SlideShare a Scribd company logo
Security	- Insights	At	Scale
Raffael	Marty
VP	Security	Analytics	@	Sophos
May	2016
XLDB	2016,	Stanford,	USA
©	Raffael	Marty 2
"This presentation was prepared solely by Raffael
Marty in his personal capacity. The material, views,
and opinions expressed in this presentation are the
author's own and do not reflect the views of Sophos
Ltd. or its affiliates."
Disclaimer
Security	– Shift	Towards	Analytics
6
Past Present Future
Prevention
• Single	instance	
focus
• AV,	firewalls,	IDS
• Cross	entity	
intelligence
• Synchronized
security
Detection
• Data	collection	
and	centralization
• Big	data	
technologies
• Machine	learning	
attempts
• Many	challenges
• Prediction?
• Machine	assisted	
insights
• UX	focus
• Patterns,	behaviors,	
collaboration
+
• Data	driven
learn
Why	the	shift?	Attackers	use	novel	and	specific	methods	to	compromise	each	target.
Security	
7
Gaining	Insights:
Finding	novel	attacks
Data
9
• Types of	data
o Time-series	(with	lots	of	categorical	fields)
o Context	(spatial	data)	– Entities,	blacklists,	etc.
o Multiple	records	for	one	“transaction”	(fusion?)
• Many	access use-cases
o Lookups	/	joins	(external	services	also)
o Search,	aggregate,	compute,	…	(One	interface?	(extended)	SQL?)
• Data	challenges
o Collection	(many	data	formats,	many	transports)
o Scale	(storage	cost,	access	speed)
o Encryption	(transparent,	fast)
o Operational	challenges	(bottlenecks,	etc.)
o Collaboration	(security,	transport)
o How	to	find	relevant	insights?	Not	statistical	anomalies!
• Can	we	get	a	reference	implementation? The	proverbial	hair	ball
Analytics
10
• Mostly	anomaly	/	outlier	detection!	Finding	attacker	behavior	in	the	data
o But	what’s	normal?	This	is	not	about	statistical outliers!
• Approaches
o Cohort	analysis	(users	and	machines)	->	e.g.,	clustering
o Hypothesis	implementation	->	e.g.,	beacon	detection
o ”Learning”	behavior	->	e.g.,	interactive	visualization	of	metrics
• Analytics	challenges
o Categorical	data
o Large	amounts	of	data
o Statistical	vs.	actual	anomalies
o Distance	functions
o Not	a	‘closed’	system
• We	need	humans	in	the	loop!	And	that’s	where	visualization	comes	in.	
Analytics	drives	visualization.
10
Visualization	– Why?
©	Raffael	Marty 14
1. Use analytics to prepare and summarize data.
2. Visualize the output.
3. Help human analysts make decisions and take actions.
Why	Visualization?
15
• SELECT count(distinct protocol) FROM flows;
• SELECT count(distinct port) FROM flows;
• SELECT count(distinct src_network) FROM flows;
• SELECT count(distinct dest_network) FROM flows;
• SELECT port, count(*) FROM flows GROUP BY port;
• SELECT protocol,
count(CASE WHEN flows < 200 THEN 1 END) AS [<200],
count(CASE WHEN flows>= 201 AND flows < 300 THEN 1 END)
AS [201 - 300],
count(CASE WHEN flows>= 301 AND flows < 350 THEN 1 END)
AS [301 - 350],
count(CASE WHEN flows>= 351 THEN 1 END) AS [>351]
FROM flows GROUP BY protocol;
• SELECT port, count(distinct src_network) FROM flows GROUP BY
port;
• SELECT src_network, count(distinct dest_network) FROM flows
GROUP BY port;
• SELECT src_network, count(distinct dest_network) AS dn,
sum(flows) FROM flows GROUP BY port, dn;
• SELECT port, protocol, count(*) FROM flows GROUP BY port,
protocol;
• SELECT sum(flows), dest_network FROM flows GROUP BY
dest_network;
• etc.
port dest_network
protocol src_network flows
Visualization	Challenges
• Visualizing	1TB	of	data?
• Visualization	Mantra	by	Ben	Shneiderman
• Drives	backend	requirements
• Capture	visual	learnings	– automate	findings Security. Analytics. Insight.27
Information Visualization Mantra
Overview Zoom / Filter Details on Demand
Principle by Ben Shneiderman
Sophos	– Security	Made	Simple
20
• For	non	experts
• Consolidating security	capabilities
• Open	architecture
• Data	science	to	SOLVE problems	
not	to	highlight	issues
Analytics
UTM/Next-Gen	Firewall
Wireless
Web
Email
Disk	Encryption
File	Encryption
Endpoint	/	
Next-Gen	Endpoint
Mobile
Server
Sophos	Central
raffael.marty@sophos.com
@raffaelmarty
©	Raffael	Marty 21

More Related Content

PDF
Visualization in the Age of Big Data
PDF
Cloud - Security - Big Data
PPTX
How To Drive Value with Security Data
PDF
Application Logging for Forensics
PDF
Artificial Intelligence – Time Bomb or The Promised Land?
PDF
AI & ML in Cyber Security - Why Algorithms are Dangerous
PPTX
Delivering Security Insights with Data Analytics and Visualization
PDF
Creating Your Own Threat Intel Through Hunting & Visualization
Visualization in the Age of Big Data
Cloud - Security - Big Data
How To Drive Value with Security Data
Application Logging for Forensics
Artificial Intelligence – Time Bomb or The Promised Land?
AI & ML in Cyber Security - Why Algorithms are Dangerous
Delivering Security Insights with Data Analytics and Visualization
Creating Your Own Threat Intel Through Hunting & Visualization

What's hot (20)

PDF
Creating Your Own Threat Intel Through Hunting & Visualization
PPTX
AI & ML in Cyber Security - Welcome Back to 1999 - Security Hasn't Changed
PDF
Security Chat 5.0
PDF
Visualization for Security
PDF
The Heatmap
 - Why is Security Visualization so Hard?
PDF
Big data Visualization and Dashboards
PDF
Threat Hunting Platforms (Collaboration with SANS Institute)
PPTX
Cyber Threat Hunting with Phirelight
PDF
The Heatmap
 - Why is Security Visualization so Hard?
PDF
CTI ANT: Hunting for Chinese Threat Intelligence
PDF
User and Entity Behavior Analytics using the Sqrrl Behavior Graph
PDF
Threat Hunting with Elastic at SpectorOps: Welcome to HELK
PPTX
Building a Successful Threat Hunting Program
PDF
Understanding the "Intelligence" in AI
PPTX
Sqrrl and IBM: Threat Hunting for QRadar Users
PDF
Jisheng Wang at AI Frontiers: Deep Learning in Security
PPTX
Threat Hunting vs. UEBA: Similarities, Differences, and How They Work Together
PPTX
Data-Driven Threat Intelligence: Useful Methods and Measurements for Handling...
PPTX
Cyber Threat Intelligence: Building and maturing an intelligence program that...
PPT
RSA 2006 - Visual Security Event Analysis
Creating Your Own Threat Intel Through Hunting & Visualization
AI & ML in Cyber Security - Welcome Back to 1999 - Security Hasn't Changed
Security Chat 5.0
Visualization for Security
The Heatmap
 - Why is Security Visualization so Hard?
Big data Visualization and Dashboards
Threat Hunting Platforms (Collaboration with SANS Institute)
Cyber Threat Hunting with Phirelight
The Heatmap
 - Why is Security Visualization so Hard?
CTI ANT: Hunting for Chinese Threat Intelligence
User and Entity Behavior Analytics using the Sqrrl Behavior Graph
Threat Hunting with Elastic at SpectorOps: Welcome to HELK
Building a Successful Threat Hunting Program
Understanding the "Intelligence" in AI
Sqrrl and IBM: Threat Hunting for QRadar Users
Jisheng Wang at AI Frontiers: Deep Learning in Security
Threat Hunting vs. UEBA: Similarities, Differences, and How They Work Together
Data-Driven Threat Intelligence: Useful Methods and Measurements for Handling...
Cyber Threat Intelligence: Building and maturing an intelligence program that...
RSA 2006 - Visual Security Event Analysis
Ad

Viewers also liked (20)

PPTX
ArcSight & RSA ECAT Integration - By We-Ankor & Or Cohen
PDF
Machine Learning The Key Ingredient to Self-Driving Data Center
PDF
Visualization Lifecycle
PDF
Self-Driving Data Center (Apply Machine Learning to the Cloud)
PDF
Self-Tuning Data Centers
PPT
Log Visualization - Bellua BCS 2006
PDF
The Self Healing Cloud: Protecting Applications and Infrastructure with Autom...
PDF
Security Visualization - Let's Take A Step Back
PPT
SMS Spam Filter Design Using R: A Machine Learning Approach
PDF
Cyber Security – How Visual Analytics Unlock Insight
DOC
افضل شركة تنظيف بجدة
PPTX
Tarina
PDF
Presentation1 ssi new
PPTX
Ssi 3013 stella present
PDF
Visual Analytics and Security Intelligence
PDF
Supercharging Visualization with Data Mining
PPTX
Effective Blogging
PDF
Graphic Design Services
PDF
RiFRA new collection K.KUBE
PPTX
Direct market costs of aflatoxins in Kenyan dairy value chain
ArcSight & RSA ECAT Integration - By We-Ankor & Or Cohen
Machine Learning The Key Ingredient to Self-Driving Data Center
Visualization Lifecycle
Self-Driving Data Center (Apply Machine Learning to the Cloud)
Self-Tuning Data Centers
Log Visualization - Bellua BCS 2006
The Self Healing Cloud: Protecting Applications and Infrastructure with Autom...
Security Visualization - Let's Take A Step Back
SMS Spam Filter Design Using R: A Machine Learning Approach
Cyber Security – How Visual Analytics Unlock Insight
افضل شركة تنظيف بجدة
Tarina
Presentation1 ssi new
Ssi 3013 stella present
Visual Analytics and Security Intelligence
Supercharging Visualization with Data Mining
Effective Blogging
Graphic Design Services
RiFRA new collection K.KUBE
Direct market costs of aflatoxins in Kenyan dairy value chain
Ad

Similar to Security Insights at Scale (20)

PDF
Technical track chris calvert-1 30 pm-issa conference-calvert
PDF
RSA-Pivotal Security Big Data Reference Architecture
 
PDF
NETWORK SECURITY MONITORING WITH BIG DATA ANALYTICS - Nguyễn Minh Đức
PPTX
Big Data Analytics for Cyber Security: A Quick Overview
PDF
Big Data Visualization
PDF
Oksana Safronova - Will you detect it or not? How to check if security team i...
PDF
Big data Propels SIEM into the era of Security Analytics
 
PPTX
SAST Threat Detection for SAP [Webinar]
PPTX
44CON 2014 - Security Analytics Beyond Cyber, Phil Huggins
PPTX
Security Analytics Beyond Cyber
PDF
Next generation security analytics
PDF
DEF CON 27 - workshop - KRISTY WESTPHAL - analysis 101
PDF
Big Data & Security Have Collided - What Are You Going to do About It?
 
PDF
Finding the needle in the haystack: how Nestle is leveraging big data to defe...
PDF
Demystifying Security Analytics: Data, Methods, Use Cases
PPT
Security metrics 2
PDF
Data Analytics for Security Intelligence
PDF
[cb22] Keynote: Underwhelmed: Making Sense of the Overwhelming Challenge of C...
PPT
Abney and Associates Security 2014 News: Big Returns from Big Data for Security
Technical track chris calvert-1 30 pm-issa conference-calvert
RSA-Pivotal Security Big Data Reference Architecture
 
NETWORK SECURITY MONITORING WITH BIG DATA ANALYTICS - Nguyễn Minh Đức
Big Data Analytics for Cyber Security: A Quick Overview
Big Data Visualization
Oksana Safronova - Will you detect it or not? How to check if security team i...
Big data Propels SIEM into the era of Security Analytics
 
SAST Threat Detection for SAP [Webinar]
44CON 2014 - Security Analytics Beyond Cyber, Phil Huggins
Security Analytics Beyond Cyber
Next generation security analytics
DEF CON 27 - workshop - KRISTY WESTPHAL - analysis 101
Big Data & Security Have Collided - What Are You Going to do About It?
 
Finding the needle in the haystack: how Nestle is leveraging big data to defe...
Demystifying Security Analytics: Data, Methods, Use Cases
Security metrics 2
Data Analytics for Security Intelligence
[cb22] Keynote: Underwhelmed: Making Sense of the Overwhelming Challenge of C...
Abney and Associates Security 2014 News: Big Returns from Big Data for Security

More from Raffael Marty (9)

PDF
Exploring the Defender's Advantage
PDF
Extended Detection and Response (XDR) An Overhyped Product Category With Ulti...
PDF
Cyber Security Beyond 2020 – Will We Learn From Our Mistakes?
PDF
AI & ML in Cyber Security - Why Algorithms Are Dangerous
PDF
Workshop: Big Data Visualization for Security
PDF
DAVIX - Data Analysis and Visualization Linux
PDF
AfterGlow
PPT
Event Graphs - EUSecWest 2006
PDF
Insider Threat Visualization - HackInTheBox 2007
Exploring the Defender's Advantage
Extended Detection and Response (XDR) An Overhyped Product Category With Ulti...
Cyber Security Beyond 2020 – Will We Learn From Our Mistakes?
AI & ML in Cyber Security - Why Algorithms Are Dangerous
Workshop: Big Data Visualization for Security
DAVIX - Data Analysis and Visualization Linux
AfterGlow
Event Graphs - EUSecWest 2006
Insider Threat Visualization - HackInTheBox 2007

Recently uploaded (20)

PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PDF
NewMind AI Weekly Chronicles - August'25 Week I
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PDF
Empathic Computing: Creating Shared Understanding
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PDF
Approach and Philosophy of On baking technology
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PDF
KodekX | Application Modernization Development
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PDF
Encapsulation theory and applications.pdf
PPTX
Programs and apps: productivity, graphics, security and other tools
PPTX
Big Data Technologies - Introduction.pptx
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PPTX
Cloud computing and distributed systems.
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Mobile App Security Testing_ A Comprehensive Guide.pdf
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
NewMind AI Weekly Chronicles - August'25 Week I
Per capita expenditure prediction using model stacking based on satellite ima...
Dropbox Q2 2025 Financial Results & Investor Presentation
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
Empathic Computing: Creating Shared Understanding
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
Approach and Philosophy of On baking technology
Advanced methodologies resolving dimensionality complications for autism neur...
KodekX | Application Modernization Development
Digital-Transformation-Roadmap-for-Companies.pptx
Encapsulation theory and applications.pdf
Programs and apps: productivity, graphics, security and other tools
Big Data Technologies - Introduction.pptx
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
Cloud computing and distributed systems.
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows

Security Insights at Scale

  • 2. © Raffael Marty 2 "This presentation was prepared solely by Raffael Marty in his personal capacity. The material, views, and opinions expressed in this presentation are the author's own and do not reflect the views of Sophos Ltd. or its affiliates." Disclaimer
  • 3. Security – Shift Towards Analytics 6 Past Present Future Prevention • Single instance focus • AV, firewalls, IDS • Cross entity intelligence • Synchronized security Detection • Data collection and centralization • Big data technologies • Machine learning attempts • Many challenges • Prediction? • Machine assisted insights • UX focus • Patterns, behaviors, collaboration + • Data driven learn Why the shift? Attackers use novel and specific methods to compromise each target.
  • 5. Data 9 • Types of data o Time-series (with lots of categorical fields) o Context (spatial data) – Entities, blacklists, etc. o Multiple records for one “transaction” (fusion?) • Many access use-cases o Lookups / joins (external services also) o Search, aggregate, compute, … (One interface? (extended) SQL?) • Data challenges o Collection (many data formats, many transports) o Scale (storage cost, access speed) o Encryption (transparent, fast) o Operational challenges (bottlenecks, etc.) o Collaboration (security, transport) o How to find relevant insights? Not statistical anomalies! • Can we get a reference implementation? The proverbial hair ball
  • 6. Analytics 10 • Mostly anomaly / outlier detection! Finding attacker behavior in the data o But what’s normal? This is not about statistical outliers! • Approaches o Cohort analysis (users and machines) -> e.g., clustering o Hypothesis implementation -> e.g., beacon detection o ”Learning” behavior -> e.g., interactive visualization of metrics • Analytics challenges o Categorical data o Large amounts of data o Statistical vs. actual anomalies o Distance functions o Not a ‘closed’ system • We need humans in the loop! And that’s where visualization comes in. Analytics drives visualization. 10
  • 7. Visualization – Why? © Raffael Marty 14 1. Use analytics to prepare and summarize data. 2. Visualize the output. 3. Help human analysts make decisions and take actions.
  • 8. Why Visualization? 15 • SELECT count(distinct protocol) FROM flows; • SELECT count(distinct port) FROM flows; • SELECT count(distinct src_network) FROM flows; • SELECT count(distinct dest_network) FROM flows; • SELECT port, count(*) FROM flows GROUP BY port; • SELECT protocol, count(CASE WHEN flows < 200 THEN 1 END) AS [<200], count(CASE WHEN flows>= 201 AND flows < 300 THEN 1 END) AS [201 - 300], count(CASE WHEN flows>= 301 AND flows < 350 THEN 1 END) AS [301 - 350], count(CASE WHEN flows>= 351 THEN 1 END) AS [>351] FROM flows GROUP BY protocol; • SELECT port, count(distinct src_network) FROM flows GROUP BY port; • SELECT src_network, count(distinct dest_network) FROM flows GROUP BY port; • SELECT src_network, count(distinct dest_network) AS dn, sum(flows) FROM flows GROUP BY port, dn; • SELECT port, protocol, count(*) FROM flows GROUP BY port, protocol; • SELECT sum(flows), dest_network FROM flows GROUP BY dest_network; • etc. port dest_network protocol src_network flows
  • 9. Visualization Challenges • Visualizing 1TB of data? • Visualization Mantra by Ben Shneiderman • Drives backend requirements • Capture visual learnings – automate findings Security. Analytics. Insight.27 Information Visualization Mantra Overview Zoom / Filter Details on Demand Principle by Ben Shneiderman
  • 10. Sophos – Security Made Simple 20 • For non experts • Consolidating security capabilities • Open architecture • Data science to SOLVE problems not to highlight issues Analytics UTM/Next-Gen Firewall Wireless Web Email Disk Encryption File Encryption Endpoint / Next-Gen Endpoint Mobile Server Sophos Central