<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Complex Data Visualized &#187; analysisComplex Data Visualized</title>
	<atom:link href="http://complexdatavisualized.com/tag/analysis/feed/" rel="self" type="application/rss+xml" />
	<link>http://complexdatavisualized.com</link>
	<description>Survey of interfaces and visualizations of complex networks</description>
	<lastBuildDate>Wed, 26 Nov 2014 21:34:01 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=3.5</generator>
		<item>
		<title>Raphael Marty on the need for more human eyes in sec monitoring</title>
		<link>http://complexdatavisualized.com/740/</link>
		<comments>http://complexdatavisualized.com/740/#comments</comments>
		<pubDate>Wed, 16 Oct 2013 20:02:50 +0000</pubDate>
		<dc:creator>Johannes Landstorfer</dc:creator>
				<category><![CDATA[related]]></category>
		<category><![CDATA[analysis]]></category>
		<category><![CDATA[conference]]></category>
		<category><![CDATA[cyber-security]]></category>
		<category><![CDATA[talk]]></category>
		<category><![CDATA[visualization]]></category>

		<guid isPermaLink="false">http://complexdatavisualized.com/?p=740</guid>
		<description><![CDATA[Raphael Marty spoke at the 2013 (ACM) conference for Knowledge Discovery and Data mining (KDD&#8217;13). It is a very enlightening talk if you want to learn about the status of visualization in computer network security today and core challenges. Ever growing data traffic and persistent problems like false positives in automatic detection cause headaches to network engineers and analysts today, and also Marty admitted often that he has no idea of how to solve them. ...]]></description>
				<content:encoded><![CDATA[<p>Raphael Marty spoke at the 2013 (ACM) conference for Knowledge Discovery and Data mining (<a href="http://www.kdd.org/kdd2013/">KDD&#8217;13</a>). It is a very enlightening talk if you want to learn about the status of visualization in computer network security today and core challenges. Ever growing data traffic and persistent problems like false positives in automatic detection cause headaches to network engineers and analysts today, and also Marty admitted often that he has no idea of how to solve them. As he has worked for IBM, HP/ArcSight, and Splunk, the most prestigious companies in this area, this likely not because of lacking expertise).</p>
<p><iframe width="955" height="716" src="http://www.youtube.com/embed/CEAMF0TaUUU?feature=oembed" frameborder="0" allowfullscreen></iframe></p>
<p>Marty also generously provided the <a href="http://www.slideshare.net/zrlram/kdd-2013-dm-challenges">slides for his talk</a>.</p>
<p>Some key points I took away:</p>
<h2>Algorithms can&#8217;t cope with targeted or unknown attacks – monitoring needed</h2>
<p>Today&#8217;s attacks are rarely massive or brute force, but targeted, sophisticated, more often nation state sponsored, and low and slow (this is particularly important as it means you can&#8217;t look for typical spikes, which are a sign a mass event – you have to look at long term issues).</p>
<p>Automated tools of today find <em>known</em> threats and work with <em>predefined</em> patterns – they don&#8217;t find unknown attacks (<a href="http://en.wikipedia.org/wiki/Zero-day_attack">0 days</a>) and the more &#8220;heuristic&#8221; tools produce lots of false positives (i.e. increase the workload for analysts instead of reducing it)</p>
<p>According to Gartner <a href="http://www.gartner.com/DisplayDocument?id=2500416">automatic defense systems (prevention) will become entirely useless from in 2020</a>. Instead, you have to monitor and watch out for malicious behaviour (human eyes!), it won&#8217;t be solved automatically.</p>
<p>Some figures for current data amounts in a typical security monitoring setup:</p>
<p><a href="http://complexdatavisualized.com/?attachment_id=741" rel="attachment wp-att-741"><img class="alignnone size-full wp-image-741" alt="marty_detectiontechnology___slideshare-zrlram" src="http://complexdatavisualized.com/wp-content/uploads/2013/10/marty_detectiontechnology___slideshare-zrlram.png" width="1554" height="1014" /></a></p>
<p>So, if everything works out nicely, you still end up with 1000 (highly aggregated/abstracted) alerts that you have to investigate to find the one incident.</p>
<h2>Some security data properties:</h2>
<p><a href="http://complexdatavisualized.com/?attachment_id=742" rel="attachment wp-att-742"><img class="alignnone size-full wp-image-742" alt="marty_securitydata___slideshare-zrlram" src="http://complexdatavisualized.com/wp-content/uploads/2013/10/marty_securitydata___slideshare-zrlram.png" width="1554" height="1014" /></a></p>
<h2>Challenges with data mining methods</h2>
<ul>
<li>Anomaly detection – but how to define &#8220;normal&#8221;?</li>
<li>Association rules – but data is sparse, there&#8217;s little continuity in web traffic</li>
<li>Clustering – no good algorithms available (for categorical data, such as user names, IP addresses)</li>
<li>Classification – data is not consistent (e.g. machine names may change over time)</li>
<li>Summarization – disrespect &#8220;low and slow&#8221; values, which are important</li>
</ul>
<h2>How can visualization help?</h2>
<ol>
<li>make algorithms at work transparent to the user</li>
<li>empower human eyes for understanding, validation, exploration</li>
</ol>
<ul>
<ul>
<li>because they bring</li>
<li>supreme pattern recognition</li>
<li>memory for contexts</li>
<li>intuition!</li>
<li>predictive capabilities</li>
</ul>
</ul>
<p>This is of course a to-do list for our work!</p>
<h2>The need for more research</h2>
<blockquote><p>What is the optimal visualization?</p>
<p>– it depends very much on data at hand and your objectives. But there&#8217;s also very few research on that and I&#8217;m missing that, actually. E.g. what&#8217;s a good visualization for firewall data?</p></blockquote>
<p>And he even shares one of our core problems, the lack of realistic test data:</p>
<blockquote><p>That&#8217;s hard. VAST has some good sets or you can look for cooperations with companies.</p></blockquote>
]]></content:encoded>
			<wfw:commentRss>http://complexdatavisualized.com/740/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>IPython: interactive/self-documenting data analysis</title>
		<link>http://complexdatavisualized.com/ipython-interactiveself-documenting-data-analysis/</link>
		<comments>http://complexdatavisualized.com/ipython-interactiveself-documenting-data-analysis/#comments</comments>
		<pubDate>Mon, 09 Sep 2013 12:53:38 +0000</pubDate>
		<dc:creator>Johannes Landstorfer</dc:creator>
				<category><![CDATA[communication]]></category>
		<category><![CDATA[Visualization Work]]></category>
		<category><![CDATA[analysis]]></category>
		<category><![CDATA[collaboration]]></category>
		<category><![CDATA[Ideas]]></category>
		<category><![CDATA[talk]]></category>
		<category><![CDATA[tool]]></category>

		<guid isPermaLink="false">http://complexdatavisualized.com/?p=727</guid>
		<description><![CDATA[IPython is an &#8220;interactive&#8221; framework for writing python code. Code snippets can be run at the programmer&#8217;s will and the output will be displayed right below the code. Together with rich input from html-markup to iFrames, an entire workflow can be fully documented. This is very handy for learning, of course, but also to make a complex analysis of a computer incident available and transparent to later readers. As everything (docu, code, output) gets &#8220;statically&#8221; ...]]></description>
				<content:encoded><![CDATA[<p><a href="http://ipython.org/" target="_blank">IPython</a> is an &#8220;interactive&#8221; framework for writing python code. Code snippets can be run at the programmer&#8217;s will and the output will be displayed right below the code. Together with rich input from html-markup to iFrames, an entire workflow can be fully documented. This is very handy for learning, of course, but also to make a complex analysis of a computer incident available and transparent to later readers. As everything (docu, code, output) gets &#8220;statically&#8221; saved in JSON, the documentation is even independent of the availability of data sources. (Note: there is also a special &#8220;<a href="http://nbviewer.ipython.org/" target="_blank">Notebook viewer</a>&#8221; available online so the reader doesn&#8217;t have to know/have IPython her/himself)</p>
<p>As a couple of powerful viz and analysis libraries are available for Python (such as <a href="http://pandas.pydata.org/" target="_blank">PANDAS</a>), this is (almost) ideal for recording an analysts way to a result.</p>
<p>Ideas for improvement:</p>
<ol>
<li>make it even more interactive/auto-updating so that changes in one place (&#8220;cell&#8221;) show up in other places at once (maybe even work with realtime sources?) – maybe towards frameworks like puredata/MAX: this would help explore various parameters for the analysis functions.</li>
<li>Think about some auto-recording functions so that documentation becomes easier and the &#8220;author&#8221; has to think less about it. This might be especially possible in the narrow context of network security analysis where certain procedures are standardized or very common.</li>
</ol>
<p>See how it works, e.g. with PCAPS (German)</p>
<p><iframe width="955" height="537" src="http://www.youtube.com/embed/66c7aACFf7Q?feature=oembed&#038;start=1080" frameborder="0" allowfullscreen></iframe></p>
<p>Thanks to <a href="http://www.genua.de" target="_blank">Genua</a> who shared their internal training so well recorded and so generously!</p>
]]></content:encoded>
			<wfw:commentRss>http://complexdatavisualized.com/ipython-interactiveself-documenting-data-analysis/feed/</wfw:commentRss>
		<slash:comments>1</slash:comments>
		</item>
	</channel>
</rss>
