amp Academia

The 2nd Dichotomy

16

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The 2nd Dichotomy

16

bull donrsquot understand the real impact

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The 2nd Dichotomy

16

bull donrsquot understand the real impactbull get the 70 solution

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The 2nd Dichotomy

16

bull donrsquot understand the real impactbull get the 70 solutionbull donrsquot think big

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The 2nd Dichotomy

16

bull donrsquot understand the real impactbull get the 70 solutionbull donrsquot think bigbull no timemoney for real research

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The 2nd Dichotomy

16

bull donrsquot understand the real impactbull get the 70 solutionbull donrsquot think bigbull no timemoney for real researchbull canrsquot scale

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The 2nd Dichotomy

16

bull donrsquot understand the real impactbull get the 70 solutionbull donrsquot think bigbull no timemoney for real researchbull canrsquot scalebull work based off of a few

customerrsquos input

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The 2nd Dichotomy

16

bull donrsquot understand the real impactbull get the 70 solutionbull donrsquot think bigbull no timemoney for real researchbull canrsquot scalebull work based off of a few

customerrsquos input

bull donrsquot know whatrsquos been done in industry

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The 2nd Dichotomy

16

bull donrsquot understand the real impactbull get the 70 solutionbull donrsquot think bigbull no timemoney for real researchbull canrsquot scalebull work based off of a few

customerrsquos input

bull donrsquot know whatrsquos been done in industrybull donrsquot understand the use-cases

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The 2nd Dichotomy

16

bull donrsquot understand the real impactbull get the 70 solutionbull donrsquot think bigbull no timemoney for real researchbull canrsquot scalebull work based off of a few

customerrsquos input

bull donrsquot know whatrsquos been done in industrybull donrsquot understand the use-casesbull donrsquot understand the environments

data domain

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The 2nd Dichotomy

16

bull donrsquot understand the real impactbull get the 70 solutionbull donrsquot think bigbull no timemoney for real researchbull canrsquot scalebull work based off of a few

customerrsquos input

bull donrsquot know whatrsquos been done in industrybull donrsquot understand the use-casesbull donrsquot understand the environments

data domainbull work on simulated data

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The 2nd Dichotomy

16

bull donrsquot understand the real impactbull get the 70 solutionbull donrsquot think bigbull no timemoney for real researchbull canrsquot scalebull work based off of a few

customerrsquos input

bull donrsquot know whatrsquos been done in industrybull donrsquot understand the use-casesbull donrsquot understand the environments

data domainbull work on simulated databull construct their own problems

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The 2nd Dichotomy

16

bull donrsquot understand the real impactbull get the 70 solutionbull donrsquot think bigbull no timemoney for real researchbull canrsquot scalebull work based off of a few

customerrsquos input

bull donrsquot know whatrsquos been done in industrybull donrsquot understand the use-casesbull donrsquot understand the environments

data domainbull work on simulated databull construct their own problems bull use overly complicated impractical

solutions

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The 2nd Dichotomy

16

bull donrsquot understand the real impactbull get the 70 solutionbull donrsquot think bigbull no timemoney for real researchbull canrsquot scalebull work based off of a few

customerrsquos input

bull donrsquot know whatrsquos been done in industrybull donrsquot understand the use-casesbull donrsquot understand the environments

data domainbull work on simulated databull construct their own problems bull use overly complicated impractical

solutionsbull use graphs visualization where it is not

needed

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The Way Forward

17

bull Building a secviz disciplinebull Bridging the gapbull Learning the ldquootherrdquo discipline

Security Visualization

SecViz

bull More academia industry collaboration bull Build components widgets gadgetsbull (Re-)use existing technologiesbull Focus on strengthsbull Focus on the visualization and interaction aspects

Two disciplines

Two worlds

18

bull Use-case oriented visualizationbull Perimeter Threatbull Governance Risk Compliance (GRC)bull Insider Threat bull IT data visualizationbull SecVizOrgbull DAVIX

My Focus Areas

18

bull Use-case oriented visualizationbull Perimeter Threatbull Governance Risk Compliance (GRC)bull Insider Threat bull IT data visualizationbull SecVizOrgbull DAVIX

Insider Threat Visualizationbull Huge amounts of databull More and other data sources than for the traditional security use-cases- Insiders often have legitimate access to machines and data You need to log more than the

exceptions

- Insider crimes are often executed on the application layer

bull The questions are not known in advance - Visualization provokes questions and helps find answers

bull Dynamic nature of fraud- Problem for static algorithms

- Bandits quickly adapt to fixed threshold-based detection systems

bull Looking for any unusual patterns

19

20

20

SecViz - Security VisualizationThis is a place to share discuss challenge and learn about

security visualization

Data Analysis and Visualization Linuxdavixsecvizorg

D

V

X

bull Addressing the secviz dichotomy

bull Better industry - academia collaboration

bull More and better visualization tools

- Use-case driven product development

bull We need to solve the data semantics problem

- Common Event Expression

- Entity extraction

23

The Futurebull Addressing the secviz dichotomy

bull Better industry - academia collaboration

bull More and better visualization tools

- Use-case driven product development

bull We need to solve the data semantics problem

- Common Event Expression

- Entity extraction

23

Vielen Dank

S

E

C I

V

Z

raffael marty secviz org

Page 11: Security Research2.0 - FIT 2008

The 1st Dichotomy

bull security databull networking protocolsbull routing protocols (the Internet)bull security impactbull security policybull jargonbull use-casesbull are the end-users

5

bull types of databull perceptionbull opticsbull color theorybull depth cue theorybull interaction theory bull types of graphsbull human computer interaction

Security Visualization

The Failure - New Graphs

6

The Right Thing - Reuse Graphs

7

The Failure - The Wrong Graph

8

The Right Thing - Adequate Graphs

9

The Right Thing - Adequate Graphs

9

The Failure - The Wrong Integration

10

bull Using proprietary data formatbull Provide parsers for various data formats

bull does not scalebull is probably buggy incomplete

bull Use wrong data access paradigm bull complex configuration

eg needs an SSH connection

usrsharemanman5launchdplist5ltxml version=10 encoding=UTF-8gtltDOCTYPE plist PUBLIC -Apple ComputerDTD PLIST 10EN httpwwwapplecomDTDsPropertyList-10dtdgtltplist version=10gtltdictgt ltkeygt_nameltkeygt ltdictgt ltkeygt_isColumnltkeygt ltstringgtYESltstringgt ltkeygt_isOutlineColumnltkeygt ltstringgtYESltstringgt ltkeygt_orderltkeygt ltstringgt0ltstringgt ltdictgt ltkeygtbsd_nameltkeygt ltdictgt ltkeygt_orderltkeygt ltstringgt62ltstringgt ltdictgt ltkeygtdetachable_driveltkeygt ltdictgt ltkeygt_orderltkeygt ltstringgt59ltstringgt ltdictgt ltkeygtdevice_manufacturerltkeygt ltdictgt ltkeygt_orderltkeygt ltstringgt41ltstringgt ltdictgt ltkeygtdevice_modelltkeygt ltdictgt ltkeygt_orderltkeygt ltstringgt42ltstringgt ltdictgt ltkeygtdevice_revisionltkeygt

bull Keep It Simple Stupidbull Use CSV inputbull Use files as inputbull Offload to other tools

bull parsersbull data conversions

The Right Thing - KISS

11

Using node sizessizesource=1sizetarget=200maxNodeSize=02

usrsharemanman5launchdplist5ltxml version=10 encoding=UTF-8gtltDOCTYPE plist PUBLIC -Apple ComputerDTD PLIST 10EN httpwwwapplecomDTDsPropertyList-10dtdgtltplist version=10gtltdictgt ltkeygt_nameltkeygt ltdictgt ltkeygt_isColumnltkeygt ltstringgtYESltstringgt ltkeygt_isOutlineColumnltkeygt ltstringgtYESltstringgt ltkeygt_orderltkeygt ltstringgt0ltstringgt ltdictgt ltkeygtbsd_nameltkeygt ltdictgt ltkeygt_orderltkeygt ltstringgt62ltstringgt ltdictgt ltkeygtdetachable_driveltkeygt ltdictgt ltkeygt_orderltkeygt ltstringgt59ltstringgt ltdictgt ltkeygtdevice_manufacturerltkeygt ltdictgt ltkeygt_orderltkeygt ltstringgt41ltstringgt ltdictgt ltkeygtdevice_modelltkeygt ltdictgt ltkeygt_orderltkeygt ltstringgt42ltstringgt ltdictgt ltkeygtdevice_revisionltkeygt

The Failure - So What

12

The Right Thing - Help The User Along

13

bull Provide use-case aligned displaysbull Meaningful legendsbull Interactive explorationbull UI design that guides the user through tasksbull Do not overload displays

The Failure - Unnecessary Ink

14

The Right Thing - Apply Good Visualization Practices

15

bull Dont use graphics to decorate a few numbersbull Reduce data ink ratiobull Visualization principles

The 2nd Dichotomy

16

The 2nd Dichotomy

16

two worldsIndustry amp Academia

The 2nd Dichotomy

16

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The 2nd Dichotomy

16

bull donrsquot understand the real impact

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The 2nd Dichotomy

16

bull donrsquot understand the real impactbull get the 70 solution

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The 2nd Dichotomy

16

bull donrsquot understand the real impactbull get the 70 solutionbull donrsquot think big

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The 2nd Dichotomy

16

bull donrsquot understand the real impactbull get the 70 solutionbull donrsquot think bigbull no timemoney for real research

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The 2nd Dichotomy

16

bull donrsquot understand the real impactbull get the 70 solutionbull donrsquot think bigbull no timemoney for real researchbull canrsquot scale

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The 2nd Dichotomy

16

bull donrsquot understand the real impactbull get the 70 solutionbull donrsquot think bigbull no timemoney for real researchbull canrsquot scalebull work based off of a few

customerrsquos input

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The 2nd Dichotomy

16

bull donrsquot understand the real impactbull get the 70 solutionbull donrsquot think bigbull no timemoney for real researchbull canrsquot scalebull work based off of a few

customerrsquos input

bull donrsquot know whatrsquos been done in industry

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The 2nd Dichotomy

16

bull donrsquot understand the real impactbull get the 70 solutionbull donrsquot think bigbull no timemoney for real researchbull canrsquot scalebull work based off of a few

customerrsquos input

bull donrsquot know whatrsquos been done in industrybull donrsquot understand the use-cases

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The 2nd Dichotomy

16

bull donrsquot understand the real impactbull get the 70 solutionbull donrsquot think bigbull no timemoney for real researchbull canrsquot scalebull work based off of a few

customerrsquos input

bull donrsquot know whatrsquos been done in industrybull donrsquot understand the use-casesbull donrsquot understand the environments

data domain

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The 2nd Dichotomy

16

bull donrsquot understand the real impactbull get the 70 solutionbull donrsquot think bigbull no timemoney for real researchbull canrsquot scalebull work based off of a few

customerrsquos input

bull donrsquot know whatrsquos been done in industrybull donrsquot understand the use-casesbull donrsquot understand the environments

data domainbull work on simulated data

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The 2nd Dichotomy

16

bull donrsquot understand the real impactbull get the 70 solutionbull donrsquot think bigbull no timemoney for real researchbull canrsquot scalebull work based off of a few

customerrsquos input

bull donrsquot know whatrsquos been done in industrybull donrsquot understand the use-casesbull donrsquot understand the environments

data domainbull work on simulated databull construct their own problems

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The 2nd Dichotomy

16

bull donrsquot understand the real impactbull get the 70 solutionbull donrsquot think bigbull no timemoney for real researchbull canrsquot scalebull work based off of a few

customerrsquos input

bull donrsquot know whatrsquos been done in industrybull donrsquot understand the use-casesbull donrsquot understand the environments

data domainbull work on simulated databull construct their own problems bull use overly complicated impractical

solutions

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The 2nd Dichotomy

16

bull donrsquot understand the real impactbull get the 70 solutionbull donrsquot think bigbull no timemoney for real researchbull canrsquot scalebull work based off of a few

customerrsquos input

bull donrsquot know whatrsquos been done in industrybull donrsquot understand the use-casesbull donrsquot understand the environments

data domainbull work on simulated databull construct their own problems bull use overly complicated impractical

solutionsbull use graphs visualization where it is not

needed

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The Way Forward

17

bull Building a secviz disciplinebull Bridging the gapbull Learning the ldquootherrdquo discipline

Security Visualization

SecViz

bull More academia industry collaboration bull Build components widgets gadgetsbull (Re-)use existing technologiesbull Focus on strengthsbull Focus on the visualization and interaction aspects

Two disciplines

Two worlds

18

bull Use-case oriented visualizationbull Perimeter Threatbull Governance Risk Compliance (GRC)bull Insider Threat bull IT data visualizationbull SecVizOrgbull DAVIX

My Focus Areas

18

bull Use-case oriented visualizationbull Perimeter Threatbull Governance Risk Compliance (GRC)bull Insider Threat bull IT data visualizationbull SecVizOrgbull DAVIX

Insider Threat Visualizationbull Huge amounts of databull More and other data sources than for the traditional security use-cases- Insiders often have legitimate access to machines and data You need to log more than the

exceptions

- Insider crimes are often executed on the application layer

bull The questions are not known in advance - Visualization provokes questions and helps find answers

bull Dynamic nature of fraud- Problem for static algorithms

- Bandits quickly adapt to fixed threshold-based detection systems

bull Looking for any unusual patterns

19

20

20

SecViz - Security VisualizationThis is a place to share discuss challenge and learn about

security visualization

Data Analysis and Visualization Linuxdavixsecvizorg

D

V

X

bull Addressing the secviz dichotomy

bull Better industry - academia collaboration

bull More and better visualization tools

- Use-case driven product development

bull We need to solve the data semantics problem

- Common Event Expression

- Entity extraction

23

The Futurebull Addressing the secviz dichotomy

bull Better industry - academia collaboration

bull More and better visualization tools

- Use-case driven product development

bull We need to solve the data semantics problem

- Common Event Expression

- Entity extraction

23

Vielen Dank

S

E

C I

V

Z

raffael marty secviz org

Page 12: Security Research2.0 - FIT 2008

The Failure - New Graphs

6

The Right Thing - Reuse Graphs

7

The Failure - The Wrong Graph

8

The Right Thing - Adequate Graphs

9

The Right Thing - Adequate Graphs

9

The Failure - The Wrong Integration

10

bull Using proprietary data formatbull Provide parsers for various data formats

bull does not scalebull is probably buggy incomplete

bull Use wrong data access paradigm bull complex configuration

eg needs an SSH connection

usrsharemanman5launchdplist5ltxml version=10 encoding=UTF-8gtltDOCTYPE plist PUBLIC -Apple ComputerDTD PLIST 10EN httpwwwapplecomDTDsPropertyList-10dtdgtltplist version=10gtltdictgt ltkeygt_nameltkeygt ltdictgt ltkeygt_isColumnltkeygt ltstringgtYESltstringgt ltkeygt_isOutlineColumnltkeygt ltstringgtYESltstringgt ltkeygt_orderltkeygt ltstringgt0ltstringgt ltdictgt ltkeygtbsd_nameltkeygt ltdictgt ltkeygt_orderltkeygt ltstringgt62ltstringgt ltdictgt ltkeygtdetachable_driveltkeygt ltdictgt ltkeygt_orderltkeygt ltstringgt59ltstringgt ltdictgt ltkeygtdevice_manufacturerltkeygt ltdictgt ltkeygt_orderltkeygt ltstringgt41ltstringgt ltdictgt ltkeygtdevice_modelltkeygt ltdictgt ltkeygt_orderltkeygt ltstringgt42ltstringgt ltdictgt ltkeygtdevice_revisionltkeygt

bull Keep It Simple Stupidbull Use CSV inputbull Use files as inputbull Offload to other tools

bull parsersbull data conversions

The Right Thing - KISS

11

Using node sizessizesource=1sizetarget=200maxNodeSize=02

usrsharemanman5launchdplist5ltxml version=10 encoding=UTF-8gtltDOCTYPE plist PUBLIC -Apple ComputerDTD PLIST 10EN httpwwwapplecomDTDsPropertyList-10dtdgtltplist version=10gtltdictgt ltkeygt_nameltkeygt ltdictgt ltkeygt_isColumnltkeygt ltstringgtYESltstringgt ltkeygt_isOutlineColumnltkeygt ltstringgtYESltstringgt ltkeygt_orderltkeygt ltstringgt0ltstringgt ltdictgt ltkeygtbsd_nameltkeygt ltdictgt ltkeygt_orderltkeygt ltstringgt62ltstringgt ltdictgt ltkeygtdetachable_driveltkeygt ltdictgt ltkeygt_orderltkeygt ltstringgt59ltstringgt ltdictgt ltkeygtdevice_manufacturerltkeygt ltdictgt ltkeygt_orderltkeygt ltstringgt41ltstringgt ltdictgt ltkeygtdevice_modelltkeygt ltdictgt ltkeygt_orderltkeygt ltstringgt42ltstringgt ltdictgt ltkeygtdevice_revisionltkeygt

The Failure - So What

12

The Right Thing - Help The User Along

13

bull Provide use-case aligned displaysbull Meaningful legendsbull Interactive explorationbull UI design that guides the user through tasksbull Do not overload displays

The Failure - Unnecessary Ink

14

The Right Thing - Apply Good Visualization Practices

15

bull Dont use graphics to decorate a few numbersbull Reduce data ink ratiobull Visualization principles

The 2nd Dichotomy

16

The 2nd Dichotomy

16

two worldsIndustry amp Academia

The 2nd Dichotomy

16

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The 2nd Dichotomy

16

bull donrsquot understand the real impact

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The 2nd Dichotomy

16

bull donrsquot understand the real impactbull get the 70 solution

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The 2nd Dichotomy

16

bull donrsquot understand the real impactbull get the 70 solutionbull donrsquot think big

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The 2nd Dichotomy

16

bull donrsquot understand the real impactbull get the 70 solutionbull donrsquot think bigbull no timemoney for real research

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The 2nd Dichotomy

16

bull donrsquot understand the real impactbull get the 70 solutionbull donrsquot think bigbull no timemoney for real researchbull canrsquot scale

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The 2nd Dichotomy

16

bull donrsquot understand the real impactbull get the 70 solutionbull donrsquot think bigbull no timemoney for real researchbull canrsquot scalebull work based off of a few

customerrsquos input

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The 2nd Dichotomy

16

bull donrsquot understand the real impactbull get the 70 solutionbull donrsquot think bigbull no timemoney for real researchbull canrsquot scalebull work based off of a few

customerrsquos input

bull donrsquot know whatrsquos been done in industry

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The 2nd Dichotomy

16

bull donrsquot understand the real impactbull get the 70 solutionbull donrsquot think bigbull no timemoney for real researchbull canrsquot scalebull work based off of a few

customerrsquos input

bull donrsquot know whatrsquos been done in industrybull donrsquot understand the use-cases

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The 2nd Dichotomy

16

bull donrsquot understand the real impactbull get the 70 solutionbull donrsquot think bigbull no timemoney for real researchbull canrsquot scalebull work based off of a few

customerrsquos input

bull donrsquot know whatrsquos been done in industrybull donrsquot understand the use-casesbull donrsquot understand the environments

data domain

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The 2nd Dichotomy

16

bull donrsquot understand the real impactbull get the 70 solutionbull donrsquot think bigbull no timemoney for real researchbull canrsquot scalebull work based off of a few

customerrsquos input

bull donrsquot know whatrsquos been done in industrybull donrsquot understand the use-casesbull donrsquot understand the environments

data domainbull work on simulated data

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The 2nd Dichotomy

16

bull donrsquot understand the real impactbull get the 70 solutionbull donrsquot think bigbull no timemoney for real researchbull canrsquot scalebull work based off of a few

customerrsquos input

bull donrsquot know whatrsquos been done in industrybull donrsquot understand the use-casesbull donrsquot understand the environments

data domainbull work on simulated databull construct their own problems

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The 2nd Dichotomy

16

bull donrsquot understand the real impactbull get the 70 solutionbull donrsquot think bigbull no timemoney for real researchbull canrsquot scalebull work based off of a few

customerrsquos input

bull donrsquot know whatrsquos been done in industrybull donrsquot understand the use-casesbull donrsquot understand the environments

data domainbull work on simulated databull construct their own problems bull use overly complicated impractical

solutions

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The 2nd Dichotomy

16

bull donrsquot understand the real impactbull get the 70 solutionbull donrsquot think bigbull no timemoney for real researchbull canrsquot scalebull work based off of a few

customerrsquos input

bull donrsquot know whatrsquos been done in industrybull donrsquot understand the use-casesbull donrsquot understand the environments

data domainbull work on simulated databull construct their own problems bull use overly complicated impractical

solutionsbull use graphs visualization where it is not

needed

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The Way Forward

17

bull Building a secviz disciplinebull Bridging the gapbull Learning the ldquootherrdquo discipline

Security Visualization

SecViz

bull More academia industry collaboration bull Build components widgets gadgetsbull (Re-)use existing technologiesbull Focus on strengthsbull Focus on the visualization and interaction aspects

Two disciplines

Two worlds

18

bull Use-case oriented visualizationbull Perimeter Threatbull Governance Risk Compliance (GRC)bull Insider Threat bull IT data visualizationbull SecVizOrgbull DAVIX

My Focus Areas

18

bull Use-case oriented visualizationbull Perimeter Threatbull Governance Risk Compliance (GRC)bull Insider Threat bull IT data visualizationbull SecVizOrgbull DAVIX

Insider Threat Visualizationbull Huge amounts of databull More and other data sources than for the traditional security use-cases- Insiders often have legitimate access to machines and data You need to log more than the

exceptions

- Insider crimes are often executed on the application layer

bull The questions are not known in advance - Visualization provokes questions and helps find answers

bull Dynamic nature of fraud- Problem for static algorithms

- Bandits quickly adapt to fixed threshold-based detection systems

bull Looking for any unusual patterns

19

20

20

SecViz - Security VisualizationThis is a place to share discuss challenge and learn about

security visualization

Data Analysis and Visualization Linuxdavixsecvizorg

D

V

X

bull Addressing the secviz dichotomy

bull Better industry - academia collaboration

bull More and better visualization tools

- Use-case driven product development

bull We need to solve the data semantics problem

- Common Event Expression

- Entity extraction

23

The Futurebull Addressing the secviz dichotomy

bull Better industry - academia collaboration

bull More and better visualization tools

- Use-case driven product development

bull We need to solve the data semantics problem

- Common Event Expression

- Entity extraction

23

Vielen Dank

S

E

C I

V

Z

raffael marty secviz org

Page 13: Security Research2.0 - FIT 2008

The Right Thing - Reuse Graphs

7

The Failure - The Wrong Graph

8

The Right Thing - Adequate Graphs

9

The Right Thing - Adequate Graphs

9

The Failure - The Wrong Integration

10

bull Using proprietary data formatbull Provide parsers for various data formats

bull does not scalebull is probably buggy incomplete

bull Use wrong data access paradigm bull complex configuration

eg needs an SSH connection

usrsharemanman5launchdplist5ltxml version=10 encoding=UTF-8gtltDOCTYPE plist PUBLIC -Apple ComputerDTD PLIST 10EN httpwwwapplecomDTDsPropertyList-10dtdgtltplist version=10gtltdictgt ltkeygt_nameltkeygt ltdictgt ltkeygt_isColumnltkeygt ltstringgtYESltstringgt ltkeygt_isOutlineColumnltkeygt ltstringgtYESltstringgt ltkeygt_orderltkeygt ltstringgt0ltstringgt ltdictgt ltkeygtbsd_nameltkeygt ltdictgt ltkeygt_orderltkeygt ltstringgt62ltstringgt ltdictgt ltkeygtdetachable_driveltkeygt ltdictgt ltkeygt_orderltkeygt ltstringgt59ltstringgt ltdictgt ltkeygtdevice_manufacturerltkeygt ltdictgt ltkeygt_orderltkeygt ltstringgt41ltstringgt ltdictgt ltkeygtdevice_modelltkeygt ltdictgt ltkeygt_orderltkeygt ltstringgt42ltstringgt ltdictgt ltkeygtdevice_revisionltkeygt

bull Keep It Simple Stupidbull Use CSV inputbull Use files as inputbull Offload to other tools

bull parsersbull data conversions

The Right Thing - KISS

11

Using node sizessizesource=1sizetarget=200maxNodeSize=02

usrsharemanman5launchdplist5ltxml version=10 encoding=UTF-8gtltDOCTYPE plist PUBLIC -Apple ComputerDTD PLIST 10EN httpwwwapplecomDTDsPropertyList-10dtdgtltplist version=10gtltdictgt ltkeygt_nameltkeygt ltdictgt ltkeygt_isColumnltkeygt ltstringgtYESltstringgt ltkeygt_isOutlineColumnltkeygt ltstringgtYESltstringgt ltkeygt_orderltkeygt ltstringgt0ltstringgt ltdictgt ltkeygtbsd_nameltkeygt ltdictgt ltkeygt_orderltkeygt ltstringgt62ltstringgt ltdictgt ltkeygtdetachable_driveltkeygt ltdictgt ltkeygt_orderltkeygt ltstringgt59ltstringgt ltdictgt ltkeygtdevice_manufacturerltkeygt ltdictgt ltkeygt_orderltkeygt ltstringgt41ltstringgt ltdictgt ltkeygtdevice_modelltkeygt ltdictgt ltkeygt_orderltkeygt ltstringgt42ltstringgt ltdictgt ltkeygtdevice_revisionltkeygt

The Failure - So What

12

The Right Thing - Help The User Along

13

bull Provide use-case aligned displaysbull Meaningful legendsbull Interactive explorationbull UI design that guides the user through tasksbull Do not overload displays

The Failure - Unnecessary Ink

14

The Right Thing - Apply Good Visualization Practices

15

bull Dont use graphics to decorate a few numbersbull Reduce data ink ratiobull Visualization principles

The 2nd Dichotomy

16

The 2nd Dichotomy

16

two worldsIndustry amp Academia

The 2nd Dichotomy

16

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The 2nd Dichotomy

16

bull donrsquot understand the real impact

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The 2nd Dichotomy

16

bull donrsquot understand the real impactbull get the 70 solution

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The 2nd Dichotomy

16

bull donrsquot understand the real impactbull get the 70 solutionbull donrsquot think big

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The 2nd Dichotomy

16

bull donrsquot understand the real impactbull get the 70 solutionbull donrsquot think bigbull no timemoney for real research

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The 2nd Dichotomy

16

bull donrsquot understand the real impactbull get the 70 solutionbull donrsquot think bigbull no timemoney for real researchbull canrsquot scale

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The 2nd Dichotomy

16

bull donrsquot understand the real impactbull get the 70 solutionbull donrsquot think bigbull no timemoney for real researchbull canrsquot scalebull work based off of a few

customerrsquos input

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The 2nd Dichotomy

16

bull donrsquot understand the real impactbull get the 70 solutionbull donrsquot think bigbull no timemoney for real researchbull canrsquot scalebull work based off of a few

customerrsquos input

bull donrsquot know whatrsquos been done in industry

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The 2nd Dichotomy

16

bull donrsquot understand the real impactbull get the 70 solutionbull donrsquot think bigbull no timemoney for real researchbull canrsquot scalebull work based off of a few

customerrsquos input

bull donrsquot know whatrsquos been done in industrybull donrsquot understand the use-cases

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The 2nd Dichotomy

16

bull donrsquot understand the real impactbull get the 70 solutionbull donrsquot think bigbull no timemoney for real researchbull canrsquot scalebull work based off of a few

customerrsquos input

bull donrsquot know whatrsquos been done in industrybull donrsquot understand the use-casesbull donrsquot understand the environments

data domain

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The 2nd Dichotomy

16

bull donrsquot understand the real impactbull get the 70 solutionbull donrsquot think bigbull no timemoney for real researchbull canrsquot scalebull work based off of a few

customerrsquos input

bull donrsquot know whatrsquos been done in industrybull donrsquot understand the use-casesbull donrsquot understand the environments

data domainbull work on simulated data

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The 2nd Dichotomy

16

bull donrsquot understand the real impactbull get the 70 solutionbull donrsquot think bigbull no timemoney for real researchbull canrsquot scalebull work based off of a few

customerrsquos input

bull donrsquot know whatrsquos been done in industrybull donrsquot understand the use-casesbull donrsquot understand the environments

data domainbull work on simulated databull construct their own problems

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The 2nd Dichotomy

16

bull donrsquot understand the real impactbull get the 70 solutionbull donrsquot think bigbull no timemoney for real researchbull canrsquot scalebull work based off of a few

customerrsquos input

bull donrsquot know whatrsquos been done in industrybull donrsquot understand the use-casesbull donrsquot understand the environments

data domainbull work on simulated databull construct their own problems bull use overly complicated impractical

solutions

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The 2nd Dichotomy

16

bull donrsquot understand the real impactbull get the 70 solutionbull donrsquot think bigbull no timemoney for real researchbull canrsquot scalebull work based off of a few

customerrsquos input

bull donrsquot know whatrsquos been done in industrybull donrsquot understand the use-casesbull donrsquot understand the environments

data domainbull work on simulated databull construct their own problems bull use overly complicated impractical

solutionsbull use graphs visualization where it is not

needed

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The Way Forward

17

bull Building a secviz disciplinebull Bridging the gapbull Learning the ldquootherrdquo discipline

Security Visualization

SecViz

bull More academia industry collaboration bull Build components widgets gadgetsbull (Re-)use existing technologiesbull Focus on strengthsbull Focus on the visualization and interaction aspects

Two disciplines

Two worlds

18

bull Use-case oriented visualizationbull Perimeter Threatbull Governance Risk Compliance (GRC)bull Insider Threat bull IT data visualizationbull SecVizOrgbull DAVIX

My Focus Areas

18

bull Use-case oriented visualizationbull Perimeter Threatbull Governance Risk Compliance (GRC)bull Insider Threat bull IT data visualizationbull SecVizOrgbull DAVIX

Insider Threat Visualizationbull Huge amounts of databull More and other data sources than for the traditional security use-cases- Insiders often have legitimate access to machines and data You need to log more than the

exceptions

- Insider crimes are often executed on the application layer

bull The questions are not known in advance - Visualization provokes questions and helps find answers

bull Dynamic nature of fraud- Problem for static algorithms

- Bandits quickly adapt to fixed threshold-based detection systems

bull Looking for any unusual patterns

19

20

20

SecViz - Security VisualizationThis is a place to share discuss challenge and learn about

security visualization

Data Analysis and Visualization Linuxdavixsecvizorg

D

V

X

bull Addressing the secviz dichotomy

bull Better industry - academia collaboration

bull More and better visualization tools

- Use-case driven product development

bull We need to solve the data semantics problem

- Common Event Expression

- Entity extraction

23

The Futurebull Addressing the secviz dichotomy

bull Better industry - academia collaboration

bull More and better visualization tools

- Use-case driven product development

bull We need to solve the data semantics problem

- Common Event Expression

- Entity extraction

23

Vielen Dank

S

E

C I

V

Z

raffael marty secviz org

Page 14: Security Research2.0 - FIT 2008

The Failure - The Wrong Graph

8

The Right Thing - Adequate Graphs

9

The Right Thing - Adequate Graphs

9

The Failure - The Wrong Integration

10

bull Using proprietary data formatbull Provide parsers for various data formats

bull does not scalebull is probably buggy incomplete

bull Use wrong data access paradigm bull complex configuration

eg needs an SSH connection

usrsharemanman5launchdplist5ltxml version=10 encoding=UTF-8gtltDOCTYPE plist PUBLIC -Apple ComputerDTD PLIST 10EN httpwwwapplecomDTDsPropertyList-10dtdgtltplist version=10gtltdictgt ltkeygt_nameltkeygt ltdictgt ltkeygt_isColumnltkeygt ltstringgtYESltstringgt ltkeygt_isOutlineColumnltkeygt ltstringgtYESltstringgt ltkeygt_orderltkeygt ltstringgt0ltstringgt ltdictgt ltkeygtbsd_nameltkeygt ltdictgt ltkeygt_orderltkeygt ltstringgt62ltstringgt ltdictgt ltkeygtdetachable_driveltkeygt ltdictgt ltkeygt_orderltkeygt ltstringgt59ltstringgt ltdictgt ltkeygtdevice_manufacturerltkeygt ltdictgt ltkeygt_orderltkeygt ltstringgt41ltstringgt ltdictgt ltkeygtdevice_modelltkeygt ltdictgt ltkeygt_orderltkeygt ltstringgt42ltstringgt ltdictgt ltkeygtdevice_revisionltkeygt

bull Keep It Simple Stupidbull Use CSV inputbull Use files as inputbull Offload to other tools

bull parsersbull data conversions

The Right Thing - KISS

11

Using node sizessizesource=1sizetarget=200maxNodeSize=02

usrsharemanman5launchdplist5ltxml version=10 encoding=UTF-8gtltDOCTYPE plist PUBLIC -Apple ComputerDTD PLIST 10EN httpwwwapplecomDTDsPropertyList-10dtdgtltplist version=10gtltdictgt ltkeygt_nameltkeygt ltdictgt ltkeygt_isColumnltkeygt ltstringgtYESltstringgt ltkeygt_isOutlineColumnltkeygt ltstringgtYESltstringgt ltkeygt_orderltkeygt ltstringgt0ltstringgt ltdictgt ltkeygtbsd_nameltkeygt ltdictgt ltkeygt_orderltkeygt ltstringgt62ltstringgt ltdictgt ltkeygtdetachable_driveltkeygt ltdictgt ltkeygt_orderltkeygt ltstringgt59ltstringgt ltdictgt ltkeygtdevice_manufacturerltkeygt ltdictgt ltkeygt_orderltkeygt ltstringgt41ltstringgt ltdictgt ltkeygtdevice_modelltkeygt ltdictgt ltkeygt_orderltkeygt ltstringgt42ltstringgt ltdictgt ltkeygtdevice_revisionltkeygt

The Failure - So What

12

The Right Thing - Help The User Along

13

bull Provide use-case aligned displaysbull Meaningful legendsbull Interactive explorationbull UI design that guides the user through tasksbull Do not overload displays

The Failure - Unnecessary Ink

14

The Right Thing - Apply Good Visualization Practices

15

bull Dont use graphics to decorate a few numbersbull Reduce data ink ratiobull Visualization principles

The 2nd Dichotomy

16

The 2nd Dichotomy

16

two worldsIndustry amp Academia

The 2nd Dichotomy

16

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The 2nd Dichotomy

16

bull donrsquot understand the real impact

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The 2nd Dichotomy

16

bull donrsquot understand the real impactbull get the 70 solution

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The 2nd Dichotomy

16

bull donrsquot understand the real impactbull get the 70 solutionbull donrsquot think big

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The 2nd Dichotomy

16

bull donrsquot understand the real impactbull get the 70 solutionbull donrsquot think bigbull no timemoney for real research

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The 2nd Dichotomy

16

bull donrsquot understand the real impactbull get the 70 solutionbull donrsquot think bigbull no timemoney for real researchbull canrsquot scale

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The 2nd Dichotomy

16

bull donrsquot understand the real impactbull get the 70 solutionbull donrsquot think bigbull no timemoney for real researchbull canrsquot scalebull work based off of a few

customerrsquos input

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The 2nd Dichotomy

16

bull donrsquot understand the real impactbull get the 70 solutionbull donrsquot think bigbull no timemoney for real researchbull canrsquot scalebull work based off of a few

customerrsquos input

bull donrsquot know whatrsquos been done in industry

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The 2nd Dichotomy

16

bull donrsquot understand the real impactbull get the 70 solutionbull donrsquot think bigbull no timemoney for real researchbull canrsquot scalebull work based off of a few

customerrsquos input

bull donrsquot know whatrsquos been done in industrybull donrsquot understand the use-cases

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The 2nd Dichotomy

16

bull donrsquot understand the real impactbull get the 70 solutionbull donrsquot think bigbull no timemoney for real researchbull canrsquot scalebull work based off of a few

customerrsquos input

bull donrsquot know whatrsquos been done in industrybull donrsquot understand the use-casesbull donrsquot understand the environments

data domain

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The 2nd Dichotomy

16

bull donrsquot understand the real impactbull get the 70 solutionbull donrsquot think bigbull no timemoney for real researchbull canrsquot scalebull work based off of a few

customerrsquos input

bull donrsquot know whatrsquos been done in industrybull donrsquot understand the use-casesbull donrsquot understand the environments

data domainbull work on simulated data

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The 2nd Dichotomy

16

bull donrsquot understand the real impactbull get the 70 solutionbull donrsquot think bigbull no timemoney for real researchbull canrsquot scalebull work based off of a few

customerrsquos input

bull donrsquot know whatrsquos been done in industrybull donrsquot understand the use-casesbull donrsquot understand the environments

data domainbull work on simulated databull construct their own problems

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The 2nd Dichotomy

16

bull donrsquot understand the real impactbull get the 70 solutionbull donrsquot think bigbull no timemoney for real researchbull canrsquot scalebull work based off of a few

customerrsquos input

bull donrsquot know whatrsquos been done in industrybull donrsquot understand the use-casesbull donrsquot understand the environments

data domainbull work on simulated databull construct their own problems bull use overly complicated impractical

solutions

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The 2nd Dichotomy

16

bull donrsquot understand the real impactbull get the 70 solutionbull donrsquot think bigbull no timemoney for real researchbull canrsquot scalebull work based off of a few

customerrsquos input

bull donrsquot know whatrsquos been done in industrybull donrsquot understand the use-casesbull donrsquot understand the environments

data domainbull work on simulated databull construct their own problems bull use overly complicated impractical

solutionsbull use graphs visualization where it is not

needed

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The Way Forward

17

bull Building a secviz disciplinebull Bridging the gapbull Learning the ldquootherrdquo discipline

Security Visualization

SecViz

bull More academia industry collaboration bull Build components widgets gadgetsbull (Re-)use existing technologiesbull Focus on strengthsbull Focus on the visualization and interaction aspects

Two disciplines

Two worlds

18

bull Use-case oriented visualizationbull Perimeter Threatbull Governance Risk Compliance (GRC)bull Insider Threat bull IT data visualizationbull SecVizOrgbull DAVIX

My Focus Areas

18

bull Use-case oriented visualizationbull Perimeter Threatbull Governance Risk Compliance (GRC)bull Insider Threat bull IT data visualizationbull SecVizOrgbull DAVIX

Insider Threat Visualizationbull Huge amounts of databull More and other data sources than for the traditional security use-cases- Insiders often have legitimate access to machines and data You need to log more than the

exceptions

- Insider crimes are often executed on the application layer

bull The questions are not known in advance - Visualization provokes questions and helps find answers

bull Dynamic nature of fraud- Problem for static algorithms

- Bandits quickly adapt to fixed threshold-based detection systems

bull Looking for any unusual patterns

19

20

20

SecViz - Security VisualizationThis is a place to share discuss challenge and learn about

security visualization

Data Analysis and Visualization Linuxdavixsecvizorg

D

V

X

bull Addressing the secviz dichotomy

bull Better industry - academia collaboration

bull More and better visualization tools

- Use-case driven product development

bull We need to solve the data semantics problem

- Common Event Expression

- Entity extraction

23

The Futurebull Addressing the secviz dichotomy

bull Better industry - academia collaboration

bull More and better visualization tools

- Use-case driven product development

bull We need to solve the data semantics problem

- Common Event Expression

- Entity extraction

23

Vielen Dank

S

E

C I

V

Z

raffael marty secviz org

Page 15: Security Research2.0 - FIT 2008

The Right Thing - Adequate Graphs

9

The Right Thing - Adequate Graphs

9

The Failure - The Wrong Integration

10

bull Using proprietary data formatbull Provide parsers for various data formats

bull does not scalebull is probably buggy incomplete

bull Use wrong data access paradigm bull complex configuration

eg needs an SSH connection

usrsharemanman5launchdplist5ltxml version=10 encoding=UTF-8gtltDOCTYPE plist PUBLIC -Apple ComputerDTD PLIST 10EN httpwwwapplecomDTDsPropertyList-10dtdgtltplist version=10gtltdictgt ltkeygt_nameltkeygt ltdictgt ltkeygt_isColumnltkeygt ltstringgtYESltstringgt ltkeygt_isOutlineColumnltkeygt ltstringgtYESltstringgt ltkeygt_orderltkeygt ltstringgt0ltstringgt ltdictgt ltkeygtbsd_nameltkeygt ltdictgt ltkeygt_orderltkeygt ltstringgt62ltstringgt ltdictgt ltkeygtdetachable_driveltkeygt ltdictgt ltkeygt_orderltkeygt ltstringgt59ltstringgt ltdictgt ltkeygtdevice_manufacturerltkeygt ltdictgt ltkeygt_orderltkeygt ltstringgt41ltstringgt ltdictgt ltkeygtdevice_modelltkeygt ltdictgt ltkeygt_orderltkeygt ltstringgt42ltstringgt ltdictgt ltkeygtdevice_revisionltkeygt

bull Keep It Simple Stupidbull Use CSV inputbull Use files as inputbull Offload to other tools

bull parsersbull data conversions

The Right Thing - KISS

11

Using node sizessizesource=1sizetarget=200maxNodeSize=02

usrsharemanman5launchdplist5ltxml version=10 encoding=UTF-8gtltDOCTYPE plist PUBLIC -Apple ComputerDTD PLIST 10EN httpwwwapplecomDTDsPropertyList-10dtdgtltplist version=10gtltdictgt ltkeygt_nameltkeygt ltdictgt ltkeygt_isColumnltkeygt ltstringgtYESltstringgt ltkeygt_isOutlineColumnltkeygt ltstringgtYESltstringgt ltkeygt_orderltkeygt ltstringgt0ltstringgt ltdictgt ltkeygtbsd_nameltkeygt ltdictgt ltkeygt_orderltkeygt ltstringgt62ltstringgt ltdictgt ltkeygtdetachable_driveltkeygt ltdictgt ltkeygt_orderltkeygt ltstringgt59ltstringgt ltdictgt ltkeygtdevice_manufacturerltkeygt ltdictgt ltkeygt_orderltkeygt ltstringgt41ltstringgt ltdictgt ltkeygtdevice_modelltkeygt ltdictgt ltkeygt_orderltkeygt ltstringgt42ltstringgt ltdictgt ltkeygtdevice_revisionltkeygt

The Failure - So What

12

The Right Thing - Help The User Along

13

bull Provide use-case aligned displaysbull Meaningful legendsbull Interactive explorationbull UI design that guides the user through tasksbull Do not overload displays

The Failure - Unnecessary Ink

14

The Right Thing - Apply Good Visualization Practices

15

bull Dont use graphics to decorate a few numbersbull Reduce data ink ratiobull Visualization principles

The 2nd Dichotomy

16

The 2nd Dichotomy

16

two worldsIndustry amp Academia

The 2nd Dichotomy

16

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The 2nd Dichotomy

16

bull donrsquot understand the real impact

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The 2nd Dichotomy

16

bull donrsquot understand the real impactbull get the 70 solution

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The 2nd Dichotomy

16

bull donrsquot understand the real impactbull get the 70 solutionbull donrsquot think big

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The 2nd Dichotomy

16

bull donrsquot understand the real impactbull get the 70 solutionbull donrsquot think bigbull no timemoney for real research

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The 2nd Dichotomy

16

bull donrsquot understand the real impactbull get the 70 solutionbull donrsquot think bigbull no timemoney for real researchbull canrsquot scale

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The 2nd Dichotomy

16

bull donrsquot understand the real impactbull get the 70 solutionbull donrsquot think bigbull no timemoney for real researchbull canrsquot scalebull work based off of a few

customerrsquos input

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The 2nd Dichotomy

16

bull donrsquot understand the real impactbull get the 70 solutionbull donrsquot think bigbull no timemoney for real researchbull canrsquot scalebull work based off of a few

customerrsquos input

bull donrsquot know whatrsquos been done in industry

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The 2nd Dichotomy

16

bull donrsquot understand the real impactbull get the 70 solutionbull donrsquot think bigbull no timemoney for real researchbull canrsquot scalebull work based off of a few

customerrsquos input

bull donrsquot know whatrsquos been done in industrybull donrsquot understand the use-cases

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The 2nd Dichotomy

16

bull donrsquot understand the real impactbull get the 70 solutionbull donrsquot think bigbull no timemoney for real researchbull canrsquot scalebull work based off of a few

customerrsquos input

bull donrsquot know whatrsquos been done in industrybull donrsquot understand the use-casesbull donrsquot understand the environments

data domain

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The 2nd Dichotomy

16

bull donrsquot understand the real impactbull get the 70 solutionbull donrsquot think bigbull no timemoney for real researchbull canrsquot scalebull work based off of a few

customerrsquos input

bull donrsquot know whatrsquos been done in industrybull donrsquot understand the use-casesbull donrsquot understand the environments

data domainbull work on simulated data

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The 2nd Dichotomy

16

bull donrsquot understand the real impactbull get the 70 solutionbull donrsquot think bigbull no timemoney for real researchbull canrsquot scalebull work based off of a few

customerrsquos input

bull donrsquot know whatrsquos been done in industrybull donrsquot understand the use-casesbull donrsquot understand the environments

data domainbull work on simulated databull construct their own problems

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The 2nd Dichotomy

16

bull donrsquot understand the real impactbull get the 70 solutionbull donrsquot think bigbull no timemoney for real researchbull canrsquot scalebull work based off of a few

customerrsquos input

bull donrsquot know whatrsquos been done in industrybull donrsquot understand the use-casesbull donrsquot understand the environments

data domainbull work on simulated databull construct their own problems bull use overly complicated impractical

solutions

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The 2nd Dichotomy

16

bull donrsquot understand the real impactbull get the 70 solutionbull donrsquot think bigbull no timemoney for real researchbull canrsquot scalebull work based off of a few

customerrsquos input

bull donrsquot know whatrsquos been done in industrybull donrsquot understand the use-casesbull donrsquot understand the environments

data domainbull work on simulated databull construct their own problems bull use overly complicated impractical

solutionsbull use graphs visualization where it is not

needed

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The Way Forward

17

bull Building a secviz disciplinebull Bridging the gapbull Learning the ldquootherrdquo discipline

Security Visualization

SecViz

bull More academia industry collaboration bull Build components widgets gadgetsbull (Re-)use existing technologiesbull Focus on strengthsbull Focus on the visualization and interaction aspects

Two disciplines

Two worlds

18

bull Use-case oriented visualizationbull Perimeter Threatbull Governance Risk Compliance (GRC)bull Insider Threat bull IT data visualizationbull SecVizOrgbull DAVIX

My Focus Areas

18

bull Use-case oriented visualizationbull Perimeter Threatbull Governance Risk Compliance (GRC)bull Insider Threat bull IT data visualizationbull SecVizOrgbull DAVIX

Insider Threat Visualizationbull Huge amounts of databull More and other data sources than for the traditional security use-cases- Insiders often have legitimate access to machines and data You need to log more than the

exceptions

- Insider crimes are often executed on the application layer

bull The questions are not known in advance - Visualization provokes questions and helps find answers

bull Dynamic nature of fraud- Problem for static algorithms

- Bandits quickly adapt to fixed threshold-based detection systems

bull Looking for any unusual patterns

19

20

20

SecViz - Security VisualizationThis is a place to share discuss challenge and learn about

security visualization

Data Analysis and Visualization Linuxdavixsecvizorg

D

V

X

bull Addressing the secviz dichotomy

bull Better industry - academia collaboration

bull More and better visualization tools

- Use-case driven product development

bull We need to solve the data semantics problem

- Common Event Expression

- Entity extraction

23

The Futurebull Addressing the secviz dichotomy

bull Better industry - academia collaboration

bull More and better visualization tools

- Use-case driven product development

bull We need to solve the data semantics problem

- Common Event Expression

- Entity extraction

23

Vielen Dank

S

E

C I

V

Z

raffael marty secviz org

Page 16: Security Research2.0 - FIT 2008

The Right Thing - Adequate Graphs

9

The Failure - The Wrong Integration

10

bull Using proprietary data formatbull Provide parsers for various data formats

bull does not scalebull is probably buggy incomplete

bull Use wrong data access paradigm bull complex configuration

eg needs an SSH connection

usrsharemanman5launchdplist5ltxml version=10 encoding=UTF-8gtltDOCTYPE plist PUBLIC -Apple ComputerDTD PLIST 10EN httpwwwapplecomDTDsPropertyList-10dtdgtltplist version=10gtltdictgt ltkeygt_nameltkeygt ltdictgt ltkeygt_isColumnltkeygt ltstringgtYESltstringgt ltkeygt_isOutlineColumnltkeygt ltstringgtYESltstringgt ltkeygt_orderltkeygt ltstringgt0ltstringgt ltdictgt ltkeygtbsd_nameltkeygt ltdictgt ltkeygt_orderltkeygt ltstringgt62ltstringgt ltdictgt ltkeygtdetachable_driveltkeygt ltdictgt ltkeygt_orderltkeygt ltstringgt59ltstringgt ltdictgt ltkeygtdevice_manufacturerltkeygt ltdictgt ltkeygt_orderltkeygt ltstringgt41ltstringgt ltdictgt ltkeygtdevice_modelltkeygt ltdictgt ltkeygt_orderltkeygt ltstringgt42ltstringgt ltdictgt ltkeygtdevice_revisionltkeygt

bull Keep It Simple Stupidbull Use CSV inputbull Use files as inputbull Offload to other tools

bull parsersbull data conversions

The Right Thing - KISS

11

Using node sizessizesource=1sizetarget=200maxNodeSize=02

usrsharemanman5launchdplist5ltxml version=10 encoding=UTF-8gtltDOCTYPE plist PUBLIC -Apple ComputerDTD PLIST 10EN httpwwwapplecomDTDsPropertyList-10dtdgtltplist version=10gtltdictgt ltkeygt_nameltkeygt ltdictgt ltkeygt_isColumnltkeygt ltstringgtYESltstringgt ltkeygt_isOutlineColumnltkeygt ltstringgtYESltstringgt ltkeygt_orderltkeygt ltstringgt0ltstringgt ltdictgt ltkeygtbsd_nameltkeygt ltdictgt ltkeygt_orderltkeygt ltstringgt62ltstringgt ltdictgt ltkeygtdetachable_driveltkeygt ltdictgt ltkeygt_orderltkeygt ltstringgt59ltstringgt ltdictgt ltkeygtdevice_manufacturerltkeygt ltdictgt ltkeygt_orderltkeygt ltstringgt41ltstringgt ltdictgt ltkeygtdevice_modelltkeygt ltdictgt ltkeygt_orderltkeygt ltstringgt42ltstringgt ltdictgt ltkeygtdevice_revisionltkeygt

The Failure - So What

12

The Right Thing - Help The User Along

13

bull Provide use-case aligned displaysbull Meaningful legendsbull Interactive explorationbull UI design that guides the user through tasksbull Do not overload displays

The Failure - Unnecessary Ink

14

The Right Thing - Apply Good Visualization Practices

15

bull Dont use graphics to decorate a few numbersbull Reduce data ink ratiobull Visualization principles

The 2nd Dichotomy

16

The 2nd Dichotomy

16

two worldsIndustry amp Academia

The 2nd Dichotomy

16

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The 2nd Dichotomy

16

bull donrsquot understand the real impact

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The 2nd Dichotomy

16

bull donrsquot understand the real impactbull get the 70 solution

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The 2nd Dichotomy

16

bull donrsquot understand the real impactbull get the 70 solutionbull donrsquot think big

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The 2nd Dichotomy

16

bull donrsquot understand the real impactbull get the 70 solutionbull donrsquot think bigbull no timemoney for real research

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The 2nd Dichotomy

16

bull donrsquot understand the real impactbull get the 70 solutionbull donrsquot think bigbull no timemoney for real researchbull canrsquot scale

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The 2nd Dichotomy

16

bull donrsquot understand the real impactbull get the 70 solutionbull donrsquot think bigbull no timemoney for real researchbull canrsquot scalebull work based off of a few

customerrsquos input

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The 2nd Dichotomy

16

bull donrsquot understand the real impactbull get the 70 solutionbull donrsquot think bigbull no timemoney for real researchbull canrsquot scalebull work based off of a few

customerrsquos input

bull donrsquot know whatrsquos been done in industry

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The 2nd Dichotomy

16

bull donrsquot understand the real impactbull get the 70 solutionbull donrsquot think bigbull no timemoney for real researchbull canrsquot scalebull work based off of a few

customerrsquos input

bull donrsquot know whatrsquos been done in industrybull donrsquot understand the use-cases

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The 2nd Dichotomy

16

bull donrsquot understand the real impactbull get the 70 solutionbull donrsquot think bigbull no timemoney for real researchbull canrsquot scalebull work based off of a few

customerrsquos input

bull donrsquot know whatrsquos been done in industrybull donrsquot understand the use-casesbull donrsquot understand the environments

data domain

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The 2nd Dichotomy

16

bull donrsquot understand the real impactbull get the 70 solutionbull donrsquot think bigbull no timemoney for real researchbull canrsquot scalebull work based off of a few

customerrsquos input

bull donrsquot know whatrsquos been done in industrybull donrsquot understand the use-casesbull donrsquot understand the environments

data domainbull work on simulated data

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The 2nd Dichotomy

16

bull donrsquot understand the real impactbull get the 70 solutionbull donrsquot think bigbull no timemoney for real researchbull canrsquot scalebull work based off of a few

customerrsquos input

bull donrsquot know whatrsquos been done in industrybull donrsquot understand the use-casesbull donrsquot understand the environments

data domainbull work on simulated databull construct their own problems

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The 2nd Dichotomy

16

bull donrsquot understand the real impactbull get the 70 solutionbull donrsquot think bigbull no timemoney for real researchbull canrsquot scalebull work based off of a few

customerrsquos input

bull donrsquot know whatrsquos been done in industrybull donrsquot understand the use-casesbull donrsquot understand the environments

data domainbull work on simulated databull construct their own problems bull use overly complicated impractical

solutions

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The 2nd Dichotomy

16

bull donrsquot understand the real impactbull get the 70 solutionbull donrsquot think bigbull no timemoney for real researchbull canrsquot scalebull work based off of a few

customerrsquos input

bull donrsquot know whatrsquos been done in industrybull donrsquot understand the use-casesbull donrsquot understand the environments

data domainbull work on simulated databull construct their own problems bull use overly complicated impractical

solutionsbull use graphs visualization where it is not

needed

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The Way Forward

17

bull Building a secviz disciplinebull Bridging the gapbull Learning the ldquootherrdquo discipline

Security Visualization

SecViz

bull More academia industry collaboration bull Build components widgets gadgetsbull (Re-)use existing technologiesbull Focus on strengthsbull Focus on the visualization and interaction aspects

Two disciplines

Two worlds

18

bull Use-case oriented visualizationbull Perimeter Threatbull Governance Risk Compliance (GRC)bull Insider Threat bull IT data visualizationbull SecVizOrgbull DAVIX

My Focus Areas

18

bull Use-case oriented visualizationbull Perimeter Threatbull Governance Risk Compliance (GRC)bull Insider Threat bull IT data visualizationbull SecVizOrgbull DAVIX

Insider Threat Visualizationbull Huge amounts of databull More and other data sources than for the traditional security use-cases- Insiders often have legitimate access to machines and data You need to log more than the

exceptions

- Insider crimes are often executed on the application layer

bull The questions are not known in advance - Visualization provokes questions and helps find answers

bull Dynamic nature of fraud- Problem for static algorithms

- Bandits quickly adapt to fixed threshold-based detection systems

bull Looking for any unusual patterns

19

20

20

SecViz - Security VisualizationThis is a place to share discuss challenge and learn about

security visualization

Data Analysis and Visualization Linuxdavixsecvizorg

D

V

X

bull Addressing the secviz dichotomy

bull Better industry - academia collaboration

bull More and better visualization tools

- Use-case driven product development

bull We need to solve the data semantics problem

- Common Event Expression

- Entity extraction

23

The Futurebull Addressing the secviz dichotomy

bull Better industry - academia collaboration

bull More and better visualization tools

- Use-case driven product development

bull We need to solve the data semantics problem

- Common Event Expression

- Entity extraction

23

Vielen Dank

S

E

C I

V

Z

raffael marty secviz org

Page 17: Security Research2.0 - FIT 2008

The Failure - The Wrong Integration

10

bull Using proprietary data formatbull Provide parsers for various data formats

bull does not scalebull is probably buggy incomplete

bull Use wrong data access paradigm bull complex configuration

eg needs an SSH connection

usrsharemanman5launchdplist5ltxml version=10 encoding=UTF-8gtltDOCTYPE plist PUBLIC -Apple ComputerDTD PLIST 10EN httpwwwapplecomDTDsPropertyList-10dtdgtltplist version=10gtltdictgt ltkeygt_nameltkeygt ltdictgt ltkeygt_isColumnltkeygt ltstringgtYESltstringgt ltkeygt_isOutlineColumnltkeygt ltstringgtYESltstringgt ltkeygt_orderltkeygt ltstringgt0ltstringgt ltdictgt ltkeygtbsd_nameltkeygt ltdictgt ltkeygt_orderltkeygt ltstringgt62ltstringgt ltdictgt ltkeygtdetachable_driveltkeygt ltdictgt ltkeygt_orderltkeygt ltstringgt59ltstringgt ltdictgt ltkeygtdevice_manufacturerltkeygt ltdictgt ltkeygt_orderltkeygt ltstringgt41ltstringgt ltdictgt ltkeygtdevice_modelltkeygt ltdictgt ltkeygt_orderltkeygt ltstringgt42ltstringgt ltdictgt ltkeygtdevice_revisionltkeygt

bull Keep It Simple Stupidbull Use CSV inputbull Use files as inputbull Offload to other tools

bull parsersbull data conversions

The Right Thing - KISS

11

Using node sizessizesource=1sizetarget=200maxNodeSize=02

usrsharemanman5launchdplist5ltxml version=10 encoding=UTF-8gtltDOCTYPE plist PUBLIC -Apple ComputerDTD PLIST 10EN httpwwwapplecomDTDsPropertyList-10dtdgtltplist version=10gtltdictgt ltkeygt_nameltkeygt ltdictgt ltkeygt_isColumnltkeygt ltstringgtYESltstringgt ltkeygt_isOutlineColumnltkeygt ltstringgtYESltstringgt ltkeygt_orderltkeygt ltstringgt0ltstringgt ltdictgt ltkeygtbsd_nameltkeygt ltdictgt ltkeygt_orderltkeygt ltstringgt62ltstringgt ltdictgt ltkeygtdetachable_driveltkeygt ltdictgt ltkeygt_orderltkeygt ltstringgt59ltstringgt ltdictgt ltkeygtdevice_manufacturerltkeygt ltdictgt ltkeygt_orderltkeygt ltstringgt41ltstringgt ltdictgt ltkeygtdevice_modelltkeygt ltdictgt ltkeygt_orderltkeygt ltstringgt42ltstringgt ltdictgt ltkeygtdevice_revisionltkeygt

The Failure - So What

12

The Right Thing - Help The User Along

13

bull Provide use-case aligned displaysbull Meaningful legendsbull Interactive explorationbull UI design that guides the user through tasksbull Do not overload displays

The Failure - Unnecessary Ink

14

The Right Thing - Apply Good Visualization Practices

15

bull Dont use graphics to decorate a few numbersbull Reduce data ink ratiobull Visualization principles

The 2nd Dichotomy

16

The 2nd Dichotomy

16

two worldsIndustry amp Academia

The 2nd Dichotomy

16

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The 2nd Dichotomy

16

bull donrsquot understand the real impact

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The 2nd Dichotomy

16

bull donrsquot understand the real impactbull get the 70 solution

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The 2nd Dichotomy

16

bull donrsquot understand the real impactbull get the 70 solutionbull donrsquot think big

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The 2nd Dichotomy

16

bull donrsquot understand the real impactbull get the 70 solutionbull donrsquot think bigbull no timemoney for real research

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The 2nd Dichotomy

16

bull donrsquot understand the real impactbull get the 70 solutionbull donrsquot think bigbull no timemoney for real researchbull canrsquot scale

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The 2nd Dichotomy

16

bull donrsquot understand the real impactbull get the 70 solutionbull donrsquot think bigbull no timemoney for real researchbull canrsquot scalebull work based off of a few

customerrsquos input

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The 2nd Dichotomy

16

bull donrsquot understand the real impactbull get the 70 solutionbull donrsquot think bigbull no timemoney for real researchbull canrsquot scalebull work based off of a few

customerrsquos input

bull donrsquot know whatrsquos been done in industry

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The 2nd Dichotomy

16

bull donrsquot understand the real impactbull get the 70 solutionbull donrsquot think bigbull no timemoney for real researchbull canrsquot scalebull work based off of a few

customerrsquos input

bull donrsquot know whatrsquos been done in industrybull donrsquot understand the use-cases

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The 2nd Dichotomy

16

bull donrsquot understand the real impactbull get the 70 solutionbull donrsquot think bigbull no timemoney for real researchbull canrsquot scalebull work based off of a few

customerrsquos input

bull donrsquot know whatrsquos been done in industrybull donrsquot understand the use-casesbull donrsquot understand the environments

data domain

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The 2nd Dichotomy

16

bull donrsquot understand the real impactbull get the 70 solutionbull donrsquot think bigbull no timemoney for real researchbull canrsquot scalebull work based off of a few

customerrsquos input

bull donrsquot know whatrsquos been done in industrybull donrsquot understand the use-casesbull donrsquot understand the environments

data domainbull work on simulated data

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The 2nd Dichotomy

16

bull donrsquot understand the real impactbull get the 70 solutionbull donrsquot think bigbull no timemoney for real researchbull canrsquot scalebull work based off of a few

customerrsquos input

bull donrsquot know whatrsquos been done in industrybull donrsquot understand the use-casesbull donrsquot understand the environments

data domainbull work on simulated databull construct their own problems

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The 2nd Dichotomy

16

bull donrsquot understand the real impactbull get the 70 solutionbull donrsquot think bigbull no timemoney for real researchbull canrsquot scalebull work based off of a few

customerrsquos input

bull donrsquot know whatrsquos been done in industrybull donrsquot understand the use-casesbull donrsquot understand the environments

data domainbull work on simulated databull construct their own problems bull use overly complicated impractical

solutions

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The 2nd Dichotomy

16

bull donrsquot understand the real impactbull get the 70 solutionbull donrsquot think bigbull no timemoney for real researchbull canrsquot scalebull work based off of a few

customerrsquos input

bull donrsquot know whatrsquos been done in industrybull donrsquot understand the use-casesbull donrsquot understand the environments

data domainbull work on simulated databull construct their own problems bull use overly complicated impractical

solutionsbull use graphs visualization where it is not

needed

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The Way Forward

17

bull Building a secviz disciplinebull Bridging the gapbull Learning the ldquootherrdquo discipline

Security Visualization

SecViz

bull More academia industry collaboration bull Build components widgets gadgetsbull (Re-)use existing technologiesbull Focus on strengthsbull Focus on the visualization and interaction aspects

Two disciplines

Two worlds

18

bull Use-case oriented visualizationbull Perimeter Threatbull Governance Risk Compliance (GRC)bull Insider Threat bull IT data visualizationbull SecVizOrgbull DAVIX

My Focus Areas

18

bull Use-case oriented visualizationbull Perimeter Threatbull Governance Risk Compliance (GRC)bull Insider Threat bull IT data visualizationbull SecVizOrgbull DAVIX

Insider Threat Visualizationbull Huge amounts of databull More and other data sources than for the traditional security use-cases- Insiders often have legitimate access to machines and data You need to log more than the

exceptions

- Insider crimes are often executed on the application layer

bull The questions are not known in advance - Visualization provokes questions and helps find answers

bull Dynamic nature of fraud- Problem for static algorithms

- Bandits quickly adapt to fixed threshold-based detection systems

bull Looking for any unusual patterns

19

20

20

SecViz - Security VisualizationThis is a place to share discuss challenge and learn about

security visualization

Data Analysis and Visualization Linuxdavixsecvizorg

D

V

X

bull Addressing the secviz dichotomy

bull Better industry - academia collaboration

bull More and better visualization tools

- Use-case driven product development

bull We need to solve the data semantics problem

- Common Event Expression

- Entity extraction

23

The Futurebull Addressing the secviz dichotomy

bull Better industry - academia collaboration

bull More and better visualization tools

- Use-case driven product development

bull We need to solve the data semantics problem

- Common Event Expression

- Entity extraction

23

Vielen Dank

S

E

C I

V

Z

raffael marty secviz org

Page 18: Security Research2.0 - FIT 2008

bull Keep It Simple Stupidbull Use CSV inputbull Use files as inputbull Offload to other tools

bull parsersbull data conversions

The Right Thing - KISS

11

Using node sizessizesource=1sizetarget=200maxNodeSize=02

usrsharemanman5launchdplist5ltxml version=10 encoding=UTF-8gtltDOCTYPE plist PUBLIC -Apple ComputerDTD PLIST 10EN httpwwwapplecomDTDsPropertyList-10dtdgtltplist version=10gtltdictgt ltkeygt_nameltkeygt ltdictgt ltkeygt_isColumnltkeygt ltstringgtYESltstringgt ltkeygt_isOutlineColumnltkeygt ltstringgtYESltstringgt ltkeygt_orderltkeygt ltstringgt0ltstringgt ltdictgt ltkeygtbsd_nameltkeygt ltdictgt ltkeygt_orderltkeygt ltstringgt62ltstringgt ltdictgt ltkeygtdetachable_driveltkeygt ltdictgt ltkeygt_orderltkeygt ltstringgt59ltstringgt ltdictgt ltkeygtdevice_manufacturerltkeygt ltdictgt ltkeygt_orderltkeygt ltstringgt41ltstringgt ltdictgt ltkeygtdevice_modelltkeygt ltdictgt ltkeygt_orderltkeygt ltstringgt42ltstringgt ltdictgt ltkeygtdevice_revisionltkeygt

The Failure - So What

12

The Right Thing - Help The User Along

13

bull Provide use-case aligned displaysbull Meaningful legendsbull Interactive explorationbull UI design that guides the user through tasksbull Do not overload displays

The Failure - Unnecessary Ink

14

The Right Thing - Apply Good Visualization Practices

15

bull Dont use graphics to decorate a few numbersbull Reduce data ink ratiobull Visualization principles

The 2nd Dichotomy

16

The 2nd Dichotomy

16

two worldsIndustry amp Academia

The 2nd Dichotomy

16

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The 2nd Dichotomy

16

bull donrsquot understand the real impact

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The 2nd Dichotomy

16

bull donrsquot understand the real impactbull get the 70 solution

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The 2nd Dichotomy

16

bull donrsquot understand the real impactbull get the 70 solutionbull donrsquot think big

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The 2nd Dichotomy

16

bull donrsquot understand the real impactbull get the 70 solutionbull donrsquot think bigbull no timemoney for real research

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The 2nd Dichotomy

16

bull donrsquot understand the real impactbull get the 70 solutionbull donrsquot think bigbull no timemoney for real researchbull canrsquot scale

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The 2nd Dichotomy

16

bull donrsquot understand the real impactbull get the 70 solutionbull donrsquot think bigbull no timemoney for real researchbull canrsquot scalebull work based off of a few

customerrsquos input

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The 2nd Dichotomy

16

bull donrsquot understand the real impactbull get the 70 solutionbull donrsquot think bigbull no timemoney for real researchbull canrsquot scalebull work based off of a few

customerrsquos input

bull donrsquot know whatrsquos been done in industry

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The 2nd Dichotomy

16

bull donrsquot understand the real impactbull get the 70 solutionbull donrsquot think bigbull no timemoney for real researchbull canrsquot scalebull work based off of a few

customerrsquos input

bull donrsquot know whatrsquos been done in industrybull donrsquot understand the use-cases

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The 2nd Dichotomy

16

bull donrsquot understand the real impactbull get the 70 solutionbull donrsquot think bigbull no timemoney for real researchbull canrsquot scalebull work based off of a few

customerrsquos input

bull donrsquot know whatrsquos been done in industrybull donrsquot understand the use-casesbull donrsquot understand the environments

data domain

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The 2nd Dichotomy

16

bull donrsquot understand the real impactbull get the 70 solutionbull donrsquot think bigbull no timemoney for real researchbull canrsquot scalebull work based off of a few

customerrsquos input

bull donrsquot know whatrsquos been done in industrybull donrsquot understand the use-casesbull donrsquot understand the environments

data domainbull work on simulated data

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The 2nd Dichotomy

16

bull donrsquot understand the real impactbull get the 70 solutionbull donrsquot think bigbull no timemoney for real researchbull canrsquot scalebull work based off of a few

customerrsquos input

bull donrsquot know whatrsquos been done in industrybull donrsquot understand the use-casesbull donrsquot understand the environments

data domainbull work on simulated databull construct their own problems

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The 2nd Dichotomy

16

bull donrsquot understand the real impactbull get the 70 solutionbull donrsquot think bigbull no timemoney for real researchbull canrsquot scalebull work based off of a few

customerrsquos input

bull donrsquot know whatrsquos been done in industrybull donrsquot understand the use-casesbull donrsquot understand the environments

data domainbull work on simulated databull construct their own problems bull use overly complicated impractical

solutions

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The 2nd Dichotomy

16

bull donrsquot understand the real impactbull get the 70 solutionbull donrsquot think bigbull no timemoney for real researchbull canrsquot scalebull work based off of a few

customerrsquos input

bull donrsquot know whatrsquos been done in industrybull donrsquot understand the use-casesbull donrsquot understand the environments

data domainbull work on simulated databull construct their own problems bull use overly complicated impractical

solutionsbull use graphs visualization where it is not

needed

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The Way Forward

17

bull Building a secviz disciplinebull Bridging the gapbull Learning the ldquootherrdquo discipline

Security Visualization

SecViz

bull More academia industry collaboration bull Build components widgets gadgetsbull (Re-)use existing technologiesbull Focus on strengthsbull Focus on the visualization and interaction aspects

Two disciplines

Two worlds

18

bull Use-case oriented visualizationbull Perimeter Threatbull Governance Risk Compliance (GRC)bull Insider Threat bull IT data visualizationbull SecVizOrgbull DAVIX

My Focus Areas

18

bull Use-case oriented visualizationbull Perimeter Threatbull Governance Risk Compliance (GRC)bull Insider Threat bull IT data visualizationbull SecVizOrgbull DAVIX

Insider Threat Visualizationbull Huge amounts of databull More and other data sources than for the traditional security use-cases- Insiders often have legitimate access to machines and data You need to log more than the

exceptions

- Insider crimes are often executed on the application layer

bull The questions are not known in advance - Visualization provokes questions and helps find answers

bull Dynamic nature of fraud- Problem for static algorithms

- Bandits quickly adapt to fixed threshold-based detection systems

bull Looking for any unusual patterns

19

20

20

SecViz - Security VisualizationThis is a place to share discuss challenge and learn about

security visualization

Data Analysis and Visualization Linuxdavixsecvizorg

D

V

X

bull Addressing the secviz dichotomy

bull Better industry - academia collaboration

bull More and better visualization tools

- Use-case driven product development

bull We need to solve the data semantics problem

- Common Event Expression

- Entity extraction

23

The Futurebull Addressing the secviz dichotomy

bull Better industry - academia collaboration

bull More and better visualization tools

- Use-case driven product development

bull We need to solve the data semantics problem

- Common Event Expression

- Entity extraction

23

Vielen Dank

S

E

C I

V

Z

raffael marty secviz org

Page 19: Security Research2.0 - FIT 2008

The Failure - So What

12

The Right Thing - Help The User Along

13

bull Provide use-case aligned displaysbull Meaningful legendsbull Interactive explorationbull UI design that guides the user through tasksbull Do not overload displays

The Failure - Unnecessary Ink

14

The Right Thing - Apply Good Visualization Practices

15

bull Dont use graphics to decorate a few numbersbull Reduce data ink ratiobull Visualization principles

The 2nd Dichotomy

16

The 2nd Dichotomy

16

two worldsIndustry amp Academia

The 2nd Dichotomy

16

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The 2nd Dichotomy

16

bull donrsquot understand the real impact

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The 2nd Dichotomy

16

bull donrsquot understand the real impactbull get the 70 solution

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The 2nd Dichotomy

16

bull donrsquot understand the real impactbull get the 70 solutionbull donrsquot think big

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The 2nd Dichotomy

16

bull donrsquot understand the real impactbull get the 70 solutionbull donrsquot think bigbull no timemoney for real research

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The 2nd Dichotomy

16

bull donrsquot understand the real impactbull get the 70 solutionbull donrsquot think bigbull no timemoney for real researchbull canrsquot scale

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The 2nd Dichotomy

16

bull donrsquot understand the real impactbull get the 70 solutionbull donrsquot think bigbull no timemoney for real researchbull canrsquot scalebull work based off of a few

customerrsquos input

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The 2nd Dichotomy

16

bull donrsquot understand the real impactbull get the 70 solutionbull donrsquot think bigbull no timemoney for real researchbull canrsquot scalebull work based off of a few

customerrsquos input

bull donrsquot know whatrsquos been done in industry

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The 2nd Dichotomy

16

bull donrsquot understand the real impactbull get the 70 solutionbull donrsquot think bigbull no timemoney for real researchbull canrsquot scalebull work based off of a few

customerrsquos input

bull donrsquot know whatrsquos been done in industrybull donrsquot understand the use-cases

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The 2nd Dichotomy

16

bull donrsquot understand the real impactbull get the 70 solutionbull donrsquot think bigbull no timemoney for real researchbull canrsquot scalebull work based off of a few

customerrsquos input

bull donrsquot know whatrsquos been done in industrybull donrsquot understand the use-casesbull donrsquot understand the environments

data domain

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The 2nd Dichotomy

16

bull donrsquot understand the real impactbull get the 70 solutionbull donrsquot think bigbull no timemoney for real researchbull canrsquot scalebull work based off of a few

customerrsquos input

bull donrsquot know whatrsquos been done in industrybull donrsquot understand the use-casesbull donrsquot understand the environments

data domainbull work on simulated data

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The 2nd Dichotomy

16

bull donrsquot understand the real impactbull get the 70 solutionbull donrsquot think bigbull no timemoney for real researchbull canrsquot scalebull work based off of a few

customerrsquos input

bull donrsquot know whatrsquos been done in industrybull donrsquot understand the use-casesbull donrsquot understand the environments

data domainbull work on simulated databull construct their own problems

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The 2nd Dichotomy

16

bull donrsquot understand the real impactbull get the 70 solutionbull donrsquot think bigbull no timemoney for real researchbull canrsquot scalebull work based off of a few

customerrsquos input

bull donrsquot know whatrsquos been done in industrybull donrsquot understand the use-casesbull donrsquot understand the environments

data domainbull work on simulated databull construct their own problems bull use overly complicated impractical

solutions

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The 2nd Dichotomy

16

bull donrsquot understand the real impactbull get the 70 solutionbull donrsquot think bigbull no timemoney for real researchbull canrsquot scalebull work based off of a few

customerrsquos input

bull donrsquot know whatrsquos been done in industrybull donrsquot understand the use-casesbull donrsquot understand the environments

data domainbull work on simulated databull construct their own problems bull use overly complicated impractical

solutionsbull use graphs visualization where it is not

needed

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The Way Forward

17

bull Building a secviz disciplinebull Bridging the gapbull Learning the ldquootherrdquo discipline

Security Visualization

SecViz

bull More academia industry collaboration bull Build components widgets gadgetsbull (Re-)use existing technologiesbull Focus on strengthsbull Focus on the visualization and interaction aspects

Two disciplines

Two worlds

18

bull Use-case oriented visualizationbull Perimeter Threatbull Governance Risk Compliance (GRC)bull Insider Threat bull IT data visualizationbull SecVizOrgbull DAVIX

My Focus Areas

18

bull Use-case oriented visualizationbull Perimeter Threatbull Governance Risk Compliance (GRC)bull Insider Threat bull IT data visualizationbull SecVizOrgbull DAVIX

Insider Threat Visualizationbull Huge amounts of databull More and other data sources than for the traditional security use-cases- Insiders often have legitimate access to machines and data You need to log more than the

exceptions

- Insider crimes are often executed on the application layer

bull The questions are not known in advance - Visualization provokes questions and helps find answers

bull Dynamic nature of fraud- Problem for static algorithms

- Bandits quickly adapt to fixed threshold-based detection systems

bull Looking for any unusual patterns

19

20

20

SecViz - Security VisualizationThis is a place to share discuss challenge and learn about

security visualization

Data Analysis and Visualization Linuxdavixsecvizorg

D

V

X

bull Addressing the secviz dichotomy

bull Better industry - academia collaboration

bull More and better visualization tools

- Use-case driven product development

bull We need to solve the data semantics problem

- Common Event Expression

- Entity extraction

23

The Futurebull Addressing the secviz dichotomy

bull Better industry - academia collaboration

bull More and better visualization tools

- Use-case driven product development

bull We need to solve the data semantics problem

- Common Event Expression

- Entity extraction

23

Vielen Dank

S

E

C I

V

Z

raffael marty secviz org

Page 20: Security Research2.0 - FIT 2008

The Right Thing - Help The User Along

13

bull Provide use-case aligned displaysbull Meaningful legendsbull Interactive explorationbull UI design that guides the user through tasksbull Do not overload displays

The Failure - Unnecessary Ink

14

The Right Thing - Apply Good Visualization Practices

15

bull Dont use graphics to decorate a few numbersbull Reduce data ink ratiobull Visualization principles

The 2nd Dichotomy

16

The 2nd Dichotomy

16

two worldsIndustry amp Academia

The 2nd Dichotomy

16

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The 2nd Dichotomy

16

bull donrsquot understand the real impact

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The 2nd Dichotomy

16

bull donrsquot understand the real impactbull get the 70 solution

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The 2nd Dichotomy

16

bull donrsquot understand the real impactbull get the 70 solutionbull donrsquot think big

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The 2nd Dichotomy

16

bull donrsquot understand the real impactbull get the 70 solutionbull donrsquot think bigbull no timemoney for real research

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The 2nd Dichotomy

16

bull donrsquot understand the real impactbull get the 70 solutionbull donrsquot think bigbull no timemoney for real researchbull canrsquot scale

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The 2nd Dichotomy

16

bull donrsquot understand the real impactbull get the 70 solutionbull donrsquot think bigbull no timemoney for real researchbull canrsquot scalebull work based off of a few

customerrsquos input

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The 2nd Dichotomy

16

bull donrsquot understand the real impactbull get the 70 solutionbull donrsquot think bigbull no timemoney for real researchbull canrsquot scalebull work based off of a few

customerrsquos input

bull donrsquot know whatrsquos been done in industry

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The 2nd Dichotomy

16

bull donrsquot understand the real impactbull get the 70 solutionbull donrsquot think bigbull no timemoney for real researchbull canrsquot scalebull work based off of a few

customerrsquos input

bull donrsquot know whatrsquos been done in industrybull donrsquot understand the use-cases

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The 2nd Dichotomy

16

bull donrsquot understand the real impactbull get the 70 solutionbull donrsquot think bigbull no timemoney for real researchbull canrsquot scalebull work based off of a few

customerrsquos input

bull donrsquot know whatrsquos been done in industrybull donrsquot understand the use-casesbull donrsquot understand the environments

data domain

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The 2nd Dichotomy

16

bull donrsquot understand the real impactbull get the 70 solutionbull donrsquot think bigbull no timemoney for real researchbull canrsquot scalebull work based off of a few

customerrsquos input

bull donrsquot know whatrsquos been done in industrybull donrsquot understand the use-casesbull donrsquot understand the environments

data domainbull work on simulated data

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The 2nd Dichotomy

16

bull donrsquot understand the real impactbull get the 70 solutionbull donrsquot think bigbull no timemoney for real researchbull canrsquot scalebull work based off of a few

customerrsquos input

bull donrsquot know whatrsquos been done in industrybull donrsquot understand the use-casesbull donrsquot understand the environments

data domainbull work on simulated databull construct their own problems

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The 2nd Dichotomy

16

bull donrsquot understand the real impactbull get the 70 solutionbull donrsquot think bigbull no timemoney for real researchbull canrsquot scalebull work based off of a few

customerrsquos input

bull donrsquot know whatrsquos been done in industrybull donrsquot understand the use-casesbull donrsquot understand the environments

data domainbull work on simulated databull construct their own problems bull use overly complicated impractical

solutions

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The 2nd Dichotomy

16

bull donrsquot understand the real impactbull get the 70 solutionbull donrsquot think bigbull no timemoney for real researchbull canrsquot scalebull work based off of a few

customerrsquos input

bull donrsquot know whatrsquos been done in industrybull donrsquot understand the use-casesbull donrsquot understand the environments

data domainbull work on simulated databull construct their own problems bull use overly complicated impractical

solutionsbull use graphs visualization where it is not

needed

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The Way Forward

17

bull Building a secviz disciplinebull Bridging the gapbull Learning the ldquootherrdquo discipline

Security Visualization

SecViz

bull More academia industry collaboration bull Build components widgets gadgetsbull (Re-)use existing technologiesbull Focus on strengthsbull Focus on the visualization and interaction aspects

Two disciplines

Two worlds

18

bull Use-case oriented visualizationbull Perimeter Threatbull Governance Risk Compliance (GRC)bull Insider Threat bull IT data visualizationbull SecVizOrgbull DAVIX

My Focus Areas

18

bull Use-case oriented visualizationbull Perimeter Threatbull Governance Risk Compliance (GRC)bull Insider Threat bull IT data visualizationbull SecVizOrgbull DAVIX

Insider Threat Visualizationbull Huge amounts of databull More and other data sources than for the traditional security use-cases- Insiders often have legitimate access to machines and data You need to log more than the

exceptions

- Insider crimes are often executed on the application layer

bull The questions are not known in advance - Visualization provokes questions and helps find answers

bull Dynamic nature of fraud- Problem for static algorithms

- Bandits quickly adapt to fixed threshold-based detection systems

bull Looking for any unusual patterns

19

20

20

SecViz - Security VisualizationThis is a place to share discuss challenge and learn about

security visualization

Data Analysis and Visualization Linuxdavixsecvizorg

D

V

X

bull Addressing the secviz dichotomy

bull Better industry - academia collaboration

bull More and better visualization tools

- Use-case driven product development

bull We need to solve the data semantics problem

- Common Event Expression

- Entity extraction

23

The Futurebull Addressing the secviz dichotomy

bull Better industry - academia collaboration

bull More and better visualization tools

- Use-case driven product development

bull We need to solve the data semantics problem

- Common Event Expression

- Entity extraction

23

Vielen Dank

S

E

C I

V

Z

raffael marty secviz org

Page 21: Security Research2.0 - FIT 2008

The Failure - Unnecessary Ink

14

The Right Thing - Apply Good Visualization Practices

15

bull Dont use graphics to decorate a few numbersbull Reduce data ink ratiobull Visualization principles

The 2nd Dichotomy

16

The 2nd Dichotomy

16

two worldsIndustry amp Academia

The 2nd Dichotomy

16

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The 2nd Dichotomy

16

bull donrsquot understand the real impact

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The 2nd Dichotomy

16

bull donrsquot understand the real impactbull get the 70 solution

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The 2nd Dichotomy

16

bull donrsquot understand the real impactbull get the 70 solutionbull donrsquot think big

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The 2nd Dichotomy

16

bull donrsquot understand the real impactbull get the 70 solutionbull donrsquot think bigbull no timemoney for real research

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The 2nd Dichotomy

16

bull donrsquot understand the real impactbull get the 70 solutionbull donrsquot think bigbull no timemoney for real researchbull canrsquot scale

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The 2nd Dichotomy

16

bull donrsquot understand the real impactbull get the 70 solutionbull donrsquot think bigbull no timemoney for real researchbull canrsquot scalebull work based off of a few

customerrsquos input

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The 2nd Dichotomy

16

bull donrsquot understand the real impactbull get the 70 solutionbull donrsquot think bigbull no timemoney for real researchbull canrsquot scalebull work based off of a few

customerrsquos input

bull donrsquot know whatrsquos been done in industry

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The 2nd Dichotomy

16

bull donrsquot understand the real impactbull get the 70 solutionbull donrsquot think bigbull no timemoney for real researchbull canrsquot scalebull work based off of a few

customerrsquos input

bull donrsquot know whatrsquos been done in industrybull donrsquot understand the use-cases

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The 2nd Dichotomy

16

bull donrsquot understand the real impactbull get the 70 solutionbull donrsquot think bigbull no timemoney for real researchbull canrsquot scalebull work based off of a few

customerrsquos input

bull donrsquot know whatrsquos been done in industrybull donrsquot understand the use-casesbull donrsquot understand the environments

data domain

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The 2nd Dichotomy

16

bull donrsquot understand the real impactbull get the 70 solutionbull donrsquot think bigbull no timemoney for real researchbull canrsquot scalebull work based off of a few

customerrsquos input

bull donrsquot know whatrsquos been done in industrybull donrsquot understand the use-casesbull donrsquot understand the environments

data domainbull work on simulated data

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The 2nd Dichotomy

16

bull donrsquot understand the real impactbull get the 70 solutionbull donrsquot think bigbull no timemoney for real researchbull canrsquot scalebull work based off of a few

customerrsquos input

bull donrsquot know whatrsquos been done in industrybull donrsquot understand the use-casesbull donrsquot understand the environments

data domainbull work on simulated databull construct their own problems

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The 2nd Dichotomy

16

bull donrsquot understand the real impactbull get the 70 solutionbull donrsquot think bigbull no timemoney for real researchbull canrsquot scalebull work based off of a few

customerrsquos input

bull donrsquot know whatrsquos been done in industrybull donrsquot understand the use-casesbull donrsquot understand the environments

data domainbull work on simulated databull construct their own problems bull use overly complicated impractical

solutions

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The 2nd Dichotomy

16

bull donrsquot understand the real impactbull get the 70 solutionbull donrsquot think bigbull no timemoney for real researchbull canrsquot scalebull work based off of a few

customerrsquos input

bull donrsquot know whatrsquos been done in industrybull donrsquot understand the use-casesbull donrsquot understand the environments

data domainbull work on simulated databull construct their own problems bull use overly complicated impractical

solutionsbull use graphs visualization where it is not

needed

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The Way Forward

17

bull Building a secviz disciplinebull Bridging the gapbull Learning the ldquootherrdquo discipline

Security Visualization

SecViz

bull More academia industry collaboration bull Build components widgets gadgetsbull (Re-)use existing technologiesbull Focus on strengthsbull Focus on the visualization and interaction aspects

Two disciplines

Two worlds

18

bull Use-case oriented visualizationbull Perimeter Threatbull Governance Risk Compliance (GRC)bull Insider Threat bull IT data visualizationbull SecVizOrgbull DAVIX

My Focus Areas

18

bull Use-case oriented visualizationbull Perimeter Threatbull Governance Risk Compliance (GRC)bull Insider Threat bull IT data visualizationbull SecVizOrgbull DAVIX

Insider Threat Visualizationbull Huge amounts of databull More and other data sources than for the traditional security use-cases- Insiders often have legitimate access to machines and data You need to log more than the

exceptions

- Insider crimes are often executed on the application layer

bull The questions are not known in advance - Visualization provokes questions and helps find answers

bull Dynamic nature of fraud- Problem for static algorithms

- Bandits quickly adapt to fixed threshold-based detection systems

bull Looking for any unusual patterns

19

20

20

SecViz - Security VisualizationThis is a place to share discuss challenge and learn about

security visualization

Data Analysis and Visualization Linuxdavixsecvizorg

D

V

X

bull Addressing the secviz dichotomy

bull Better industry - academia collaboration

bull More and better visualization tools

- Use-case driven product development

bull We need to solve the data semantics problem

- Common Event Expression

- Entity extraction

23

The Futurebull Addressing the secviz dichotomy

bull Better industry - academia collaboration

bull More and better visualization tools

- Use-case driven product development

bull We need to solve the data semantics problem

- Common Event Expression

- Entity extraction

23

Vielen Dank

S

E

C I

V

Z

raffael marty secviz org

Page 22: Security Research2.0 - FIT 2008

The Right Thing - Apply Good Visualization Practices

15

bull Dont use graphics to decorate a few numbersbull Reduce data ink ratiobull Visualization principles

The 2nd Dichotomy

16

The 2nd Dichotomy

16

two worldsIndustry amp Academia

The 2nd Dichotomy

16

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The 2nd Dichotomy

16

bull donrsquot understand the real impact

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The 2nd Dichotomy

16

bull donrsquot understand the real impactbull get the 70 solution

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The 2nd Dichotomy

16

bull donrsquot understand the real impactbull get the 70 solutionbull donrsquot think big

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The 2nd Dichotomy

16

bull donrsquot understand the real impactbull get the 70 solutionbull donrsquot think bigbull no timemoney for real research

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The 2nd Dichotomy

16

bull donrsquot understand the real impactbull get the 70 solutionbull donrsquot think bigbull no timemoney for real researchbull canrsquot scale

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The 2nd Dichotomy

16

bull donrsquot understand the real impactbull get the 70 solutionbull donrsquot think bigbull no timemoney for real researchbull canrsquot scalebull work based off of a few

customerrsquos input

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The 2nd Dichotomy

16

bull donrsquot understand the real impactbull get the 70 solutionbull donrsquot think bigbull no timemoney for real researchbull canrsquot scalebull work based off of a few

customerrsquos input

bull donrsquot know whatrsquos been done in industry

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The 2nd Dichotomy

16

bull donrsquot understand the real impactbull get the 70 solutionbull donrsquot think bigbull no timemoney for real researchbull canrsquot scalebull work based off of a few

customerrsquos input

bull donrsquot know whatrsquos been done in industrybull donrsquot understand the use-cases

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The 2nd Dichotomy

16

bull donrsquot understand the real impactbull get the 70 solutionbull donrsquot think bigbull no timemoney for real researchbull canrsquot scalebull work based off of a few

customerrsquos input

bull donrsquot know whatrsquos been done in industrybull donrsquot understand the use-casesbull donrsquot understand the environments

data domain

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The 2nd Dichotomy

16

bull donrsquot understand the real impactbull get the 70 solutionbull donrsquot think bigbull no timemoney for real researchbull canrsquot scalebull work based off of a few

customerrsquos input

bull donrsquot know whatrsquos been done in industrybull donrsquot understand the use-casesbull donrsquot understand the environments

data domainbull work on simulated data

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The 2nd Dichotomy

16

bull donrsquot understand the real impactbull get the 70 solutionbull donrsquot think bigbull no timemoney for real researchbull canrsquot scalebull work based off of a few

customerrsquos input

bull donrsquot know whatrsquos been done in industrybull donrsquot understand the use-casesbull donrsquot understand the environments

data domainbull work on simulated databull construct their own problems

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The 2nd Dichotomy

16

bull donrsquot understand the real impactbull get the 70 solutionbull donrsquot think bigbull no timemoney for real researchbull canrsquot scalebull work based off of a few

customerrsquos input

bull donrsquot know whatrsquos been done in industrybull donrsquot understand the use-casesbull donrsquot understand the environments

data domainbull work on simulated databull construct their own problems bull use overly complicated impractical

solutions

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The 2nd Dichotomy

16

bull donrsquot understand the real impactbull get the 70 solutionbull donrsquot think bigbull no timemoney for real researchbull canrsquot scalebull work based off of a few

customerrsquos input

bull donrsquot know whatrsquos been done in industrybull donrsquot understand the use-casesbull donrsquot understand the environments

data domainbull work on simulated databull construct their own problems bull use overly complicated impractical

solutionsbull use graphs visualization where it is not

needed

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The Way Forward

17

bull Building a secviz disciplinebull Bridging the gapbull Learning the ldquootherrdquo discipline

Security Visualization

SecViz

bull More academia industry collaboration bull Build components widgets gadgetsbull (Re-)use existing technologiesbull Focus on strengthsbull Focus on the visualization and interaction aspects

Two disciplines

Two worlds

18

bull Use-case oriented visualizationbull Perimeter Threatbull Governance Risk Compliance (GRC)bull Insider Threat bull IT data visualizationbull SecVizOrgbull DAVIX

My Focus Areas

18

bull Use-case oriented visualizationbull Perimeter Threatbull Governance Risk Compliance (GRC)bull Insider Threat bull IT data visualizationbull SecVizOrgbull DAVIX

Insider Threat Visualizationbull Huge amounts of databull More and other data sources than for the traditional security use-cases- Insiders often have legitimate access to machines and data You need to log more than the

exceptions

- Insider crimes are often executed on the application layer

bull The questions are not known in advance - Visualization provokes questions and helps find answers

bull Dynamic nature of fraud- Problem for static algorithms

- Bandits quickly adapt to fixed threshold-based detection systems

bull Looking for any unusual patterns

19

20

20

SecViz - Security VisualizationThis is a place to share discuss challenge and learn about

security visualization

Data Analysis and Visualization Linuxdavixsecvizorg

D

V

X

bull Addressing the secviz dichotomy

bull Better industry - academia collaboration

bull More and better visualization tools

- Use-case driven product development

bull We need to solve the data semantics problem

- Common Event Expression

- Entity extraction

23

The Futurebull Addressing the secviz dichotomy

bull Better industry - academia collaboration

bull More and better visualization tools

- Use-case driven product development

bull We need to solve the data semantics problem

- Common Event Expression

- Entity extraction

23

Vielen Dank

S

E

C I

V

Z

raffael marty secviz org

Page 23: Security Research2.0 - FIT 2008

The 2nd Dichotomy

16

The 2nd Dichotomy

16

two worldsIndustry amp Academia

The 2nd Dichotomy

16

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The 2nd Dichotomy

16

bull donrsquot understand the real impact

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The 2nd Dichotomy

16

bull donrsquot understand the real impactbull get the 70 solution

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The 2nd Dichotomy

16

bull donrsquot understand the real impactbull get the 70 solutionbull donrsquot think big

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The 2nd Dichotomy

16

bull donrsquot understand the real impactbull get the 70 solutionbull donrsquot think bigbull no timemoney for real research

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The 2nd Dichotomy

16

bull donrsquot understand the real impactbull get the 70 solutionbull donrsquot think bigbull no timemoney for real researchbull canrsquot scale

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The 2nd Dichotomy

16

bull donrsquot understand the real impactbull get the 70 solutionbull donrsquot think bigbull no timemoney for real researchbull canrsquot scalebull work based off of a few

customerrsquos input

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The 2nd Dichotomy

16

bull donrsquot understand the real impactbull get the 70 solutionbull donrsquot think bigbull no timemoney for real researchbull canrsquot scalebull work based off of a few

customerrsquos input

bull donrsquot know whatrsquos been done in industry

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The 2nd Dichotomy

16

bull donrsquot understand the real impactbull get the 70 solutionbull donrsquot think bigbull no timemoney for real researchbull canrsquot scalebull work based off of a few

customerrsquos input

bull donrsquot know whatrsquos been done in industrybull donrsquot understand the use-cases

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The 2nd Dichotomy

16

bull donrsquot understand the real impactbull get the 70 solutionbull donrsquot think bigbull no timemoney for real researchbull canrsquot scalebull work based off of a few

customerrsquos input

bull donrsquot know whatrsquos been done in industrybull donrsquot understand the use-casesbull donrsquot understand the environments

data domain

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The 2nd Dichotomy

16

bull donrsquot understand the real impactbull get the 70 solutionbull donrsquot think bigbull no timemoney for real researchbull canrsquot scalebull work based off of a few

customerrsquos input

bull donrsquot know whatrsquos been done in industrybull donrsquot understand the use-casesbull donrsquot understand the environments

data domainbull work on simulated data

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The 2nd Dichotomy

16

bull donrsquot understand the real impactbull get the 70 solutionbull donrsquot think bigbull no timemoney for real researchbull canrsquot scalebull work based off of a few

customerrsquos input

bull donrsquot know whatrsquos been done in industrybull donrsquot understand the use-casesbull donrsquot understand the environments

data domainbull work on simulated databull construct their own problems

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The 2nd Dichotomy

16

bull donrsquot understand the real impactbull get the 70 solutionbull donrsquot think bigbull no timemoney for real researchbull canrsquot scalebull work based off of a few

customerrsquos input

bull donrsquot know whatrsquos been done in industrybull donrsquot understand the use-casesbull donrsquot understand the environments

data domainbull work on simulated databull construct their own problems bull use overly complicated impractical

solutions

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The 2nd Dichotomy

16

bull donrsquot understand the real impactbull get the 70 solutionbull donrsquot think bigbull no timemoney for real researchbull canrsquot scalebull work based off of a few

customerrsquos input

bull donrsquot know whatrsquos been done in industrybull donrsquot understand the use-casesbull donrsquot understand the environments

data domainbull work on simulated databull construct their own problems bull use overly complicated impractical

solutionsbull use graphs visualization where it is not

needed

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The Way Forward

17

bull Building a secviz disciplinebull Bridging the gapbull Learning the ldquootherrdquo discipline

Security Visualization

SecViz

bull More academia industry collaboration bull Build components widgets gadgetsbull (Re-)use existing technologiesbull Focus on strengthsbull Focus on the visualization and interaction aspects

Two disciplines

Two worlds

18

bull Use-case oriented visualizationbull Perimeter Threatbull Governance Risk Compliance (GRC)bull Insider Threat bull IT data visualizationbull SecVizOrgbull DAVIX

My Focus Areas

18

bull Use-case oriented visualizationbull Perimeter Threatbull Governance Risk Compliance (GRC)bull Insider Threat bull IT data visualizationbull SecVizOrgbull DAVIX

Insider Threat Visualizationbull Huge amounts of databull More and other data sources than for the traditional security use-cases- Insiders often have legitimate access to machines and data You need to log more than the

exceptions

- Insider crimes are often executed on the application layer

bull The questions are not known in advance - Visualization provokes questions and helps find answers

bull Dynamic nature of fraud- Problem for static algorithms

- Bandits quickly adapt to fixed threshold-based detection systems

bull Looking for any unusual patterns

19

20

20

SecViz - Security VisualizationThis is a place to share discuss challenge and learn about

security visualization

Data Analysis and Visualization Linuxdavixsecvizorg

D

V

X

bull Addressing the secviz dichotomy

bull Better industry - academia collaboration

bull More and better visualization tools

- Use-case driven product development

bull We need to solve the data semantics problem

- Common Event Expression

- Entity extraction

23

The Futurebull Addressing the secviz dichotomy

bull Better industry - academia collaboration

bull More and better visualization tools

- Use-case driven product development

bull We need to solve the data semantics problem

- Common Event Expression

- Entity extraction

23

Vielen Dank

S

E

C I

V

Z

raffael marty secviz org

Page 24: Security Research2.0 - FIT 2008

The 2nd Dichotomy

16

two worldsIndustry amp Academia

The 2nd Dichotomy

16

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The 2nd Dichotomy

16

bull donrsquot understand the real impact

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The 2nd Dichotomy

16

bull donrsquot understand the real impactbull get the 70 solution

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The 2nd Dichotomy

16

bull donrsquot understand the real impactbull get the 70 solutionbull donrsquot think big

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The 2nd Dichotomy

16

bull donrsquot understand the real impactbull get the 70 solutionbull donrsquot think bigbull no timemoney for real research

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The 2nd Dichotomy

16

bull donrsquot understand the real impactbull get the 70 solutionbull donrsquot think bigbull no timemoney for real researchbull canrsquot scale

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The 2nd Dichotomy

16

bull donrsquot understand the real impactbull get the 70 solutionbull donrsquot think bigbull no timemoney for real researchbull canrsquot scalebull work based off of a few

customerrsquos input

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The 2nd Dichotomy

16

bull donrsquot understand the real impactbull get the 70 solutionbull donrsquot think bigbull no timemoney for real researchbull canrsquot scalebull work based off of a few

customerrsquos input

bull donrsquot know whatrsquos been done in industry

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The 2nd Dichotomy

16

bull donrsquot understand the real impactbull get the 70 solutionbull donrsquot think bigbull no timemoney for real researchbull canrsquot scalebull work based off of a few

customerrsquos input

bull donrsquot know whatrsquos been done in industrybull donrsquot understand the use-cases

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The 2nd Dichotomy

16

bull donrsquot understand the real impactbull get the 70 solutionbull donrsquot think bigbull no timemoney for real researchbull canrsquot scalebull work based off of a few

customerrsquos input

bull donrsquot know whatrsquos been done in industrybull donrsquot understand the use-casesbull donrsquot understand the environments

data domain

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The 2nd Dichotomy

16

bull donrsquot understand the real impactbull get the 70 solutionbull donrsquot think bigbull no timemoney for real researchbull canrsquot scalebull work based off of a few

customerrsquos input

bull donrsquot know whatrsquos been done in industrybull donrsquot understand the use-casesbull donrsquot understand the environments

data domainbull work on simulated data

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The 2nd Dichotomy

16

bull donrsquot understand the real impactbull get the 70 solutionbull donrsquot think bigbull no timemoney for real researchbull canrsquot scalebull work based off of a few

customerrsquos input

bull donrsquot know whatrsquos been done in industrybull donrsquot understand the use-casesbull donrsquot understand the environments

data domainbull work on simulated databull construct their own problems

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The 2nd Dichotomy

16

bull donrsquot understand the real impactbull get the 70 solutionbull donrsquot think bigbull no timemoney for real researchbull canrsquot scalebull work based off of a few

customerrsquos input

bull donrsquot know whatrsquos been done in industrybull donrsquot understand the use-casesbull donrsquot understand the environments

data domainbull work on simulated databull construct their own problems bull use overly complicated impractical

solutions

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The 2nd Dichotomy

16

bull donrsquot understand the real impactbull get the 70 solutionbull donrsquot think bigbull no timemoney for real researchbull canrsquot scalebull work based off of a few

customerrsquos input

bull donrsquot know whatrsquos been done in industrybull donrsquot understand the use-casesbull donrsquot understand the environments

data domainbull work on simulated databull construct their own problems bull use overly complicated impractical

solutionsbull use graphs visualization where it is not

needed

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The Way Forward

17

bull Building a secviz disciplinebull Bridging the gapbull Learning the ldquootherrdquo discipline

Security Visualization

SecViz

bull More academia industry collaboration bull Build components widgets gadgetsbull (Re-)use existing technologiesbull Focus on strengthsbull Focus on the visualization and interaction aspects

Two disciplines

Two worlds

18

bull Use-case oriented visualizationbull Perimeter Threatbull Governance Risk Compliance (GRC)bull Insider Threat bull IT data visualizationbull SecVizOrgbull DAVIX

My Focus Areas

18

bull Use-case oriented visualizationbull Perimeter Threatbull Governance Risk Compliance (GRC)bull Insider Threat bull IT data visualizationbull SecVizOrgbull DAVIX

Insider Threat Visualizationbull Huge amounts of databull More and other data sources than for the traditional security use-cases- Insiders often have legitimate access to machines and data You need to log more than the

exceptions

- Insider crimes are often executed on the application layer

bull The questions are not known in advance - Visualization provokes questions and helps find answers

bull Dynamic nature of fraud- Problem for static algorithms

- Bandits quickly adapt to fixed threshold-based detection systems

bull Looking for any unusual patterns

19

20

20

SecViz - Security VisualizationThis is a place to share discuss challenge and learn about

security visualization

Data Analysis and Visualization Linuxdavixsecvizorg

D

V

X

bull Addressing the secviz dichotomy

bull Better industry - academia collaboration

bull More and better visualization tools

- Use-case driven product development

bull We need to solve the data semantics problem

- Common Event Expression

- Entity extraction

23

The Futurebull Addressing the secviz dichotomy

bull Better industry - academia collaboration

bull More and better visualization tools

- Use-case driven product development

bull We need to solve the data semantics problem

- Common Event Expression

- Entity extraction

23

Vielen Dank

S

E

C I

V

Z

raffael marty secviz org

Page 25: Security Research2.0 - FIT 2008

The 2nd Dichotomy

16

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The 2nd Dichotomy

16

bull donrsquot understand the real impact

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The 2nd Dichotomy

16

bull donrsquot understand the real impactbull get the 70 solution

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The 2nd Dichotomy

16

bull donrsquot understand the real impactbull get the 70 solutionbull donrsquot think big

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The 2nd Dichotomy

16

bull donrsquot understand the real impactbull get the 70 solutionbull donrsquot think bigbull no timemoney for real research

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The 2nd Dichotomy

16

bull donrsquot understand the real impactbull get the 70 solutionbull donrsquot think bigbull no timemoney for real researchbull canrsquot scale

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The 2nd Dichotomy

16

bull donrsquot understand the real impactbull get the 70 solutionbull donrsquot think bigbull no timemoney for real researchbull canrsquot scalebull work based off of a few

customerrsquos input

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The 2nd Dichotomy

16

bull donrsquot understand the real impactbull get the 70 solutionbull donrsquot think bigbull no timemoney for real researchbull canrsquot scalebull work based off of a few

customerrsquos input

bull donrsquot know whatrsquos been done in industry

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The 2nd Dichotomy

16

bull donrsquot understand the real impactbull get the 70 solutionbull donrsquot think bigbull no timemoney for real researchbull canrsquot scalebull work based off of a few

customerrsquos input

bull donrsquot know whatrsquos been done in industrybull donrsquot understand the use-cases

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The 2nd Dichotomy

16

bull donrsquot understand the real impactbull get the 70 solutionbull donrsquot think bigbull no timemoney for real researchbull canrsquot scalebull work based off of a few

customerrsquos input

bull donrsquot know whatrsquos been done in industrybull donrsquot understand the use-casesbull donrsquot understand the environments

data domain

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The 2nd Dichotomy

16

bull donrsquot understand the real impactbull get the 70 solutionbull donrsquot think bigbull no timemoney for real researchbull canrsquot scalebull work based off of a few

customerrsquos input

bull donrsquot know whatrsquos been done in industrybull donrsquot understand the use-casesbull donrsquot understand the environments

data domainbull work on simulated data

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The 2nd Dichotomy

16

bull donrsquot understand the real impactbull get the 70 solutionbull donrsquot think bigbull no timemoney for real researchbull canrsquot scalebull work based off of a few

customerrsquos input

bull donrsquot know whatrsquos been done in industrybull donrsquot understand the use-casesbull donrsquot understand the environments

data domainbull work on simulated databull construct their own problems

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The 2nd Dichotomy

16

bull donrsquot understand the real impactbull get the 70 solutionbull donrsquot think bigbull no timemoney for real researchbull canrsquot scalebull work based off of a few

customerrsquos input

bull donrsquot know whatrsquos been done in industrybull donrsquot understand the use-casesbull donrsquot understand the environments

data domainbull work on simulated databull construct their own problems bull use overly complicated impractical

solutions

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The 2nd Dichotomy

16

bull donrsquot understand the real impactbull get the 70 solutionbull donrsquot think bigbull no timemoney for real researchbull canrsquot scalebull work based off of a few

customerrsquos input

bull donrsquot know whatrsquos been done in industrybull donrsquot understand the use-casesbull donrsquot understand the environments

data domainbull work on simulated databull construct their own problems bull use overly complicated impractical

solutionsbull use graphs visualization where it is not

needed

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The Way Forward

17

bull Building a secviz disciplinebull Bridging the gapbull Learning the ldquootherrdquo discipline

Security Visualization

SecViz

bull More academia industry collaboration bull Build components widgets gadgetsbull (Re-)use existing technologiesbull Focus on strengthsbull Focus on the visualization and interaction aspects

Two disciplines

Two worlds

18

bull Use-case oriented visualizationbull Perimeter Threatbull Governance Risk Compliance (GRC)bull Insider Threat bull IT data visualizationbull SecVizOrgbull DAVIX

My Focus Areas

18

bull Use-case oriented visualizationbull Perimeter Threatbull Governance Risk Compliance (GRC)bull Insider Threat bull IT data visualizationbull SecVizOrgbull DAVIX

Insider Threat Visualizationbull Huge amounts of databull More and other data sources than for the traditional security use-cases- Insiders often have legitimate access to machines and data You need to log more than the

exceptions

- Insider crimes are often executed on the application layer

bull The questions are not known in advance - Visualization provokes questions and helps find answers

bull Dynamic nature of fraud- Problem for static algorithms

- Bandits quickly adapt to fixed threshold-based detection systems

bull Looking for any unusual patterns

19

20

20

SecViz - Security VisualizationThis is a place to share discuss challenge and learn about

security visualization

Data Analysis and Visualization Linuxdavixsecvizorg

D

V

X

bull Addressing the secviz dichotomy

bull Better industry - academia collaboration

bull More and better visualization tools

- Use-case driven product development

bull We need to solve the data semantics problem

- Common Event Expression

- Entity extraction

23

The Futurebull Addressing the secviz dichotomy

bull Better industry - academia collaboration

bull More and better visualization tools

- Use-case driven product development

bull We need to solve the data semantics problem

- Common Event Expression

- Entity extraction

23

Vielen Dank

S

E

C I

V

Z

raffael marty secviz org

Page 26: Security Research2.0 - FIT 2008

The 2nd Dichotomy

16

bull donrsquot understand the real impact

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The 2nd Dichotomy

16

bull donrsquot understand the real impactbull get the 70 solution

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The 2nd Dichotomy

16

bull donrsquot understand the real impactbull get the 70 solutionbull donrsquot think big

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The 2nd Dichotomy

16

bull donrsquot understand the real impactbull get the 70 solutionbull donrsquot think bigbull no timemoney for real research

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The 2nd Dichotomy

16

bull donrsquot understand the real impactbull get the 70 solutionbull donrsquot think bigbull no timemoney for real researchbull canrsquot scale

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The 2nd Dichotomy

16

bull donrsquot understand the real impactbull get the 70 solutionbull donrsquot think bigbull no timemoney for real researchbull canrsquot scalebull work based off of a few

customerrsquos input

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The 2nd Dichotomy

16

bull donrsquot understand the real impactbull get the 70 solutionbull donrsquot think bigbull no timemoney for real researchbull canrsquot scalebull work based off of a few

customerrsquos input

bull donrsquot know whatrsquos been done in industry

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The 2nd Dichotomy

16

bull donrsquot understand the real impactbull get the 70 solutionbull donrsquot think bigbull no timemoney for real researchbull canrsquot scalebull work based off of a few

customerrsquos input

bull donrsquot know whatrsquos been done in industrybull donrsquot understand the use-cases

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The 2nd Dichotomy

16

bull donrsquot understand the real impactbull get the 70 solutionbull donrsquot think bigbull no timemoney for real researchbull canrsquot scalebull work based off of a few

customerrsquos input

bull donrsquot know whatrsquos been done in industrybull donrsquot understand the use-casesbull donrsquot understand the environments

data domain

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The 2nd Dichotomy

16

bull donrsquot understand the real impactbull get the 70 solutionbull donrsquot think bigbull no timemoney for real researchbull canrsquot scalebull work based off of a few

customerrsquos input

bull donrsquot know whatrsquos been done in industrybull donrsquot understand the use-casesbull donrsquot understand the environments

data domainbull work on simulated data

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The 2nd Dichotomy

16

bull donrsquot understand the real impactbull get the 70 solutionbull donrsquot think bigbull no timemoney for real researchbull canrsquot scalebull work based off of a few

customerrsquos input

bull donrsquot know whatrsquos been done in industrybull donrsquot understand the use-casesbull donrsquot understand the environments

data domainbull work on simulated databull construct their own problems

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The 2nd Dichotomy

16

bull donrsquot understand the real impactbull get the 70 solutionbull donrsquot think bigbull no timemoney for real researchbull canrsquot scalebull work based off of a few

customerrsquos input

bull donrsquot know whatrsquos been done in industrybull donrsquot understand the use-casesbull donrsquot understand the environments

data domainbull work on simulated databull construct their own problems bull use overly complicated impractical

solutions

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The 2nd Dichotomy

16

bull donrsquot understand the real impactbull get the 70 solutionbull donrsquot think bigbull no timemoney for real researchbull canrsquot scalebull work based off of a few

customerrsquos input

bull donrsquot know whatrsquos been done in industrybull donrsquot understand the use-casesbull donrsquot understand the environments

data domainbull work on simulated databull construct their own problems bull use overly complicated impractical

solutionsbull use graphs visualization where it is not

needed

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The Way Forward

17

bull Building a secviz disciplinebull Bridging the gapbull Learning the ldquootherrdquo discipline

Security Visualization

SecViz

bull More academia industry collaboration bull Build components widgets gadgetsbull (Re-)use existing technologiesbull Focus on strengthsbull Focus on the visualization and interaction aspects

Two disciplines

Two worlds

18

bull Use-case oriented visualizationbull Perimeter Threatbull Governance Risk Compliance (GRC)bull Insider Threat bull IT data visualizationbull SecVizOrgbull DAVIX

My Focus Areas

18

bull Use-case oriented visualizationbull Perimeter Threatbull Governance Risk Compliance (GRC)bull Insider Threat bull IT data visualizationbull SecVizOrgbull DAVIX

Insider Threat Visualizationbull Huge amounts of databull More and other data sources than for the traditional security use-cases- Insiders often have legitimate access to machines and data You need to log more than the

exceptions

- Insider crimes are often executed on the application layer

bull The questions are not known in advance - Visualization provokes questions and helps find answers

bull Dynamic nature of fraud- Problem for static algorithms

- Bandits quickly adapt to fixed threshold-based detection systems

bull Looking for any unusual patterns

19

20

20

SecViz - Security VisualizationThis is a place to share discuss challenge and learn about

security visualization

Data Analysis and Visualization Linuxdavixsecvizorg

D

V

X

bull Addressing the secviz dichotomy

bull Better industry - academia collaboration

bull More and better visualization tools

- Use-case driven product development

bull We need to solve the data semantics problem

- Common Event Expression

- Entity extraction

23

The Futurebull Addressing the secviz dichotomy

bull Better industry - academia collaboration

bull More and better visualization tools

- Use-case driven product development

bull We need to solve the data semantics problem

- Common Event Expression

- Entity extraction

23

Vielen Dank

S

E

C I

V

Z

raffael marty secviz org

Page 27: Security Research2.0 - FIT 2008

The 2nd Dichotomy

16

bull donrsquot understand the real impactbull get the 70 solution

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The 2nd Dichotomy

16

bull donrsquot understand the real impactbull get the 70 solutionbull donrsquot think big

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The 2nd Dichotomy

16

bull donrsquot understand the real impactbull get the 70 solutionbull donrsquot think bigbull no timemoney for real research

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The 2nd Dichotomy

16

bull donrsquot understand the real impactbull get the 70 solutionbull donrsquot think bigbull no timemoney for real researchbull canrsquot scale

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The 2nd Dichotomy

16

bull donrsquot understand the real impactbull get the 70 solutionbull donrsquot think bigbull no timemoney for real researchbull canrsquot scalebull work based off of a few

customerrsquos input

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The 2nd Dichotomy

16

bull donrsquot understand the real impactbull get the 70 solutionbull donrsquot think bigbull no timemoney for real researchbull canrsquot scalebull work based off of a few

customerrsquos input

bull donrsquot know whatrsquos been done in industry

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The 2nd Dichotomy

16

bull donrsquot understand the real impactbull get the 70 solutionbull donrsquot think bigbull no timemoney for real researchbull canrsquot scalebull work based off of a few

customerrsquos input

bull donrsquot know whatrsquos been done in industrybull donrsquot understand the use-cases

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The 2nd Dichotomy

16

bull donrsquot understand the real impactbull get the 70 solutionbull donrsquot think bigbull no timemoney for real researchbull canrsquot scalebull work based off of a few

customerrsquos input

bull donrsquot know whatrsquos been done in industrybull donrsquot understand the use-casesbull donrsquot understand the environments

data domain

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The 2nd Dichotomy

16

bull donrsquot understand the real impactbull get the 70 solutionbull donrsquot think bigbull no timemoney for real researchbull canrsquot scalebull work based off of a few

customerrsquos input

bull donrsquot know whatrsquos been done in industrybull donrsquot understand the use-casesbull donrsquot understand the environments

data domainbull work on simulated data

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The 2nd Dichotomy

16

bull donrsquot understand the real impactbull get the 70 solutionbull donrsquot think bigbull no timemoney for real researchbull canrsquot scalebull work based off of a few

customerrsquos input

bull donrsquot know whatrsquos been done in industrybull donrsquot understand the use-casesbull donrsquot understand the environments

data domainbull work on simulated databull construct their own problems

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The 2nd Dichotomy

16

bull donrsquot understand the real impactbull get the 70 solutionbull donrsquot think bigbull no timemoney for real researchbull canrsquot scalebull work based off of a few

customerrsquos input

bull donrsquot know whatrsquos been done in industrybull donrsquot understand the use-casesbull donrsquot understand the environments

data domainbull work on simulated databull construct their own problems bull use overly complicated impractical

solutions

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The 2nd Dichotomy

16

bull donrsquot understand the real impactbull get the 70 solutionbull donrsquot think bigbull no timemoney for real researchbull canrsquot scalebull work based off of a few

customerrsquos input

bull donrsquot know whatrsquos been done in industrybull donrsquot understand the use-casesbull donrsquot understand the environments

data domainbull work on simulated databull construct their own problems bull use overly complicated impractical

solutionsbull use graphs visualization where it is not

needed

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The Way Forward

17

bull Building a secviz disciplinebull Bridging the gapbull Learning the ldquootherrdquo discipline

Security Visualization

SecViz

bull More academia industry collaboration bull Build components widgets gadgetsbull (Re-)use existing technologiesbull Focus on strengthsbull Focus on the visualization and interaction aspects

Two disciplines

Two worlds

18

bull Use-case oriented visualizationbull Perimeter Threatbull Governance Risk Compliance (GRC)bull Insider Threat bull IT data visualizationbull SecVizOrgbull DAVIX

My Focus Areas

18

bull Use-case oriented visualizationbull Perimeter Threatbull Governance Risk Compliance (GRC)bull Insider Threat bull IT data visualizationbull SecVizOrgbull DAVIX

Insider Threat Visualizationbull Huge amounts of databull More and other data sources than for the traditional security use-cases- Insiders often have legitimate access to machines and data You need to log more than the

exceptions

- Insider crimes are often executed on the application layer

bull The questions are not known in advance - Visualization provokes questions and helps find answers

bull Dynamic nature of fraud- Problem for static algorithms

- Bandits quickly adapt to fixed threshold-based detection systems

bull Looking for any unusual patterns

19

20

20

SecViz - Security VisualizationThis is a place to share discuss challenge and learn about

security visualization

Data Analysis and Visualization Linuxdavixsecvizorg

D

V

X

bull Addressing the secviz dichotomy

bull Better industry - academia collaboration

bull More and better visualization tools

- Use-case driven product development

bull We need to solve the data semantics problem

- Common Event Expression

- Entity extraction

23

The Futurebull Addressing the secviz dichotomy

bull Better industry - academia collaboration

bull More and better visualization tools

- Use-case driven product development

bull We need to solve the data semantics problem

- Common Event Expression

- Entity extraction

23

Vielen Dank

S

E

C I

V

Z

raffael marty secviz org

Page 28: Security Research2.0 - FIT 2008

The 2nd Dichotomy

16

bull donrsquot understand the real impactbull get the 70 solutionbull donrsquot think big

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The 2nd Dichotomy

16

bull donrsquot understand the real impactbull get the 70 solutionbull donrsquot think bigbull no timemoney for real research

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The 2nd Dichotomy

16

bull donrsquot understand the real impactbull get the 70 solutionbull donrsquot think bigbull no timemoney for real researchbull canrsquot scale

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The 2nd Dichotomy

16

bull donrsquot understand the real impactbull get the 70 solutionbull donrsquot think bigbull no timemoney for real researchbull canrsquot scalebull work based off of a few

customerrsquos input

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The 2nd Dichotomy

16

bull donrsquot understand the real impactbull get the 70 solutionbull donrsquot think bigbull no timemoney for real researchbull canrsquot scalebull work based off of a few

customerrsquos input

bull donrsquot know whatrsquos been done in industry

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The 2nd Dichotomy

16

bull donrsquot understand the real impactbull get the 70 solutionbull donrsquot think bigbull no timemoney for real researchbull canrsquot scalebull work based off of a few

customerrsquos input

bull donrsquot know whatrsquos been done in industrybull donrsquot understand the use-cases

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The 2nd Dichotomy

16

bull donrsquot understand the real impactbull get the 70 solutionbull donrsquot think bigbull no timemoney for real researchbull canrsquot scalebull work based off of a few

customerrsquos input

bull donrsquot know whatrsquos been done in industrybull donrsquot understand the use-casesbull donrsquot understand the environments

data domain

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The 2nd Dichotomy

16

bull donrsquot understand the real impactbull get the 70 solutionbull donrsquot think bigbull no timemoney for real researchbull canrsquot scalebull work based off of a few

customerrsquos input

bull donrsquot know whatrsquos been done in industrybull donrsquot understand the use-casesbull donrsquot understand the environments

data domainbull work on simulated data

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The 2nd Dichotomy

16

bull donrsquot understand the real impactbull get the 70 solutionbull donrsquot think bigbull no timemoney for real researchbull canrsquot scalebull work based off of a few

customerrsquos input

bull donrsquot know whatrsquos been done in industrybull donrsquot understand the use-casesbull donrsquot understand the environments

data domainbull work on simulated databull construct their own problems

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The 2nd Dichotomy

16

bull donrsquot understand the real impactbull get the 70 solutionbull donrsquot think bigbull no timemoney for real researchbull canrsquot scalebull work based off of a few

customerrsquos input

bull donrsquot know whatrsquos been done in industrybull donrsquot understand the use-casesbull donrsquot understand the environments

data domainbull work on simulated databull construct their own problems bull use overly complicated impractical

solutions

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The 2nd Dichotomy

16

bull donrsquot understand the real impactbull get the 70 solutionbull donrsquot think bigbull no timemoney for real researchbull canrsquot scalebull work based off of a few

customerrsquos input

bull donrsquot know whatrsquos been done in industrybull donrsquot understand the use-casesbull donrsquot understand the environments

data domainbull work on simulated databull construct their own problems bull use overly complicated impractical

solutionsbull use graphs visualization where it is not

needed

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The Way Forward

17

bull Building a secviz disciplinebull Bridging the gapbull Learning the ldquootherrdquo discipline

Security Visualization

SecViz

bull More academia industry collaboration bull Build components widgets gadgetsbull (Re-)use existing technologiesbull Focus on strengthsbull Focus on the visualization and interaction aspects

Two disciplines

Two worlds

18

bull Use-case oriented visualizationbull Perimeter Threatbull Governance Risk Compliance (GRC)bull Insider Threat bull IT data visualizationbull SecVizOrgbull DAVIX

My Focus Areas

18

bull Use-case oriented visualizationbull Perimeter Threatbull Governance Risk Compliance (GRC)bull Insider Threat bull IT data visualizationbull SecVizOrgbull DAVIX

Insider Threat Visualizationbull Huge amounts of databull More and other data sources than for the traditional security use-cases- Insiders often have legitimate access to machines and data You need to log more than the

exceptions

- Insider crimes are often executed on the application layer

bull The questions are not known in advance - Visualization provokes questions and helps find answers

bull Dynamic nature of fraud- Problem for static algorithms

- Bandits quickly adapt to fixed threshold-based detection systems

bull Looking for any unusual patterns

19

20

20

SecViz - Security VisualizationThis is a place to share discuss challenge and learn about

security visualization

Data Analysis and Visualization Linuxdavixsecvizorg

D

V

X

bull Addressing the secviz dichotomy

bull Better industry - academia collaboration

bull More and better visualization tools

- Use-case driven product development

bull We need to solve the data semantics problem

- Common Event Expression

- Entity extraction

23

The Futurebull Addressing the secviz dichotomy

bull Better industry - academia collaboration

bull More and better visualization tools

- Use-case driven product development

bull We need to solve the data semantics problem

- Common Event Expression

- Entity extraction

23

Vielen Dank

S

E

C I

V

Z

raffael marty secviz org

Page 29: Security Research2.0 - FIT 2008

The 2nd Dichotomy

16

bull donrsquot understand the real impactbull get the 70 solutionbull donrsquot think bigbull no timemoney for real research

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The 2nd Dichotomy

16

bull donrsquot understand the real impactbull get the 70 solutionbull donrsquot think bigbull no timemoney for real researchbull canrsquot scale

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The 2nd Dichotomy

16

bull donrsquot understand the real impactbull get the 70 solutionbull donrsquot think bigbull no timemoney for real researchbull canrsquot scalebull work based off of a few

customerrsquos input

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The 2nd Dichotomy

16

bull donrsquot understand the real impactbull get the 70 solutionbull donrsquot think bigbull no timemoney for real researchbull canrsquot scalebull work based off of a few

customerrsquos input

bull donrsquot know whatrsquos been done in industry

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The 2nd Dichotomy

16

bull donrsquot understand the real impactbull get the 70 solutionbull donrsquot think bigbull no timemoney for real researchbull canrsquot scalebull work based off of a few

customerrsquos input

bull donrsquot know whatrsquos been done in industrybull donrsquot understand the use-cases

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The 2nd Dichotomy

16

bull donrsquot understand the real impactbull get the 70 solutionbull donrsquot think bigbull no timemoney for real researchbull canrsquot scalebull work based off of a few

customerrsquos input

bull donrsquot know whatrsquos been done in industrybull donrsquot understand the use-casesbull donrsquot understand the environments

data domain

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The 2nd Dichotomy

16

bull donrsquot understand the real impactbull get the 70 solutionbull donrsquot think bigbull no timemoney for real researchbull canrsquot scalebull work based off of a few

customerrsquos input

bull donrsquot know whatrsquos been done in industrybull donrsquot understand the use-casesbull donrsquot understand the environments

data domainbull work on simulated data

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The 2nd Dichotomy

16

bull donrsquot understand the real impactbull get the 70 solutionbull donrsquot think bigbull no timemoney for real researchbull canrsquot scalebull work based off of a few

customerrsquos input

bull donrsquot know whatrsquos been done in industrybull donrsquot understand the use-casesbull donrsquot understand the environments

data domainbull work on simulated databull construct their own problems

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The 2nd Dichotomy

16

bull donrsquot understand the real impactbull get the 70 solutionbull donrsquot think bigbull no timemoney for real researchbull canrsquot scalebull work based off of a few

customerrsquos input

bull donrsquot know whatrsquos been done in industrybull donrsquot understand the use-casesbull donrsquot understand the environments

data domainbull work on simulated databull construct their own problems bull use overly complicated impractical

solutions

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The 2nd Dichotomy

16

bull donrsquot understand the real impactbull get the 70 solutionbull donrsquot think bigbull no timemoney for real researchbull canrsquot scalebull work based off of a few

customerrsquos input

bull donrsquot know whatrsquos been done in industrybull donrsquot understand the use-casesbull donrsquot understand the environments

data domainbull work on simulated databull construct their own problems bull use overly complicated impractical

solutionsbull use graphs visualization where it is not

needed

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The Way Forward

17

bull Building a secviz disciplinebull Bridging the gapbull Learning the ldquootherrdquo discipline

Security Visualization

SecViz

bull More academia industry collaboration bull Build components widgets gadgetsbull (Re-)use existing technologiesbull Focus on strengthsbull Focus on the visualization and interaction aspects

Two disciplines

Two worlds

18

bull Use-case oriented visualizationbull Perimeter Threatbull Governance Risk Compliance (GRC)bull Insider Threat bull IT data visualizationbull SecVizOrgbull DAVIX

My Focus Areas

18

bull Use-case oriented visualizationbull Perimeter Threatbull Governance Risk Compliance (GRC)bull Insider Threat bull IT data visualizationbull SecVizOrgbull DAVIX

Insider Threat Visualizationbull Huge amounts of databull More and other data sources than for the traditional security use-cases- Insiders often have legitimate access to machines and data You need to log more than the

exceptions

- Insider crimes are often executed on the application layer

bull The questions are not known in advance - Visualization provokes questions and helps find answers

bull Dynamic nature of fraud- Problem for static algorithms

- Bandits quickly adapt to fixed threshold-based detection systems

bull Looking for any unusual patterns

19

20

20

SecViz - Security VisualizationThis is a place to share discuss challenge and learn about

security visualization

Data Analysis and Visualization Linuxdavixsecvizorg

D

V

X

bull Addressing the secviz dichotomy

bull Better industry - academia collaboration

bull More and better visualization tools

- Use-case driven product development

bull We need to solve the data semantics problem

- Common Event Expression

- Entity extraction

23

The Futurebull Addressing the secviz dichotomy

bull Better industry - academia collaboration

bull More and better visualization tools

- Use-case driven product development

bull We need to solve the data semantics problem

- Common Event Expression

- Entity extraction

23

Vielen Dank

S

E

C I

V

Z

raffael marty secviz org

Page 30: Security Research2.0 - FIT 2008

The 2nd Dichotomy

16

bull donrsquot understand the real impactbull get the 70 solutionbull donrsquot think bigbull no timemoney for real researchbull canrsquot scale

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The 2nd Dichotomy

16

bull donrsquot understand the real impactbull get the 70 solutionbull donrsquot think bigbull no timemoney for real researchbull canrsquot scalebull work based off of a few

customerrsquos input

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The 2nd Dichotomy

16

bull donrsquot understand the real impactbull get the 70 solutionbull donrsquot think bigbull no timemoney for real researchbull canrsquot scalebull work based off of a few

customerrsquos input

bull donrsquot know whatrsquos been done in industry

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The 2nd Dichotomy

16

bull donrsquot understand the real impactbull get the 70 solutionbull donrsquot think bigbull no timemoney for real researchbull canrsquot scalebull work based off of a few

customerrsquos input

bull donrsquot know whatrsquos been done in industrybull donrsquot understand the use-cases

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The 2nd Dichotomy

16

bull donrsquot understand the real impactbull get the 70 solutionbull donrsquot think bigbull no timemoney for real researchbull canrsquot scalebull work based off of a few

customerrsquos input

bull donrsquot know whatrsquos been done in industrybull donrsquot understand the use-casesbull donrsquot understand the environments

data domain

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The 2nd Dichotomy

16

bull donrsquot understand the real impactbull get the 70 solutionbull donrsquot think bigbull no timemoney for real researchbull canrsquot scalebull work based off of a few

customerrsquos input

bull donrsquot know whatrsquos been done in industrybull donrsquot understand the use-casesbull donrsquot understand the environments

data domainbull work on simulated data

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The 2nd Dichotomy

16

bull donrsquot understand the real impactbull get the 70 solutionbull donrsquot think bigbull no timemoney for real researchbull canrsquot scalebull work based off of a few

customerrsquos input

bull donrsquot know whatrsquos been done in industrybull donrsquot understand the use-casesbull donrsquot understand the environments

data domainbull work on simulated databull construct their own problems

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The 2nd Dichotomy

16

bull donrsquot understand the real impactbull get the 70 solutionbull donrsquot think bigbull no timemoney for real researchbull canrsquot scalebull work based off of a few

customerrsquos input

bull donrsquot know whatrsquos been done in industrybull donrsquot understand the use-casesbull donrsquot understand the environments

data domainbull work on simulated databull construct their own problems bull use overly complicated impractical

solutions

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The 2nd Dichotomy

16

bull donrsquot understand the real impactbull get the 70 solutionbull donrsquot think bigbull no timemoney for real researchbull canrsquot scalebull work based off of a few

customerrsquos input

bull donrsquot know whatrsquos been done in industrybull donrsquot understand the use-casesbull donrsquot understand the environments

data domainbull work on simulated databull construct their own problems bull use overly complicated impractical

solutionsbull use graphs visualization where it is not

needed

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The Way Forward

17

bull Building a secviz disciplinebull Bridging the gapbull Learning the ldquootherrdquo discipline

Security Visualization

SecViz

bull More academia industry collaboration bull Build components widgets gadgetsbull (Re-)use existing technologiesbull Focus on strengthsbull Focus on the visualization and interaction aspects

Two disciplines

Two worlds

18

bull Use-case oriented visualizationbull Perimeter Threatbull Governance Risk Compliance (GRC)bull Insider Threat bull IT data visualizationbull SecVizOrgbull DAVIX

My Focus Areas

18

bull Use-case oriented visualizationbull Perimeter Threatbull Governance Risk Compliance (GRC)bull Insider Threat bull IT data visualizationbull SecVizOrgbull DAVIX

Insider Threat Visualizationbull Huge amounts of databull More and other data sources than for the traditional security use-cases- Insiders often have legitimate access to machines and data You need to log more than the

exceptions

- Insider crimes are often executed on the application layer

bull The questions are not known in advance - Visualization provokes questions and helps find answers

bull Dynamic nature of fraud- Problem for static algorithms

- Bandits quickly adapt to fixed threshold-based detection systems

bull Looking for any unusual patterns

19

20

20

SecViz - Security VisualizationThis is a place to share discuss challenge and learn about

security visualization

Data Analysis and Visualization Linuxdavixsecvizorg

D

V

X

bull Addressing the secviz dichotomy

bull Better industry - academia collaboration

bull More and better visualization tools

- Use-case driven product development

bull We need to solve the data semantics problem

- Common Event Expression

- Entity extraction

23

The Futurebull Addressing the secviz dichotomy

bull Better industry - academia collaboration

bull More and better visualization tools

- Use-case driven product development

bull We need to solve the data semantics problem

- Common Event Expression

- Entity extraction

23

Vielen Dank

S

E

C I

V

Z

raffael marty secviz org

Page 31: Security Research2.0 - FIT 2008

The 2nd Dichotomy

16

bull donrsquot understand the real impactbull get the 70 solutionbull donrsquot think bigbull no timemoney for real researchbull canrsquot scalebull work based off of a few

customerrsquos input

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The 2nd Dichotomy

16

bull donrsquot understand the real impactbull get the 70 solutionbull donrsquot think bigbull no timemoney for real researchbull canrsquot scalebull work based off of a few

customerrsquos input

bull donrsquot know whatrsquos been done in industry

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The 2nd Dichotomy

16

bull donrsquot understand the real impactbull get the 70 solutionbull donrsquot think bigbull no timemoney for real researchbull canrsquot scalebull work based off of a few

customerrsquos input

bull donrsquot know whatrsquos been done in industrybull donrsquot understand the use-cases

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The 2nd Dichotomy

16

bull donrsquot understand the real impactbull get the 70 solutionbull donrsquot think bigbull no timemoney for real researchbull canrsquot scalebull work based off of a few

customerrsquos input

bull donrsquot know whatrsquos been done in industrybull donrsquot understand the use-casesbull donrsquot understand the environments

data domain

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The 2nd Dichotomy

16

bull donrsquot understand the real impactbull get the 70 solutionbull donrsquot think bigbull no timemoney for real researchbull canrsquot scalebull work based off of a few

customerrsquos input

bull donrsquot know whatrsquos been done in industrybull donrsquot understand the use-casesbull donrsquot understand the environments

data domainbull work on simulated data

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The 2nd Dichotomy

16

bull donrsquot understand the real impactbull get the 70 solutionbull donrsquot think bigbull no timemoney for real researchbull canrsquot scalebull work based off of a few

customerrsquos input

bull donrsquot know whatrsquos been done in industrybull donrsquot understand the use-casesbull donrsquot understand the environments

data domainbull work on simulated databull construct their own problems

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The 2nd Dichotomy

16

bull donrsquot understand the real impactbull get the 70 solutionbull donrsquot think bigbull no timemoney for real researchbull canrsquot scalebull work based off of a few

customerrsquos input

bull donrsquot know whatrsquos been done in industrybull donrsquot understand the use-casesbull donrsquot understand the environments

data domainbull work on simulated databull construct their own problems bull use overly complicated impractical

solutions

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The 2nd Dichotomy

16

bull donrsquot understand the real impactbull get the 70 solutionbull donrsquot think bigbull no timemoney for real researchbull canrsquot scalebull work based off of a few

customerrsquos input

bull donrsquot know whatrsquos been done in industrybull donrsquot understand the use-casesbull donrsquot understand the environments

data domainbull work on simulated databull construct their own problems bull use overly complicated impractical

solutionsbull use graphs visualization where it is not

needed

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The Way Forward

17

bull Building a secviz disciplinebull Bridging the gapbull Learning the ldquootherrdquo discipline

Security Visualization

SecViz

bull More academia industry collaboration bull Build components widgets gadgetsbull (Re-)use existing technologiesbull Focus on strengthsbull Focus on the visualization and interaction aspects

Two disciplines

Two worlds

18

bull Use-case oriented visualizationbull Perimeter Threatbull Governance Risk Compliance (GRC)bull Insider Threat bull IT data visualizationbull SecVizOrgbull DAVIX

My Focus Areas

18

bull Use-case oriented visualizationbull Perimeter Threatbull Governance Risk Compliance (GRC)bull Insider Threat bull IT data visualizationbull SecVizOrgbull DAVIX

Insider Threat Visualizationbull Huge amounts of databull More and other data sources than for the traditional security use-cases- Insiders often have legitimate access to machines and data You need to log more than the

exceptions

- Insider crimes are often executed on the application layer

bull The questions are not known in advance - Visualization provokes questions and helps find answers

bull Dynamic nature of fraud- Problem for static algorithms

- Bandits quickly adapt to fixed threshold-based detection systems

bull Looking for any unusual patterns

19

20

20

SecViz - Security VisualizationThis is a place to share discuss challenge and learn about

security visualization

Data Analysis and Visualization Linuxdavixsecvizorg

D

V

X

bull Addressing the secviz dichotomy

bull Better industry - academia collaboration

bull More and better visualization tools

- Use-case driven product development

bull We need to solve the data semantics problem

- Common Event Expression

- Entity extraction

23

The Futurebull Addressing the secviz dichotomy

bull Better industry - academia collaboration

bull More and better visualization tools

- Use-case driven product development

bull We need to solve the data semantics problem

- Common Event Expression

- Entity extraction

23

Vielen Dank

S

E

C I

V

Z

raffael marty secviz org

Page 32: Security Research2.0 - FIT 2008

The 2nd Dichotomy

16

bull donrsquot understand the real impactbull get the 70 solutionbull donrsquot think bigbull no timemoney for real researchbull canrsquot scalebull work based off of a few

customerrsquos input

bull donrsquot know whatrsquos been done in industry

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The 2nd Dichotomy

16

bull donrsquot understand the real impactbull get the 70 solutionbull donrsquot think bigbull no timemoney for real researchbull canrsquot scalebull work based off of a few

customerrsquos input

bull donrsquot know whatrsquos been done in industrybull donrsquot understand the use-cases

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The 2nd Dichotomy

16

bull donrsquot understand the real impactbull get the 70 solutionbull donrsquot think bigbull no timemoney for real researchbull canrsquot scalebull work based off of a few

customerrsquos input

bull donrsquot know whatrsquos been done in industrybull donrsquot understand the use-casesbull donrsquot understand the environments

data domain

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The 2nd Dichotomy

16

bull donrsquot understand the real impactbull get the 70 solutionbull donrsquot think bigbull no timemoney for real researchbull canrsquot scalebull work based off of a few

customerrsquos input

bull donrsquot know whatrsquos been done in industrybull donrsquot understand the use-casesbull donrsquot understand the environments

data domainbull work on simulated data

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The 2nd Dichotomy

16

bull donrsquot understand the real impactbull get the 70 solutionbull donrsquot think bigbull no timemoney for real researchbull canrsquot scalebull work based off of a few

customerrsquos input

bull donrsquot know whatrsquos been done in industrybull donrsquot understand the use-casesbull donrsquot understand the environments

data domainbull work on simulated databull construct their own problems

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The 2nd Dichotomy

16

bull donrsquot understand the real impactbull get the 70 solutionbull donrsquot think bigbull no timemoney for real researchbull canrsquot scalebull work based off of a few

customerrsquos input

bull donrsquot know whatrsquos been done in industrybull donrsquot understand the use-casesbull donrsquot understand the environments

data domainbull work on simulated databull construct their own problems bull use overly complicated impractical

solutions

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The 2nd Dichotomy

16

bull donrsquot understand the real impactbull get the 70 solutionbull donrsquot think bigbull no timemoney for real researchbull canrsquot scalebull work based off of a few

customerrsquos input

bull donrsquot know whatrsquos been done in industrybull donrsquot understand the use-casesbull donrsquot understand the environments

data domainbull work on simulated databull construct their own problems bull use overly complicated impractical

solutionsbull use graphs visualization where it is not

needed

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The Way Forward

17

bull Building a secviz disciplinebull Bridging the gapbull Learning the ldquootherrdquo discipline

Security Visualization

SecViz

bull More academia industry collaboration bull Build components widgets gadgetsbull (Re-)use existing technologiesbull Focus on strengthsbull Focus on the visualization and interaction aspects

Two disciplines

Two worlds

18

bull Use-case oriented visualizationbull Perimeter Threatbull Governance Risk Compliance (GRC)bull Insider Threat bull IT data visualizationbull SecVizOrgbull DAVIX

My Focus Areas

18

bull Use-case oriented visualizationbull Perimeter Threatbull Governance Risk Compliance (GRC)bull Insider Threat bull IT data visualizationbull SecVizOrgbull DAVIX

Insider Threat Visualizationbull Huge amounts of databull More and other data sources than for the traditional security use-cases- Insiders often have legitimate access to machines and data You need to log more than the

exceptions

- Insider crimes are often executed on the application layer

bull The questions are not known in advance - Visualization provokes questions and helps find answers

bull Dynamic nature of fraud- Problem for static algorithms

- Bandits quickly adapt to fixed threshold-based detection systems

bull Looking for any unusual patterns

19

20

20

SecViz - Security VisualizationThis is a place to share discuss challenge and learn about

security visualization

Data Analysis and Visualization Linuxdavixsecvizorg

D

V

X

bull Addressing the secviz dichotomy

bull Better industry - academia collaboration

bull More and better visualization tools

- Use-case driven product development

bull We need to solve the data semantics problem

- Common Event Expression

- Entity extraction

23

The Futurebull Addressing the secviz dichotomy

bull Better industry - academia collaboration

bull More and better visualization tools

- Use-case driven product development

bull We need to solve the data semantics problem

- Common Event Expression

- Entity extraction

23

Vielen Dank

S

E

C I

V

Z

raffael marty secviz org

Page 33: Security Research2.0 - FIT 2008

The 2nd Dichotomy

16

bull donrsquot understand the real impactbull get the 70 solutionbull donrsquot think bigbull no timemoney for real researchbull canrsquot scalebull work based off of a few

customerrsquos input

bull donrsquot know whatrsquos been done in industrybull donrsquot understand the use-cases

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The 2nd Dichotomy

16

bull donrsquot understand the real impactbull get the 70 solutionbull donrsquot think bigbull no timemoney for real researchbull canrsquot scalebull work based off of a few

customerrsquos input

bull donrsquot know whatrsquos been done in industrybull donrsquot understand the use-casesbull donrsquot understand the environments

data domain

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The 2nd Dichotomy

16

bull donrsquot understand the real impactbull get the 70 solutionbull donrsquot think bigbull no timemoney for real researchbull canrsquot scalebull work based off of a few

customerrsquos input

bull donrsquot know whatrsquos been done in industrybull donrsquot understand the use-casesbull donrsquot understand the environments

data domainbull work on simulated data

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The 2nd Dichotomy

16

bull donrsquot understand the real impactbull get the 70 solutionbull donrsquot think bigbull no timemoney for real researchbull canrsquot scalebull work based off of a few

customerrsquos input

bull donrsquot know whatrsquos been done in industrybull donrsquot understand the use-casesbull donrsquot understand the environments

data domainbull work on simulated databull construct their own problems

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The 2nd Dichotomy

16

bull donrsquot understand the real impactbull get the 70 solutionbull donrsquot think bigbull no timemoney for real researchbull canrsquot scalebull work based off of a few

customerrsquos input

bull donrsquot know whatrsquos been done in industrybull donrsquot understand the use-casesbull donrsquot understand the environments

data domainbull work on simulated databull construct their own problems bull use overly complicated impractical

solutions

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The 2nd Dichotomy

16

bull donrsquot understand the real impactbull get the 70 solutionbull donrsquot think bigbull no timemoney for real researchbull canrsquot scalebull work based off of a few

customerrsquos input

bull donrsquot know whatrsquos been done in industrybull donrsquot understand the use-casesbull donrsquot understand the environments

data domainbull work on simulated databull construct their own problems bull use overly complicated impractical

solutionsbull use graphs visualization where it is not

needed

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The Way Forward

17

bull Building a secviz disciplinebull Bridging the gapbull Learning the ldquootherrdquo discipline

Security Visualization

SecViz

bull More academia industry collaboration bull Build components widgets gadgetsbull (Re-)use existing technologiesbull Focus on strengthsbull Focus on the visualization and interaction aspects

Two disciplines

Two worlds

18

bull Use-case oriented visualizationbull Perimeter Threatbull Governance Risk Compliance (GRC)bull Insider Threat bull IT data visualizationbull SecVizOrgbull DAVIX

My Focus Areas

18

bull Use-case oriented visualizationbull Perimeter Threatbull Governance Risk Compliance (GRC)bull Insider Threat bull IT data visualizationbull SecVizOrgbull DAVIX

Insider Threat Visualizationbull Huge amounts of databull More and other data sources than for the traditional security use-cases- Insiders often have legitimate access to machines and data You need to log more than the

exceptions

- Insider crimes are often executed on the application layer

bull The questions are not known in advance - Visualization provokes questions and helps find answers

bull Dynamic nature of fraud- Problem for static algorithms

- Bandits quickly adapt to fixed threshold-based detection systems

bull Looking for any unusual patterns

19

20

20

SecViz - Security VisualizationThis is a place to share discuss challenge and learn about

security visualization

Data Analysis and Visualization Linuxdavixsecvizorg

D

V

X

bull Addressing the secviz dichotomy

bull Better industry - academia collaboration

bull More and better visualization tools

- Use-case driven product development

bull We need to solve the data semantics problem

- Common Event Expression

- Entity extraction

23

The Futurebull Addressing the secviz dichotomy

bull Better industry - academia collaboration

bull More and better visualization tools

- Use-case driven product development

bull We need to solve the data semantics problem

- Common Event Expression

- Entity extraction

23

Vielen Dank

S

E

C I

V

Z

raffael marty secviz org

Page 34: Security Research2.0 - FIT 2008

The 2nd Dichotomy

16

bull donrsquot understand the real impactbull get the 70 solutionbull donrsquot think bigbull no timemoney for real researchbull canrsquot scalebull work based off of a few

customerrsquos input

bull donrsquot know whatrsquos been done in industrybull donrsquot understand the use-casesbull donrsquot understand the environments

data domain

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The 2nd Dichotomy

16

bull donrsquot understand the real impactbull get the 70 solutionbull donrsquot think bigbull no timemoney for real researchbull canrsquot scalebull work based off of a few

customerrsquos input

bull donrsquot know whatrsquos been done in industrybull donrsquot understand the use-casesbull donrsquot understand the environments

data domainbull work on simulated data

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The 2nd Dichotomy

16

bull donrsquot understand the real impactbull get the 70 solutionbull donrsquot think bigbull no timemoney for real researchbull canrsquot scalebull work based off of a few

customerrsquos input

bull donrsquot know whatrsquos been done in industrybull donrsquot understand the use-casesbull donrsquot understand the environments

data domainbull work on simulated databull construct their own problems

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The 2nd Dichotomy

16

bull donrsquot understand the real impactbull get the 70 solutionbull donrsquot think bigbull no timemoney for real researchbull canrsquot scalebull work based off of a few

customerrsquos input

bull donrsquot know whatrsquos been done in industrybull donrsquot understand the use-casesbull donrsquot understand the environments

data domainbull work on simulated databull construct their own problems bull use overly complicated impractical

solutions

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The 2nd Dichotomy

16

bull donrsquot understand the real impactbull get the 70 solutionbull donrsquot think bigbull no timemoney for real researchbull canrsquot scalebull work based off of a few

customerrsquos input

bull donrsquot know whatrsquos been done in industrybull donrsquot understand the use-casesbull donrsquot understand the environments

data domainbull work on simulated databull construct their own problems bull use overly complicated impractical

solutionsbull use graphs visualization where it is not

needed

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The Way Forward

17

bull Building a secviz disciplinebull Bridging the gapbull Learning the ldquootherrdquo discipline

Security Visualization

SecViz

bull More academia industry collaboration bull Build components widgets gadgetsbull (Re-)use existing technologiesbull Focus on strengthsbull Focus on the visualization and interaction aspects

Two disciplines

Two worlds

18

bull Use-case oriented visualizationbull Perimeter Threatbull Governance Risk Compliance (GRC)bull Insider Threat bull IT data visualizationbull SecVizOrgbull DAVIX

My Focus Areas

18

bull Use-case oriented visualizationbull Perimeter Threatbull Governance Risk Compliance (GRC)bull Insider Threat bull IT data visualizationbull SecVizOrgbull DAVIX

Insider Threat Visualizationbull Huge amounts of databull More and other data sources than for the traditional security use-cases- Insiders often have legitimate access to machines and data You need to log more than the

exceptions

- Insider crimes are often executed on the application layer

bull The questions are not known in advance - Visualization provokes questions and helps find answers

bull Dynamic nature of fraud- Problem for static algorithms

- Bandits quickly adapt to fixed threshold-based detection systems

bull Looking for any unusual patterns

19

20

20

SecViz - Security VisualizationThis is a place to share discuss challenge and learn about

security visualization

Data Analysis and Visualization Linuxdavixsecvizorg

D

V

X

bull Addressing the secviz dichotomy

bull Better industry - academia collaboration

bull More and better visualization tools

- Use-case driven product development

bull We need to solve the data semantics problem

- Common Event Expression

- Entity extraction

23

The Futurebull Addressing the secviz dichotomy

bull Better industry - academia collaboration

bull More and better visualization tools

- Use-case driven product development

bull We need to solve the data semantics problem

- Common Event Expression

- Entity extraction

23

Vielen Dank

S

E

C I

V

Z

raffael marty secviz org

Page 35: Security Research2.0 - FIT 2008

The 2nd Dichotomy

16

bull donrsquot understand the real impactbull get the 70 solutionbull donrsquot think bigbull no timemoney for real researchbull canrsquot scalebull work based off of a few

customerrsquos input

bull donrsquot know whatrsquos been done in industrybull donrsquot understand the use-casesbull donrsquot understand the environments

data domainbull work on simulated data

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The 2nd Dichotomy

16

bull donrsquot understand the real impactbull get the 70 solutionbull donrsquot think bigbull no timemoney for real researchbull canrsquot scalebull work based off of a few

customerrsquos input

bull donrsquot know whatrsquos been done in industrybull donrsquot understand the use-casesbull donrsquot understand the environments

data domainbull work on simulated databull construct their own problems

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The 2nd Dichotomy

16

bull donrsquot understand the real impactbull get the 70 solutionbull donrsquot think bigbull no timemoney for real researchbull canrsquot scalebull work based off of a few

customerrsquos input

bull donrsquot know whatrsquos been done in industrybull donrsquot understand the use-casesbull donrsquot understand the environments

data domainbull work on simulated databull construct their own problems bull use overly complicated impractical

solutions

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The 2nd Dichotomy

16

bull donrsquot understand the real impactbull get the 70 solutionbull donrsquot think bigbull no timemoney for real researchbull canrsquot scalebull work based off of a few

customerrsquos input

bull donrsquot know whatrsquos been done in industrybull donrsquot understand the use-casesbull donrsquot understand the environments

data domainbull work on simulated databull construct their own problems bull use overly complicated impractical

solutionsbull use graphs visualization where it is not

needed

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The Way Forward

17

bull Building a secviz disciplinebull Bridging the gapbull Learning the ldquootherrdquo discipline

Security Visualization

SecViz

bull More academia industry collaboration bull Build components widgets gadgetsbull (Re-)use existing technologiesbull Focus on strengthsbull Focus on the visualization and interaction aspects

Two disciplines

Two worlds

18

bull Use-case oriented visualizationbull Perimeter Threatbull Governance Risk Compliance (GRC)bull Insider Threat bull IT data visualizationbull SecVizOrgbull DAVIX

My Focus Areas

18

bull Use-case oriented visualizationbull Perimeter Threatbull Governance Risk Compliance (GRC)bull Insider Threat bull IT data visualizationbull SecVizOrgbull DAVIX

Insider Threat Visualizationbull Huge amounts of databull More and other data sources than for the traditional security use-cases- Insiders often have legitimate access to machines and data You need to log more than the

exceptions

- Insider crimes are often executed on the application layer

bull The questions are not known in advance - Visualization provokes questions and helps find answers

bull Dynamic nature of fraud- Problem for static algorithms

- Bandits quickly adapt to fixed threshold-based detection systems

bull Looking for any unusual patterns

19

20

20

SecViz - Security VisualizationThis is a place to share discuss challenge and learn about

security visualization

Data Analysis and Visualization Linuxdavixsecvizorg

D

V

X

bull Addressing the secviz dichotomy

bull Better industry - academia collaboration

bull More and better visualization tools

- Use-case driven product development

bull We need to solve the data semantics problem

- Common Event Expression

- Entity extraction

23

The Futurebull Addressing the secviz dichotomy

bull Better industry - academia collaboration

bull More and better visualization tools

- Use-case driven product development

bull We need to solve the data semantics problem

- Common Event Expression

- Entity extraction

23

Vielen Dank

S

E

C I

V

Z

raffael marty secviz org

Page 36: Security Research2.0 - FIT 2008

The 2nd Dichotomy

16

bull donrsquot understand the real impactbull get the 70 solutionbull donrsquot think bigbull no timemoney for real researchbull canrsquot scalebull work based off of a few

customerrsquos input

bull donrsquot know whatrsquos been done in industrybull donrsquot understand the use-casesbull donrsquot understand the environments

data domainbull work on simulated databull construct their own problems

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The 2nd Dichotomy

16

bull donrsquot understand the real impactbull get the 70 solutionbull donrsquot think bigbull no timemoney for real researchbull canrsquot scalebull work based off of a few

customerrsquos input

bull donrsquot know whatrsquos been done in industrybull donrsquot understand the use-casesbull donrsquot understand the environments

data domainbull work on simulated databull construct their own problems bull use overly complicated impractical

solutions

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The 2nd Dichotomy

16

bull donrsquot understand the real impactbull get the 70 solutionbull donrsquot think bigbull no timemoney for real researchbull canrsquot scalebull work based off of a few

customerrsquos input

bull donrsquot know whatrsquos been done in industrybull donrsquot understand the use-casesbull donrsquot understand the environments

data domainbull work on simulated databull construct their own problems bull use overly complicated impractical

solutionsbull use graphs visualization where it is not

needed

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The Way Forward

17

bull Building a secviz disciplinebull Bridging the gapbull Learning the ldquootherrdquo discipline

Security Visualization

SecViz

bull More academia industry collaboration bull Build components widgets gadgetsbull (Re-)use existing technologiesbull Focus on strengthsbull Focus on the visualization and interaction aspects

Two disciplines

Two worlds

18

bull Use-case oriented visualizationbull Perimeter Threatbull Governance Risk Compliance (GRC)bull Insider Threat bull IT data visualizationbull SecVizOrgbull DAVIX

My Focus Areas

18

bull Use-case oriented visualizationbull Perimeter Threatbull Governance Risk Compliance (GRC)bull Insider Threat bull IT data visualizationbull SecVizOrgbull DAVIX

Insider Threat Visualizationbull Huge amounts of databull More and other data sources than for the traditional security use-cases- Insiders often have legitimate access to machines and data You need to log more than the

exceptions

- Insider crimes are often executed on the application layer

bull The questions are not known in advance - Visualization provokes questions and helps find answers

bull Dynamic nature of fraud- Problem for static algorithms

- Bandits quickly adapt to fixed threshold-based detection systems

bull Looking for any unusual patterns

19

20

20

SecViz - Security VisualizationThis is a place to share discuss challenge and learn about

security visualization

Data Analysis and Visualization Linuxdavixsecvizorg

D

V

X

bull Addressing the secviz dichotomy

bull Better industry - academia collaboration

bull More and better visualization tools

- Use-case driven product development

bull We need to solve the data semantics problem

- Common Event Expression

- Entity extraction

23

The Futurebull Addressing the secviz dichotomy

bull Better industry - academia collaboration

bull More and better visualization tools

- Use-case driven product development

bull We need to solve the data semantics problem

- Common Event Expression

- Entity extraction

23

Vielen Dank

S

E

C I

V

Z

raffael marty secviz org

Page 37: Security Research2.0 - FIT 2008

The 2nd Dichotomy

16

bull donrsquot understand the real impactbull get the 70 solutionbull donrsquot think bigbull no timemoney for real researchbull canrsquot scalebull work based off of a few

customerrsquos input

bull donrsquot know whatrsquos been done in industrybull donrsquot understand the use-casesbull donrsquot understand the environments

data domainbull work on simulated databull construct their own problems bull use overly complicated impractical

solutions

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The 2nd Dichotomy

16

bull donrsquot understand the real impactbull get the 70 solutionbull donrsquot think bigbull no timemoney for real researchbull canrsquot scalebull work based off of a few

customerrsquos input

bull donrsquot know whatrsquos been done in industrybull donrsquot understand the use-casesbull donrsquot understand the environments

data domainbull work on simulated databull construct their own problems bull use overly complicated impractical

solutionsbull use graphs visualization where it is not

needed

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The Way Forward

17

bull Building a secviz disciplinebull Bridging the gapbull Learning the ldquootherrdquo discipline

Security Visualization

SecViz

bull More academia industry collaboration bull Build components widgets gadgetsbull (Re-)use existing technologiesbull Focus on strengthsbull Focus on the visualization and interaction aspects

Two disciplines

Two worlds

18

bull Use-case oriented visualizationbull Perimeter Threatbull Governance Risk Compliance (GRC)bull Insider Threat bull IT data visualizationbull SecVizOrgbull DAVIX

My Focus Areas

18

bull Use-case oriented visualizationbull Perimeter Threatbull Governance Risk Compliance (GRC)bull Insider Threat bull IT data visualizationbull SecVizOrgbull DAVIX

Insider Threat Visualizationbull Huge amounts of databull More and other data sources than for the traditional security use-cases- Insiders often have legitimate access to machines and data You need to log more than the

exceptions

- Insider crimes are often executed on the application layer

bull The questions are not known in advance - Visualization provokes questions and helps find answers

bull Dynamic nature of fraud- Problem for static algorithms

- Bandits quickly adapt to fixed threshold-based detection systems

bull Looking for any unusual patterns

19

20

20

SecViz - Security VisualizationThis is a place to share discuss challenge and learn about

security visualization

Data Analysis and Visualization Linuxdavixsecvizorg

D

V

X

bull Addressing the secviz dichotomy

bull Better industry - academia collaboration

bull More and better visualization tools

- Use-case driven product development

bull We need to solve the data semantics problem

- Common Event Expression

- Entity extraction

23

The Futurebull Addressing the secviz dichotomy

bull Better industry - academia collaboration

bull More and better visualization tools

- Use-case driven product development

bull We need to solve the data semantics problem

- Common Event Expression

- Entity extraction

23

Vielen Dank

S

E

C I

V

Z

raffael marty secviz org

Page 38: Security Research2.0 - FIT 2008

The 2nd Dichotomy

16

bull donrsquot understand the real impactbull get the 70 solutionbull donrsquot think bigbull no timemoney for real researchbull canrsquot scalebull work based off of a few

customerrsquos input

bull donrsquot know whatrsquos been done in industrybull donrsquot understand the use-casesbull donrsquot understand the environments

data domainbull work on simulated databull construct their own problems bull use overly complicated impractical

solutionsbull use graphs visualization where it is not

needed

Some comments are based on paper reviews from RAID 200708 VizSec 200708

Industry Academia

The Way Forward

17

bull Building a secviz disciplinebull Bridging the gapbull Learning the ldquootherrdquo discipline

Security Visualization

SecViz

bull More academia industry collaboration bull Build components widgets gadgetsbull (Re-)use existing technologiesbull Focus on strengthsbull Focus on the visualization and interaction aspects

Two disciplines

Two worlds

18

bull Use-case oriented visualizationbull Perimeter Threatbull Governance Risk Compliance (GRC)bull Insider Threat bull IT data visualizationbull SecVizOrgbull DAVIX

My Focus Areas

18

bull Use-case oriented visualizationbull Perimeter Threatbull Governance Risk Compliance (GRC)bull Insider Threat bull IT data visualizationbull SecVizOrgbull DAVIX

Insider Threat Visualizationbull Huge amounts of databull More and other data sources than for the traditional security use-cases- Insiders often have legitimate access to machines and data You need to log more than the

exceptions

- Insider crimes are often executed on the application layer

bull The questions are not known in advance - Visualization provokes questions and helps find answers

bull Dynamic nature of fraud- Problem for static algorithms

- Bandits quickly adapt to fixed threshold-based detection systems

bull Looking for any unusual patterns

19

20

20

SecViz - Security VisualizationThis is a place to share discuss challenge and learn about

security visualization

Data Analysis and Visualization Linuxdavixsecvizorg

D

V

X

bull Addressing the secviz dichotomy

bull Better industry - academia collaboration

bull More and better visualization tools

- Use-case driven product development

bull We need to solve the data semantics problem

- Common Event Expression

- Entity extraction

23

The Futurebull Addressing the secviz dichotomy

bull Better industry - academia collaboration

bull More and better visualization tools

- Use-case driven product development

bull We need to solve the data semantics problem

- Common Event Expression

- Entity extraction

23

Vielen Dank

S

E

C I

V

Z

raffael marty secviz org

Page 39: Security Research2.0 - FIT 2008

The Way Forward

17

bull Building a secviz disciplinebull Bridging the gapbull Learning the ldquootherrdquo discipline

Security Visualization

SecViz

bull More academia industry collaboration bull Build components widgets gadgetsbull (Re-)use existing technologiesbull Focus on strengthsbull Focus on the visualization and interaction aspects

Two disciplines

Two worlds

18

bull Use-case oriented visualizationbull Perimeter Threatbull Governance Risk Compliance (GRC)bull Insider Threat bull IT data visualizationbull SecVizOrgbull DAVIX

My Focus Areas

18

bull Use-case oriented visualizationbull Perimeter Threatbull Governance Risk Compliance (GRC)bull Insider Threat bull IT data visualizationbull SecVizOrgbull DAVIX

Insider Threat Visualizationbull Huge amounts of databull More and other data sources than for the traditional security use-cases- Insiders often have legitimate access to machines and data You need to log more than the

exceptions

- Insider crimes are often executed on the application layer

bull The questions are not known in advance - Visualization provokes questions and helps find answers

bull Dynamic nature of fraud- Problem for static algorithms

- Bandits quickly adapt to fixed threshold-based detection systems

bull Looking for any unusual patterns

19

20

20

SecViz - Security VisualizationThis is a place to share discuss challenge and learn about

security visualization

Data Analysis and Visualization Linuxdavixsecvizorg

D

V

X

bull Addressing the secviz dichotomy

bull Better industry - academia collaboration

bull More and better visualization tools

- Use-case driven product development

bull We need to solve the data semantics problem

- Common Event Expression

- Entity extraction

23

The Futurebull Addressing the secviz dichotomy

bull Better industry - academia collaboration

bull More and better visualization tools

- Use-case driven product development

bull We need to solve the data semantics problem

- Common Event Expression

- Entity extraction

23

Vielen Dank

S

E

C I

V

Z

raffael marty secviz org

Page 40: Security Research2.0 - FIT 2008

18

bull Use-case oriented visualizationbull Perimeter Threatbull Governance Risk Compliance (GRC)bull Insider Threat bull IT data visualizationbull SecVizOrgbull DAVIX

My Focus Areas

18

bull Use-case oriented visualizationbull Perimeter Threatbull Governance Risk Compliance (GRC)bull Insider Threat bull IT data visualizationbull SecVizOrgbull DAVIX

Insider Threat Visualizationbull Huge amounts of databull More and other data sources than for the traditional security use-cases- Insiders often have legitimate access to machines and data You need to log more than the

exceptions

- Insider crimes are often executed on the application layer

bull The questions are not known in advance - Visualization provokes questions and helps find answers

bull Dynamic nature of fraud- Problem for static algorithms

- Bandits quickly adapt to fixed threshold-based detection systems

bull Looking for any unusual patterns

19

20

20

SecViz - Security VisualizationThis is a place to share discuss challenge and learn about

security visualization

Data Analysis and Visualization Linuxdavixsecvizorg

D

V

X

bull Addressing the secviz dichotomy

bull Better industry - academia collaboration

bull More and better visualization tools

- Use-case driven product development

bull We need to solve the data semantics problem

- Common Event Expression

- Entity extraction

23

The Futurebull Addressing the secviz dichotomy

bull Better industry - academia collaboration

bull More and better visualization tools

- Use-case driven product development

bull We need to solve the data semantics problem

- Common Event Expression

- Entity extraction

23

Vielen Dank

S

E

C I

V

Z

raffael marty secviz org

Page 41: Security Research2.0 - FIT 2008

My Focus Areas

18

bull Use-case oriented visualizationbull Perimeter Threatbull Governance Risk Compliance (GRC)bull Insider Threat bull IT data visualizationbull SecVizOrgbull DAVIX

Insider Threat Visualizationbull Huge amounts of databull More and other data sources than for the traditional security use-cases- Insiders often have legitimate access to machines and data You need to log more than the

exceptions

- Insider crimes are often executed on the application layer

bull The questions are not known in advance - Visualization provokes questions and helps find answers

bull Dynamic nature of fraud- Problem for static algorithms

- Bandits quickly adapt to fixed threshold-based detection systems

bull Looking for any unusual patterns

19

20

20

SecViz - Security VisualizationThis is a place to share discuss challenge and learn about

security visualization

Data Analysis and Visualization Linuxdavixsecvizorg

D

V

X

bull Addressing the secviz dichotomy

bull Better industry - academia collaboration

bull More and better visualization tools

- Use-case driven product development

bull We need to solve the data semantics problem

- Common Event Expression

- Entity extraction

23

The Futurebull Addressing the secviz dichotomy

bull Better industry - academia collaboration

bull More and better visualization tools

- Use-case driven product development

bull We need to solve the data semantics problem

- Common Event Expression

- Entity extraction

23

Vielen Dank

S

E

C I

V

Z

raffael marty secviz org

Page 42: Security Research2.0 - FIT 2008

Insider Threat Visualizationbull Huge amounts of databull More and other data sources than for the traditional security use-cases- Insiders often have legitimate access to machines and data You need to log more than the

exceptions

- Insider crimes are often executed on the application layer

bull The questions are not known in advance - Visualization provokes questions and helps find answers

bull Dynamic nature of fraud- Problem for static algorithms

- Bandits quickly adapt to fixed threshold-based detection systems

bull Looking for any unusual patterns

19

20

20

SecViz - Security VisualizationThis is a place to share discuss challenge and learn about

security visualization

Data Analysis and Visualization Linuxdavixsecvizorg

D

V

X

bull Addressing the secviz dichotomy

bull Better industry - academia collaboration

bull More and better visualization tools

- Use-case driven product development

bull We need to solve the data semantics problem

- Common Event Expression

- Entity extraction

23

The Futurebull Addressing the secviz dichotomy

bull Better industry - academia collaboration

bull More and better visualization tools

- Use-case driven product development

bull We need to solve the data semantics problem

- Common Event Expression

- Entity extraction

23

Vielen Dank

S

E

C I

V

Z

raffael marty secviz org

Page 43: Security Research2.0 - FIT 2008

20

20

SecViz - Security VisualizationThis is a place to share discuss challenge and learn about

security visualization

Data Analysis and Visualization Linuxdavixsecvizorg

D

V

X

bull Addressing the secviz dichotomy

bull Better industry - academia collaboration

bull More and better visualization tools

- Use-case driven product development

bull We need to solve the data semantics problem

- Common Event Expression

- Entity extraction

23

The Futurebull Addressing the secviz dichotomy

bull Better industry - academia collaboration

bull More and better visualization tools

- Use-case driven product development

bull We need to solve the data semantics problem

- Common Event Expression

- Entity extraction

23

Vielen Dank

S

E

C I

V

Z

raffael marty secviz org

Page 44: Security Research2.0 - FIT 2008

20

SecViz - Security VisualizationThis is a place to share discuss challenge and learn about

security visualization

Data Analysis and Visualization Linuxdavixsecvizorg

D

V

X

bull Addressing the secviz dichotomy

bull Better industry - academia collaboration

bull More and better visualization tools

- Use-case driven product development

bull We need to solve the data semantics problem

- Common Event Expression

- Entity extraction

23

The Futurebull Addressing the secviz dichotomy

bull Better industry - academia collaboration

bull More and better visualization tools

- Use-case driven product development

bull We need to solve the data semantics problem

- Common Event Expression

- Entity extraction

23

Vielen Dank

S

E

C I

V

Z

raffael marty secviz org

Page 45: Security Research2.0 - FIT 2008

SecViz - Security VisualizationThis is a place to share discuss challenge and learn about

security visualization

Data Analysis and Visualization Linuxdavixsecvizorg

D

V

X

bull Addressing the secviz dichotomy

bull Better industry - academia collaboration

bull More and better visualization tools

- Use-case driven product development

bull We need to solve the data semantics problem

- Common Event Expression

- Entity extraction

23

The Futurebull Addressing the secviz dichotomy

bull Better industry - academia collaboration

bull More and better visualization tools

- Use-case driven product development

bull We need to solve the data semantics problem

- Common Event Expression

- Entity extraction

23

Vielen Dank

S

E

C I

V

Z

raffael marty secviz org

Page 46: Security Research2.0 - FIT 2008

Data Analysis and Visualization Linuxdavixsecvizorg

D

V

X

bull Addressing the secviz dichotomy

bull Better industry - academia collaboration

bull More and better visualization tools

- Use-case driven product development

bull We need to solve the data semantics problem

- Common Event Expression

- Entity extraction

23

The Futurebull Addressing the secviz dichotomy

bull Better industry - academia collaboration

bull More and better visualization tools

- Use-case driven product development

bull We need to solve the data semantics problem

- Common Event Expression

- Entity extraction

23

Vielen Dank

S

E

C I

V

Z

raffael marty secviz org

Page 47: Security Research2.0 - FIT 2008

bull Addressing the secviz dichotomy

bull Better industry - academia collaboration

bull More and better visualization tools

- Use-case driven product development

bull We need to solve the data semantics problem

- Common Event Expression

- Entity extraction

23

The Futurebull Addressing the secviz dichotomy

bull Better industry - academia collaboration

bull More and better visualization tools

- Use-case driven product development

bull We need to solve the data semantics problem

- Common Event Expression

- Entity extraction

23

Vielen Dank

S

E

C I

V

Z

raffael marty secviz org

Page 48: Security Research2.0 - FIT 2008

The Futurebull Addressing the secviz dichotomy

bull Better industry - academia collaboration

bull More and better visualization tools

- Use-case driven product development

bull We need to solve the data semantics problem

- Common Event Expression

- Entity extraction

23

Vielen Dank

S

E

C I

V

Z

raffael marty secviz org

Page 49: Security Research2.0 - FIT 2008

Vielen Dank

S

E

C I

V

Z

raffael marty secviz org