abnormal detect: finding the suspect

18
Abnormal Detect: Finding the Suspect Co-on Team Presented

Upload: jayme-ramirez

Post on 02-Jan-2016

31 views

Category:

Documents


0 download

DESCRIPTION

Abnormal Detect: Finding the Suspect. Co-on Team Presented. Background Review. Yi Fu. Finding the suspect. Jialiang Wang. Yanni Li. Guohao Zhang. Problem. An embassy employee is suspected of sending data to an outside criminal organization from the Embassy - PowerPoint PPT Presentation

TRANSCRIPT

Page 1: Abnormal Detect: Finding the Suspect

Abnormal Detect: Finding the SuspectCo-on Team Presented

Page 2: Abnormal Detect: Finding the Suspect

Background Review• Finding the suspect

Jialiang Wang Yanni Li

Yi Fu Guohao Zhang

Page 3: Abnormal Detect: Finding the Suspect

Problem• An embassy employee is suspected of sending data to an out

side criminal organization from the Embassy• The IP and Network traffic are recorded• Task

• Identify which computer(s) the employee most likely used to send information to his contact

• Characterize the patterns of behavior of suspicious computer use

Page 4: Abnormal Detect: Finding the Suspect

Source Data• Data

Page 5: Abnormal Detect: Finding the Suspect

Data Prepossessing

• Data Filter• Example:

• destIP: 37.170.30.250 has 9638 communications with ALL the sourceIP

• unlikely to be the suspect’s contact• it can be filtered

Page 6: Abnormal Detect: Finding the Suspect

Data Prepossessing• Data size pattern

Page 7: Abnormal Detect: Finding the Suspect

Data Prepossessing• Abnormal Records

Page 8: Abnormal Detect: Finding the Suspect

Visualization metaphor

• Time bar

Page 9: Abnormal Detect: Finding the Suspect

Visualization metaphor

• Prox data of building entrance

Page 10: Abnormal Detect: Finding the Suspect

Visualization metaphor

• Prox data of classified region entrance

Page 11: Abnormal Detect: Finding the Suspect

Visualization metaphor

• Network flow

Page 12: Abnormal Detect: Finding the Suspect

Data Explor

• Overall view

Page 13: Abnormal Detect: Finding the Suspect

Stories found

demo

Page 14: Abnormal Detect: Finding the Suspect

ResultsResults

#56 29th Jan #31 10th Jan

#21 23rd Jan

SourceIP AccessTime DestIP ReqSize37.170.100.56

2008/1/29 15:41100.59.151.1331002475

437.170.100.31

2008/1/10 14:27100.59.151.133 6543216

37.170.100.21

2008/1/23 12:4237.158.218.208 2912383

Page 15: Abnormal Detect: Finding the Suspect

ResultsResults

#5 4th Jan #17 15th Jan

SourceIP AccessTime DestIP Socket ReqSize RespSize

37.170.100.17 2008/1/15 9:5337.170.30.250 25 139964 59318

37.170.100.5 2008/1/4 13:4137.170.30.250 25 4520912 55328

37.170.100.41 2008/1/17 17:1637.170.30.250 25 1662032 59307

Page 16: Abnormal Detect: Finding the Suspect

Left to be Done• Suspect transfer function

• Data size based on statistics• DestIP connecting times• Pattern based transfer function

• Interactive data operations: filter etc.• Higher resolution: day-view• Office grouping• Automatic highest suspicious detect• More interactions

Page 17: Abnormal Detect: Finding the Suspect

Left to be Done

• Focus+context method, using sigma lens to magnify to identify patterns

Page 18: Abnormal Detect: Finding the Suspect

Thank you!