GIS APPLICATION IN FIREWALL LOG VISUALIZATION Penn State MGIS 596A Peer Review Presenter: Juliana Lo Advisor: Dr. Michael Thomas Date: December 17, 2014.

Slides:



Advertisements
Similar presentations
Geography 911: NeoGeography GIS 2.0 and Software Toolkits Joshua S. Campbell – 23 February 2010.
Advertisements

Pulan Yu School of Informatics Indiana University Bloomington Web service based Varuna.Net.
New Release Announcements and Product Roadmap Chris DiPierro, Director of Software Development April 9-11, 2014
Lesson 1. Course Outline E-Commerce and its types, Internet and WWW Basics, Internet standards and protocols, IP addressing, Data communication on internet,
Network Management Overview IACT 918 July 2004 Gene Awyzio SITACS University of Wollongong.
Supervisor: Amichai Shulman Students: Vitaly Timofeev Eyal Shemesh.
A Security Pattern for a Virtual Private Network Ajoy Kumar and Eduardo B. Fernandez Dept. of Computer Science and Eng. Florida Atlantic University Boca.
Databases. Database Information is not useful if not organized In database, data are organized in a way that people find meaningful and useful. Database.
INTRANET SECURITY Catherine Alexis CMPT 585 Computer and Data Security Dr Stefan Robila.
MS DB Proposal Scott Canaan B. Thomas Golisano College of Computing & Information Sciences.
INTERNET DATABASE Chapter 9. u Basics of Internet, Web, HTTP, HTML, URLs. u Advantages and disadvantages of Web as a database platform. u Approaches for.
Wireless LAN Topology Visualiser Project Supervisor: Dr Arkady Zaslavsky Project Team Members: Jignesh Rambhia Robert Mark Bram Tejas Magia.
Project Plan The Development Plan The project plan is one of the first formal documents produced by the project team. It describes  How the project will.
Systems Analysis and Design in a Changing World, 6th Edition 1 Chapter 6.
Introduction to Database Management
Effort in hours Duration Over Weeks Or Months Inception Launch Web Lifecycle Methodology Maintenance Phases Copyright Wonderlane Studios.
Charlie Crocker Vice President Farallon Geographics, Inc. An Overview of Internet Mapping Technology.
Esri International User Conference | San Diego, CA Technical Workshops | Esri Tracking Solutions: Working with real-time data Adam Mollenkopf David Kaiser.
INTRUSION DETECTION SYSTEMS Tristan Walters Rayce West.
Esri International User Conference | San Diego, CA Technical Workshops | ArcGIS for SharePoint, An Introduction Art Haddad Rich Zwaap.
Esri International User Conference | San Diego, CA Technical Workshops | ArcGIS for Server Road Ahead Ismael Chivite, Anne Reuland.
Securing Legacy Software SoBeNet User group meeting 25/06/2004.
ArcGIS Workflow Manager An Introduction
GIS Application in Firewall Security Log Visualization Juliana Lo.
SEC835 Database and Web application security Information Security Architecture.
Maintaining a Microsoft SQL Server 2008 Database SQLServer-Training.com.
CLOUD COMPUTING  IT is a service provider which provides information.  IT allows the employees to work remotely  IT is a on demand network access.
What is FORENSICS? Why do we need Network Forensics?
Firewall and Internet Access Mechanism that control (1)Internet access, (2)Handle the problem of screening a particular network or an organization from.
Karsten Vennemann, Seattle Free and Easy Web Mapping.
Introduction to ArcGIS for Environmental Scientists Module 1 – Data Visualization Chapter 1 – GIS Basics.
Introduction: Databases and Database Users
COEN 252 Computer Forensics Collecting Network-based Evidence.
Software Aspects of PQ in a DG Context By Dr. Siri Varadan.
An Introduction To Building An Open Standard Web Map Application Joe Daigneau Pennsylvania State University.
material assembled from the web pages at
Enterprise GIS Planning and Framework Jennifer Reek GIS Coordinator City of Brookfield, WI.
CS480 Computer Science Seminar Introduction to Microsoft Solutions Framework (MSF)
Creating a Trail Map and Trouble Reporting System Using Open Source Technology Capstone Proposal David Todd Advisor: Jan Oliver Wallgrün GEOG 596A: Individual.
IT 456 Seminar 5 Dr Jeffrey A Robinson. Overview of Course Week 1 – Introduction Week 2 – Installation of SQL and management Tools Week 3 - Creating and.
Esri UC 2014 | Technical Workshop | Esri Roads and Highways: Integrating and Developing LRS Business Systems Tom Hill.
ArcGIS Server for Administrators
4 - 1 Copyright © 2006, The McGraw-Hill Companies, Inc. All rights reserved. Computer Software Chapter 4.
Economic Development Maps and Apps for State and Local Governments Lindsay King Nikki Golding Chris Buscaglia.
1 Implementing Monitoring and Reporting. 2 Why Should Implement Monitoring? One of the biggest complaints we hear about firewall products from almost.
Securing the Network Infrastructure. Firewalls Typically used to filter packets Designed to prevent malicious packets from entering the network or its.
Virginia Geospatial Clearinghouse Workgroup Data Sharing Presentation 8/18/2010 Data Sharing.
Denial of Service Sharmistha Roy Adversarial challenges in Web Based Services.
ArcGIS Workflow Manager Introduction
PwC New Technologies New Risks. PricewaterhouseCoopers Technology and Security Evolution Mainframe Technology –Single host –Limited Trusted users Security.
Adding ArcGIS Online to Your GIS Curriculum
Intro to GIS & Pictometry Trainers: Randy Jones, GIS Technician, Douglas County Jon Fiskness, GISP GIS Coordinator, City of Superior.
Powered by Microsoft Azure, PointMatter Is a Flexible Solution to Move and Share Data between Business Groups and IT MICROSOFT AZURE ISV PROFILE: LOGICMATTER.
Managing and Monitoring the Microsoft Application Platform Damir Bersinic Ruth Morton IT Pro Advisor Microsoft Canada
CHAPTER - 4 COMPUTER NETWORK Dr. BALAMURUGAN MUTHURAMAN
Systems Analysis and Design in a Changing World, 6th Edition 1 Chapter 6 - Essentials of Design an the Design Activities.
Regan Little. Definition Methods of Screening Types of Firewall Network-Level Firewalls Circuit-Level Firewalls Application-Level Firewalls Stateful Multi-Level.
UTILIZING GIS AT A PUBLIC GARDEN FOR MANAGEMENT OF IRRIGATION SYSTEMS Ethan Sockwell Cohort 26.
Chapter 11 – Cloud Application Development. Contents Motivation. Connecting clients to instances through firewalls. Cloud Computing: Theory and Practice.
By: Keith Reiter COSC 356. Today’s Agenda Introduction Types of firewalls Firewall Access Rules Firewall Logging Who needs a firewall Summary.
Clouding with Microsoft Azure
Architecture Review 10/11/2004
CompTIA Security+ Study Guide (SY0-401)
GIS Basic Training June 7, 2007 – ICIT Midyear Conference
CompTIA Security+ Study Guide (SY0-401)
IS4550 Security Policies and Implementation
Database Management Systems
ArcGIS Online – The Road Ahead
A - E Cloud Enterprise Symbols
Introduction to Portal for ArcGIS
Presentation transcript:

GIS APPLICATION IN FIREWALL LOG VISUALIZATION Penn State MGIS 596A Peer Review Presenter: Juliana Lo Advisor: Dr. Michael Thomas Date: December 17,

Presentation Outline Introduction to firewall Problem definition Project goal and objectives Design methodology and process Potential challenges Project status 2

Firewall Definition A firewall is a hardware or software designed to permit or deny network traffic based on a set of rules Protect network from unauthorized access. 3

Firewall Security Log Traffic logging is essential for these reasons: System monitoring Compliance Forensics Challenges: Too much data to sort through Live dynamic data IP Packet 4

Firewall Security Log Solution Transform Table Map Source IP: Database Latitude , Longitude Attributes: event time, severity, # of occurrences Charts

Project Goal and Objectives Project Goal Project Goal Develop a GIS-enabled web application to visualize firewall traffic in near-real time. Geolocation of firewall IP packets into geographic coordinates. Visualize the information on a map. Develop a feasible workflow for data extraction, transformation, and loading process. Automated data processing to support near-real time data. Use the cloud infrastructure to share GIS data and applications. Objectives 6 Project Goal Project Goal Develop a GIS-enabled web application to visualize firewall traffic in near-real time.

Develop system specification Identify subsystems, hardware and software Data flow diagrams System test plan Operational testing and evaluation System assessment Acceptance Design Methodology Discovery System Requirements Design Technical Design Development Coding Testing Test Client Ok Launch Conceptual design Needs identification System requirements Assemble system components Software programming Unit and integration tests 7

System Architecture Diagram Inside Network Cloud GIS Computers reaching firewall Clients access web app Internet firewall Application server database web app Definition: a collection of components organized to accomplish a specific task of function or set of functions 8

Data Flow Diagram Computer Firewall Web App Client Parser IP Address Geolocation Load Network traffic Filtered data Unprocessed records Geolocation file Formatted file Add geographic coordinates Capture Extract attributes File with lat,lon SQL updates Query records Returns map 9 Definition: Movement of data between entities and the processes and data stores within a system Source/Entity Data Flow Process Data Store Symbols RDBMS Changes since last update New records Data feed

Hardware Firewall (existing) Application Server (new) Programs that need to be written Capture Parser IP Geolocation Data loading System Components (HW, SW) 10 Raw Data 11/27/2014 1:20 PM,Alert, ,NetScreen device_id= [Root]system-alert-00442: TCP sweep! From to zone Untrust, proto TCP (int ethernet0/2). Occurred 37 times. 11/27/2014 1:30 PM,Alert, ,NetScreen device_id= [Root]system-alert-00442: TCP sweep! From to zone Untrust, proto TCP (int ethernet0/2). Occurred 10 times. ( :01:32) Formatted Data Geocoded SQL Statement INSERT INTO my_table (date, severity, point_geom …) VALUES (…)

GIS in the Cloud Candidate Providers: 11 APIDataCOST Evaluation Factors Key Advantages Data Access & Availability  Anywhere and any time IT Infrastructure  Reduced setup cost  Reduced maintenance cost ArcGIS Online, CartoDB, Mapbox

GIS in the Cloud Evaluation 12 Data SupportCostAPI ArcGIS OnlineLayer packages, shapefiles, CSV files, map services Free individual account, org expensive Robust Javascript library and design tool MapBoxTiles, shapefiles, KML, geotiff Subscription is easy to understand Robust Javascript library and design tool CartoDBExcel, CSV, XML, SHP, GeoJSON, and PostSQL/PostGIS backend Subscription is easy to understand Robust Javascript library and design tool CartoDB Advantage  Cloud based geospatial database  Use SQL API to post data to PostGIS backend Live, Dynamic Data!

IP-Based Geolocation Issues Inaccuracies Rely on vendor provided database Accuracy is good about location at county, state, and city level ISP level accuracy is less reliable 13

IP-Based Geolocation Issues Variation in result accuracy Use proxy servers at known locations (GeoSurf, FoxyProxy, and many others) Virtual Private Network (VPN) TOR Project, like a proxy but server changes 14

Anticipated Results Map with symbols, cluster map Pie Chart and Line Graph 15

Project Status In Progress (to be completed by 2 nd week Jan, 2015) Concept Design System Specification System Design Implementation & Testing (Jan 2015 – Apr 2015) Data extraction, transformation, load scripts Web site development Visualization scripts 16

Presentation ESRI User Conference San Diego, CA July 20 – 24, 2015 Abstract submitted 17

References A. Chuvakin, K. Schmidt, C. Phillips, "The Authoritative Guide to Understanding the Concepts Surrounding Logging and Log Management", Chapter 2, Publisher Syngress, December 13, S. Northcutt, J. Shenk, D. Shakleford, "The Log Management Industry: An Untapped Market", Sans Institute InfoSec Reading Room, June 2006, industry-untapped-market "Log Formats Supported by Sawmill", Sawmill, (accessed Oct 25, 2014). T. Bond, "Visualizing Firewall Log Data to Detect Security Incidents", Sans Institute Global Information Assurance Certification Paper, Sans Institute, 2009, log-data-detect-security/ I. Poese, S. Uhlig, M Ali Kaafar, B. Donnet, B. Gueye, "IP Geolocation Databases: Unreliable?", ACM SIGCOMM Computer communication Review (CCR), April J. A. Muir, P.C. van Oorschot, “Internet Geolocation and Evation”, ACM Computing Surveys, vol. 42, no. 1, VN Padmanabhan, L Subramanian, “An investigation of geographic mapping techniques for Internet hosts”, ACM SIGCOMM Computer Communication Review 31 (4), , Y Tian, R Dey, Y Liu, KW Ross, “China’s Internet: Topology Mapping and Geolocating”, INFOCOM, 2012 Proceedings IEEE,