SlideShare a Scribd company logo
VizSec 2014 
Paris, France, November 2014 
Dan Hubbard, CTO OpenDNS 
1 CONFIDENTIAL
Security people have a legacy of being curious. 
2 CONFIDENTIAL
3 CONFIDENTIAL 
We pull things apart.
4 CONFIDENTIAL 
we break them
5 CONFIDENTIAL 
we explore
6 CONFIDENTIAL 
we discover
7 CONFIDENTIAL 
we defend.
8 CONFIDENTIAL 
We are curious explorers.
Turns out curious explorers makes for good defenders. 
9 CONFIDENTIAL
10 CONFIDENTIAL 
Since the mid 80’s
11 CONFIDENTIAL 
Yes, 30 years now
We have been defending through gaining knowledge (samples), 
exploring them (RCE), and creating vaccines (updates) . 
12 CONFIDENTIAL
As the problem scaled we scaled with more curious 
explorers. 
13 CONFIDENTIAL
14 CONFIDENTIAL 
And more…
15 CONFIDENTIAL 
And more…
16 CONFIDENTIAL 
And more…
We got to a point where we could not hire enough 
defenders. 
17 CONFIDENTIAL
18 CONFIDENTIAL 
So, we automated.
Hashes, fingerprints, behavior analysis, sandboxing 
19 CONFIDENTIAL
20 CONFIDENTIAL 
Then signatures, heuristics, and anomalies.
21 CONFIDENTIAL 
But we still could not scale!
And along the way we lost our curiosity and we stopped 
being explorers. 
22 CONFIDENTIAL
Meanwhile other industries starting understanding the 
value of data. 
23 CONFIDENTIAL
24 CONFIDENTIAL 
And the value of large scale compute.
25 CONFIDENTIAL 
The information age started
And we created a culture with an unlimited thirst for data. 
26 CONFIDENTIAL
27 CONFIDENTIAL 
Our appetite for data skyrocketed.
28 CONFIDENTIAL 
And the “Big Data” movement started.
Big Data gave us the ability to absorb a massive amount of 
data and query it with meaningful results. 
29 CONFIDENTIAL
30 CONFIDENTIAL 
Data helped us solve BIG PROBLEMS.
31 CONFIDENTIAL 
Creating cures for disease.
32 CONFIDENTIAL 
Mapping critical genomes.
33 CONFIDENTIAL 
Predicting natural disasters.
34 CONFIDENTIAL 
The world became a lot different.
35 CONFIDENTIAL 
Google, Facebook, Amazon, Twitter
36 CONFIDENTIAL 
Meanwhile…….
Security made incremental attempts at better mousetraps. 
37 CONFIDENTIAL
38 CONFIDENTIAL 
Whitelisting, HIPS, Containerization.
39 CONFIDENTIAL 
“Next Generation” this.
40 CONFIDENTIAL 
“Cyber Defender” that.
41 CONFIDENTIAL 
Bottom line…
42 CONFIDENTIAL 
We lost pace with technology.
Which in turn, left us a long way behind in defending. 
43 CONFIDENTIAL
And we suffer massive decreases in our efficacy. 
44 CONFIDENTIAL
45 CONFIDENTIAL 
So, lets get back to our roots.
46 CONFIDENTIAL 
Embrace the Big Data movement.
47 CONFIDENTIAL 
Innovate in Security Visualization.
And get back to being the curious explorers were are. 
48 CONFIDENTIAL
49 CONFIDENTIAL 
How ?
50 CONFIDENTIAL 
To start you need some data to explore.
51 CONFIDENTIAL 
More = better
52 CONFIDENTIAL 
Diversity in data is important.
Don’t underestimate the ability to query that data! 
53 CONFIDENTIAL
54 CONFIDENTIAL 
Remove all data silos.
55 CONFIDENTIAL 
API’s are critical.
56 CONFIDENTIAL 
Science and Art come together.
57 CONFIDENTIAL 
Security Visualization Today
We have made some progress in 2D Security Viz. 
58 CONFIDENTIAL
59 CONFIDENTIAL 
Examples.
Red October Infrastructure 
60 CONFIDENTIAL
SEA: Twitter, Huffington Post, NY Times Hijack 
61 CONFIDENTIAL
Moneypak 1 
62 CONFIDENTIAL
Moneypak 2 
63 CONFIDENTIAL
Kelhios 
64 CONFIDENTIAL
Customer Botnet Connections 
65 CONFIDENTIAL
Clusters of Algorithmic Scores 
66 CONFIDENTIAL
67 CONFIDENTIAL 
Image are great because they tell a story.
68 CONFIDENTIAL 
But its at best a short story.
69 CONFIDENTIAL 
Its actually more like a magazine than a book
70 CONFIDENTIAL 
Image sequences.
71 CONFIDENTIAL
This is OK, but it limits our exploration capabilities. 
72 CONFIDENTIAL
So we can add context to the visuals. 
73 CONFIDENTIAL
74 CONFIDENTIAL
75 CONFIDENTIAL 
This is a LOT better than “flat” images.
76 CONFIDENTIAL 
Helps tell a more complete story.
77 CONFIDENTIAL 
But does not open up enough exploration.
And two dimensions limits the representation and 
exploration of the data. 
78 CONFIDENTIAL
So, how can we REALLY explore the data in a meaningful 
way? 
79 CONFIDENTIAL
We need to be able to interact and explore the data. 
80 CONFIDENTIAL
3D models and Interactive visualization allows us to do this. 
81 CONFIDENTIAL
82 CONFIDENTIAL 
Examples.
83 CONFIDENTIAL 
These are best viewed in the keynote recording here: 
http://labs.opendns.com/2014/12/01/vizsec2014
Kelhios BotNet 
84 CONFIDENTIAL
Kelhios BotNet Over Time 
85 CONFIDENTIAL
Red October APT Infrastructure 
86 CONFIDENTIAL
Customer BotNet Connection / Relationships 
87 CONFIDENTIAL
Ukraine Networks 
88 CONFIDENTIAL
Cryptolocker Co-occurrences 
89 CONFIDENTIAL
90 CONFIDENTIAL 
Lets Explore!
91 CONFIDENTIAL 
Future Present.
92 CONFIDENTIAL 
What if the interface was the visualization?
93 CONFIDENTIAL 
What if the interface was the visualization?
Through the visualization you could manipulate the data. 
94 CONFIDENTIAL
Assign 
Malware 
95 CONFIDENTIAL
96 CONFIDENTIAL 
Assign 
Malware
97 CONFIDENTIAL 
Lastly…
Viz. is also very good at two key areas in security. 
98 CONFIDENTIAL
99 CONFIDENTIAL 
Education
100 CONFIDENTIAL 
Awareness
101 CONFIDENTIAL 
People like art.
102 CONFIDENTIAL 
All people are curious!
103 CONFIDENTIAL 
OpenGraphiti Art
104 CONFIDENTIAL
105 CONFIDENTIAL
106 CONFIDENTIAL
107 CONFIDENTIAL 
OpenGraphiti Art Experiment
108 CONFIDENTIAL
109 CONFIDENTIAL
110 CONFIDENTIAL
111 CONFIDENTIAL
112 CONFIDENTIAL
113 CONFIDENTIAL
114 CONFIDENTIAL
115 CONFIDENTIAL
116 CONFIDENTIAL
The art project was so popular we use it in marketing 
material. 
117 CONFIDENTIAL
118 CONFIDENTIAL 
And the images are talking points of interest.
119 CONFIDENTIAL 
What’s next?
120 CONFIDENTIAL 
People like new interfaces.
121 CONFIDENTIAL 
Leap Motion
122 CONFIDENTIAL 
Oculus Rift
123 CONFIDENTIAL 
Predictive modeling with Viz.
124 CONFIDENTIAL 
Pour conclure…
Security needs to get back into the forefront of innovation. 
125 CONFIDENTIAL
126 CONFIDENTIAL 
Embrace the Big Data movement.
And not just become leaders in Security Visualization 
127 CONFIDENTIAL
But innovators in the entire visualization movement. 
128 CONFIDENTIAL
129 CONFIDENTIAL 
Merci Beaucoup 
Dan Hubbard 
dan @ opendns.com 
Opengraphiti.com 
Opendns.com

More Related Content

PDF
New DNS Traffic Analysis Techniques to Identify Global Internet Threats
PDF
Blackhat USA 2015: BGP Stream Presentation
PDF
OpenDNS Whitepaper: Platform Technology
PPTX
Standardizing and Strengthening Security to Lower Costs
PDF
Umbrella for MSPs: Enterprise Grade Malware Protection & Containment
PPTX
Speak Security: Under the Hood of the OpenDNS Security Research Labs with Dhi...
PDF
Docker at OpenDNS
PDF
Decoding Connectivity: Thriving and Leading in the Internet of Everything World
New DNS Traffic Analysis Techniques to Identify Global Internet Threats
Blackhat USA 2015: BGP Stream Presentation
OpenDNS Whitepaper: Platform Technology
Standardizing and Strengthening Security to Lower Costs
Umbrella for MSPs: Enterprise Grade Malware Protection & Containment
Speak Security: Under the Hood of the OpenDNS Security Research Labs with Dhi...
Docker at OpenDNS
Decoding Connectivity: Thriving and Leading in the Internet of Everything World

Similar to OpenDNS CTO Dan Hubbard VizSec 2014 Keynote Slides (20)

PDF
De impact van Digitaal op Marketing
KEY
Notacon 7 - SCADA and ICS for Security Experts
PPT
CES 2013: The Year of the Connected Brand - Consumer Electronics Show Recap
PDF
10 Myths on Cloud Computing Technology
PPT
CES 2013: The Year of the Connected Brand
PDF
Online Marketing PART2 - new communication paradigm
PDF
Retrofit IoT
PDF
BlackHat Europe 2010: SCADA and ICS for Security Experts
PDF
2600 v15 n3 (autumn 1998)
PPT
Chief Learning Officer Forum
PDF
Tomorrow's conference
PPTX
The 360i Newsroom and Why Real-Time Marketing is Not a Thing
PDF
Backdoor Dreaming
PDF
Tim Maleeny
PDF
Technology megatrends
PDF
FFCOI Imagination Dilemma Presentation
PPTX
BTO2017 | TEN - Olaf Slater - SABRE
PDF
Hyper island future_book_mobile
PDF
techwizards
PDF
CyberSEED: Virtual Machine Introspection to Detect and Protect
De impact van Digitaal op Marketing
Notacon 7 - SCADA and ICS for Security Experts
CES 2013: The Year of the Connected Brand - Consumer Electronics Show Recap
10 Myths on Cloud Computing Technology
CES 2013: The Year of the Connected Brand
Online Marketing PART2 - new communication paradigm
Retrofit IoT
BlackHat Europe 2010: SCADA and ICS for Security Experts
2600 v15 n3 (autumn 1998)
Chief Learning Officer Forum
Tomorrow's conference
The 360i Newsroom and Why Real-Time Marketing is Not a Thing
Backdoor Dreaming
Tim Maleeny
Technology megatrends
FFCOI Imagination Dilemma Presentation
BTO2017 | TEN - Olaf Slater - SABRE
Hyper island future_book_mobile
techwizards
CyberSEED: Virtual Machine Introspection to Detect and Protect
Ad

More from OpenDNS (17)

PDF
What Happens Before the Kill Chain
PDF
Using Algorithms to Brute Force Algorithms...A Journey Through Time and Names...
PDF
Highly Available Docker Networking With BGP
PDF
One Phish, Two Phish, Red Phish, Your Account Details Just Got Stolen
PDF
Security Ninjas: An Open Source Application Security Training Program
PPTX
Infrastructure Tracking with Passive Monitoring and Active Probing: ShmooCon ...
PDF
IP Routing, AWS, and Docker
PDF
Defcon
PDF
Marauder or Scanning Your DNSDB for Fun and Profit - SOURCE Boston
PDF
Network Security: A Four Point Analysis of Appliances vs. the Cloud
PDF
CanSecWest 2014 Presentation: "Intelligent Use of Intelligence: Design to Dis...
PDF
Rethinking Cyber-Security: 7 Key Strategies for the Challenges that Lie Ahead
PDF
Baythreat Cryptolocker Presentation
PDF
Cryptolocker Webcast
PDF
MSP Webcast - Leveraging Cloud Security to Become a Virtual CIO
PDF
Fast Detection of New Malicious Domains using DNS
PDF
Umbrella for MSPs: Cloud Security via N-able
What Happens Before the Kill Chain
Using Algorithms to Brute Force Algorithms...A Journey Through Time and Names...
Highly Available Docker Networking With BGP
One Phish, Two Phish, Red Phish, Your Account Details Just Got Stolen
Security Ninjas: An Open Source Application Security Training Program
Infrastructure Tracking with Passive Monitoring and Active Probing: ShmooCon ...
IP Routing, AWS, and Docker
Defcon
Marauder or Scanning Your DNSDB for Fun and Profit - SOURCE Boston
Network Security: A Four Point Analysis of Appliances vs. the Cloud
CanSecWest 2014 Presentation: "Intelligent Use of Intelligence: Design to Dis...
Rethinking Cyber-Security: 7 Key Strategies for the Challenges that Lie Ahead
Baythreat Cryptolocker Presentation
Cryptolocker Webcast
MSP Webcast - Leveraging Cloud Security to Become a Virtual CIO
Fast Detection of New Malicious Domains using DNS
Umbrella for MSPs: Cloud Security via N-able
Ad

Recently uploaded (20)

PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PDF
Electronic commerce courselecture one. Pdf
PPTX
Spectroscopy.pptx food analysis technology
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PDF
Network Security Unit 5.pdf for BCA BBA.
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PDF
NewMind AI Weekly Chronicles - August'25 Week I
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PDF
Empathic Computing: Creating Shared Understanding
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
DOCX
The AUB Centre for AI in Media Proposal.docx
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PDF
MIND Revenue Release Quarter 2 2025 Press Release
PDF
KodekX | Application Modernization Development
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PPTX
Cloud computing and distributed systems.
PPT
Teaching material agriculture food technology
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
Electronic commerce courselecture one. Pdf
Spectroscopy.pptx food analysis technology
“AI and Expert System Decision Support & Business Intelligence Systems”
Network Security Unit 5.pdf for BCA BBA.
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
NewMind AI Weekly Chronicles - August'25 Week I
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
Understanding_Digital_Forensics_Presentation.pptx
Empathic Computing: Creating Shared Understanding
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
The AUB Centre for AI in Media Proposal.docx
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
Digital-Transformation-Roadmap-for-Companies.pptx
MIND Revenue Release Quarter 2 2025 Press Release
KodekX | Application Modernization Development
20250228 LYD VKU AI Blended-Learning.pptx
Cloud computing and distributed systems.
Teaching material agriculture food technology

OpenDNS CTO Dan Hubbard VizSec 2014 Keynote Slides