Demystifying Data Analytics & Visualization Make Your Data Dance.

Slides:



Advertisements
Similar presentations
Top-Down Network Design Chapter Nine Developing Network Management Strategies Copyright 2010 Cisco Press & Priscilla Oppenheimer.
Advertisements

Good afternoon. My name is Marek Pawłowski
The Internet of Riedwaan Bassadien Platform Strategy Manager Microsoft Everything Your things.
Big Data: Analytics Platforms Donald Kossmann Systems Group, ETH Zurich 1.
Introducing WatchGuard Dimension. Oceans of Log Data The 3 Dimensions of Big Data Volume –“Log Everything - Storage is Cheap” –Becomes too much data –
MONITORING TOOLS Open Source Security Tools to monitor your network.
Anomaly Detection Steven M. Bellovin Matsuzaki ‘maz’ Yoshinobu 1.
5/1/2006Sireesha/IDS1 Intrusion Detection Systems (A preliminary study) Sireesha Dasaraju CS526 - Advanced Internet Systems UCCS.
Fraud Detection in Banking using Big Data By Madhu Malapaka For ISACA, Hyderabad Chapter Date: 14 th Dec 2014 Wilshire Software.
INTRUSION DETECTION SYSTEMS Tristan Walters Rayce West.
+ Hbase: Hadoop Database B. Ramamurthy. + Motivation-1 HDFS itself is “big” Why do we need “hbase” that is bigger and more complex? Word count, web logs.
Intrusion Prevention, Detection & Response. IDS vs IPS IDS = Intrusion detection system IPS = intrusion prevention system.
2005 HR Retreat: Employment Teampriority-health.comSecurity Event Management February GR ISSA Meeting Security Event Management Correlation, Categorization,
How to make it easy for you customers to find and research you and your services!
This presentation was scheduled to be delivered by Brian Mitchell, Lead Architect, Microsoft Big Data COE Follow him Contact him.
Scanners Inventory all machines on site; 12,000+ nmap farm All machines usually twice a day Find critical vulnerabilities and issue blocks Nessus Homegrown.
©2013 Software AG. All rights reserved. Dr John Bates CTO, Software AG 12 th November 2013 Turning Market Crisis into Competitive Advantage The Clue’s.
Opening Keynote Presentation An Architecture for Intelligent Trading  Alessandro Petroni – Senior Principal Architect, Financial Services, TIBCO Software.
IIT Indore © Neminah Hubballi
The Most Analytical and Comprehensive Defense Network in a Box.
Big Data. What is Big Data? Big Data Analytics: 11 Case Histories and Success Stories
Top-Down Network Design Chapter Nine Developing Network Management Strategies Oppenheimer.
Young-Bean Song AnalyticsDNA September 18, 1015.
Contents HADOOP INTRODUCTION AND CONCEPTUAL OVERVIEW TERMINOLOGY QUICK TOUR OF CLOUDERA MANAGER.
CSCI 530 Lab Intrusion Detection Systems IDS. A collection of techniques and methodologies used to monitor suspicious activities both at the network and.
IOS and Android with Windows Azure Websites Name Title Address Website.
Streamlining Monitoring Infrastructure in IT-DB-IMS Charles Newey ›
SNORT Biopsy: A Forensic Analysis on Intrusion Detection System By Asif Syed Chowdhury.
Windows Azure. Azure Application platform for the public cloud. Windows Azure is an operating system You can: – build a web application that runs.
Cryptography and Network Security Sixth Edition by William Stallings.
Storage Centralized Logging (Log Aggregator)
What we know or see What’s actually there Wikipedia : In information technology, big data is a collection of data sets so large and complex that it.
+ Logentries Is a Real-Time Log Analytics Service for Aggregating, Analyzing, and Alerting on Log Data from Microsoft Azure Apps and Systems MICROSOFT.
Server & Tools Business
Big Data Analytics with Excel Peter Myers Bitwise Solutions.
Content Creation and Management: What’s Next for Government Libraries and Information Stephen Abram, Vice President, Innovation, SirsiDynix IFLA, Seoul.
Harnessing Big Data with Hadoop Dipti Sangani; Madhu Reddy DBI210.
Andy Roberts Data Architect
SNORT! Among other things. Description Open source ids/ips Real-time analysis: alerting, blocking, logging Real-time response: alerting, session sniping,
1 Divya Jain Oct 10 th, 2014 Big Data Products: Where do I start?
Big Data Javad Azimi May First of All… Sorry about the language  Feel free to ask any question Please share similar experiences.
AZ PASS User Group Azure Data Factory Overview Josh Sivey, Solution Partner October
Getting to know U-SQL Azhagappan Arunachalam.  Sr Applications Database Architect 
What is it and why it matters? Hadoop. What Is Hadoop? Hadoop is an open-source software framework for storing data and running applications on clusters.
B ig D ata Analysis for Page Ranking using Map/Reduce R.Renuka, R.Vidhya Priya, III B.Sc., IT, The S.F.R.College for Women, Sivakasi.
Microsoft Power Query 101 Belinda Allen Smith & Allen Consulting, Inc.
BIG DATA BIGDATA, collection of large and complex data sets difficult to process using on-hand database tools.
Big Data Visualization Challenges Danko Nebesh. What We Believe Big Data Information Visualization is very important Hadoop and Accumulo technologies.
Microsoft Ignite /28/2017 6:07 PM
Some Great Open Source Intrusion Detection Systems (IDSs)
Network Monitoring Sebastian Büttrich, NSRC / IT University of Copenhagen Last edit: February 2012, ICTP Trieste
SIEM Rotem Mesika System security engineering
Cloud App Security vs. O365 Advanced Security Management
Centralised logging using RSYSLog
Log Management Systems
Wonderware Online Cost-Effective SaaS Solution Powered by the Microsoft Azure Cloud Platform Delivers Industrial Insights to Users and OEMs MICROSOFT AZURE.
Top-Down Network Design Chapter Nine Developing Network Management Strategies Copyright 2010 Cisco Press & Priscilla Oppenheimer.
Deep Dive into the Blue VCU Infosec Team.
9/18/ :06 AM BRK2212 Gain visibility into Network performance and availability with Network monitoring solutions in Azure Vijay Tinnanur Abhishek.
Logsign All-In-One Security Information and Event Management (SIEM) Solution Built on Azure Improves Security & Business Continuity MICROSOFT AZURE APP.
NetFlow Analysis with Elastic Stack
Voice Analytics on Microsoft Azure Allows Various Customers to Get the Most Out of Conversations with Clients Through Efficient Content Analysis MICROSOFT.
Human (user) behavior patterns and analytics
The ELK stack - get to know logs
COMP4442 Cloud Computing: Assignment 1
Cloud Security AWS as an example.
Big DATA.
Cloud Security AWS as an example.
Welcome to Microsoft Azure for Research Training!
Top-Down Network Design Chapter Nine Developing Network Management Strategies Copyright 2010 Cisco Press & Priscilla Oppenheimer.
Presentation transcript:

Demystifying Data Analytics & Visualization Make Your Data Dance

This guy? Definition & Discussion: “Big Data Hype” What is an analytic? How do we visualize Demo: of Data Analytics and Visualization Questions/Discussion Today’s Agenda 2

This Guy? 3 My Wife! Creepy Kids My Wife Made 

Its everywhere We all hear it, but what does it mean? Does it really mean anything or is it just more marketing hype? Is bigger really better? Big Data or Big Hype? 4

How many logs do we have now? Too many to count Not just on your file system, but in traffic too! Human – Human Machine – Human Machine - Machine Logs Logs Everywhere 5 Linux/Unix/Mac(BSD) Microsoft Bro Logs –Or plain Netflow generation Snort or other IDS Switches/Routers

What do you do with all this? 6

How do you decide which logs you want? –Compliance –Policy –Curiosity –Just because Normalization –On the fly (streams) –On the remote/local file system (batch) Get Them In Your Database 7

Tools for Transport: –Flume, fluentd, rsyslog, syslog-ng, sqoop, logstash Tools for Storage: –Note: Relational/Non-relational is important –mySQL, cassandra, Hadoop (HDFS), Elasticsearch Degree’s of Wholeness –ELSA, graylog2, Snare Some Free Tools To Help 8

All data is not gold You need a strategy that gets you the right data at the right time Data is Big... But So What? 9

Wikipedia Definition – “the discovery and communication of meaningful patterns in data” Defining: Analytics 10

Simple! What! A question?! I can understand that! These questions can be used to create –Metrics –Statistics –Network behaviors –These all help the application of Analytics as analytics help are used to create them. Simply a Question 11

I received an IDS alert, is there other similar behavior on my network that I did not receive an alert for? I have an IP blacklist, what hosts on my network connected to those IP addresses? Better yet, is there other similar behavior on my network to non–black-listed IP addresses? Ask Questions of Your Data 12

Unpatched Systems Misconfigured Devices File access –Rates –Personnel Visibility –Of your network –Of your hosts What Other Kinds of Insight 13

So you normalized and stored the data You’ve asked good questions of our data with analytics Now what? We visualize But how? Visualization. 14

15 Demo Time!

16 Questions? Source links in the notes on this slide

17