Among the blind, the squinter rules.
Security visualization in the field
Among the blind, the squinter rules. Security visualization in the - - PowerPoint PPT Presentation
Among the blind, the squinter rules. Security visualization in the field About me Wim Remes .Ernst and Young Belgium (ITRA FSO) .Incident Response/Analysis .Security Monitoring (SIEM) .Security Management .Eurotrash podcast .InfosecMentors
Among the blind, the squinter rules.
Security visualization in the field
About me
Wim Remes .Ernst and Young Belgium (ITRA FSO)
.Incident Response/Analysis .Security Monitoring (SIEM) .Security Management
.Eurotrash podcast .InfosecMentors
@wimremes on twitter wremes-at-gmail-dot-com
Disclaimer
The opinions and ideas expressed in this talk are my own and are not endorsed by any corporate entity
Agenda
Tools can [save|kill] your day
What tools can I use ?
cool kids use this (not!)
What tools can I use ?
Security tools will help ...
PS : export to CSV works well ... try it for a 5000+ host network ;)credit where credit is due ...
this is going in the right direction...
Open source it is then ...
grep sed awk perl ...
http://www.secviz.org kudos to @zrlram
visualization hall of fail
PIE
It’s what’s in your face
whoa, I take the biggest piece !
Even the best can fail...
sometimes however, they rock ...
to explain simple stuff ;-)
“if bullet points are the obvious killers, pie charts are shurikens”
failing in style ...
playing hide and seek ?
we have to raise the bar
please your audience
Changing the tune keeps people engaged
picture by tochis :http://www.flickr.com/photos/tochis/Many eyes see different things
picture by tochis :http://www.flickr.com/photos/tochis/you’re the designer
who’s that for ?
Management Technical Historical Comparative Supporting Decisions & Business Objectives Clear & Concise Actionable ! (Near) Real Time More complex Facilitating the job Actionable!
42
tips & tricks
Zen master of data visualization
Edward Tufte
data can be beautiful! data should be beautiful!
Dashboard design guru
Stephen Few
“The sad thing about dancing bearware is that most people are quite satisfied with the lumbering beast.”
Alan Cooper, 1999, the inmates are running the asylum.sparklines (aka datawords)
5 6 7 8 9 10 11 12 13
Infographs
choose your chart wisely
http://www.flickr.com/photos/amit-agarwal/3196386402/Get data from external sources
context creates clarity
让我们作的更好
5 4 3 2 1 25 50 75 100 Vulnerabilities by Severity Level3D?
compared to ? last year? last month?
(let’s make things better)Messy Dashboards (1/5)
network status
Messy Dashboards (2/5)
Events/Second
Messy Dashboards (3/5)
Top attackers 10.10.10.10 192.168.10.234 172.30.12.15 8.8.8.8 Top targets 172.16.12.30 172.16.12.15 172.16.12.230 172.16.12.120
Messy Dashboards (4/5)
Messy Dashboards (5/5)
network status
375 750 1125 1500 12:00 12:10 12:20 12:30 12:40 12:50 13:00Events/Second
worms portscans failed logins FTP 15 30 45 60Major Events
Windows Unix NetworkTop attackers 10.10.10.10 192.168.10.234 172.30.12.15 8.8.8.8 Top targets 172.16.12.30 172.16.12.15 172.16.12.230 172.16.12.120
1000 2000 3000 4000 9:00 10:00 11:00 12:00 13:00 Local Network - Inbound bytesserver health
3,1415926535897932384626433832
US NL US CN BE US DE
TimeNet VolumeDrive EuroAccess RoadRunner Great Lakes Comnet ISPSYSTEM-AS KEYWEB ASBlink...Understand
DE BE NL CN US
Ok, we can still say it with pie
let’s get to work
Davix | gltail
http://dataviz.com.au/blog/Visualizing_VOIP_attacks.htmlruby | real time | logs http://www.fudgie.org/
Davix | afterglow
credit: David Bernal Michelena http://www.honeynet.org/challenges/2010_5_log_mysteries(extra)
http://www.secviz.org/content/top-ssh-brute-force-attackersperl | chart director
Google Charts API
http://code.google.com/apis/chart/
http://search.cpan.org/dist/URI-GoogleChart/
jquery libraries
http://jquery.com/ http://omnipotent.net/jquery.sparkline/ http://www.jqplot.com/
Conclusions
than pie charts
use them wisely
Thank you
wremes@gmail.com - @wimremes