Difference between revisions of "1718t1is428T12"

From Visual Analytics for Business Intelligence
Jump to navigation Jump to search
Line 41: Line 41:
  
 
<!--Content-->
 
<!--Content-->
==<div style="background: #F6B419; padding-top: 20px; padding-bottom: 20px; line-height: 0.3em; text-indent: 15px; font-size:20px; font-family:Trebuchet MS; "><font color= #5E2705>Introduction & Motivation</font></div>==
+
==<div style="background: #F6B419; padding-top: 20px; padding-bottom: 20px; line-height: 0.3em; text-indent: 15px; font-size:20px; font-family:Trebuchet MS; "><font color= #5E2705>Coming Soon!</font></div>==
 
<div style="font-size: 15px; padding-top: 15px; padding-bottom: 30px; padding-left: 15px; padding-right: 15px;">
 
<div style="font-size: 15px; padding-top: 15px; padding-bottom: 30px; padding-left: 15px; padding-right: 15px;">
In data analytics and visualization, there are unique challenges faced in the security realm as compared to conventional Business Intelligence analytics; rare incidents (i.e. attacks) within massive volumes of data need to be detected. Organizations commonly use Security Information and Event Management (SIEM) software solutions to gather security events from various systems and logs, by deploying real-time alert tools optimized to do event-driven signature matching for a subset of the overall gathered data. As attacks are more sophisticated these days, threats are more difficult to detect with signature-based systems.
 
 
Extensive analytics can complement SIEM solutions to identify major anomalies, combine multiple markers of attackers’ actions, and detect customized infections. Identifying malicious behavior is challenging, as we do not always know what we are looking for — anomalous behaviors must be an attack, and some attack signatures are unknown and not upfront, so it is crucial to present findings to security analysts for human-driven analysis.
 
</div>
 
 
==<div style="background: #F6B419; padding-top: 20px; padding-bottom: 20px; line-height: 0.3em; text-indent: 15px; font-size:20px; font-family:Trebuchet MS; "><font color= #5E2705>Objectives</font></div>==
 
<div style="font-size: 15px; padding-top: 15px; padding-bottom: 30px; padding-left: 15px; padding-right: 15px;">
 
Security analysts may not be data science specialists, so the use of visual data representation and visual analytics can make security data analytics easier to understand. The aim of the project is to help organizations identify high-level security threats and attacks by analyzing large amounts of security data (i.e. firewall and IDS logs) we have collected, such that security analysts are able to deal with such threats and attacks with the findings without being required to have strong data science proficiency.
 
 
This project tells a story of an attack on a large organization and the three main objectives are:
 
# Discovering key incidents that took place for the time period recorded in the firewall and IDS logs.
 
# Recognizing a security trend in the firewall and IDS logs over the course of the time period.
 
# Identifying the root causes of the incidents identified. And bearing in mind that corporate networks cannot be shut down or disconnected from the internet, what can done to mitigate the issues.
 
</div>
 
 
==<div style="background: #F6B419; padding-top: 20px; padding-bottom: 20px; line-height: 0.3em; text-indent: 15px; font-size:20px; font-family:Trebuchet MS; "><font color= #5E2705>Background Survey of Related Works</font></div>==
 
<div style="font-size: 13px; padding-top: 15px; padding-bottom: 30px; padding-left: 15px; padding-right: 15px;">
 
{| class="wikitable" style="background-color:#FFFFFF;" width="100%"
 
|-
 
! style="font-weight: bold;background: #5E2705;color:#fff;width: 50%;" | Visualizations
 
! style="font-weight: bold;background: #5E2705;color:#fff;" | Explanation
 
|-
 
| [[Image:Team12 viz1.JPG|550px|center]]
 
<br>
 
<center>Data source: http://www.digitalattackmap.com/ </center>
 
||
 
Digital Attack Map is a live data visualization of DDoS attacks around the globe, built through a collaboration between Google Ideas and Arbor Networks. The tool surfaces anonymous attack traffic data to let users explore historic trends and find reports of outages happening on a given day.
 
|-
 
| [[Image:Team12 viz2.JPG|550px|center]]
 
<br>
 
<center>Data source: http://www.trendmicro.com.sg/sg/security-intelligence/current-threat-activity/global-botnet-map/index.html</center>
 
||
 
Global botnet threat activity map by Trend Micro shows the monitored malicious network activity to identify command-and-control servers. It enables security analyst to identify which computers are being attack how many often over the past 2 weeks.
 
|-
 
| [[Image:Team12 viz3.JPG|550px|center]]
 
<br>
 
<center>Data source: https://www.akamai.com/us/en/solutions/intelligent-platform/visualizing-akamai/real-time-web-monitor.jsp </center>
 
||
 
Global Internet conditions map by Akamai. With this real-time data they identify the global regions target of the greatest web attack traffic, cities with the slowest web connections (latency) and geographic areas with the most web traffic (traffic density).
 
|}
 
</div>
 
 
==<div style="background: #F6B419; padding-top: 20px; padding-bottom: 20px; line-height: 0.3em; text-indent: 15px; font-size:20px; font-family:Trebuchet MS; "><font color= #5E2705>Datasets</font></div>==
 
<div style="font-size: 15px; padding-top: 15px; padding-bottom: 30px; padding-left: 15px; padding-right: 15px;">
 
</div>
 
 
==<div style="background: #F6B419; padding-top: 20px; padding-bottom: 20px; line-height: 0.3em; text-indent: 15px; font-size:20px; font-family:Trebuchet MS; "><font color= #5E2705>Tools / Libraries</font></div>==
 
<div style="font-size: 15px; padding-top: 15px; padding-bottom: 30px; padding-left: 15px; padding-right: 15px;">
 
*Tableau
 
*Github
 
*Microsoft Excel
 
*Adobe Creative Suites
 
*Sketch
 
*Javascript: sigma.js, vis.js, three.js, D3.js
 
*Python
 
</div>
 
 
==<div style="background: #F6B419; padding-top: 20px; padding-bottom: 20px; line-height: 0.3em; text-indent: 15px; font-size:20px; font-family:Trebuchet MS; "><font color= #5E2705>Technical Challenges</font></div>==
 
<div style="font-size: 13px; padding-top: 15px; padding-bottom: 30px; padding-left: 15px; padding-right: 15px;">
 
{| class="wikitable" style="background-color:#FFFFFF;" width="100%"
 
|-
 
! style="font-weight: bold;background: #5E2705;color:#FFFFFF; width: 40%;" | Key Technical Challenges
 
! style="font-weight: bold;background: #5E2705;color:#FFFFFF; width: 30%;" | Detailed Description
 
! style="font-weight: bold;background: #5E2705;color:#FFFFFF; width: 30%;" | Proposed Solution
 
|-
 
| <center> Unfamiliar with D3.js libraries </center> ||
 
D3.js is a JavaScript library for producing dynamic, interactive data visualizations in web browsers.
 
||
 
*Go for the d3 workshop
 
*Self learning
 
*Peer Learning
 
|-
 
| <center> Data Cleaning and Transformation </center> ||
 
The data set are in text format and many other different format. Integration are challenging as there are a lot of manual work to be done.
 
||
 
* Delegate workload for cleaning datasets
 
|-
 
| <center> Data Unavailability </center> ||
 
Many actual security attacks and defense data are paid version.
 
||
 
*Research databases using school links through the library portal
 
|-
 
| <center> Determining the Most Optimal Interactive Elements </center> ||
 
In order to enable users to understand the data sets, interactive elements needs to be suitable for this project
 
||
 
*Develop storyboard
 
*Research on security visualization
 
|}
 
</div>
 
 
==<div style="background: #F6B419; padding-top: 20px; padding-bottom: 20px; line-height: 0.3em; text-indent: 15px; font-size:20px; font-family:Trebuchet MS; "><font color= #5E2705>Project Timeline & Task Assignments</font></div>==
 
<div style="font-size: 15px; padding-top: 15px; padding-bottom: 30px;">
 
[[Image: projecttimeline_team12.png |1020px|center]]
 
</div>
 
 
==<div style="background: #F6B419; padding-top: 20px; padding-bottom: 20px; line-height: 0.3em; text-indent: 15px; font-size:20px; font-family:Trebuchet MS; "><font color= #5E2705>References</font></div>==
 
<div style="font-size: 15px; padding-top: 15px; padding-bottom: 30px; padding-left: 15px; padding-right: 15px;">
 
*Databases: http://vizsec.org/data/
 
*Botnet Dataset: https://www.uvic.ca/engineering/ece/isot/datasets/
 
*D3.js: https://d3js.org/
 
*Detect virus: https://www.virustotal.com
 
 
</div>
 
</div>
  

Revision as of 18:46, 19 November 2017

Los tres mascatero logo.png


Home

Proposal

Team

Poster

Application

Research Paper

Version 1 Version 2

Coming Soon!

Comments

Please leave comments here.