SlideShare a Scribd company logo
Towards Designing Effective Visualizations
for DNS-based Network Threat Analysis
Rosa Romero-Gรณmez, Yacin Nadji, and Manos Antonakakis
{rgomez30,yacin,manos}@gatech.edu
What is Network Threat Analysis?
2
Analyst
Alerts Threat Intelligence
The Domain Name System (DNS) is an essential protocol used by
both legitimate Internet applications and cyber attacks
[Building a Dynamic Reputation System for DNS, Antonakakis et al. 2010]
3
Challenges
4
Threat Intelligence Acquisition
โ€œSecurity analysts are still collecting threat intelligence via
email, spreadsheets, and cutting/pasting information from
web-based sources. Obviously, these manual processes
donโ€™t scaleโ€
[Enterprise Strategy Group (ESG) Research Report: Threat Intelligence and Its Role Within Enterprise
Cybersecurity Practices,

June 2015]
5
Analytics
โ€œThreat intelligence may offer clues but human beings are
left to do the heavy lifting by investigating and analyzing
the data on their ownโ€
[ESG Research Report: Threat Intelligence and Its Role Within Enterprise Cybersecurity Practices, 

June 2015]
6
Our Approach:

Open Source THreat Analysis COnsole
(THACO)
Open Datasets Visualization Techniques
7
8
Classless Inter-Domain Routing (CIDR)
Notation
192.0.0.0/8
192.1.0.0/16 192.2.0.0/16
192.168.16.0/24
192.3.0.0/16
192.2.3.0/24
192.2.3.1/32
192.2.3.12/32
/8
/16
/24
/32
Access to THACO live demo: https://ipviz.gtisc.gatech.edu/
9
User-centered Visualization Design
Domain Problem /
Data Characterization
Design Prototype Evaluation
10
Domain Problem & Data
Characterization
โ€ข Procedure: informal interviews with two domain experts
in network threat analysis during two months

โ€ข Output: two main high-level categories of tasks and
data requirements:
Top-down network
threat analysis
or
Threat Hunting
Bottom-up network
threat analysis
or
Incident Response
11
Domain Problem & Data
Characterization
โ€ข Effective threat intelligence involves the combination of
multiple data sources:

โ€ข Active DNS datasets (https://www.activednsproject.org/)
โ€ข Public Domain Blacklists such as abuse.ch
โ€ข Malware Traces (https://www.virustotal.com)
โ€ข Domain WHOIS records (https://www.threatminer.org/)
12
Design
โ€ข Design Goals 

1. Multiple views

2. Different levels of detail

3. Scalability
Multi-grouping, zoomable treemap
13
Evaluation
โ€ข Participants:
โ€ข Network threat analysts are hard to find 

โ€ข Seven in-situ and thirty-one online network threat
analysts from both academia and industry
โ€ข Years of experience ranging < 1 year to > 10 years
โ€ข Procedure:
โ€ข In-situ evaluation: tasks scenarios and semi-structured
interviews
โ€ข Online evaluation: web-based survey (SUS, System
Usability Scale)
14
Evaluation
โ€ข Main Results:
โ€ข Threat analysis experience of participants affects
neither task completion rates nor task completion
times using THACO
โ€ข Experience analysts satisfaction garnered THACO an
โ€œAโ€ grade in usability
โ€ข Limitations:
โ€ข THACO could be improved for tasks involving
keeping track of different pieces of information over
time
15
Want data?
Active DNS datasets: https://
www.activednsproject.org/

16
Want a demo?
THACO live demo: https://
ipviz.gtisc.gatech.edu/

17
Want code?
Source code on GitHub: https://
github.com/Astrolavos/THACO

18
Questions?
19
Towards Designing Effective Visualizations
for DNS-based Network Threat Analysis
Rosa Romero-Gรณmez, Yacin Nadji, and Manos Antonakakis
{rgomez30,yacin,manos}@gatech.edu

More Related Content

PDF
Data Visualization for Big Data: Experience from the Front Line
PDF
balloon: LOD forecasting - cloudy with a chance of services
PDF
Diffusion in platform-based markets: big data driven agent-based model
PDF
From Data to Visualization, what happens in between?
PDF
Cloud - Security - Big Data
PDF
Big Data Visualization
PPTX
An Approach for RDF-based Semantic Access to NoSQL Repositories
PPTX
How To Drive Value with Security Data
Data Visualization for Big Data: Experience from the Front Line
balloon: LOD forecasting - cloudy with a chance of services
Diffusion in platform-based markets: big data driven agent-based model
From Data to Visualization, what happens in between?
Cloud - Security - Big Data
Big Data Visualization
An Approach for RDF-based Semantic Access to NoSQL Repositories
How To Drive Value with Security Data

What's hot (20)

PDF
A Picture is Worth 1,000 Rows
ย 
PDF
Deep Learning in Security - Examples, Infrastructure, Challenges, and Suggest...
PDF
Democratizing Data within your organization - Data Discovery
PDF
DataTags: Sharing Privacy Sensitive Data by Michael Bar-sinai
PDF
Reproducible Research and the Cloud
PDF
Doing Research in the Cloud - NIH Workshop Dennis Gannon
PDF
(Web User Interfaces track) "Getting the Query Right: User Interface Design o...
PDF
Data Analytics in Real World (May 2016)
PDF
vion_a2000_5 facts_d2
PDF
Gianluigi Vigano, Senior Architect and Fouad Teban, Regional Presales Manager...
PDF
[Webinar] Introduction to Cypher
ย 
PPT
Collaborative Data Analysis with Taverna Workflows
PDF
Accelerating your Research with Microsoft Azure (June 2015)
PPT
Semantic Text Processing Powered by Wikipedia
PDF
Big Data Repository for Structural Biology: Challenges and Opportunities by P...
PDF
Tutorial Data Management and workflows
ย 
PDF
Secondary data analysis with digital trace data
PPTX
Databases, Web Services and Tools For Systems Immunology
PPTX
[3DIR] BIM Search Engine: Exploiting Interrelations between Objects when Ass...
ย 
PDF
Threat Hunting with Elastic at SpectorOps: Welcome to HELK
A Picture is Worth 1,000 Rows
ย 
Deep Learning in Security - Examples, Infrastructure, Challenges, and Suggest...
Democratizing Data within your organization - Data Discovery
DataTags: Sharing Privacy Sensitive Data by Michael Bar-sinai
Reproducible Research and the Cloud
Doing Research in the Cloud - NIH Workshop Dennis Gannon
(Web User Interfaces track) "Getting the Query Right: User Interface Design o...
Data Analytics in Real World (May 2016)
vion_a2000_5 facts_d2
Gianluigi Vigano, Senior Architect and Fouad Teban, Regional Presales Manager...
[Webinar] Introduction to Cypher
ย 
Collaborative Data Analysis with Taverna Workflows
Accelerating your Research with Microsoft Azure (June 2015)
Semantic Text Processing Powered by Wikipedia
Big Data Repository for Structural Biology: Challenges and Opportunities by P...
Tutorial Data Management and workflows
ย 
Secondary data analysis with digital trace data
Databases, Web Services and Tools For Systems Immunology
[3DIR] BIM Search Engine: Exploiting Interrelations between Objects when Ass...
ย 
Threat Hunting with Elastic at SpectorOps: Welcome to HELK
Ad

Similar to Towards Designing Effective Visualizations for DNS-based Network Threat Analysis (20)

PDF
Telesoft Cyber Threat Hunting Infographic
PDF
Data-Driven Threat Intelligence: Metrics on Indicator Dissemination and Sharing
PPTX
Incorporating Threat Intelligence into Your Enterprise Communications Systems...
PPTX
Application of threat intelligence in security operation 2017-06-03
ย 
PDF
Caccia alle Minacce: Intelligence e Hunting nel cyberspace
PDF
Cyber Threat hunting workshop
PPTX
User and entity behavior analytics: building an effective solution
PPTX
Application of threat intelligence in security operation
PDF
[cb22] Keynote: Underwhelmed: Making Sense of the Overwhelming Challenge of C...
PDF
Threat Hunting Procedures and Measurement Matrice
PPTX
Targeted Attacks: Have you found yours?
PPTX
Targeted Attacks: Have you found yours?
PDF
Threat Intelligence in the daily life of a SOC Analyst
PDF
SOC Analyst a Practical Walkthrough.pdf
PDF
IRJET- 3 Juncture based Issuer Driven Pull Out System using Distributed Servers
PPTX
Threat Hunting with Splunk Hands-on
ย 
PDF
Global Cyber Threat Intelligence
PPTX
Hunting the Evil of your Infrastructure
PDF
What Happens Before the Kill Chain
ย 
PDF
Cyber Secuirty Visualization
Telesoft Cyber Threat Hunting Infographic
Data-Driven Threat Intelligence: Metrics on Indicator Dissemination and Sharing
Incorporating Threat Intelligence into Your Enterprise Communications Systems...
Application of threat intelligence in security operation 2017-06-03
ย 
Caccia alle Minacce: Intelligence e Hunting nel cyberspace
Cyber Threat hunting workshop
User and entity behavior analytics: building an effective solution
Application of threat intelligence in security operation
[cb22] Keynote: Underwhelmed: Making Sense of the Overwhelming Challenge of C...
Threat Hunting Procedures and Measurement Matrice
Targeted Attacks: Have you found yours?
Targeted Attacks: Have you found yours?
Threat Intelligence in the daily life of a SOC Analyst
SOC Analyst a Practical Walkthrough.pdf
IRJET- 3 Juncture based Issuer Driven Pull Out System using Distributed Servers
Threat Hunting with Splunk Hands-on
ย 
Global Cyber Threat Intelligence
Hunting the Evil of your Infrastructure
What Happens Before the Kill Chain
ย 
Cyber Secuirty Visualization
Ad

Recently uploaded (20)

PPTX
oil_refinery_comprehensive_20250804084928 (1).pptx
PPTX
Data_Analytics_and_PowerBI_Presentation.pptx
PDF
Business Analytics and business intelligence.pdf
PDF
Recruitment and Placement PPT.pdfbjfibjdfbjfobj
PPT
Reliability_Chapter_ presentation 1221.5784
PPTX
AI Strategy room jwfjksfksfjsjsjsjsjfsjfsj
PPTX
advance b rammar.pptxfdgdfgdfsgdfgsdgfdfgdfgsdfgdfgdfg
PPTX
1_Introduction to advance data techniques.pptx
PPTX
01_intro xxxxxxxxxxfffffffffffaaaaaaaaaaafg
PPTX
Acceptance and paychological effects of mandatory extra coach I classes.pptx
PPTX
IB Computer Science - Internal Assessment.pptx
PPT
Quality review (1)_presentation of this 21
PPTX
The THESIS FINAL-DEFENSE-PRESENTATION.pptx
PPTX
Microsoft-Fabric-Unifying-Analytics-for-the-Modern-Enterprise Solution.pptx
PPTX
DISORDERS OF THE LIVER, GALLBLADDER AND PANCREASE (1).pptx
PDF
Fluorescence-microscope_Botany_detailed content
PPTX
Introduction-to-Cloud-ComputingFinal.pptx
PPTX
STUDY DESIGN details- Lt Col Maksud (21).pptx
PDF
Mega Projects Data Mega Projects Data
PPTX
Qualitative Qantitative and Mixed Methods.pptx
oil_refinery_comprehensive_20250804084928 (1).pptx
Data_Analytics_and_PowerBI_Presentation.pptx
Business Analytics and business intelligence.pdf
Recruitment and Placement PPT.pdfbjfibjdfbjfobj
Reliability_Chapter_ presentation 1221.5784
AI Strategy room jwfjksfksfjsjsjsjsjfsjfsj
advance b rammar.pptxfdgdfgdfsgdfgsdgfdfgdfgsdfgdfgdfg
1_Introduction to advance data techniques.pptx
01_intro xxxxxxxxxxfffffffffffaaaaaaaaaaafg
Acceptance and paychological effects of mandatory extra coach I classes.pptx
IB Computer Science - Internal Assessment.pptx
Quality review (1)_presentation of this 21
The THESIS FINAL-DEFENSE-PRESENTATION.pptx
Microsoft-Fabric-Unifying-Analytics-for-the-Modern-Enterprise Solution.pptx
DISORDERS OF THE LIVER, GALLBLADDER AND PANCREASE (1).pptx
Fluorescence-microscope_Botany_detailed content
Introduction-to-Cloud-ComputingFinal.pptx
STUDY DESIGN details- Lt Col Maksud (21).pptx
Mega Projects Data Mega Projects Data
Qualitative Qantitative and Mixed Methods.pptx

Towards Designing Effective Visualizations for DNS-based Network Threat Analysis

  • 1. Towards Designing Effective Visualizations for DNS-based Network Threat Analysis Rosa Romero-Gรณmez, Yacin Nadji, and Manos Antonakakis {rgomez30,yacin,manos}@gatech.edu
  • 2. What is Network Threat Analysis? 2
  • 3. Analyst Alerts Threat Intelligence The Domain Name System (DNS) is an essential protocol used by both legitimate Internet applications and cyber attacks [Building a Dynamic Reputation System for DNS, Antonakakis et al. 2010] 3
  • 5. Threat Intelligence Acquisition โ€œSecurity analysts are still collecting threat intelligence via email, spreadsheets, and cutting/pasting information from web-based sources. Obviously, these manual processes donโ€™t scaleโ€ [Enterprise Strategy Group (ESG) Research Report: Threat Intelligence and Its Role Within Enterprise Cybersecurity Practices, June 2015] 5
  • 6. Analytics โ€œThreat intelligence may offer clues but human beings are left to do the heavy lifting by investigating and analyzing the data on their ownโ€ [ESG Research Report: Threat Intelligence and Its Role Within Enterprise Cybersecurity Practices, June 2015] 6
  • 7. Our Approach: Open Source THreat Analysis COnsole (THACO) Open Datasets Visualization Techniques 7
  • 8. 8 Classless Inter-Domain Routing (CIDR) Notation 192.0.0.0/8 192.1.0.0/16 192.2.0.0/16 192.168.16.0/24 192.3.0.0/16 192.2.3.0/24 192.2.3.1/32 192.2.3.12/32 /8 /16 /24 /32
  • 9. Access to THACO live demo: https://ipviz.gtisc.gatech.edu/ 9
  • 10. User-centered Visualization Design Domain Problem / Data Characterization Design Prototype Evaluation 10
  • 11. Domain Problem & Data Characterization โ€ข Procedure: informal interviews with two domain experts in network threat analysis during two months โ€ข Output: two main high-level categories of tasks and data requirements: Top-down network threat analysis or Threat Hunting Bottom-up network threat analysis or Incident Response 11
  • 12. Domain Problem & Data Characterization โ€ข Effective threat intelligence involves the combination of multiple data sources: โ€ข Active DNS datasets (https://www.activednsproject.org/) โ€ข Public Domain Blacklists such as abuse.ch โ€ข Malware Traces (https://www.virustotal.com) โ€ข Domain WHOIS records (https://www.threatminer.org/) 12
  • 13. Design โ€ข Design Goals 1. Multiple views 2. Different levels of detail 3. Scalability Multi-grouping, zoomable treemap 13
  • 14. Evaluation โ€ข Participants: โ€ข Network threat analysts are hard to find โ€ข Seven in-situ and thirty-one online network threat analysts from both academia and industry โ€ข Years of experience ranging < 1 year to > 10 years โ€ข Procedure: โ€ข In-situ evaluation: tasks scenarios and semi-structured interviews โ€ข Online evaluation: web-based survey (SUS, System Usability Scale) 14
  • 15. Evaluation โ€ข Main Results: โ€ข Threat analysis experience of participants affects neither task completion rates nor task completion times using THACO โ€ข Experience analysts satisfaction garnered THACO an โ€œAโ€ grade in usability โ€ข Limitations: โ€ข THACO could be improved for tasks involving keeping track of different pieces of information over time 15
  • 16. Want data? Active DNS datasets: https:// www.activednsproject.org/ 16
  • 17. Want a demo? THACO live demo: https:// ipviz.gtisc.gatech.edu/ 17
  • 18. Want code? Source code on GitHub: https:// github.com/Astrolavos/THACO 18
  • 20. Towards Designing Effective Visualizations for DNS-based Network Threat Analysis Rosa Romero-Gรณmez, Yacin Nadji, and Manos Antonakakis {rgomez30,yacin,manos}@gatech.edu