PresentationPDF Available

A Journey Into Cyberspace

Authors:
  • Cyberspace Situational Awareness

Abstract

A Journey Into Cyberspace - A brief visual presentation on the results of research and development into new visualization tools and methods for cyberspace situational awareness via graph processing and multisensor data fusion.
CYBERSPACE
A JOURNEY INTO
TIM BASS
PRESENTATION DOI 10.13140/RG 2.2.26109.77284/1
CLANDESTINE BAIDU BOTS …. GEOIP CHINA
TIM BASS 4 MARCH 2017
CLANDESTINE BAIDU BOTS …. GEOIP CHINA
TIM BASS 4 MARCH 2017PRESENTATION DOI 10.13140/RG 2.2.26109.77284/1
IDENTIFIED SEARCH BOT NETWORK …
TIM BASS 4 MARCH 2017PRESENTATION DOI 10.13140/RG 2.2.26109.77284/1
CLANDESTINE BAIDU BOTS …. GEOIP BRAZIL
TIM BASS 4 MARCH 2017
UNREGISTERED
USER
REGISTERED
USER
PRESENTATION DOI 10.13140/RG 2.2.26109.77284/1
CLANDESTINE BAIDU BOTS …. GEOIP BRAZIL
TIM BASS 4 MARCH 2017
“NORMAL” BOT NETWORKS
PRESENTATION DOI 10.13140/RG 2.2.26109.77284/1
CLANDESTINE BAIDU BOTS …. GEOIP BRAZIL
TIM BASS 4 MARCH 2017
A CLOSER LOOK SHOWS > 200 BOTS DISGUISED AS NORMAL USERS
PRESENTATION DOI 10.13140/RG 2.2.26109.77284/1
BASENODE
TIM BASS 4 MARCH 2017PRESENTATION DOI 10.13140/RG 2.2.26109.77284/1
TIM BASS 4 MARCH 2017
CLANDESTINE BAIDU BOTS …. GEOIP CHINA
PRESENTATION DOI 10.13140/RG 2.2.26109.77284/1
TIM BASS 4 MARCH 2017
… UNREGISTERED GUESTS
PRESENTATION DOI 10.13140/RG 2.2.26109.77284/1
TIM BASS 4 MARCH 2017
CREATE BY …
PRESENTATION DOI 10.13140/RG 2.2.26109.77284/1
TIM BASS 4 MARCH 2017
CREATE … 1
ENRICH OBJECTS BY USING DATA FUSION TECHNIQUES
PRESENTATION DOI 10.13140/RG 2.2.26109.77284/1
TIM BASS 4 MARCH 2017
CREATE … 2
… SAVE OBJECT BASE AS JSON FILE
PRESENTATION DOI 10.13140/RG 2.2.26109.77284/1
TIM BASS 4 MARCH 2017
CREATE … 3
…IMPORT OBJECT BASE INTO VISUALIZATION ENGINE
PRESENTATION DOI 10.13140/RG 2.2.26109.77284/1
TIM BASS 4 MARCH 2017
CREATE …4
BUILD CYBERSPACE USING CUSTOM GRAPH ALGORITHMS
PRESENTATION DOI 10.13140/RG 2.2.26109.77284/1
TIM BASS 4 MARCH 2017
WORK BY …
TRAVEL IN CYBERSPACE OBSERVING
4
-PATTERNS & ANOMALIES
-STRANGE BEHAVIOR
-UNEXPECTED SITUATIONS
-UNEXPLAINABLE OBSERVATIONS
PRESENTATION DOI 10.13140/RG 2.2.26109.77284/1
TIM BASS 4 MARCH 2017
REFINE & ENRICH …
OBJECTS & SITUATIONS
PRESENTATION DOI 10.13140/RG 2.2.26109.77284/1
TIM BASS 4 MARCH 2017
MAKE DECISIONS …
PRESENTATION DOI 10.13140/RG 2.2.26109.77284/1
TIM BASS 4 MARCH 2017
TAKE ACTION …
PRESENTATION DOI 10.13140/RG 2.2.26109.77284/1
TIM BASS 4 MARCH 2017
BASED ON …
IMPROVED SITUATIONAL AWARENESS
PRESENTATION DOI 10.13140/RG 2.2.26109.77284/1
TIM BASS 4 MARCH 2017
CYBERSPACE
SITUATIONAL AWARENESS!
PRESENTATION DOI 10.13140/RG 2.2.26109.77284/1
TIM BASS 4 MARCH 2017
REFERENCES
BASS, TIM, INTRUSION DETECTION SYSTEMS AND MULTISENSOR DATA FUSION,
COMMUNICATIONS OF THE ACM 43(4):99-105 · APRIL 2000, DOI:
10.1145/332051.332079
BASS, TIM, CYBERSPACE SITUATIONAL AWARENESS DEMANDS MIMIC TRADITIONAL
COMMAND REQUIREMENTS, SIGNAL , OFFICIAL PUBLICATION OF AFCEA, FEBRUARY
2000, DOI: 10.13140/RG.2.2.27068.85127
BASS, TIM, CYBERSPACE SITUATION GRAPHS - A BRIEF OVERVIEW, PRESENTATION,
AFFILIATION: WWW.THECEPBLOG.COM, SEPTEMBER 2016, DOI: 10.13140/RG.
2.2.16014.56643/9
PRESENTATION DOI 10.13140/RG 2.2.26109.77284/1
© TIM BASS, MARCH 2017
ALL RIGHTS RESERVED
TIM@UNIX.COM
PRESENTATION DOI 10.13140/RG 2.2.26109.77284/1
Technical Report
Full-text available
This paper presents patterns and anomalies in cyberspace based on the results of research and development into visualization tools and processing methods for virtualized cyberspace situational awareness. In this paper, we present independent research into virtualizing cyberspace with actual operational data showing a number of situational patterns and anomalies. These situational patterns include bots disguised as normal web users, large bot networks, bot networks using IP address space allocated to defunct companies and more. We present the background, motivation, our techniques, initial results, and future direction toward the critical goals of cybersecurity and realizing human situational awareness in the cyber domain.
Article
Full-text available
Next-generation cyberspace intrusion detection (ID) systems will require the fusion of data from myriad heterogeneous distributed network sensors to effectively create cyberspace situational awareness.