SlideShare a Scribd company logo
Visualizing*Threats:*
KeyLines*for*Cyber*Security*
Corey*Lanum,*Cambridge*Intelligence*
Louie*Gasparini,*CyberFlow*AnalyCcs*
Part%1%'%Network%Visualiza3on%
•  Why*connected*data?*
•  Going*beyond*network*charts*
•  Protect,*detect,*invesCgate*
•  VisualizaCon*and*analysis*techniques*
**
Agenda*
Part%2%–%CyberFlow%Analy3cs%
•  Using*KeyLines*to*build*a*GUI*
•  Cyber*security*and*the*IoT*
•  Network*visualizaCon*for*beLer**
cyber*security*
IntroducCon*to*KeyLines*
KeyLines*is*a*powerful*SDK*for*building*network**
visualizaCon*web*applicaCons:*
•  Rapid*development*
•  Full*customizaCon*
•  Unrivalled*compaCbility*
•  Simple*deployment*
•  Easy*maintenance*
•  Powerful*funcConality*
A*wide*variety*of*use*cases*
Intelligence*/*security* Law*enforcement*
Business*Intelligence*AnCRfraud*
Sales*/*MarkeCng*/*CRM* IT*management*
Cyber*security*
Compliance*
+*others*
•  Compliance*
•  AML*/*KYC*
•  PharmaceuCcals*
•  Data*discovery*
•  Process*management,*etc…*
Data*at*the*heart*of*Cyber*Security*
Keeping*bad*actors*out*of*
networks*
*
Finding*bad*actors*already*in*
your*network*
*
PostRaLack*forensics*to*close*
the*loopholes*
*
Data%is%your%best%weapon%
%
Cyber&Security&Opera/ons&Center&
Why*network*visualizaCon?*
Understanding%connected%data%
*
*
*
*
*
%
%
*
*
*
*
*
•  What*depends*on*what?*
•  What*is*normal*network*behavior?*
•  Where*are*the*vulnerabiliCes?*
%
Network%visualiza3on%is%the%most%intui3ve%way%to%answer%these%ques3ons.%
Protect*
Detect*
InvesCgate*
InvesCgate*
Techniques:*Dynamic*networks*
Techniques:*Mapping*
Visualizing Threats: Network Visualization for Cyber Security
Security & The Industrial Internet of Things !
Network Security ! Smart Buildings ! Smart Factories ! Smart Cities !
Policy Violations!
Continuous Threat Monitoring !
Segmentation !
Operational !
Security (OpSec)!
Advanced !
Security Threats!
Limit the Attack Surface!
Network segmentation & containment!
Machine learn normal behavior of !
client, server & protocol traffic. !
Identify ANY new behavior!
Identify ANY change in existing !
behavior !
Maintain Security Hygiene!
Identify, reprimand poor security hygiene!
Fix misconfigured devices, identify !
Employee ‘jump drive, chrome sticks !
Unknown wi-fi edge devices, Employee !
network scans, Peer-to-Peer Apps (TOR)
& other protocol misuse!
Operational Anomalies!
Identify and alert on operational anomalies !
in network traffic, direction, size, timing etc. !
Recognize unusual server communications
patterns, SNMP event storms, new activities
or unusual SCADA traffic!
Advanced Threats!
Identify, alert and build case management !
tools on advanced security threats, !
including port scanning, protocol tunneling
or suspicious protocols, new connections to
SCADA sensors, data exfiltration!
High Velocity Data -> Streaming Analytics
!
•  Real-time, unstructured, data-in-motion!
•  Operational information flow !
•  Complexity: volume, performance, timing!
Big Data Pools -> Traditional Analytics
!
•  Batch processing, structured, data-at-rest!
•  Historical transactions and events!
•  Complexity: size of data pools!
Streaming Real-Time Analytics!
Analytics Positioning !
Traditional
Big Data Analytics
!
What happened?!
Why did it happen?!
What might happen? !
How can we make it happen?!
!
by looking at old, historic data!
!
Descriptive, Diagnostic, !
Predictive, Prescriptive !
Analytics !
!
!
CyberFlow
Streaming Analytics
!
What’s happening?!
Why is it happening?!
How is it happening?!
Where is it happening? !
Who’s making it happen?!
!
‘Anomalytics’ !
Solution outline
Continuous Data Monitoring!
& Machine Learning via
network tap or span port!
Apply multiple ‘stereoscopic’!
machine learning algorithms and
policy framework in real time !
Provides Continuous, Contextual
Awareness & Anomaly Detection across
all connected IP Devices!
Monitor ! Machine Learn ! ‘Anomalytics’ !
Solution: Continuous machine learning analytics that provides real-time infrastructure anomaly
detection and contextual awareness of all IP connected devices, thus providing for better business
intelligence, operational intelligence and active situational awareness. !
•  Firewalls
•  SIEM
•  Anti-Virus
Target
Maintains it was PCI-DSS Compliant at the time of the
breach.
Fazio Mechanical
Our system and security measures are in Full Compliance
with HVAC industry practices.
How could this occur?
•  IPS
•  Industry Compliance
•  PCI-DSS Compliance
Targeted!
•  Abnormal communications with a partner VPN
•  Internal Pivoting and Data Movement
•  Access to POS Terminals
•  Linking events together
•  Data Transfer from POS terminals to a central staging
server
•  FTP from DMZ server to Internet server controlled by
Rescator
What was missed?
Targeted!
FlowScape!
Internal Threat Detection
Internet!
WAN!
Unified Network !
Security Policy!
Console!
!
LAN!
Network Edge!
Wireless!
LAN!
Network Core!
Data!
Center!
Remote!
Offices and!
Branches!
Virtual Machines!
Lateral Movement!
Wireless!
LAN!
Network Core!
!
LAN!
Network Edge!
Network Sensor
• Smart Packet Inspection
• Device on Demand Deep Packet Inspection
• 10 Gigabit Ethernet Connection
• Tap or Span Port - Passive Connection
• Appliance or VM Image
!!Net!Sensor! WAN!
!
LAN!
Network Edge!
Wireless!
LAN!
Network Core!
Network Sensor!
!!Net!Sensor!
!!Net!Sensor!
!!Net!Sensor!
Clusters of activity form an APT case!Automatically Group Events into a
Case!
M111!M10!M4!M3!M2!
Flowscape: Anomalytic Processes, Engines & Models
M6!M5! M8!M7!M1! M9! M..!
Multi-Behavioral, Real-Time, Contextual Analytical Algorithm Models !
Device !
Packets!
Device !
Payloads!
Session in !
Progress!
IP X !
IP Pairs!
Server!
by Port!
Port!
Activity!
IP X!
Port!
IP X IP!
X Port!
Client !
Port!
Server !
IP X Port!
Protocol !
Anomalies!
Other …!
Anomaly Fusion & Machine Learning Engine!
Threat Assessment Visualization !
!
Policy Frameworks !
‘Anomalytics’ !
Continuous CyberFlow Machine Learning!
‘Anomalytics’ !
TM!
Confidential - Not for distribution!
Finding unknown threats & reducing false positives
Analytical Engines !
Behavioral Models!
Self Organizing Maps !
Binocular Fusion !
StereoscopicFusion!
Tuning & Policy Engine !
“Anomalytics” - event/case manager !
ContinuousReal-TimeAnalyticsusingbehavioralselforganizingmaps!
Payload !
Server by Port!
IP X IP X Port!
Protocol Anomalies!
Client Port!
Automation of Clustering !
Breach Behaviors!
!
Confidential - Not for distribution!
Cyberflow Analytics: Patent Pending Research !
Binocular Fusion ‘SOM’ Modeling for Anomaly Detection!
Reduction of n-space anomalies detection !Clustering analytics using “Self Organizing Maps”!
Cluster Machine Learning using ‘SOM’ !
Customer Case Study!
Network Topology!
Data Center
•  FlowScape was installed in data
center at the Environmental Services
Department, where most domains
pass through to go external!
•  SPAN ports were configured to collect
raw packets from Cisco switches!
•  FlowScape providers Real Time
analytics and dashboards!
Infrastructure
•  1200+ network devices!
•  12,000+ workstations!
•  1000+ servers !
•  500+ printers!
!
Customer Benefits!
•  Customer spends $600/infected
device @100/month = $720K/year!
•  FlowScape reduces detection and
recovery by 50% saving the customer
an estimated $360K/year!
Machine Learning
Day 1! Events! Steady State!
Painting the network topology !
!
Machine learning all traffic!
“everything is new” !
!
Fireworks!
!
Machine Learn!
Command & Control Events!
Good vs Bad events !
(Security Scan vs DDoS)!
‘Anomalytics’!
!
Real-time continuous!
Anomaly detection !
Clusters of activity form an APT case!Smart City Case Study!
FlowScape is deployed in large Custiomer Network
Deployment - 1200+ network devices, 12,000+
workstations, 1000+ servers, 500+ printers…!
Custom IoT Server Apps !
Backup Servers!
SNMP agents!
DNS Servers!
NetBIOS traffic !
Clusters of activity form an APT case!Smart City Case Study!
Detection of BitTorrent and other anomalies – non-standard high risk communication that is not normally
found on the network – BYOD VPN connection!
19
19!Confidential - Not for distribution!
Clusters of activity form an APT case!Smart City Case Study!
Cyber Security Breach: Sality Botnet Command & Control Attack!
20
http://www.pcworld.com/article/2139460/sality-malware-growing-old-takes-on-a-new-trick.html
1. attacker scan's internet to find specific (home) router models
2. attempt login using default credentials
3. If successful, change router's DNS server to attacker controlled DNS
4. Route user to compromised servers
5. Once user downloads malware cover tracks by changing router's DNS
to 8.8.8.8 (google DNS)
20!
Clusters of activity form an APT case!Smart City Case Study!
Cyber Security Breach Activity, Malware/MetaSploit from Croatia!
Confidential - Not for distribution!
Visualizing Threats: Network Visualization for Cyber Security
Clusters of activity form an APT case!Smart City Case Study!
FlowScape Detection of Cyber Breach
activity that their current Security
tools did not catch:
•  They weren't able to catch/aggregate
bittorrent users w/ Palo Alto.!
•  They weren't able to catch the Onion
Tor traffic with current security tools!
•  They missed the Sality Botnet which
was a BYOD remote device coming in
through VPN!
•  Palo Alto did not detect compromised
device and they were informed of the
breach by an outside agency (e.g.
FBI)!
•  Palo Alto missed port 137 to India !
Any*QuesCons?*
@Cambridgeintel* CambridgeRIntelligence.com*
corey@cambridgeRintelligence.com*
louie@cyberflowanalyCcs.com*
*

More Related Content

PPTX
AI & ML in Cyber Security - Welcome Back to 1999 - Security Hasn't Changed
PDF
Building powerful apps with ArangoDB & KeyLines
PDF
Security Chat 5.0
PDF
Understanding the "Intelligence" in AI
PDF
Artificial Intelligence – Time Bomb or The Promised Land?
PDF
Cyber Security Beyond 2020 – Will We Learn From Our Mistakes?
PDF
Ransomware ly
PPTX
Delivering Security Insights with Data Analytics and Visualization
AI & ML in Cyber Security - Welcome Back to 1999 - Security Hasn't Changed
Building powerful apps with ArangoDB & KeyLines
Security Chat 5.0
Understanding the "Intelligence" in AI
Artificial Intelligence – Time Bomb or The Promised Land?
Cyber Security Beyond 2020 – Will We Learn From Our Mistakes?
Ransomware ly
Delivering Security Insights with Data Analytics and Visualization

What's hot (20)

PPTX
Cyber security and AI
PPTX
How is ai important to the future of cyber security
PDF
UMS Cybersecurity Awareness Seminar: Cybersecurity - Lessons learned from sec...
PDF
AI & ML in Cyber Security - Why Algorithms are Dangerous
PDF
How Machine Learning & AI Will Improve Cyber Security
PPTX
How To Drive Value with Security Data
PDF
ISACA Ethical Hacking Presentation 10/2011
PPTX
IOT Security FUN-damental
PDF
Security Analytics: The Promise of Artificial Intelligence, Machine Learning,...
PDF
Supercharged graph visualization for cyber security
PDF
Threat Intelligence Workshop
PDF
Visualizing NoSQL databases as networks
PPTX
AI and ML in Cybersecurity
PDF
Threat Intelligence
PPTX
Cyber Threat Intelligence
PPTX
NTXISSACSC2 - Top Ten Trends in TRM by Jon Murphy
PPTX
Visualizing the neo4j graph database with key lines
PPTX
Threat intelligence in security
PPTX
One Year After WannaCry - Has Anything Changed? A Root Cause Analysis of Data...
PPTX
Actionable Threat Intelligence
Cyber security and AI
How is ai important to the future of cyber security
UMS Cybersecurity Awareness Seminar: Cybersecurity - Lessons learned from sec...
AI & ML in Cyber Security - Why Algorithms are Dangerous
How Machine Learning & AI Will Improve Cyber Security
How To Drive Value with Security Data
ISACA Ethical Hacking Presentation 10/2011
IOT Security FUN-damental
Security Analytics: The Promise of Artificial Intelligence, Machine Learning,...
Supercharged graph visualization for cyber security
Threat Intelligence Workshop
Visualizing NoSQL databases as networks
AI and ML in Cybersecurity
Threat Intelligence
Cyber Threat Intelligence
NTXISSACSC2 - Top Ten Trends in TRM by Jon Murphy
Visualizing the neo4j graph database with key lines
Threat intelligence in security
One Year After WannaCry - Has Anything Changed? A Root Cause Analysis of Data...
Actionable Threat Intelligence
Ad

Similar to Visualizing Threats: Network Visualization for Cyber Security (20)

PDF
Detection of Spreading Process on many assets over the network
PDF
Finding the needle in the haystack: how Nestle is leveraging big data to defe...
PDF
Advanced Threats and Lateral Movement Detection
PDF
Intelligent cyber security solutions
PDF
Lessons Learned Fighting Modern Cyberthreats in Critical ICS Networks
PDF
FireSIGHT Management Center (FMC) slides
PDF
Architecting cybersecurity to future proof smart cities against emerging cybe...
PPT
Cio ciso security_strategyv1.1
PDF
Compliance made easy. Pass your audits stress-free.
PDF
2021 01-13 reducing risk-of_ransomware
PDF
2012 Data Center Security
PDF
Detecting advanced and evasive threats on the network
PPTX
Threat_actors_and_vectors_with_whiiteandblack_boxtesting.pptx
PPTX
SplunkLive! Customer Presentation – Virtustream
PPTX
Cyber Security
PPTX
44HHVVDDBBGGFFKKLLJJHHSSXXYGGVCCV22.pptx
PPTX
Defend-Against-Next-Gen-Attacks-with-Wire-Data-by-Pete-Anderson.pptx
PDF
DETECTE E INVESTIGUE LAS AMENAZAS AVANZADAS
PPTX
Protecting Financial Networks from Cyber Crime
PDF
The Threat Landscape & Network Security Measures
Detection of Spreading Process on many assets over the network
Finding the needle in the haystack: how Nestle is leveraging big data to defe...
Advanced Threats and Lateral Movement Detection
Intelligent cyber security solutions
Lessons Learned Fighting Modern Cyberthreats in Critical ICS Networks
FireSIGHT Management Center (FMC) slides
Architecting cybersecurity to future proof smart cities against emerging cybe...
Cio ciso security_strategyv1.1
Compliance made easy. Pass your audits stress-free.
2021 01-13 reducing risk-of_ransomware
2012 Data Center Security
Detecting advanced and evasive threats on the network
Threat_actors_and_vectors_with_whiiteandblack_boxtesting.pptx
SplunkLive! Customer Presentation – Virtustream
Cyber Security
44HHVVDDBBGGFFKKLLJJHHSSXXYGGVCCV22.pptx
Defend-Against-Next-Gen-Attacks-with-Wire-Data-by-Pete-Anderson.pptx
DETECTE E INVESTIGUE LAS AMENAZAS AVANZADAS
Protecting Financial Networks from Cyber Crime
The Threat Landscape & Network Security Measures
Ad

More from Cambridge Intelligence (7)

PDF
Dynamic networks
PPTX
Bringing Networks to Life Using Visualization for User Engagement
PPTX
Making the switch to angular js
PPT
Big Data & Graphs in Rome
PPTX
Seeing Graphs - How to successfully visualize connected data
PPTX
Using KeyLines to Visualize Fraud
PPTX
Designing graph visualizations - unpicking the hairball
Dynamic networks
Bringing Networks to Life Using Visualization for User Engagement
Making the switch to angular js
Big Data & Graphs in Rome
Seeing Graphs - How to successfully visualize connected data
Using KeyLines to Visualize Fraud
Designing graph visualizations - unpicking the hairball

Recently uploaded (20)

PDF
Review of recent advances in non-invasive hemoglobin estimation
PDF
Encapsulation_ Review paper, used for researhc scholars
PPTX
A Presentation on Artificial Intelligence
PPT
Teaching material agriculture food technology
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
KodekX | Application Modernization Development
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PPTX
MYSQL Presentation for SQL database connectivity
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PDF
Approach and Philosophy of On baking technology
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PDF
Spectral efficient network and resource selection model in 5G networks
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PDF
NewMind AI Weekly Chronicles - August'25 Week I
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
Review of recent advances in non-invasive hemoglobin estimation
Encapsulation_ Review paper, used for researhc scholars
A Presentation on Artificial Intelligence
Teaching material agriculture food technology
Agricultural_Statistics_at_a_Glance_2022_0.pdf
Dropbox Q2 2025 Financial Results & Investor Presentation
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
KodekX | Application Modernization Development
Digital-Transformation-Roadmap-for-Companies.pptx
Understanding_Digital_Forensics_Presentation.pptx
MYSQL Presentation for SQL database connectivity
Chapter 3 Spatial Domain Image Processing.pdf
Approach and Philosophy of On baking technology
Advanced methodologies resolving dimensionality complications for autism neur...
20250228 LYD VKU AI Blended-Learning.pptx
Spectral efficient network and resource selection model in 5G networks
Reach Out and Touch Someone: Haptics and Empathic Computing
Per capita expenditure prediction using model stacking based on satellite ima...
NewMind AI Weekly Chronicles - August'25 Week I
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...

Visualizing Threats: Network Visualization for Cyber Security

  • 2. Part%1%'%Network%Visualiza3on% •  Why*connected*data?* •  Going*beyond*network*charts* •  Protect,*detect,*invesCgate* •  VisualizaCon*and*analysis*techniques* ** Agenda* Part%2%–%CyberFlow%Analy3cs% •  Using*KeyLines*to*build*a*GUI* •  Cyber*security*and*the*IoT* •  Network*visualizaCon*for*beLer** cyber*security*
  • 6. Why*network*visualizaCon?* Understanding%connected%data% * * * * * % % * * * * * •  What*depends*on*what?* •  What*is*normal*network*behavior?* •  Where*are*the*vulnerabiliCes?* % Network%visualiza3on%is%the%most%intui3ve%way%to%answer%these%ques3ons.%
  • 14. Security & The Industrial Internet of Things ! Network Security ! Smart Buildings ! Smart Factories ! Smart Cities ! Policy Violations! Continuous Threat Monitoring ! Segmentation ! Operational ! Security (OpSec)! Advanced ! Security Threats! Limit the Attack Surface! Network segmentation & containment! Machine learn normal behavior of ! client, server & protocol traffic. ! Identify ANY new behavior! Identify ANY change in existing ! behavior ! Maintain Security Hygiene! Identify, reprimand poor security hygiene! Fix misconfigured devices, identify ! Employee ‘jump drive, chrome sticks ! Unknown wi-fi edge devices, Employee ! network scans, Peer-to-Peer Apps (TOR) & other protocol misuse! Operational Anomalies! Identify and alert on operational anomalies ! in network traffic, direction, size, timing etc. ! Recognize unusual server communications patterns, SNMP event storms, new activities or unusual SCADA traffic! Advanced Threats! Identify, alert and build case management ! tools on advanced security threats, ! including port scanning, protocol tunneling or suspicious protocols, new connections to SCADA sensors, data exfiltration!
  • 15. High Velocity Data -> Streaming Analytics ! •  Real-time, unstructured, data-in-motion! •  Operational information flow ! •  Complexity: volume, performance, timing! Big Data Pools -> Traditional Analytics ! •  Batch processing, structured, data-at-rest! •  Historical transactions and events! •  Complexity: size of data pools! Streaming Real-Time Analytics! Analytics Positioning ! Traditional Big Data Analytics ! What happened?! Why did it happen?! What might happen? ! How can we make it happen?! ! by looking at old, historic data! ! Descriptive, Diagnostic, ! Predictive, Prescriptive ! Analytics ! ! ! CyberFlow Streaming Analytics ! What’s happening?! Why is it happening?! How is it happening?! Where is it happening? ! Who’s making it happen?! !
  • 16. ‘Anomalytics’ ! Solution outline Continuous Data Monitoring! & Machine Learning via network tap or span port! Apply multiple ‘stereoscopic’! machine learning algorithms and policy framework in real time ! Provides Continuous, Contextual Awareness & Anomaly Detection across all connected IP Devices! Monitor ! Machine Learn ! ‘Anomalytics’ ! Solution: Continuous machine learning analytics that provides real-time infrastructure anomaly detection and contextual awareness of all IP connected devices, thus providing for better business intelligence, operational intelligence and active situational awareness. !
  • 17. •  Firewalls •  SIEM •  Anti-Virus Target Maintains it was PCI-DSS Compliant at the time of the breach. Fazio Mechanical Our system and security measures are in Full Compliance with HVAC industry practices. How could this occur? •  IPS •  Industry Compliance •  PCI-DSS Compliance Targeted!
  • 18. •  Abnormal communications with a partner VPN •  Internal Pivoting and Data Movement •  Access to POS Terminals •  Linking events together •  Data Transfer from POS terminals to a central staging server •  FTP from DMZ server to Internet server controlled by Rescator What was missed? Targeted!
  • 20. Internet! WAN! Unified Network ! Security Policy! Console! ! LAN! Network Edge! Wireless! LAN! Network Core! Data! Center! Remote! Offices and! Branches! Virtual Machines! Lateral Movement!
  • 22. Network Sensor • Smart Packet Inspection • Device on Demand Deep Packet Inspection • 10 Gigabit Ethernet Connection • Tap or Span Port - Passive Connection • Appliance or VM Image !!Net!Sensor! WAN! ! LAN! Network Edge! Wireless! LAN! Network Core! Network Sensor! !!Net!Sensor! !!Net!Sensor! !!Net!Sensor!
  • 23. Clusters of activity form an APT case!Automatically Group Events into a Case!
  • 24. M111!M10!M4!M3!M2! Flowscape: Anomalytic Processes, Engines & Models M6!M5! M8!M7!M1! M9! M..! Multi-Behavioral, Real-Time, Contextual Analytical Algorithm Models ! Device ! Packets! Device ! Payloads! Session in ! Progress! IP X ! IP Pairs! Server! by Port! Port! Activity! IP X! Port! IP X IP! X Port! Client ! Port! Server ! IP X Port! Protocol ! Anomalies! Other …! Anomaly Fusion & Machine Learning Engine! Threat Assessment Visualization ! ! Policy Frameworks ! ‘Anomalytics’ ! Continuous CyberFlow Machine Learning! ‘Anomalytics’ ! TM! Confidential - Not for distribution!
  • 25. Finding unknown threats & reducing false positives Analytical Engines ! Behavioral Models! Self Organizing Maps ! Binocular Fusion ! StereoscopicFusion! Tuning & Policy Engine ! “Anomalytics” - event/case manager ! ContinuousReal-TimeAnalyticsusingbehavioralselforganizingmaps! Payload ! Server by Port! IP X IP X Port! Protocol Anomalies! Client Port! Automation of Clustering ! Breach Behaviors! ! Confidential - Not for distribution!
  • 26. Cyberflow Analytics: Patent Pending Research ! Binocular Fusion ‘SOM’ Modeling for Anomaly Detection! Reduction of n-space anomalies detection !Clustering analytics using “Self Organizing Maps”! Cluster Machine Learning using ‘SOM’ !
  • 27. Customer Case Study! Network Topology! Data Center •  FlowScape was installed in data center at the Environmental Services Department, where most domains pass through to go external! •  SPAN ports were configured to collect raw packets from Cisco switches! •  FlowScape providers Real Time analytics and dashboards! Infrastructure •  1200+ network devices! •  12,000+ workstations! •  1000+ servers ! •  500+ printers! ! Customer Benefits! •  Customer spends $600/infected device @100/month = $720K/year! •  FlowScape reduces detection and recovery by 50% saving the customer an estimated $360K/year!
  • 28. Machine Learning Day 1! Events! Steady State! Painting the network topology ! ! Machine learning all traffic! “everything is new” ! ! Fireworks! ! Machine Learn! Command & Control Events! Good vs Bad events ! (Security Scan vs DDoS)! ‘Anomalytics’! ! Real-time continuous! Anomaly detection !
  • 29. Clusters of activity form an APT case!Smart City Case Study! FlowScape is deployed in large Custiomer Network Deployment - 1200+ network devices, 12,000+ workstations, 1000+ servers, 500+ printers…! Custom IoT Server Apps ! Backup Servers! SNMP agents! DNS Servers! NetBIOS traffic !
  • 30. Clusters of activity form an APT case!Smart City Case Study! Detection of BitTorrent and other anomalies – non-standard high risk communication that is not normally found on the network – BYOD VPN connection! 19 19!Confidential - Not for distribution!
  • 31. Clusters of activity form an APT case!Smart City Case Study! Cyber Security Breach: Sality Botnet Command & Control Attack! 20 http://www.pcworld.com/article/2139460/sality-malware-growing-old-takes-on-a-new-trick.html 1. attacker scan's internet to find specific (home) router models 2. attempt login using default credentials 3. If successful, change router's DNS server to attacker controlled DNS 4. Route user to compromised servers 5. Once user downloads malware cover tracks by changing router's DNS to 8.8.8.8 (google DNS) 20!
  • 32. Clusters of activity form an APT case!Smart City Case Study! Cyber Security Breach Activity, Malware/MetaSploit from Croatia! Confidential - Not for distribution!
  • 34. Clusters of activity form an APT case!Smart City Case Study! FlowScape Detection of Cyber Breach activity that their current Security tools did not catch: •  They weren't able to catch/aggregate bittorrent users w/ Palo Alto.! •  They weren't able to catch the Onion Tor traffic with current security tools! •  They missed the Sality Botnet which was a BYOD remote device coming in through VPN! •  Palo Alto did not detect compromised device and they were informed of the breach by an outside agency (e.g. FBI)! •  Palo Alto missed port 137 to India !