We are exploring how data mining can help visualization. I am giving examples of security visualizations and am discussing how data mining best augments visualization efforts.
Web Archivierung - MUSS oder Nice to Have? Rechtliche und andere Gründe, welche für die Archivierung von Web-Inhalten sprechen. Referat anlässlich des ISSS Lunch vom 15.3.12
This document discusses visual security event analysis as an approach to addressing challenges in security monitoring. It summarizes the key benefits of a visual approach as being able to provide multiple views on event data for improved situational awareness, real-time monitoring and incident response, and forensic and historical investigation. Specific examples are provided showing how visualizations can help with port scan detection, insider threat analysis, and compliance reporting.
DAVIX - Data Analysis and Visualization LinuxRaffael Marty
DAVIX, a live CD for data analysis and visualization, brings the most important free tools for data processing and visualization to your desk. There is no hassle with installing an operating system or struggle to build the necessary tools to get started with visualization. You can completely dedicate your time to data analysis.
This document discusses visualizing logfiles using graphs. It begins with an introduction on how graphs can help detect both expected and unexpected events while reducing analysis and response times. It then covers graphing basics like how to generate a graph by parsing a logfile and normalizing the data. Different types of visual graphs are presented, including link graphs and tree maps. Link graph configurations using different node types like source IP, name, destination IP are demonstrated. Tree maps can organize data hierarchically by protocol and service to visualize network traffic proportions.
Security Visualization - Let's Take A Step BackRaffael Marty
I gave the keynote at VizSec 2012. I used the opportunity to take a step back to see where security visualization is at and propose a challenge for how some of the problems we should be focusing on going forward.
Video recording is here: http://youtu.be/AEAs7IzTHMo
This document discusses the intersection of cloud computing, big data, and security. It explains how cloud computing has enabled big data by providing large amounts of cheap storage and on-demand computing power. This has allowed companies to analyze larger datasets than ever before to gain insights. However, big data also presents security challenges as more data is stored remotely in the cloud. The document outlines both the benefits and risks to security from adopting cloud computing and discusses how big data analytics could also be used to enhance cyber security.
Visual Analytics and Security IntelligenceRaffael Marty
Big data and security intelligence are the two hot security topics in 2012. We are collecting more and more information from both the infrastructure, but increasingly also directly from our applications. Some companies are moving away from traditional log management and SIEM tools and are deploying big data products. But what is this big data craze all about? Why is it that we have more and more data to look at? And is big data the right approach or what is missing?
The presentation takes the audience on a journey through big data tools and show that analytical tools are needed to make use of these infrastructures. How can visualization be used to fill in the gap in analytics to move into gaining situational awareness and building up security intelligence.
Creating Your Own Threat Intel Through Hunting & VisualizationRaffael Marty
The security industry is talking a lot about threat intelligence; external information that a company can leverage to understand where potential threats are knocking on the door and might have already perpetrated the network boundaries. Conversations with many CERTs have shown that we have to stop relying on knowledge about how attacks have been conducted in the past and start ‘hunting’ for signs of compromises and anomalies in our own environments.
In this presentation we explore how the decade old field of security visualization has emerged. We show how we have applied advanced analytics and visualization to create our own threat intelligence and investigated lateral movement in a Fortune 50 company.
Visualization. Data science. No machine learning. But pretty pictures.What is internal threat intelligence? Check out http://www.darkreading.com/analytics/creating-your-own-threat-intel-through-hunting-and-visualization/a/d-id/1321225
Ensuring security of a company’s data and infrastructure has largely become a data analytics challenge. It is about finding and understanding patterns and behaviors that are indicative of malicious activities or deviations from the norm. Data, Analytics, and Visualization are used to gain insights and discover those malicious activities. These three components play off of each other, but also have their inherent challenges. A few examples will be given to explore and illustrate some of these challenges,
Creating Your Own Threat Intel Through Hunting & VisualizationRaffael Marty
The security industry is talking a lot about threat intelligence; external information that a company can leverage to understand where potential threats are knocking on the door and might have already perpetrated the network boundaries. Conversations with many CERTs have shown that we have to stop relying on knowledge about how attacks have been conducted in the past and start 'hunting' for signs of compromises and anomalies in our own environments.
In this presentation we explore how the decade old field of security visualization has emerged. We show how we have applied advanced analytics and visualization to create our own threat intelligence and investigated lateral movement in a Fortune 50 company.
Visualization. Data science. No machine learning. But pretty pictures.
Here is a blog post I wrote a bit ago about the general theme of internal threat intelligence:
http://www.darkreading.com/analytics/creating-your-own-threat-intel-through-hunting-and-visualization/a/d-id/1321225?
AI & ML in Cyber Security - Welcome Back to 1999 - Security Hasn't ChangedRaffael Marty
We are writing the year 2017. Cyber security has been a discipline for many years and thousands of security companies are offering solutions to deter and block malicious actors in order to keep our businesses operating and our data confidential. But fundamentally, cyber security has not changed during the last two decades. We are still running Snort and Bro. Firewalls are fundamentally still the same. People get hacked for their poor passwords and we collect logs that we don't know what to do with. In this talk I will paint a slightly provocative and dark picture of security. Fundamentally, nothing has really changed. We'll have a look at machine learning and artificial intelligence and see how those techniques are used today. Do they have the potential to change anything? How will the future look with those technologies? I will show some practical examples of machine learning and motivate that simpler approaches generally win. Maybe we find some hope in visualization? Or maybe Augmented reality? We still have a ways to go.
How to protect, detect, and respond to your threats.
This is an MSP centric talk exploring how to detect, protect, and respond to cyber security threats. We first walk through the cyber defense matrix, explore what security intelligence needs to be and emphasize the concepts with two case studies of BlackCat.
Extended Detection and Response (XDR)An Overhyped Product Category With Ulti...Raffael Marty
Extended Detection and Response, or XDR for short, is one of the acronyms that are increasingly used by cybersecurity vendors to explain their approach to solving the cyber security problem. We have been spending trillions of dollars on approaches to secure our systems and data, with what success? Cybersecurity is still one of the biggest and most challenging areas that companies, small and large, are dealing with. XDR is another approach driven by security vendors to solve this problem. The challenge is that every vendor defines XDR slightly differently and makes it fit their own “challenge du jour” for marketing and selling their products.
In this presentation we will demystify the XDR acronym and put a working model behind it. Together, we will explore why XDR is a fabulous concept, but also discover that it’s nothing revolutionarily new. With an MSP lens, we will explore what the XDR benefits are for small and medium businesses and what it means to the security strategy of both MSPs and their clients. The audience will leave with a clear understanding of what XDR is, how the technology matters to them, and how XDR will ultimately help them secure their customers and enable trusted commerce.
Blog Post: http://raffy.ch/blog. - Video: https://youtu.be/nk5uz0VZrxM
In this video we talk about the world of security data or log data. In the first section, we dive into a bit of a history lesson around log management, SIEM, and big data in security. We then shift to the present to discuss some of the challenges that we face today with managing all of that data and also discuss some of the trends in the security analytics space. In the third section, we focus on the future. What does tomorrow hold in the SIEM / security data space? What are some of the key features we will see and how does this matter to the user of these approaches.
Cyber Security Beyond 2020 – Will We Learn From Our Mistakes?Raffael Marty
The cyber security industry has spent trillions of dollars to keep external attackers at bay. To what effect? We still don't see an end to the cat and mouse game between attackers and the security industry; zero day attacks, new vulnerabilities, ever increasingly sophisticated attacks, etc. We need a paradigm shift in security. A shift away from traditional threat intelligence and indicators of compromise (IOCs). We need to look at understanding behaviors. Those of devices and those of humans.
What are the security approaches and trends that will make an actual difference in protecting our critical data and intellectual property; not just from external attackers, but also from malicious insiders? We will explore topics from the 'all solving' artificial intelligence to risk-based security. We will look at what is happening within the security industry itself, where startups are putting placing their bets, and how human factors will play an increasingly important role in security, along with all of the potential challenges that will create.
Artificial Intelligence – Time Bomb or The Promised Land?Raffael Marty
Companies have AI projects. Security products use AI to keep attackers out and insiders at bay. But what is this "AI" that everyone talks about? In this talk we will explore what artificial intelligence in cyber security is, where the limitations and dangers are, and in what areas we should invest more in AI. We will talk about some of the recent failures of AI in security and invite a conversation about how we verify artificially intelligent systems to understand how much trust we can place in them.
Alongside the AI conversation, we will discover that we need to make a shift in our traditional approach to cyber security. We need to augment our reactive approaches of studying adversary behaviors to understanding behaviors of users and machines to inform a risk-driven approach to security that prevents even zero day attacks.
In this presentation I explore the topic of artificial intelligence in cyber security. What is AI and how do we get to real intelligence in a cyber context. I outline some of the dangers of the way we are using algorithms (AI, ML) today and what that leads to. We then explore how we can add real intelligence through export knowledge to the problem of finding attackers and anomalies in our applications and networks.
Presented at AI 4 Cyber in NYC on April 30, 2019
The document summarizes an agenda for a Security Chat event discussing various cybersecurity topics:
1) Several speakers will present on DevSecOps, formjacking, open source security, and tools for discovering information on the internet.
2) The event is sponsored by Forcepoint, a large cybersecurity company that provides human-centric security solutions like data protection, web security, CASB, NGFW, and more.
3) There is an opportunity for lightning talks and announcements regarding job openings or presentation sharing at the conclusion.
AI & ML in Cyber Security - Why Algorithms are DangerousRaffael Marty
This document discusses the dangers of using algorithms in cybersecurity. It makes three key points:
1) Algorithms make assumptions about the data that may not always be valid, and they do not take important domain knowledge into account.
2) Throwing algorithms at security problems without proper understanding of the data and algorithms can be dangerous and lead to failures.
3) A Bayesian belief network approach that incorporates domain expertise may be better suited for security tasks than purely algorithmic approaches. It allows modeling relationships between different factors and computing probabilities.
AI & ML in Cyber Security - Why Algorithms Are DangerousRaffael Marty
Every single security company is talking in some way or another about how they are applying machine learning. Companies go out of their way to make sure they mention machine learning and not statistics when they explain how they work. Recently, that's not enough anymore either. As a security company you have to claim artificial intelligence to be even part of the conversation.
Guess what. It's all baloney. We have entered a state in cyber security that is, in fact, dangerous. We are blindly relying on algorithms to do the right thing. We are letting deep learning algorithms detect anomalies in our data without having a clue what that algorithm just did. In academia, they call this the lack of explainability and verifiability. But rather than building systems with actual security knowledge, companies are using algorithms that nobody understands and in turn discover wrong insights.
In this talk I will show the limitations of machine learning, outline the issues of explainability, and show where deep learning should never be applied. I will show examples of how the blind application of algorithms (including deep learning) actually leads to wrong results. Algorithms are dangerous. We need to revert back to experts and invest in systems that learn from, and absorb the knowledge, of experts.
Delivering Security Insights with Data Analytics and VisualizationRaffael Marty
It's an interesting exercise to look back to the year 2000 to see how we approached cyber security. We just started to realize that data might be a useful currency, but for the most part, security pursued preventative avenues, such as firewalls, intrusion prevention systems, and anti-virus. With the advent of log management and security incident and event management (SIEM) solutions we started to gather gigabytes of sensor data and correlate data from different sensors to improve on their weaknesses and accelerate their strengths. But fundamentally, such solutions didn't scale that well and struggled to deliver real security insight.
Today, cybersecurity wouldn't work anymore without large scale data analytics and machine learning approaches, especially in the realm of malware classification and threat intelligence. Nonetheless, we are still just scratching the surface and learning where the real challenges are in data analytics for security.
This talk will go on a journey of big data in cybersecurity, exploring where big data has been and where it must go to make a true difference. We will look at the potential of data mining, machine learning, and artificial intelligence, as well as the boundaries of these approaches. We will also look at both the shortcomings and potential of data visualization and the human computer interface. It is critical that today's systems take into account the human expert and, most importantly, provide the right data.
The extent and impact of recent security breaches is showing that current security approaches are just not working. But what can we do to protect our business? We have been advocating monitoring for a long time as a way to detect subtle, advanced attacks that are still making it through our defenses. However, products have failed to deliver on this promise.
Current solutions don't scale in both data volume and analytical insights. In this presentation we will explore what security monitoring is. Specifically, we are going to explore the question of how to visualize a billion log records. A number of security visualization examples will illustrate some of the challenges with big data visualization. They will also help illustrate how data mining and user experience design help us get a handle on the security visualization challenges - enabling us to gain deep insight for a number of security use-cases.
Raffael Marty gave a presentation on big data visualization. He discussed using visualization to discover patterns in large datasets and presenting security information on dashboards. Effective dashboards provide context, highlight important comparisons and metrics, and use aesthetically pleasing designs. Integration with security information management systems requires parsing and formatting data and providing interfaces for querying and analysis. Marty is working on tools for big data analytics, custom visualization workflows, and hunting for anomalies. He invited attendees to join an online community for discussing security visualization.
The Heatmap - Why is Security Visualization so Hard?Raffael Marty
The extent and impact of recent security breaches is showing that current approaches are just not working. But what can we do to protect our business? We have been advocating monitoring for a long time as a way to detect subtle, advanced attacks. However, products have failed to deliver on this promise. Current solutions don't scale in both data volume and analytical insights. In this presentation we will explore why it is so hard to come up with a security monitoring (or shall we call it security intelligence) approach that helps find sophisticated attackers in all the data collected. We are going to explore the question of how to visualize a billion events. We are going to look at a number of security visualization examples to illustrate the problem and some possible solutions. These examples will also help illustrate how data mining and user experience design help us get a handle of the security visualization challenges - enabling us to gain deep insight for a number of security use-cases.
Workshop: Big Data Visualization for SecurityRaffael Marty
Big Data is the latest hype in the security industry. We will have a closer look at what big data is comprised of: Hadoop, Spark, ElasticSearch, Hive, MongoDB, etc. We will learn how to best manage security data in a small Hadoop cluster for different types of use-cases. Doing so, we will encounter a number of big-data open source tools, such as LogStash and Moloch that help with managing log files and packet captures.
As a second topic we will look at visualization and how we can leverage visualization to learn more about our data. In the hands-on part, we will use some of the big data tools, as well as a number of visualization tools to actively investigate a sample data set.
Creating Your Own Threat Intel Through Hunting & VisualizationRaffael Marty
The security industry is talking a lot about threat intelligence; external information that a company can leverage to understand where potential threats are knocking on the door and might have already perpetrated the network boundaries. Conversations with many CERTs have shown that we have to stop relying on knowledge about how attacks have been conducted in the past and start ‘hunting’ for signs of compromises and anomalies in our own environments.
In this presentation we explore how the decade old field of security visualization has emerged. We show how we have applied advanced analytics and visualization to create our own threat intelligence and investigated lateral movement in a Fortune 50 company.
Visualization. Data science. No machine learning. But pretty pictures.What is internal threat intelligence? Check out http://www.darkreading.com/analytics/creating-your-own-threat-intel-through-hunting-and-visualization/a/d-id/1321225
Ensuring security of a company’s data and infrastructure has largely become a data analytics challenge. It is about finding and understanding patterns and behaviors that are indicative of malicious activities or deviations from the norm. Data, Analytics, and Visualization are used to gain insights and discover those malicious activities. These three components play off of each other, but also have their inherent challenges. A few examples will be given to explore and illustrate some of these challenges,
Creating Your Own Threat Intel Through Hunting & VisualizationRaffael Marty
The security industry is talking a lot about threat intelligence; external information that a company can leverage to understand where potential threats are knocking on the door and might have already perpetrated the network boundaries. Conversations with many CERTs have shown that we have to stop relying on knowledge about how attacks have been conducted in the past and start 'hunting' for signs of compromises and anomalies in our own environments.
In this presentation we explore how the decade old field of security visualization has emerged. We show how we have applied advanced analytics and visualization to create our own threat intelligence and investigated lateral movement in a Fortune 50 company.
Visualization. Data science. No machine learning. But pretty pictures.
Here is a blog post I wrote a bit ago about the general theme of internal threat intelligence:
http://www.darkreading.com/analytics/creating-your-own-threat-intel-through-hunting-and-visualization/a/d-id/1321225?
AI & ML in Cyber Security - Welcome Back to 1999 - Security Hasn't ChangedRaffael Marty
We are writing the year 2017. Cyber security has been a discipline for many years and thousands of security companies are offering solutions to deter and block malicious actors in order to keep our businesses operating and our data confidential. But fundamentally, cyber security has not changed during the last two decades. We are still running Snort and Bro. Firewalls are fundamentally still the same. People get hacked for their poor passwords and we collect logs that we don't know what to do with. In this talk I will paint a slightly provocative and dark picture of security. Fundamentally, nothing has really changed. We'll have a look at machine learning and artificial intelligence and see how those techniques are used today. Do they have the potential to change anything? How will the future look with those technologies? I will show some practical examples of machine learning and motivate that simpler approaches generally win. Maybe we find some hope in visualization? Or maybe Augmented reality? We still have a ways to go.
How to protect, detect, and respond to your threats.
This is an MSP centric talk exploring how to detect, protect, and respond to cyber security threats. We first walk through the cyber defense matrix, explore what security intelligence needs to be and emphasize the concepts with two case studies of BlackCat.
Extended Detection and Response (XDR)An Overhyped Product Category With Ulti...Raffael Marty
Extended Detection and Response, or XDR for short, is one of the acronyms that are increasingly used by cybersecurity vendors to explain their approach to solving the cyber security problem. We have been spending trillions of dollars on approaches to secure our systems and data, with what success? Cybersecurity is still one of the biggest and most challenging areas that companies, small and large, are dealing with. XDR is another approach driven by security vendors to solve this problem. The challenge is that every vendor defines XDR slightly differently and makes it fit their own “challenge du jour” for marketing and selling their products.
In this presentation we will demystify the XDR acronym and put a working model behind it. Together, we will explore why XDR is a fabulous concept, but also discover that it’s nothing revolutionarily new. With an MSP lens, we will explore what the XDR benefits are for small and medium businesses and what it means to the security strategy of both MSPs and their clients. The audience will leave with a clear understanding of what XDR is, how the technology matters to them, and how XDR will ultimately help them secure their customers and enable trusted commerce.
Blog Post: http://raffy.ch/blog. - Video: https://youtu.be/nk5uz0VZrxM
In this video we talk about the world of security data or log data. In the first section, we dive into a bit of a history lesson around log management, SIEM, and big data in security. We then shift to the present to discuss some of the challenges that we face today with managing all of that data and also discuss some of the trends in the security analytics space. In the third section, we focus on the future. What does tomorrow hold in the SIEM / security data space? What are some of the key features we will see and how does this matter to the user of these approaches.
Cyber Security Beyond 2020 – Will We Learn From Our Mistakes?Raffael Marty
The cyber security industry has spent trillions of dollars to keep external attackers at bay. To what effect? We still don't see an end to the cat and mouse game between attackers and the security industry; zero day attacks, new vulnerabilities, ever increasingly sophisticated attacks, etc. We need a paradigm shift in security. A shift away from traditional threat intelligence and indicators of compromise (IOCs). We need to look at understanding behaviors. Those of devices and those of humans.
What are the security approaches and trends that will make an actual difference in protecting our critical data and intellectual property; not just from external attackers, but also from malicious insiders? We will explore topics from the 'all solving' artificial intelligence to risk-based security. We will look at what is happening within the security industry itself, where startups are putting placing their bets, and how human factors will play an increasingly important role in security, along with all of the potential challenges that will create.
Artificial Intelligence – Time Bomb or The Promised Land?Raffael Marty
Companies have AI projects. Security products use AI to keep attackers out and insiders at bay. But what is this "AI" that everyone talks about? In this talk we will explore what artificial intelligence in cyber security is, where the limitations and dangers are, and in what areas we should invest more in AI. We will talk about some of the recent failures of AI in security and invite a conversation about how we verify artificially intelligent systems to understand how much trust we can place in them.
Alongside the AI conversation, we will discover that we need to make a shift in our traditional approach to cyber security. We need to augment our reactive approaches of studying adversary behaviors to understanding behaviors of users and machines to inform a risk-driven approach to security that prevents even zero day attacks.
In this presentation I explore the topic of artificial intelligence in cyber security. What is AI and how do we get to real intelligence in a cyber context. I outline some of the dangers of the way we are using algorithms (AI, ML) today and what that leads to. We then explore how we can add real intelligence through export knowledge to the problem of finding attackers and anomalies in our applications and networks.
Presented at AI 4 Cyber in NYC on April 30, 2019
The document summarizes an agenda for a Security Chat event discussing various cybersecurity topics:
1) Several speakers will present on DevSecOps, formjacking, open source security, and tools for discovering information on the internet.
2) The event is sponsored by Forcepoint, a large cybersecurity company that provides human-centric security solutions like data protection, web security, CASB, NGFW, and more.
3) There is an opportunity for lightning talks and announcements regarding job openings or presentation sharing at the conclusion.
AI & ML in Cyber Security - Why Algorithms are DangerousRaffael Marty
This document discusses the dangers of using algorithms in cybersecurity. It makes three key points:
1) Algorithms make assumptions about the data that may not always be valid, and they do not take important domain knowledge into account.
2) Throwing algorithms at security problems without proper understanding of the data and algorithms can be dangerous and lead to failures.
3) A Bayesian belief network approach that incorporates domain expertise may be better suited for security tasks than purely algorithmic approaches. It allows modeling relationships between different factors and computing probabilities.
AI & ML in Cyber Security - Why Algorithms Are DangerousRaffael Marty
Every single security company is talking in some way or another about how they are applying machine learning. Companies go out of their way to make sure they mention machine learning and not statistics when they explain how they work. Recently, that's not enough anymore either. As a security company you have to claim artificial intelligence to be even part of the conversation.
Guess what. It's all baloney. We have entered a state in cyber security that is, in fact, dangerous. We are blindly relying on algorithms to do the right thing. We are letting deep learning algorithms detect anomalies in our data without having a clue what that algorithm just did. In academia, they call this the lack of explainability and verifiability. But rather than building systems with actual security knowledge, companies are using algorithms that nobody understands and in turn discover wrong insights.
In this talk I will show the limitations of machine learning, outline the issues of explainability, and show where deep learning should never be applied. I will show examples of how the blind application of algorithms (including deep learning) actually leads to wrong results. Algorithms are dangerous. We need to revert back to experts and invest in systems that learn from, and absorb the knowledge, of experts.
Delivering Security Insights with Data Analytics and VisualizationRaffael Marty
It's an interesting exercise to look back to the year 2000 to see how we approached cyber security. We just started to realize that data might be a useful currency, but for the most part, security pursued preventative avenues, such as firewalls, intrusion prevention systems, and anti-virus. With the advent of log management and security incident and event management (SIEM) solutions we started to gather gigabytes of sensor data and correlate data from different sensors to improve on their weaknesses and accelerate their strengths. But fundamentally, such solutions didn't scale that well and struggled to deliver real security insight.
Today, cybersecurity wouldn't work anymore without large scale data analytics and machine learning approaches, especially in the realm of malware classification and threat intelligence. Nonetheless, we are still just scratching the surface and learning where the real challenges are in data analytics for security.
This talk will go on a journey of big data in cybersecurity, exploring where big data has been and where it must go to make a true difference. We will look at the potential of data mining, machine learning, and artificial intelligence, as well as the boundaries of these approaches. We will also look at both the shortcomings and potential of data visualization and the human computer interface. It is critical that today's systems take into account the human expert and, most importantly, provide the right data.
The extent and impact of recent security breaches is showing that current security approaches are just not working. But what can we do to protect our business? We have been advocating monitoring for a long time as a way to detect subtle, advanced attacks that are still making it through our defenses. However, products have failed to deliver on this promise.
Current solutions don't scale in both data volume and analytical insights. In this presentation we will explore what security monitoring is. Specifically, we are going to explore the question of how to visualize a billion log records. A number of security visualization examples will illustrate some of the challenges with big data visualization. They will also help illustrate how data mining and user experience design help us get a handle on the security visualization challenges - enabling us to gain deep insight for a number of security use-cases.
Raffael Marty gave a presentation on big data visualization. He discussed using visualization to discover patterns in large datasets and presenting security information on dashboards. Effective dashboards provide context, highlight important comparisons and metrics, and use aesthetically pleasing designs. Integration with security information management systems requires parsing and formatting data and providing interfaces for querying and analysis. Marty is working on tools for big data analytics, custom visualization workflows, and hunting for anomalies. He invited attendees to join an online community for discussing security visualization.
The Heatmap - Why is Security Visualization so Hard?Raffael Marty
The extent and impact of recent security breaches is showing that current approaches are just not working. But what can we do to protect our business? We have been advocating monitoring for a long time as a way to detect subtle, advanced attacks. However, products have failed to deliver on this promise. Current solutions don't scale in both data volume and analytical insights. In this presentation we will explore why it is so hard to come up with a security monitoring (or shall we call it security intelligence) approach that helps find sophisticated attackers in all the data collected. We are going to explore the question of how to visualize a billion events. We are going to look at a number of security visualization examples to illustrate the problem and some possible solutions. These examples will also help illustrate how data mining and user experience design help us get a handle of the security visualization challenges - enabling us to gain deep insight for a number of security use-cases.
Workshop: Big Data Visualization for SecurityRaffael Marty
Big Data is the latest hype in the security industry. We will have a closer look at what big data is comprised of: Hadoop, Spark, ElasticSearch, Hive, MongoDB, etc. We will learn how to best manage security data in a small Hadoop cluster for different types of use-cases. Doing so, we will encounter a number of big-data open source tools, such as LogStash and Moloch that help with managing log files and packet captures.
As a second topic we will look at visualization and how we can leverage visualization to learn more about our data. In the hands-on part, we will use some of the big data tools, as well as a number of visualization tools to actively investigate a sample data set.
Vision is a human’s dominant sense. It is the communication channel with the highest bandwidth into the human brain. Security tools and applications need to make better use of information visualization to enhance human computer interactions and information exchange.
In this talk we will explore a few basic principles of information visualization to see how they apply to cyber security. We will explore both visualization as a data presentation, as well as a data discovery tool. We will address questions like: What makes for effective visualizations? What are some core principles to follow when designing a dashboard? How do you go about visually exploring a terabyte of data? And what role do big data and data mining play in security visualization?
The presentation is filled with visualizations of security data to help translate the theoretical concepts into tangible applications.
The Heatmap - Why is Security Visualization so Hard?Raffael Marty
This presentation explores why it is so hard to come up with a security monitoring (or shall we call it security intelligence) approach that helps find sophisticated attackers in all the data collected. It explores the question of how to visualize a billion events. To do so, the presentation dives deeply into heatmaps - matrices - as an example of a simple type of visualization. While these heatmaps are very simple, they are incredibly versatile and help us think about the problem of security visualization. They help illustrate how data mining and user experience design help get a handle of the security visualization challenges - enabling us to gain deep insight for a number of security use-cases.
Cyber Security – How Visual Analytics Unlock InsightRaffael Marty
Video can be found at: http://youtu.be/CEAMF0TaUUU
In the Cyber Security domain, we have been collecting ‘big data’ for almost two decades. The volume and variety of our data is extremely large, but understanding and capturing the semantics of the data is even more of a challenge. Finding the needle in the proverbial haystack has been attempted from many different angles. In this talk we will have a look at what approaches have been explored, what has worked, and what has not. We will see that there is still a large amount of work to be done and data mining is going to play a central role. We’ll try to motivate that in order to successfully find bad guys, we will have to embrace a solution that not only leverages clever data mining, but employs the right mix between human computer interfaces, data mining, and scalable data platforms.
AfterGlow is a script that assists with the visualization of log data. It reads CSV files and converts them into a Graph description. Check out http://afterglow.sf.net for more information also.
This short presentation gives an overview of AfterGlow and outlines the features and capabilities of the tool. It discusses some of the harder to understand features by showing some configuration examples that can be used as a starting point for some more sophisticated setups.
AftterGlow is one the most downloaded security visualization tools with over 17,000 downloads.
This document discusses using visual approaches to analyze security event data. It introduces the concept of generating graphs from log or event data to more easily identify patterns and relationships compared to raw text. Specific visualization types that the AfterGlow security event visualization tool supports are event graphs and treemaps. Event graphs show relationships between nodes, while treemaps display a hierarchical view of event data. The document argues that visual analysis can improve situational awareness, incident response, and forensic investigations compared to only examining text logs.
Raffael Marty discusses using log visualization to detect insider threats. He outlines an insider detection process that involves building a list of precursor activities, assigning them scores, applying the precursors to log files, and visualizing results to surface insider candidates. Visualization helps analyze data access patterns, financial transactions, and tune the detection process by grouping similar user behaviors. Improvements include bucketizing precursors and using watch lists to adjust user scores.
1. Big Data
and
Security Intelligence
Bay Area's Big Data Think Tank - December 2012
Raffael Marty
pixlcloud | turning data into actionable insight copyright (c) 2012
2. Doushuai's Three Barriers
‘You make your way through the darkness of abandoned grasses in a
search for meaning. As you do, where is the meaning?'
47th case of'The Gateless Barrier'
a collection of Zen koans
3. Outline
security is getting harder
we need new approaches
viz seems interesting
data mining can help
pixlcloud | turning data into actionable insight copyright (c) 2012
4. Some Security Challenges
‣security expertise
‣understanding data
‣communicating security
‣everyone is compromised
‣constantly changing
pixlcloud | turning data into actionable insight copyright (c) 2012
6. visibility, you mean
visualization?
pixlcloud | turning data into actionable insight copyright (c) 2012
7. Why Visualization?
the data... the stats ...
http://en.wikipedia.org/wiki/Anscombe%27s_quartet
pixlcloud | turning data into actionable insight copyright (c) 2012
8. Can We Do Without Viz?
http://en.wikipedia.org/wiki/Anscombe%27s_quartet
pixlcloud | turning data into actionable insight copyright (c) 2012
10. Skaitmeninio sertifikavimo centras
IZENPE S.A. - CIF A-01337260-RMerc.Vitoria-Gasteiz T1055 F62 S8
Jabber Software Foundation
StartCom Ltd.
LGPKI
IZENPE S.A. SSL Trust Delegation
America Online Inc. NetLock Kft.
Swisscom
Thawte
NetLock Halozatbiztonsagi Kft.
Trustis Limited
Not a fully connected
Elektronik Bilgi Guvenligi A.S.
•
MessageLabs
Coventry City Council
B.A.T. AS Sertifitseerimiskeskus
ADMINISTRACION NACIONAL DE CORREOS
RSA Data Security, Inc.
thawte, Inc. Consulting cc
Thawte
mesh
TeliaSonera
Thawte, Inc. Thawte Consulting (Pty) Ltd.
Thawte Consulting
ACAC Camerfirma SA A82743287
Camerfirma SA CIF
Technische Universitaet Berlin Wildau
Bergische Universitaet Fachhochschule Bonn
Technische Universitaet
Universitaet Stuttgart Wuppertal
Nbg
FH
Migros
n
VeriSign, AC CAMERFIRMA S.A.
Inc.
ueter
Hochschule Esslingen
ften
Forschungsverbund Berlin e.V.
Beuth Hochschule fuer Technik Berlin Kartographie und Geodaesie
Bundesamt fuer Fachhochschule Kiel
rein
ein
n
Universitaet Marburg
chaftsg
scha
DFN-Verein
GeoForschungsZentrum Potsdam Physikalisch-Technische Bundesanstalt
Verei
Hochschule Heilbronn Serasa S.A.
DFN-Verein
DFN-Ve
I.CA - Standard root certificate, O
-Ver
Georg-Simon-Ohm-Hochschule f. angewandte Wissenschaften FH Nbg
en
ein
DFN-
DFN
C=hk, O=C&W HKT SecureNet CAXcert EZ by DST
Class B
Wiss
sie nins
Dortmund Alfred-Wegener-Institut
UniversitaetHochschulbibliothekszentrum GmbH
Helmholtz-Zentrum fuer InfektionsforschungNRW VeriSign Trust Network
er
ein
rein
ein
in
IPK Gatersleben
N-VebH
ildau odae me
Max-Planck-Institut zur Erforschung von Gemeinschaftsguetern
N-V
Ruhr-Universitaet Bochum
ein
ere
rei
VeriSign Japan K.K.
Berlin DFN-Ver
DFN-Verein
n te
DFg Gm
DFN-Ver
C=hk, O=C&W HKT SecureNet CA Class A
n H -Ver
Ge Ge
ere DF
rg
-V
N-Ve
DFN-Verein
nd
One large point of
bu
in FN
Fachhochschule Flensburg E-Sign S.A.
afte DFN
Vewa
von
Berlin
ge rei
in
am
ere D
Hochschule Darmstadt QuoVadis Limited
chun
Technische Universitaet-VAmberg-Weiden
Hochschule Braunschweig
rein
in
le WundinDF
Potsdam
n
erein
ere
Wuppertal
Hochschule fuer Angewandte Wissenschaften Hamburg
•
erei
schu ie chung
N-V
Hochschule Mittweida (FH) - University of Applied Sciences
rein sfoVe
DFan
f. N-
An Post
N- rs
N-V
N
ors ere
Technik
Max-P che Univer Berlin e.V.
-V
DF
DF
Technis ngsverb undDFN-V
in
Georg-August-Universitaet Goettingen
n
ABA.ECOM,Microsystems Inc
Sun INC.
N-V RW FN
DF
ine
ch
ErfN-V
Hochschule fuer Wirtschaft und Umwelt Nuertingen-Geislingen Universitaet Potsdam
N-Ve ktiDF
chule
ere
on
reg
in
n ns
in g
ere
D
elin
GeoForschungsZentrum
QuoVadis Limited, Bermuda
hoch graph
Hochschule Magdeburg StendalDsF(FH) for eiAstronomical Research
ESO - European Organisation
N-V
eis ere ur
ACE Limited
FachKarto DF
N-V
isse
N-V
sitaet
Universitaet
n
adt Infe
erei
Bayerische StaatsbibliothekinnF-G Fachhochschule Luebeck N-V Cob CDC
hs
ule fuer
N
Universitaet Stuttgart
n
DF
Hochschule Heilbron
zur
D
eW
e
DF
ge
hg h M er-In ge ew trum
-Hoc
Fachhochschule Braunschweig/Wolfenbuettel er
und
ig lt
in ul
in
re
Forschu et Dortm
nn stel er
cin n )
nce ch
ge ta
in -V
stt a H
rte h
re
Hochschule fuer angewandte Wissenschaften Fachhochschule Coburg
n
-V l cierchs
hw s
ere
He nischet fuertitut
DF
bn d lensb D dt
uD ea (F
Bo rmKi fu
ue e S-Va DFN
Gika h gehEss A rgszen
st- e g stitun anF
FachhochschuleApLandshuter Universitaet Rostock
NN tt
N-V
hm
dNse oc ein
Hochsch
G nd in l
e
DF
et Dale m
oe s
pUniversitaet Bayreuth
lt bu Fe
iveis urg urg
lieR hh
Ins
Btrau nd
le hu tru
enin
ere
nF
on-O
ln
aD ac -V
er ek
F
itta B te
wre
Hochschule Mannheim N-Verein Bremen DnUniversitaet
isclis le nu lin ng
olfe FN
lanck-
me ic ei
Bergische
ecyshs -We e fu bu
ten
Hoc veschu sc en
t
itrsch -V
Universita
ae e S
IP hoc edhochul e Marth
of mer
U-V
QuoVadis Trustlink Schweiz AG
Tech esam
noaf
rs FN
ul et blio
e
dN/W
rsita -Z
ro N-V erei
-Sim
mbH
DF
unig eUniversitaet Tuebingen
rsityFch
F
enin
ivn D
ch ho ltz
e DF
ne n b
stns -V e G rein
Beuth
ch
Alfr hs rsita bi
D
le
umft w
idtre
eU ch e
hsha h
e rA
nivisseein DFN
- U W er Hochschule Bonn-Rhein-Sieg
u tzig Ve
Unich ho
nn DF Fachhochschule Muenster
achhs ch ul
Bund
cdcesc
Georg
-V n fo
Bo-W IFWe N-V Helmholtz-Zentrum Berlin fuer Materialien und Energie GmbH
H)tio Dresden e.V. in
ue N- Coop Genossenschaft
ch
ein
ele -T a
nNn
Ho lm
na u sc
irts
aF u
Lrg -Ver gemei re
hs
ch
eteDra (F a dt F n
Deutsches BiomasseForschungsZentrum N-Europe Ltd. NECgemeinnuetzige GmbH
uU
Hoc ve
bW
Fa
ale B
itmr
is
a n an D Verei rein
teu c
Auele aw DFN rum N-Ve
eidgemForschungszentrum DF Juelich Ve DFN- GmbH
Uni
rs
hu
c fu
ersh rg
rg c
FHoc
-A
wO ei nt DF n
Ucnc
ule
hs
hiv sc Mittn nh ebec
eaer
an k
-Vgs
Ze
erei
n
rein
Verei InfoNotary PLC
Koh
ch DFN- GmbH
huul e M ot re ge rsch g Dioezese Rottenburg-Stuttgart
r-s o
h o uroe fu an sdamh n FNun
lep
Martin-Luther-Universitaet VeEnergieUniversitaet Zittau/Goerlitz n Hochschule
H
N-Ve
Ge
h Lu ut
TP
Hochschule fuer Gestaltung Karlsruhe
ohch le
Ru ch scE ul et huayebin seFoin-Sie GmbH
Ha
F a ch - ch sc PTu
D DF Halle-WittenbergUlm
F Ohs ch ita et
B
Hoochs hoch et Biomstoc he elich
ES vers ita
Hoc
asen
-R
k Hochschule rei N-Verein (FH)DFN-Verein Luft- und Raumfahrt e.V. (DLR)
Deutsches Zentrum fuer
en N- Anhalt N-V
ialiDF
und
DF
erein
H ni vers ita et Brem m Ju ster tern
Ro nn Verei Coop
in
ch rs r Ma DF
U eu schu szRheinische Fachhochschule Koeln gGmbH
U ni ve chita le Bo truMuen
Fani ts rs es
trust / failure?
e ere
DFN-V
rlsruh U en . DFN-
fuert
) uttga
Berlin . (DLR)
Un ch Fachhochschule mfahrt e.V
D ive hungschulehalt (FH Weihenstephan
g Ka
urg-St rein
bH
staltun
Fo ch Europ An
Ge e Ltd um
Ho rsc hoch Zettenb fuer Lehrerfortbildung und n
Akademie Goerlitz le KoeDFN-Ve DFN-Verein Dillingen VereiPersonalfuehrung Dillingen
Ro
ule
ntr ln gGm
Rau Fachhochschule Stralsund
Fachhochschule Giessen-Friedberg
fuehrung -Verein Deutscher Sparkassen Verlag GmbH
E-Telbank Sp. z o.o.
Fa C holtz- Zittau/ chschu - undund Personal
ese
Hech Deutsches Elektronen-Synchrotron DESY
fuer DFN DFN-
NE lmsch
Leibniz-Institut fuer Polymerforschung Dresden e.V. Dresden
e.V. chule Ho ez rsitaet Factrum fuer tbildung ein
Dio chule
Ulm hho
inische Zen tronen-Synchr
Hochs
Unive es fuer Lehrerfor
Hochs
Luft
otron DES
DFN-Ver rg
Y
C=hk, O=C&W HKT SecureNet CA Root
sund Universitaet Duisburg-Essen
Miami University
in
iedbe
RWTHDFN-Verein Aachen GrafikUniversitaet Mannheim
DFN ng
schu-Vere Rhe tsch es Elek Stral en-Fr
Akademie schule Hochschule fuer rein
DFN-Verein und Buchkunst Leipzig
Deu tsch schule Giess
Unizeto Sp. z o.o.
Polymerfor
Deu hoch Duisburg-Essen DFN-Ve DFN-Verein
Paedagogische Hochschule Heidelberg Laboratories
Buchkunst Deutsche Telekom AG,
Leipzig
titut fuer
Fach hoch
nv-sa
Fach sitaet
Univer ule fuer Grafik und Heidelberg
Leibniz-Ins
Laboratories n
Hochsch Telekom AG, DFN-Verei
Fachhochschule Regensburg Paedagogische Hochschule
Universitaet Mannheim
Deutsche
DFN-Verein
Deutsche Post World Net Unizeto Technologies S.A.
Jacobs University Bremen gGmbH
Jacobs University Bremen gGmbH
DFN-Verein
Department of Education and Training
alSign
Fachhochschule Regensburg
FernUniversitaet in Hagen DFN-Verein
FernUniversitaet in HagenDFN-Verein Technische fuer Musik und Theater
Institut fuer Universitaet Darmstadt Leipzig
Hochschule
TechnischeDFN-Verein
FachhochschuleHochschule fuerDFN-Verein und Theater Leipzig e.V.
UniversitaetPhotonische Technologien e.V.
Ludwig-Max Erfurt
DFN-Verein
Universitaet Darmstadt
Gelsenkirchen Musik DFN-Verein
Fachhoc ule imilians-Universitaet Muenchen
Hochsch DFN-Verein Institut fuer Photonische Technologien
Universitaet Erfurt
z o.o.
Fritz-H hschule Wismar
k Sp. Glob
Universitaet Freiburg
Fachh aber-In Frankfur
Ludwig-Maximilians-Universitaet Muenchen
Paed ochsc stitut der t am Main
Fachhoch hule AugsbMax-Planck-G
Univ
Leibleagogische Hoch
DFN-Verein
Universitaet Freiburg
DFN-Verein
Dua ersitaet
che itut fuerBad -VereFreib Hochschule Wismar
Fachhoch
Technis Inst Biele DFN urg esellschaft
Bibchs Leibniz-Rechenzentrum DFN-Verein
Fachhoch schule Brand niz- schule Ingo schu
Hochsch feld DFN-Verein DFN-Verein
Universi lstadtle DFN urg
ule
en-W in
Fre
Fritz-Haber-Institut der Max-Planck-Gesellschaft
enbuDFN-
Ho ie
schule
Unive
LanliotUn
Fachhochschule Frankfurt am Main Audkenni hf.
rg Verei
Deuts Jena
d Nieive Neurobi uert -Ver
He ch Paedagogische Hochschule Freiburg
chule
heksse
rsitaetrsit taet Clau temb ein
Deuts
Fachhochschule Brandenburg
Konra che n
Un dersac ologie
E-Telban
Merse
urg einFachhochschule Augsburg
erg
sthal Magdeb -VerDFN
ches He
aet Be
rvice-Z
s
Ho iversi Greifsw
d-Zuse
Te
Fa ch sc hsenald entrum Universitaet Bielefeld
burg
rzz
Institu ent
rlin(FH
DFN-Ver
Te inrnis tae
Ge -Zentr rum
Bu se
Dend t fue DF
H ch ichch t DFN-V DFN-Ver
Te ch hu einHe
ein
T- oc ho -He fue ide ) ere
Fachhochschule Jena DFN-Ver
umr fue N-V
e- r Mu Duale Hochschule Baden-Wuerttemberg
Baden
utsc ch Berlin
Berch ni ch le Brem
lls
ein
Interna ere AG
Fa Syhs sc sc Unive lberg
esan aft
Uni in ein
Pa
DFN-V
hes r Info in
-Wuer DFN-Ve
om
Hum hshoemhe Bi Deutscher Wetterdienst
Hocch st ch he huleUnrsisik
veni
Ka
U ed tionale
Hoc ufsasc ule UniveNe have
sta fue
er tae
Deutsches Herzzentrum Berlin DF undLeibniz-Institut fuer Neurobiologie Magdeburg
Krlt rmatio Telek
ttem
erein
iversit
Fachhochschule Ingolstadt
rein
H ni th ag
rsita s
U a e hs ch ul sc E te horsita UlFreie Universitaet Berlin
C ochs. U ogis eb r wiss DFnstPaeda
berg
f. Ge
DFN-V
ka
TxC3x9CRKTRUSTCertificates Sunucu SertifikasxC4xB1 Hizmetleri, C
First Data Digital Elektronik Inc.
Leha vers nive ch sforsch N-Vere
ch de Fa be Be
Stif oc bo
he
u- N-Ve n Th
tae rg
echnik
H ri hs ch etEn ch ra
Technische Universitaet Clausthal
gogDF utsc
F
owensc
TxC3x9CRKTRUST Elektronik Sertifika Hizmet SaxC4x9FlayxC4xB1cxC4xB1sxC4xB1, C state-institutions
t reDF
akad erein
in Be N-V
PF ib ritechitaet
F n fed ch ul hurlarp ch et m Dueater
mie
DF ha
issen ische
HH-S istanrsg uleBibliotheksservice-Zentrumerein DFN-V Baden-Wuerttemberg
Hoach niz- - ule rsita Hoc DFN-V
e ungs
Ford Motor Company - Enterprise CA
De
T re ivench ldt-Ue fuerle ngrischsc Dres in N-Ve nn
turi esse Ha
Konrad-Zuse-Zentrum fuer Informationstechnik Berlin (ZIB)
N-Veftli rlin Fo
em
Serasa
ae erein
U K et
UWA S en
(ZIrschun
eN
THe ch aho Inst ni B asse hsch screche
A ac e
zeha B) ie DF
ldoreFrov
CA
ocisss Cita-L nive deTe nsbaSehule den Universitaet Greifswald
d ntin Da
UHec lm scgochsc ituverem lEichst ul nivW hs rf in eib - Enterprise
ity ie fu ie
T -N
rum ten
Deutsches Institut fuer Internationale Paedagogische Forschung
ften
DF g nv-sa
y N-er
e
hsete at eUra errs rr ch ch rvices er erein
Alpha
GlobalSign
ersnF Heinrich-Heine-Universitaet Duesseldorf en
nivlmn ho hug h t rs en N-Ve ve
ue G Vere Company
K oe DS
FHo eux- scis W
h (DKF
u. Ro
ae e Sc g in
ituch fuer Plasmaforschung undLand Niedersachsen
chsms Sa t nivle Kitahe nik, FN-V eorg
BHn c dphin chul etve In le B -UGm
rnbe Ford Motor
a
Deutsches Krebsforschungszentrum (DKFZ)
T-S u ech
Leibniz-Institutt ahSfthfRhse grsnitast nszu WirtHochschule Bremerhaven e.V. Technologie
ers isSltz-Zle ch ule fuer etDFN
ita
ffrz DFN-
GlobalSign
ut- is
U o eTiz
e taat G
D aoch tsch ule huen Onsbu schuhule Zw LT
GlobalSign nv-sa Northern Arizona University
reinrarb
hs DF eit
ac c Siee r- ueet in
B chn
chh tsPh n ulee Bun da snsb burg eingn rlin au BESITZ
univh anIn e zu fo ie ni bH
tt-In hw
M
Z) to N-
c inc la h ch olfg ul O ie g
rg mDFN DFN-
H eeu chchsc huleveSuDF en ER KU einfurturg reiDFN-V
Me EShs rsm fu schuBerli ch rtwand DF chenphysik nde
c
L u oc ve z U e fu
ita he enKae H Asc Ana ed er D golsaebi
T
ale tlich erei bH
liche Ag Vere
in Hochschule Merseburg (FH)
sm -V
hsch esck fu niv g
T ha hs rsitaet Rale Strahl sc -Lippe hw narb Ve
ffe Vere
dste isa n fuer Lu rm lefehaft
y es
rl
ung
Jo oc ho sc
B niibni ch IE n-Buange
e In
ch
D
H ntruho -G
e
oc u nd-I e dest
te
escit chon
et m n trurlsruch ha lytis iz ein FN tadt sch n S ricer
-V Verei
Bundesanstalt f. Geowissenschaften u. Rohstoffe
U ch-von
H nive hoch het Fa he Hotfalen DFmburg-H
Le hsHEM schu er bu taet osphaein Da erein N-Vere(DIW
Fusze n
in
Ze
W oc Ber sc
rsh
rtw str Technische diena zuFN-V
e
Universitaet Bergakademie Freiberg
U
HD Brem ha
o
tu ol ein
Fa ch scsc sc isc EUes erzburg-
hsle K en r ers ag
-B
U ch ni hu hs
etitu D
Fa Z Cpushulet fu iversiAtmf. MusikDFN-V chung ung
in ae evatio anebecanns itaet
n
Ooc m hoch Au stir rg N-Vere
Htto
mule H
BAH TxC3x9CRKTRUST Bilgi xC4xB0letixC5x9Fim ve BilixC5x9Fim GxC3xBCvenlixC4x9Fi Hizmetleri A.xC5x9E. (c) KasxC4xB1m 2005
Fa chho am PR tw Wu taet Ha
R idiv m hesc ffe ch B FI ch sc taee Un fuebuDF hek
ue hn
in
Ho ndtsa hu hu
-V G
ss S N ivoch ge k nove -Vd M DFN
SY itani er ricke n
HtoF lin
chK limstu Tech oeth
Ca ch rsi ch ner-In schule
ra
Te es TUNGsc iversiiblioth
Fa
nn
Fa ivenis eit tituch bibliot
Bu IF sc
Gesellschaft fuer wissenschaftliche Datenverarbeitung D ft
eg t-Urs fu - h nb e er erei DFNmue
ch
Ho ch -MInsHo fen
tituK ers
T-
W ch hoch e Un IE gA
Un hn iz- e Of sau r WirtschWirtschaft
ach
e
ST ch nischADEM alb GmbHsinstitutaftsforschu
rz ch
BerufsakademieumDSachsen-VStaatlicheein N-Verein DFN-und Theater Hannover
FachhochschuleFNHannoverMusik Ve
bu h Hochschule fuer
N-V enF und ak Boch
Te ibnschule Pas t fue r Ges
Ho
Ha ch che Lan titu t fue und in ein H ein -VereDFN-
er NesSyste
ulem are Dfu n et D U
Le atlich aetIns stitu hnik Berl
Fa ch che Na vicesDFN rlandsch
ab u m sc DF
Ho dis rsites k-In Tecnste -Ver Gmb -Ver DFN
Sta
Te chs
t
Ho uts RT chefuer Was
Hochschule Bremen em um Studienakademie Bautzen
en niv er TeD urg W lin
De RD atistalt s For r
Ba ive lanc fuer Kue DFN em
NO
ule -Ver nd
Universitaet Heidelberg
Un x-P hule der
n
Deutsch aet rmations-Syst Muenchen
e b itut
Ma hsc l-Info ruheeswehr
fRieu nita wan verarb eiecde -Ver DFN-
t fuGb sce
nu le N ad
DFNHarz aettrum
er F le W lden rg-W le tz ick UR
Mathemans
Hoc ersit et Aalen
it
Bundes
Leibniz-
HS- ersit
Univ ersitalet Karls
Univ
Hochschu der Bund
Univ schu
Dul
Hoch rsitae
K
Unive
Ford Motor Company - Enterprise Giesecke and Devrient
U
grg B
FL
Regionales Muenc
Karlsruhe
Otto-Friedrich
Max-Planck-G
isse tle ms En
Hochschule
sb ae Um ch Nu
Max-Planck-Institu Muenchen
ein DFN ere
Uni-Konstanz
GESIS
Universitaet Osnabruec
Helmholtz Zentrum
Bauhaus-Universitaet Weimar DFN-Verein
Fachhochschule Dortmund
Universitaet GiessenDFN-Verein
Gesellschaft des Saarlandes
e
fu te heN-Vik S ortnive
e
n
ch
en H rgule
Issuing CA01
es ec le Osle
Technische Fachhochschule tzGeorg Agricola zu Bochum
p cisch
urgrsita w nikdw D ns er
erm n htubH dte DF tung
ein tur Le
l
erl
U an
tC
er n nz Ze tu DFu rs
AU
-V
ie
Universitaet Kassel in -V
-Ver
FNilde
ul terp
Ha erei DFN
ch
Bau
ere
ra
in
Risde ueN Wis N-V un n
rg F
he eltf unig FN ch
-CEZen Muefuer
Te eAkachttga N-Vita
rein
bH
Hochschule Biberach
ein
RA
et rise
Be
-V she DFN
chule
XRamp
nn ipn
ue
le huer SSISCH N-Ve DF
AK
Un rs sbu -Ve afte
m o din fu -Ver rsita irtsc
Fl
Kath. Universitaet Eichstaett-Ingolstadt zig
ch truinetu rt ere
ikonbu aebe
en
BGC-OffSubCA Tankers
Jo
DF Se
ere erim -V ove
IFM-GEOMAR DTechnische Universitaet Dresden
itz ch Wirrg re n N
rli legs rg Mu Gmren
Gm
Glo
D
er
G
-G
rvice
n
ein D
fu
er
D
ita
be rg
ive
e u
in S/H ere Fr
- -V
FN
ik
Paedagogische Hochschule Schwaebisch Gmuend FN et at vers
Fachhochschule Rosenheim beTRUSTed
DF un tsch in ba
Friedrich-Loeffler-Institutzu -Verei
Humboldt-Universitaet Fachhochschule Neu-Ulm
IS
oz FN
sb
s Gm
Berlin
em
chho ch
nre
N-V
we
u-V
rs
L
W
leF
D
erS D
A ei
Institute ofrsitaet
lSig
Ulm
-V
Paedagogische Hochschule Ludwigsburg olz
nd mDFN
ia
H io ldFNun
Ser
t
e
tion
lfm in
itN g
ur
Hochschule Dfuer Technik,n DWirtschaft und Kultur Leipzig
a-V G aft - e.FN-V bH
er
des
Glo
Erfu
Hochschulre
rtu F
ini
ere bHr -V
Hn
e-
ere
n
d
n
m mn
KIBS AD Skopje
Security
abad /O ar N-Ve DF
o
et
ei F
W
D
Fachhochschule Ansbach
fuer Aachen
nv
ere DF
de mbN
FN rsc n
-Unive haft
-V u se er Dd
ngN
in
Fachhochschule Aschaffenburg
ch we
V. er
ed
in
Oa
N-V
nn
esellsc Techn
ints
Gie sf
bb
ir
Universitaet Jena
-sa
ruec st te
de
tut Be
m
rin H-V ein
-V hun
D
nste
g
org
DF erei
lS
se
-V
N-Ve
re
Leibniz-Institut fuer Analytische Wissenschaften - ISAS - e.V.
ch
en
DFN fri n rein N-Ve DFN-
n/G
Mobile Armor Enterprise CA
Bu - U D
ve
Universitaet eWuerzburg
de rs
nd
SchwerionenforschungDFN-Verein
ign
re DFN
nd ereZ FN
ABB Ltd.
inr
ere
g
Freistaat Sachsen Kuenste Bremen N-V
rv
aft D
n
r ei
o
k
t fuerk DFN-Ver DFN-VereDFN-Verei
Charite - Universitaetsmedizin Berlin fuer Zuechtungsforschung
Max-Planck-Institut
stfa
Universitaet Erlangen-Nuernberg
F
schu
hen
schung au
in oett
G
gG
Hochschule infuer Nestle
ato
Fachhochschule fuer Technik und Wirtschaft Berlin
es in -V
W
Agra
BeFN-V aft
in
-V
rlin
ere
nv-
ch
reBe
HafenCity-VUniversitaet Hamburg
Services
m
ere
erR
DF aften
te W Ve DF
et
ine
isre g
euse
ns ein
rysa
DF
le DF
w
Technische Universitaet Ilmenau
Helmut-Schmidt-Universitaet Universitaet der Bundeswehr Hamburg Forschungszentrum Dresden-RossendorfHochschule Niederrhein e.V.N
rlin e
erei nd/W
in D
serb
bre
in
ek
D ehr gH
en bH rstelle
-Verein
in
n
enD
ch
N-V
chenzentrum
DF
Biophysik ein
aght
in
Medizinische Hochschule Hannover -Verein
N-
es
in
n
nsc DF
Sc
DFN-Verein
DFN
FN rein
n
Helmholtz-Zentrum fuer Umweltforschung GmbH - UFZ
H
issen in N-Ve DF nst Stu
ellscha
N-V
FN
re
Bamberg
FN
la
-V amD
T-Systems SfR GmbH ere DFhh
ology DFN-V
N-Ve
Universitaet Hamburg
h
Universitaet Dortmund Universitaet Leipzig
u.
in
aftsfors Berlin
Hochschule Karlsruhe - Technik undFachhochschuleDeutsches Institut fuer Ernaehrungsforschung (DIfE) Universitaet Siegen
Technische Wirtschaft Wissenschaften Hochschule Furtwangen -V
bu rli ein
Be
DFN-Ve
Mitteldeutscher Rundfunk
ere bF
Certeurope
rei N-
-V
-V
re
ere
DF
FN
in N-V hs DFNk
DF
uN
ere
AURA - Gemini Belgium Root CA2
Observatory
Inc
en erein
Fac
Suedwestfalen Otto-von-Guericke-Universitaet MagdeburgN Sozialforschung gGmbH
scha
rg-V
Berlin-Brandenburgische Akademie der Wiesbaden
rg
In-V
er
erei FN-V
in
Deutsche Telekom AG
in
DFN
N-V
in F
D Fraunhofer
Fachhochschule C=au, O=SecureNet CA Class A
N-V
form DFN
Wissenschaftszentrum Berlin fuer
ein
Deutsche Telekom AG
ere
ilhD
ftsforsch
Universitaet zu Koeln MINEFI
Oberwo -Ve (ZA
erei
Hochschule Kempten Universitaet Innovation GmbH
TuTech zu Stiftung Tieraerztliche Luebeck Fraunhofer
n
in
DF
elm
ere D
ften
DFN-CERT Services GmbHBonn-Rhein-Sieg Hochschule Neubrandenburg Hochschule Hannover
-V
Staatliche Hochschule f. Musik u. Darstellende Kunst Stuttgarterein
oc
Fachhochschule
atio -Ver
DF
rein
DF
DF e.V
er ch
N-V
n
in FN
Universitaet Regensburg
Kaiserslaute erein
shav DF
DFN ng
ein ul
N-V
- FH
service-public gouv agriculture
rein N-Ve ttgart
N-V of D
ns
Universitaet Flensburg Fachhochschule Aachen CHEMIE Bundesinstitut fuer Risikobewertung
Universitaet UniversitaetBerlin
Kuenste Augsburg
Bundesamt fuer Wuerzburg-Schweinfurt der FIZ HAWK Berlin GmbH
Fachhochschule
ere
Fachhochschule Hildesheim/Holzminden/Goettingen
Ve
Technische Universitaet Chemnitz
Deutscher Bundestag Strahlenschutz
eren N-
Belgium Root CA
rein
mbH
DF
tech n
n
erein
lfac DFN
erei DFN
ere
in
ein
Ku
rein
eH
How much is China
-V
De
N-V
Regionales Hochschulrechenzentrum Kaiserslautern
Zentrum fuer Informationsverarbeitung und Informationstechnik
DFN-V DFN-V
Hochschule fuer Technik Stuttgart
ere
ni
in
hrein LF) e. ein
. DF
Mathematisches Forschungsinstitut Oberwolfach Landesbibliothek BESSY
Badische Biophysik
n
DF dorf
ei
Max-Planck-Institut fuergGmbH
ggen
(GSI)
Government CA/serialNumber
in
-V
in N-Vere DFN
er
gGmbH V.
T-Systems SfR
in
erein N-V
N-Ve
Ve
Deutsches Klimarechenzentrum GmbH
ein
erei
reiDFN-
Westsaechsische Hochschule Zwickau Technische Universitaet Muenchen
FN
Fachhochschule Technische Universitaet Hamburg-Harburg
Universitaet des Saarlandes
Ve
rn
DFN-Verein
rein N-
Hochschule FuldaKarlsruhe Institute of Technology Campus GmbH Universitaet Lueneburg
Hochschul-Informations-System Berlin-Buch
DF
DFN
n
Oldenburg/Ostfriesland/Wilhelmshaven
n
in
-V
Berlin)
Leuphana Bielefeld
rein DFN-
-V
Ministere en charge des affaires sanitaires et sociales
Glob
-Ver DFN
DFN
rein N-Ve
-Ver
UniversitaetFachhochschule Universitaet Kiel
er
DF
erei
alS
Passau
ein
Uni-Konstanz ein
ign
DF
in -Verein
Verei DFN-
Johann Wolfgang Goethe-Universitaet
-Ver
DFN-Verein
Bundesanstalt fuer Wasserbau
n
nv-s
Verein
n
erein
FachhochschuleHahn-Meitner-Institut Berlin GmbH Hannover
Leibniz Universitaet
a
Verei
Hochschule Ulm Dortmund
DFN-Verein
ein
STIFTUNG Ravensburg-Weingarten Universitaet Karlsruhe
Hochschule PREUSSISCHER KULTURBESITZ Hochschule fuer angewandte Wissenschaften Fachhochschule Hof Port Autonome de Marseille
Ve
Government CA
n
erein
T-Systems Enterprise Services GmbH
DFN-V
DFN-Verei
-Verein
Max-Planck-Gesellschaft Fachhochschule Erfurt
rein
rein
n
Fachhochschule Osnabrueck Deutsches Institut fuer Wirtschaftsforschung e.V. (DIW Berlin)
PM/SGDN
GESIS PM/SGDN Port Autonome de Marseille
DFN-Verein
Leibniz-Zentrum fuer AgrarlandschaftsforschungWeimar e. V. fuer Wirtschaft und Recht Berlin
Bauhaus-Universitaet (ZALF) fuer Atmosphaerenphysik
Verei
DFN-Ve
DFN-Verein
erein
DFN-Ver
NORDAKADEMIE gAG Hochschule
Leibniz-Institut
Hochschule Aalen Ministere Education Nationale (MENESR)
DFN-Verein
Hochschule Ostwestfalen-Lippe ARGE DATEN - Austrian Society for Data Protection
e-commerce monitoring GmbH
n
n
Technische Fachhochschule Berlin
tion
Otto-Friedrich-Universitaet Bambergfuer Gesellschaftsforschung - FH Deggendorf
Max-Planck-Institut angewandte Wissenschaften
Hochschule fuer
Helmholtz Zentrum Muenchen Ministere education nationale (MENESR)
rein
HS-Harz
GTE Corpora
ein
Universitaet Giessen Hochschule Offenburg
Deutsche Nationalbibliothek EON
Universitaet der Bundeswehr Muenchen ARGE DATEN - Austrian Society for Data Protection and Privacy
GlobalSign
Hochschule Muenchen
Hochschule fuer Technik und Wirtschaft Berlin Secteur public xC3x89cologie DxC3xA9veloppement et AmxC3xA9nagement durables
Universitaet Osnabrueck
Universitaet Muenster Energie-Control GmbH
Gesellschaft fuer Schwerionenforschung mbH (GSI) Ministere de la Justice Gouv
nv-sa
Jack Henry and Associates, Inc.
trusted?
XRamp Security Services Inc
Consejo General de la Abogacia NIF:Q-2863006I TC TrustCenter for Security in Data Networks GmbH
General Electric Company MinistxC3xA8re xC3x89cologie, DxC3xA9veloppement et AmxC3xA9nagement durables
Trustwave Holdings,
DIRECCION GENERAL DE LA POLICIA C=au, O=SecureNet CA Root C=au, O=SecureNet CA Class B
TC TrustCenter GmbH Colegio de Registradores de la Propiedad y Mercantiles de EspaxC3xB1a
GeoTrust Inc
XRamp
NTT DOCOMO, INC. Inc.
GeoTrust, c
Inc.
rust t, In
trus
x
GeoT
ifa
er
Cyb
Inc.
Equ
Security Services Inc
Inc
rust
Fundacion FESTE Buypass AS-983163327
GeoT
ChainedSSL
GeoTrust Inc.
EDICOM
bH
Gm
AffirmTrust
ter
Google Inc Equifax Secure Inc.
en
TxC3x9CRKTRUST Elektronik xC4xB0xC5x9Flem Hizmetleri, C
stC
Intel Corporation
Tru
TC
SwissSign AG Trustwave Holdings, Inc. Aetna Inc.
Macao Post Equifax ICP-Brasil
Echoworx Corporation
SecureTrust Corporation
Vod
GDT-EntSubCA-Public
afon
eG
Servicio de Certificacion del Colegio de Registradores (SCR)
roup
Digital Signature Trust SCEE - Sistema de CertificaxC3xA7xC3xA3o ElectrxC3xB3nica do Estado
Sonera Gm
bH
GDT-SubCA-Public ter I.CA - Qualified root certificate, O
C=hk, O=C&W HKT SecureNet CA SGC Root en
stC Microsoft Root Certificate Authority
Tru
Sempra Energy Secure Server CA1 TC Microsoft Corporation
tion
U.S. Government US Inc
Betrusted RBC Hosting Center E-CERTCHILE
Corpora
Sacred Heart University CA GAD EG Cybertrust, Inc
PTT Post WebSpace-Forum, Thomas Wendt
Munich Re Group Express Channel Server CA 3
American tio
n
Positive Software Corporation Cyb
GTE
Anthem Inc ra
ork
American Express Channel Server CA 3
ert
po
FINMECCANICA Energy SCEE Cybertrust Japan Co., Ltd.
Cor
ndt
Government of Korea
ru
etw
GmbH
UniTrust AddTrust Sweden AB
st
oration
E
RegisterFly.com, inc.
twork
Inc
Sempra GT
We
ork
TN
AC Camerfirma S.A.
n
WebSpace-Forum e.K.
tio
GTE Corporation
tw
SHECA n
omas
GAD eG
US
OVH SAS
ra
Ne
Ne
tio
PrvnxC3xAD certifikaxC4x8DnxC3xAD autorita, a.s.
Sacred ms Enterprise Services
Digicert Sdn. Bhd.
ation
LUPKI01 OptimumSSL CA
GTE Corp
po
ora
TR
T
ork
ThT
Cor
orp
US
SCEE - Sistema de CertificaxE7xE3o ElectrxF3nica do Estado
Cyb
y CA
ER
TR,US
NalcoExternalIssuingCA-1
tw
TAIWAN-CA EUNETIC GmbH
or
C
n
Ne
ti R
n
To
Certicamara S.A. Entidad de Certificacion
ert
E
Corp
E
ratio
UrS
n
GT
eBiz Networks Ltd
ST
rum
ora
GT
ru
ER
YandexExternalCA BetrustedComodo Japan Inc.
Japan Co., Ltd. ratio
Universit
ete
st,
Wotone Communications, Inc. Register.com
ork U
USER
USrp
po
tw TR
Cen
adidas AG Issuing CA Class STE Agencia Catalana de Certificacio (NIF Q-0801176-I)
po In
-Fo
Th
E
Comodo Limited
Co
FreeSSL
ublic
c
Siemens
Cor NeER
Cor
Telekom-Control-Kommission
GT
he
S
LimitedMindGenies
E
Digi-Sign TERENA
re
STU
R bSpace
g
Equ
aT
GT k
tin
Centro Nazionale per l'Informatica nella . PA
E
UBe twor
ubCA-P
The
Cybertrust Inc
ftw
ifa Th
GT
TRA
os
Heart
n x
CA n T Ne
So
up
SGssl
Re Inc.
ratio
Ltd
Po C H
LEd
NalcoExternalPolicyCA-1 I.T. Telecom
ns,US
MULTICERT-CA Uwe
SS
ro
m Inc
ive
We
.,
po tioTR
Microsoft Secure Server Authority DigiCert Inc. Co
Vodafone Group Registry Pro
T-Syste
Cor eSS
eG
B
ER
sit
ica
GDT-S
um
Thst
n
GLOBE HOSTING CERTIFICATION AUTHORITY
US
EUnet International
eun
pa
GTE
Cybertrust
timru mm
R
ration
ration
Anthe
dT Th
JaInc Op one Co
ich
EE
Corpo
Corpo Ad
Equifax Secure st
ru t, GTE
GTE
AusCERT
Mun
Bechtel pCorporation
SC
Wot
ert trus
yb er
Dhimyotis
eG G
Postecom S.p.A. GANDI SAS
A -1
C yb
Grou
C licyCA
The USERTRUST Network
Das
fone
GAid
Microsoft Internet Authority
nalPo
COMODO CA Limited
ad
Voda
InfoCert SpA
Secure Business Services,
Exter
POSTA
ation Inc.
Nalco
TAIWAN-CA.COM Inc. Secure Business Services, Inc. SECURITY PATROLS CO., LTD.
CENTRAL
Trustwave Holdings, Inc.
ity Corpor
GTE The USERTRUST
GTE Corporation
Network
Halcom SIA S.p.A. Actalis S.p.A. Marks and Spencer Group plc Secure Business Services, Inc. Microsoft
Internet Author
GTE CorporationNetwork Solutions L.L.C.
GTE Corporation Actalis S.p.A.
Etisalat
WoSign, Inc. AddTrust AB
Baltimore
.net
SE
DellCOM Tru GTE Corporation
GTE Corpor
Siemens Issuing CA Class Internet Server V1.0
rust
Etisalat Network Solutions L.L.C.
Inc. st.net ation
Tru
Dig glob
Ent
ste
iC d
GoDaddy.com, Inc.
al
ert S
KB
National Institute of Informatics
GTE
In ecu
C
ZF
Corpo
c re
G
Syncrude
QuoVadis Trustlink BV
ration
Ce
ro
Hongkong Post Autoridad Certificadora del Colegio Nacional de Correduria Publica Mexicana, A.C., O rtifi
up
KAGOYA JAPAN Inc. Dell Inc. ca
te
ESG BV
Getronics PinkRoccade Nederland B.V. IDEACROSS INC.
Au
tho
UIS-IsuB1-CA MSFT
SecureTrust Corporation
Canada Ltd
rity
Comodo CA Limited
GT
G
XiPS Intesa Sanpaolo S.p.A. CA Servizi Esterni
TE
E
C=SI, O=ACNLB Fuji Xerox
GTE Cor
Servision Inc. Certipost s.a./n.v.
Co
Corpor po
SECOM Trust.net ation
rp
ratio
SECOM Trust.net
ora
Wells Fargo WellsSecure
Fuji Xerox n
Ministerie van Defensie
Entrust.net
DigiNotar B.V.
et
Actalis S.p.A./03358520967
Japanese Government
tio
Intesa Sanpaolo S.p.A.
.n
n
ust
GTE Corpor
GTE
ert,
Inc. global SAIC
tr
SECOM Trust Systems CO.,LTD. Wells Fargo
En
Staat der Nederlanden liC GT
Cor
Va
KBC Group E
C
po
et The Walt Disney Company tio
orp
ora Enterprise CA
UIS-IntB-CA C=au, O=SecureNet CA SGC Root Sociedad Cameral de CertificacixC3xB3n Digital - CerticxC3xA1mara S.A.
ratio
The Go Daddy Group, Inc. Trus
t.n
ation
M n
n
CO
SE
on
agentschap Centraal Informatiepunt Beroepen Gezondheidszorgde Certificacion Firmaprofesional CIF A62634068
Autoridad The Walt Disney Company Commerce CA
k
SecureTrust Corporati
Trusted Secure Certificate Authority
wor
eSign Australia ValiCert, Inc. ZF
Lim T Net
Syncrude Canada Ltd GT ty
ori
E
Nederlandse Orde vanCoAdvocaten
th
d
Autoridad de Certificacion Firmaprofesional CIF A62634068/emailAddress
et
CA US
Au
ite
rp st.n
ora
UGIS S.p.A.
te
od RTR
tru
ca
Firmaprofesional S.A. NIF A-62634068 Starfield Technologies, Inc. Network Associates
INTEC Communications Inc. tio
RSA
rtifi
En
n Ce
m SE
ICC-CPI
r
o
ota
re
Co e U
Se
n
First Data Corporation
te
cu
iN
Se
The Walt Disney Company CA Inc
curit
ca
Th
Dig
DigiCert
d
vo
ste
c.
y In
Ad
CAnet
pany Tru
IPS Seguridad CA
Entrust.
y In
A-Trust Accenture
Unicert Brasil Certificadora
Inc.
n
ey Com
c.
va
Touring Club Suisse (TCS) Walt Disn
nsrit
ViaCode
e
tiocu
The
Entrust.net
rd
O
A Se
dse
Wachovia Corporation
unica
shcica
CNNIC
WISeKey Telstra RSS Issuing CA1 L=Vienna, O=Arge Daten Oesterreichische Gesellschaft fuer Datenschutz/[email protected]
C=AT, ST=Austria,
RS
an
SSL
erl
mm
Va
ed N
IPS Internet publishing Services s.l.
C Co
liC
Saphety DRS-TEM
TDC
Entru
ert,
Kas Bank NV
st.net
Entrust, Inc.
INTE
CNNIC SSL
In
DigiNotar
Internet
Saunalahden Serveri Oy
c.
E-ME SI (CA1)
x00Ax00-x00Tx00rx00ux00sx00tx00 x00Gx00ex00sx00.x00 x00fx00xFCx00rx00 x00Sx00ix00cx00hx00ex00rx00hx00ex00ix00tx00sx00sx00yx00sx00tx00ex00mx00ex00 x00ix00mx00 x00ex00lx00ex00kx00tx00rx00.x00 x00Dx00ax00tx00ex00nx00vx00ex00rx00kx00ex00hx00rx00 x00Gx00mx00bx00H
CEDICAM
O=Mortgage and Settlement Service Trustla Secretaria dea.s.
Autoridad Certificadora Raiz de CA Disig Economia, OU
Security Inc. SHCRoot
SHCRoot RSA
E-ME SSI (RCA) RSA Security Inc. Firstserver, Inc. Microsoft Root Authority
Telstra Corporation Limited CERTINOMIS
Entrust
CNNIC Configuration, CN
admin Microsec Ltd.
E-ME PSI (PCA) TaiOne International Ltd. Earthlink Inc Warner Inc.
AOL Time ComSign Advanced Security CA
.net
M
Certisign Certificadora Digital Ltda. Belgacom KEYNECTIS
as
te
certSIGN
rC
SunGard Availability Services Entidad de Certificacion Digital Abierta Certicamara S.A.
ard
KAS BANK N.V.
W
TDC Internet
orl
dw
RS
id
Autoridad Certificadora de la Asociacion Nacional del Notariado Mexicano, A.C., O
eA
Certplus
Se
xC4x8CeskxC3xA1 poxC5xA1ta, s.p. [IxC4x8C 47114983] RSA Security Inc
cu
TDC
Microsoft Trust Network
rity
IPS Certification Authority s.l. ipsCA
In
c.
TradeSign MasterCard Worldwide
KICA
CrossCert
A-Trust Ges. f. Sicherheitssysteme im elektr. Datenverkehr GmbH
yessign
SignKoreaC=TW, O=Government Root Certification Authority
Generalitat Valenciana
xE8xA1x8CxE6x94xBFxE9x99xA2
KISA
FNMT
Agencia Notarial de Certificacion S.L. Unipersonal - CIF B83395988
CBEC
INDIA PKI ANCE
Mahanagar Telephone Nigam Limited
National Informatics Centre
http://afterglow.secviz.org
Mahanagar Telephone Nigam Limited Bank Leumi Le-Israel LTD
FNMT-RCM Netrust Certificate Authority 1
EBG BilixC5x9Fim Teknolojileri ve Hizmetleri A.xC5x9E.
VISA ComSign Ltd.
India PKI
xE4xB8xADxE8x8FxAFxE9x9BxBBxE4xBFxA1xE8x82xA1xE4xBBxBDxE6x9Cx89xE9x99x90xE5x85xACxE5x8FxB8
D-Trust GmbH
Japan Certification Services, Inc. ComSign
Cisco Systems
TxC3xBCrkiye Bilimsel ve Teknolojik AraxC5x9FtxC4xB1rma Kurumu - TxC3x9CBxC4xB0TAK
Chunghwa Telecom Co., Ltd.
VAS Latvijas Pasts - Vien.reg.Nr.40003052790 Digital Signature Trust Co.
Vaestorekisterikeskus CA
pixlcloud | turning data into actionable insight copyright (c) 2012
11. Situational Awareness
Overview visualization
of a large network
screenshot courtesy of Chris Horsley
pixlcloud | turning data into actionable insight copyright (c) 2012
12. Viz Problems
• the right data
• understanding the data
- syntax
- semantics
Mar 16 08:09:48 kernel: [0.00000] Normal 1048576 -> 1048576
• too much data
pixlcloud | turning data into actionable insight copyright (c) 2012
13. Approaches
• the right data • education
• experience
• new sensors?
• understanding data • collaboration
• logging guidelines
• too much data • big data approaches
pixlcloud | turning data into actionable insight copyright (c) 2012
15. IT Has Been Changing
“memory has become the new hard
disk, hard disks are the tapes of
years ago” -- unknown source
pixlcloud | turning data into actionable insight copyright (c) 2012
16. Big Data?
• deals with large amounts of data
• what is the right technology?
- row-based?
- column-based?
- key-value? which store?
- document store?
- search engine?
- graph database?
• how to process the data for viz?
pixlcloud | turning data into actionable insight copyright (c) 2012
17. Visualizing TBs of Data?
pixlcloud | turning data into actionable insight copyright (c) 2012
22. The Place of Data Mining
• data overview (a new dataset, not seen or known before)
- summarization - (simple statistics)
• large populations (e.g., network graphs, heatmap rows)
Leverage data mining to augment and
- clustering (segregation - aggregation)
improve visualizations
Use human to find interesting areas
• high dimensionality
- dimensional reduction (often requires distance func.)
‣ principle component analysis
‣ ordination (e.g., multidimensional scaling)
pixlcloud | turning data into actionable insight copyright (c) 2012
27. pixlcloud
‣ visibility Swisscom
‣ simplicity Skaitmeninio sertifikavimo centras
IZENPE S.A. - CIF A-01337260-RMerc.Vitoria-Gasteiz T1055 F62 S8
Jabber Software Foundation
StartCom Ltd.
Thawte
LGPKI
IZENPE S.A.
America Online Inc. NetLock Kft.
NetLock Halozatbiztonsagi Kft.
‣ understanding
Trustis Limited
Elektronik Bilgi Guvenligi A.S.
MessageLabs
Coventry City Council
B.A.T. AS Sertifitseerimiskeskus
ADMINISTRACION NACIONAL DE CORREOS
RSA Data Security, Inc.
thawte, Inc. Consulting cc
Thawte
TeliaSonera
Thawte, Inc. Thawte Consulting (Pty) Ltd.
Thawte Consulting
ACAC Camerfirma SA A82743287
Camerfirma SA CIF
Technische Universitaet Berlin Wildau
Bergische Universitaet Fachhochschule Bonn
Technische Universitaet
Universitaet Stuttgart Wuppertal
Nbg
FH
Migros
ern
Hochschule Esslingen VeriSign, AC CAMERFIRMA S.A.
Inc.
ften
guet
Forschungsverbund Berlin e.V.
Beuth Hochschule fuer Technik Berlin Kartographie und Geodaesie
Bundesamt fuer Fachhochschule Kiel
erein
in
ein
Universitaet Marburg
scha
DFN-Verein
GeoForschungsZentrum Potsdam Physikalisch-Technische Bundesanstalt
ere
Serasa S.A.
hafts
Hochschule Heilbronn
DFN-Verein
I.CA - Standard root certificate, O
-Ver
DFN-V
N-V
Georg-Simon-Ohm-Hochschule f. angewandte Wissenschaften FH Nbg
sen
n
au daesie einsc
DFN
C=hk, O=C&W HKT SecureNet CAXcert EZ by DST
Class B
rei
Dortmund Alfred-Wegener-Institut
UniversitaetHochschulbibliothekszentrum GmbH
Helmholtz-Zentrum fuer InfektionsforschungNRW
DF
Wis
VeriSign Trust Network
erein
rein
Ve
erein
in
IPK Gatersleben
-VebH
ein
Max-Planck-Institut zur Erforschung von Gemeinschaftsguetern Ruhr-Universitaet Bochum
in
re
Geo Gem
N-
ere
VeriSign Japan K.K.
DFN-Verein
ndte
DFNGm
Ve
C=hk, O=C&W HKT SecureNet CA Class A
-Ver
DF
urg
DFN-Verein
rsitaet e.V. DFN-V
N-V
DFN-V
in N-
Hochschule Darmstadt Flensburg
Fachhochschule
ein
mb
E-Sign S.A.
ung
re DF
ewa
und von
k Berlin
n
le Wild inDFN
QuoVadis Limited
rei
Technische Universitaet Verein Braunschweig
aft DF
rein
-Ver
Potsdam
Ha
Hochschule Amberg-Weiden
in
ische rbund dDFN-Verein
Wuppertal
Ve
rsch
Hochschule fuer Angewandte Wissenschaften Hamburg
f. ang
schu -Vereng
ere
Hochschule Mittweida (FH) - University of Applied Sciences
-Ve
en
An Post
Ve
N-
uleDFN
N-
schu
N-V
ere nsfo
DF
N-
fuer Techni
Berlin
DFN
DF
n
Georg-August-Universitaet Goettingen ABA.ECOM,Microsystems Inc
INC.
DF
inen
ch
rei
Hochschule fuer Wirtschaft und Umwelt Nuertingen-Geislingen Universitaet Potsdam Sun
in
DF
hoch graphie
re
Erfor
n
t N-V ktio
Unive Berlin
ing
n ns
Ve
re
Fach zur DFN
GeoForschungsZentrum
te Ve W
QuoVadis Limited, Bermuda
in
Hochschule Magdeburg StendalDF(FH) for Astronomical Research
ESO - European Organisation rei rg
hsch
isl
Ve
Ve
ACE Limited
sse
NR
N-
Ve bu
Universitaet
Hochschule Heilbronn
tad Infe
N-
rei
Bayerische Staatsbibliothekinn-Ge Fachhochschule Luebeck CDC
N-
Universitaet Stuttgart
DF
N- Co in
Forsch taet Dortmun
Wi
DF
DF
sle Ma Ins ge wa um
s
Hoc
Fachhochschule Braunschweig/Wolfenbuettel ere
Hel nischet fuer Karto
en lt
ge ce ule
in
re
Fa ch rsit lbib Bonms fuer
ett an H)
hn
ing sta
N-
re
chule
tin
ig
Hochschule fuer angewandte Wissenschaften Fachhochschule Coburg N-V
Au le ener-slin ge ntr
ien sch
rei
stitut
DF
Ve
DFes (F
nd
Ve
we
er
N- el
hm-
Sc arc
Un ecgd titun DF
DF
se ch
FachhochschuleApLandshutere Universitaet Rostock
Ve
nKiel
in
Ga hu schu r An rgsze
Go n l
Nu ett
et Dar um
N-
N- ho
t aundda
ch
Universitaet Bayreuth
Techn ungsve
rsi N- rg
DF
lt n led
t Br rei
bu Re
pliDF ch
n-O
ns
ck-In
Hochs
tae Buen
ive DF tbu
IP ch hoch ule t Ma hek
Ho versita entr
werei
en ca n Fa
e le
N-V
rsi Ve
Hochschule Mannheim -Verein Bremen inUniversitaet
Bergische
Kor sc -Weg le fue rbu
taehe St
ns
olf rei DF
hul chu
Ve of mien
Um
QuoVadis Trustlink Schweiz AG
imo
liot
esam
W
iveiscurg
Ve
Universi
ty noaft
Fle
ltz-Z
d N-
Tech Plan
bH
iveUniversitaettzige ere Tuebingen
unig/ rsitrochN- ere
hsc chs
enin
DF DFN
Un hneb
Gm in
rg-S
Beuth
ns
AsDF
le
aft we
um re N-V
Es
n
Un sse Hochschule Bonn-Rhein-Sieg
ut
Hoc mho
Alf ch sch ae
Fachhochschule Muenster
Bund
eid DF
Max-
chch ch
Uni hho
Ho ive chu
Ve
sh
-Wns
N-
for rei
t Land IFW N- Helmholtz-Zentrum ein
ati te Dresden e.V.
) - WiVe in nue N-V
Berlin fuer Materialien und Energie GmbH Coop Genossenschaft
Geo
ein DF
n
on
Ph red schu
gu -T
irts
Boau ere
be
rg
Ho chs
st-
Fac
beDF a nis nd
Deutsches BiomasseForschungsZentrum gemeinnuetzige GmbH
rW
ter ch
eidgeimForschungszentrum DFN Europe Ltd. NEC -Ver DFN-Verein
ae Br (FH DF N-V gem rein
e
sit le
Amle ga wa -Ve
Juelich GmbH
lis
DF m
Un
ch
fue
Ho ch
er hu
ch ika
hu ntru DFN
nr Or
nis
le
sc
niv sc Mittw anhe bec
k in ein
InfoNotary PLC
g-
sZe
ys
hu
ch ere -Ver H
-U ch ropea nn Lue rein
gen DFN-V Dioezese Rottenburg-Stuttgart
sc le fue am ung DFN Gmb
Martin-Luther-Universitaet-Verein gieUniversitaet Zittau/Goerlitz Ener Hochschule
Ge
hr ho huule Ma tsd uth
Te
ho -Ve
Hochschule fuer Gestaltung Karlsruhe Ho
ch
Ru ch scEu ule Po yre ule
Fa ch -sch schBa binsseFor -Sie GmbH
sch g
DFN Halle-WittenbergUlm
Deutsches Zentrum fuer Luft- und Raumfahrt e.V. (DLR)
n
Ho ch rsit aet Bioman-Rhein Hochschule Anhalt (FH)
Fa O sch aet Tue Verei
n n und
ES ch rsit aet Breme Juelich
Ho ive och tock
r ein
DFN
rialie Verei
n
DFN- erein
Ho chh rsit eset Ros m DFN-V
Coop
in
Mate DFN-
Fa ive sita Bon Muenstenttgart-Ver Fachhochschule Koeln gGmbH
Un ivetsch
Rheinische erein e.V. (DLR)
ntru fuer
-Vere
ruhe Un
Un ver hulesze DFN
Deu hscFachhochschule Weihenstephan
DFN
Ltd. (FH) Berli H n
Uni schung pe Anhalt g-Stu
g Karls
hule
Gest
altun
Akademie/Goerlitz LehrerfortbildungDFN-Verein Stralsund
Hoc
For hho -Zen
chsc trum fuer Koeln Raumfahrt Fachhochschule
Euro le Rotte
nbur
hule
DFN-VgGmb
reinng
DFN-Ve DFN-Verein
alfuehru
Dillinge und Personalfuehrung Dillingen
Fachhochschule Giessen-Friedberg Deutscher Sparkassen Verlag GmbH
E-Telbank Sp. z o.o.
NEC holtz t Zittau ochsc Luft- undund Person
Helm Deutsches Elektronen-Synchrotron DESY
schu
Leibniz-Institut fuer Polymerforschung Dresden e.V.
Fac zese
C=hk, O=C&W HKT SecureNet CA Root
le fuer
e.V. Dioe schu e Ulm
Hoch rsitae Fachh m fuer ng rein
hrotron
DESY
schul DFN-Ve
ortbildu
Hoch hes Zentru en-Sync
Unive ische fuer Lehrerf dFriedberg
Stralsun Universitaet Duisburg-Essen Miami University
ein
g Dresden Hoch
Rhein ie Elektron
RWTHDFN-Verein Aachen DFN-Vereinund Buchkunst Leipzig
DFN-Ver
Deutsch hschule Hochschule fuer GrafikUniversitaet Mannheim
forschun
Deutsc es
Akadem hschule Giessen- Unizeto Sp. z o.o.
Polymer
ssen DFN-Verein DFN-Verein
Universitae fuer Grafik DFN-Verein Deutsche Telekom AG, Laboratories
Fachhoc t Duisburg-Eund Buchkunst Leipzig
nstitut fuer
ign nv-sa
Fachhoc
Hochschule Mannheim Laboratories Hochschule Heidelberg
Paedagogische
Leibniz-I
Hochschule Heidelberg
Fachhochschule Regensburg Universitaet
Paedagogische
Deutsche
DFN-Verein Telekom AG,
Deutsche Post World Net Unizeto Technologies S.A.
Fachhochschule Regensburg
DFN-Verein
Jacobs University Bremen gGmbH
Technische fuer Musik und Theater Jacobs University Bremen gGmbH
Institut fuer Universitaet Darmstadt Leipzig
Hochschule
DFN-Verein
TechnischeDFN-Verein DFN-Verein
Universitaet Darmstadt Department of Education and Training
FernUniversitaet in Hagen FachhochschuleHochschule fuerDFN-Verein und Theater Leipzig e.V.
UniversitaetPhotonische Technologien e.V.
Gelsenkirchen Musik DFN-Verein
GlobalS
FernUniversitaet in HagenDFN-Verein
Ludwig-Maximilians-U Erfurt
Hochschule
Fritz-Haber- Wismar niversitaet Muenchen
Fachhochschu DFN-Verein Institut fuer Photonische Technologien
Universitaet Erfurt
z o.o.
Universitaet Freiburg
Fachhochs Institut le Frankfurt
Ludwig-Maximilians-Universitaet Muenchen
Paedago chule Augsburg am Main
Univers
Fachho gische der Max-Planck- DFN-Verein
Universitaet Freiburg
DFN-Verein
Duale itaet
Ingolsta ule FreiburgHochschule Wismar
Fachhoch
Leibniz chschul Gesellschaft
Biblio Leibniz-Rechenzentrum DFN-Verei
Techn Hochsc eHochsch DFN-Verein
ische Bielefeld
Fachho schule Brandenb
-Institu hule DFN-Ver DFN-Verein
nk Sp.
Land schu Universitaet dt ein
chschu
Unive Unive t fuerBaden-Wuertte
Freie
Hoch
Fritz-Haber-Institut der Max-Planck-Gesellschaft Fachhochschule Frankfurt am Main
urg
Neurob DFN-Ve
Audkenni hf.
Deuts le Jena DFN-Ver
Tec Paedagogische Hochschule Freiburg
theks n
ein
rsitae rein
Deut ches
Univ Niedlersitae
Fachhochschule Brandenburg iologie mberg
Konr sche
servi
Mers Claust Magde
Hoc ersit ersacce-Ze burgereinFachhochschule Augsburg
t Greift DFN-V
ad-Z s Herzz
hal
swald DFN- Universitaet Bielefeld
E-Telba
Heinhsch eburg
Berlin
use-Z entru
hsen
Instit
Tec hnis ule
Fac hsc aet
DFN-Ve
ntrum
Ges
Hoc richche Heid (FH)
ut fuer DFN-
DFN-V
Bun
Deu ellsc entru m
Tec hho hule fuer
rein
Fachhochschule Jena T-S hnis -He Bre elbe
Be hni chs Universi Duale n-Wu
Verei DFN-Ve
Berlin
Bade
Hochschuleerein erein rein Baden-Wuerttemberg
m fuer Verei
Pae desans
tsch haft Intern AG
Un hsc
Fac yst che ine- mer rg n
DFN- DFN-V
Ho rufs sch chu Univ taet
Inform n
ation
chs Ent Deutscher Wetterdienst
es fuer
Mus
Ka kom
ive hul erttem
Deutsches Herzzentrum Berlin Vere
Ho chs rsitaete Bib le Neuersien Leibniz-Institut fuer Fachhochschule Ingolstadt
Hu hhoemse Univer hav und Neurobiologie Magdeburg
Un dag
Ho th. talt
Kre ale Paed
ik
ation
Ho
Sti ch chu chu hho sita Freie Universitaet Berlin
DFN e Tele
aka DFNBerg in
bsfo
berg
f. Geo
DFN
TxC3x9CRKTRUSTCertificates Sunucu SertifikasxC4xB1 Hizmetleri, C
First Data Digital Elektronik Inc.
Ch ive wiss
Le chs Unogi stech
-Vere
Fac era taet The
agog
Ha mbold
Un edch sch dem erp ch -Ulm-Vereinater -Vere
Fa ari rsit ivesch
Technische Universitaet Clausthal
rsch
Fri
ens
TxC3x9CRKTRUST Elektronik Sertifika Hizmet SaxC4x9FlayxC4xB1cxC4xB1sxC4xB1, C state-institutions
nik DFN- tsch
aka
wiss cha in Berlin
Fr ftu sch le Erlangrise et Due dem
Pa ibn chu DFN ische
Ho ch te aet rsit e Ho DFN in
Ho iss taaCih-L uleBibliotheksservice-Zentrum Baden-Wuerttemberg
DFN
ung
ie
Ford Motor Company - Enterprise CA
Deu
Konrad-Zuse-Zentrum fuer Informationstechnik Berlin (ZIB) HA eisfenng ule fue le Sa chs Dresde sseldor
Serasa
ens ftlich Vere
W ive ric
He ed iz- - le Ka aet Forsc
-Vere
-Ve
T-
Un Sy rsi t-Univ r Anen- Ser -Ve
Han
sze (ZIB) hung
He lm ag ch Unive sse chschu
Te ch ho Ins Bre ie Frei
cha e in CA
in DFN-
Universitaet Greifswald
rein Dat
Tie Niede chs
sba chu rein
fDFNer
ntru
Un ch sc og sctitu me lEichst nov
ch en taeUn fueers Techn Nuern
Deutsches Institut fuer Internationale Paedagogische Forschung
ften
W
DFN nv-sa
- Enterprise
ive ste ty oe ch Sta Ge n Vere
berg
Alpha
m (DK
Leibniz-InstitutHeinrich-Heine-Universitaet Technologie e.V.
en vice
DF le -Ver
Duesseldorf
lm ho hu env
Fa uts sc ch Bu Fu nsb enbg-W le utzZwicka BES
K
GlobalSign
sc Fat Sa t rae r Ku in
ive nis ltz le hu t fue aenrsit DF aet Sch le u. Roherar
-Ve Company
Ho rlin nis Wo le ule Wi bur chu rein
hu hafuer Plasmaforschung undLand Niedersachsen
BuSy dizchY ule ive Inforke-Un
rrh ein Ford Motor
Deutsches Krebsforschungszentrum (DKFZ)
T- upha aet r le Bie Gm
rs sc ita s DFN
GlobalSign
isc
ffle
ut-
Un Te sch fue
N-V Gm
Ho
ms
De ch nn
GlobalSign nv-sa Northern Arizona University
FZ) DFN
ita ch chSierzt ber org
rein beit
Be ch ch