Cyber Security White Paper
Cyber Security White Paper
cyber security
threats
Contents
Visualizing cyber data 3
Visualizing cyber threats as graphs and timelines 4
Incident forensics and log analysis 4
Impact analysis 8
Advanced graph analysis 10
Visualizing cyber threat intelligence 11
Finding anomalies and patterns 13
Root cause analysis 15
Understanding data breaches 17
Our data visualization toolkits 19
2
Visualizing cyber data
Cyber security is a big data challenge. Organizations collate and
process terabytes of disparate information every day to uncover
activity that could indicate cyber risks or threats.
These processes and systems create billions of alerts every day, and someone has to decide quickly
what action to take next. They can’t do that reliably without seeing the full picture first. That’s why data
visualization is critical.
In this white paper, we’ll share some of the ways our data visualization technologies make complex
cyber security data easier for analysts to understand, powering faster and better decision-making.
Whether you’re proactively securing your systems from malicious activity, combating an ongoing attack,
or running post-attack forensics, you need to understand those connected footprints.
Our toolkits provide two versatile ways to do that.
Timeline visualization is a technique for visualizing sequences of events, how they unfold
and how they link together. It gives cyber analysts a clear picture of the chronology of events,
highlighting unusual patterns.
3
Visualizing cyber threats as
graphs and timelines
Incident forensics and log analysis
Analysts need to understand the sequence and nature of complex, high-velocity events that happen
during a cyber attack so they can prevent them from happening again. To start their investigation,
analysts explore network data and examine communications and connections between different devices.
Graph and timeline visualization gives an intuitive view of this kind of information, so it’s easier to
make sense of dense log data. For example, here’s 15-seconds of a laptop’s IP data recorded using the
Wireshark protocol analyzer.
Root cause analysis methodology: what happens when a user visits a website
We’ve combined timeline visualization (left) with graph visualization (right) for a comprehensive view of
which events took place and when.
The timeline’s lens view holds a virtual magnifying glass over key items to reveal details as the user
scrolls through their data. It means they can investigate details in the context of the entire chart.
4
To dig deeper, we zoom in on the timeline and the graph view adapts to show only the devices and
network activity in our time range.
If you’re analyzing events in a relentless stream of time-stamped data, a powerful way to see them in
context is with time series charts.
Above the timeline, we’ve overlaid continuous CPU and memory data from the laptop, which updates
every time you interact with the charts.
5
In the visualization of a fictitious global IT network below, each subnetwork is combined and represented
by a ‘combo’ node. Alerts, shown as red glyphs on links, flag detected issues such as traffic sent to
blacklisted addresses, or downtime inside the network.
Combos provide detail on demand. Once they’re open, analysts get a clear view of alerts at a granular
level.
Choose the best combo style for your cyber data. Rectangular combos give you the option to use a slick
grid formation and save space in busy charts.
6
Arrange IT networks to simplify complexity
To bring network diagrams to life, you can add an image backdrop that makes sense to your users.
Here we’ve overlaid a fictional organization’s IT infrastructure on a floorplan, with two physical sites
connected to a central server via a VPN.
A map of the New York site shows which terminals and factory machines communicate with each other,
and alerts us to potential threats.
7
Impact analysis
Once an analyst detects a vulnerability, they need to see which dependent devices, processes, data or
software could be impacted. We use automated graph layouts to highlight relationships between child
and parent nodes.
The sequential layout (above) is designed specifically for tiered data. It presents nodes as hierarchies,
placing them at clear and uncluttered levels for easier analysis.
An organic layout (above) and an extract of the same IT network data in a sequential layout (next page)
8
9
Impact analysis reveals which nodes would have the greatest effect on a network if they failed. It’s
important to reveal these quickly, especially when you’re dealing with big, dense, complex cyber logs.
Interactive graph and timeline visualization brings them down to a user-friendly scale so they’re easier to
explore and understand without getting overwhelmed.
These uncover the most important, influential and well-connected nodes in your systems, essential for
contingency planning, identifying potential vulnerabilities and safeguarding against cyber threats.
10
Visualizing cyber threat
intelligence
Businesses must evolve their security practices continuously if they
want to stay ahead of highly-organized cyber criminals.
They need to know what potential risks they face, which means analyzing
the cyber landscape to understand threats experienced by similar
organizations.
This knowledge base represents the tactics and techniques used by cyber
criminals, with each column describing the phase of an attack.
In this example, we’ll use the language of the MITRE ATT&CK framework to analyze how the Emotet
Trojan attacks and traverses wi-fi networks.
11
Cyber threat intelligence in the Mitre ATT&CK framework: the Emotet trojan
The threat is broken down into constituent parts, defined by the ATT&CK framework, showing analysts
how it fits into the wider threat landscape.
Visualizing cyber threat intelligence gives analysts a clear view more quickly and deeply than
interrogating the data alone. It also makes intelligence easier to interpret and communicate, ensuring a
shared understanding of the threats they face.
12
Finding anomalies and patterns
As well as acting on automatic alerts and cyber threat intelligence,
cyber analysts must constantly scan for anomalous network
activity.
Graph visualization is an effective tool for identifying and exploring outliers and unusual patterns that
automated, rule-based tools can easily overlook.
This large, complex dataset contains the source and distribution of ransomware attacks over a 4-month
period. The visualization reveals hundreds of worldwide IP addresses linked to malware hosts.
Our graph visualization toolkits offer almost infinite flexibility and customization options. You control how
the chart looks and behaves, with rich node customization and interactivity options.
This is important for cyber analysts dealing with highly-connected networks and IT infrastructure.
Choose the right colors and sizing for different switches, hosts and services, and enrich labels to make
clear their relationship and position in the flow of information.
13
To reduce clutter and spot patterns more easily, we combine the countries from which the attacks
originated, revealing that the USA has the highest number of malware hosts.
Now we’ll combine nodes by the number of attacks by the ransomware responsible - TeslaCrypt,
CryptoWall or Locky. We also use the time bar to show when peaks of ransomware activity occurred.
The red activity lines in the time bar show us that TeslaCrypt was the most frequent ransomware attack
hosted in the USA. This technique means analysts can rapidly scan huge volumes of data and pick out
specific anomalies for further investigation.
14
It’s possible to take time-based analysis to the next level with timeline visualization. Daily or weekly
patterns of online activity amongst employees gives us a clear view of who was accessing a corporate
network outside core working hours.
If a malware threat was detected by your alert system, overlaying this information would give immediate
insight into who was accessing which systems and when.
When you combine graph visualization with KronoGraph, our timeline visualization tool, you get two
powerful views of the same data.
This hybrid approach to visualization helps cyber analysts to understand incidents and identify threat
sources swiftly and effectively.
15
16
Understanding data breaches
Graph visualization allows us to see beyond individual data points
to understand data in its full connected context, leading to better
and faster data analysis.
This example shows a dataset from the Verizon Data Breach report, as curated by the Veris Project. It
shows the relationships between groups of attackers (large ‘donut’ nodes), their attack vectors (color-
coded links) and their victims (smaller white nodes).
The time bar gives an overview of the trends in the dataset over time, comparing vectors. For example,
email (light pink links) is a lesser-used attack vector, and basic technology (orange links) – defined as
breaches using means such as phone or LAN access – is more widely used, but decreasing.
In particular, it’s the most common approach in breaches involving end-users or employees (the large
orange cluster to the right of the chart).
17
‘Advanced tech’ – defined here as web applications, remote access, backdoor, C2, command shell, VPN
– is the most widely used and is particularly favored by the Activist Group included in the dataset (the
large central red cluster at the top).
We’ve sized nodes by degree - in this case, the number of outbound links - to help reveal particularly
unlucky nodes.
For example, Chase Bank has been more unlucky than most in this dataset.
This is a simple example that demonstrates the advantage of a visual, graph-based approach to cyber
data analysis.
In a single chart, we can combine multiple facets of a complex dataset: attackers, attacks, victims,
vectors and times.
This allows us to easily compare and contrast patterns, and see specific incidents in their wider
contextual environment. The result is a faster route to data insight, and more advanced analysis.
18
Request a free trial
At Cambridge Intelligence, we build data visualization tools that make the world a
safer place.
From law enforcement to cyber security and fraud detection, we work with
organizations around the globe. Every day, thousands of analysts rely on our software
to ‘join the dots’ in data and uncover hidden threats.
With our help, it’s quick and easy to build game-changing data visualizations and
deploy them anywhere, to anyone.
To learn more, or to register for a free trial, visit: cambridge-intelligence.com/try/
Add graph visualizations to your ReGraph’s data-driven API makes With KronoGraph it’s easy to build
applications that work anywhere, it quick and easy to add graph interactive, scalable timelines to
as part of any stack. visualizations to your React explore evolving relationships and
applications. unfolding events.