180 likes | 289 Views
Abnormal Detect: Finding the Suspect. Co-on Team Presented. Background Review. Yi Fu. Finding the suspect. Jialiang Wang. Yanni Li. Guohao Zhang. Problem. An embassy employee is suspected of sending data to an outside criminal organization from the Embassy
E N D
Abnormal Detect: Finding the Suspect Co-on Team Presented
Background Review Yi Fu • Finding the suspect Jialiang Wang Yanni Li Guohao Zhang
Problem • An embassy employee is suspected of sending data to an outside criminal organization from the Embassy • The IP and Network traffic are recorded • Task • Identify which computer(s) the employee most likely used to send information to his contact • Characterize the patterns of behavior of suspicious computer use
Source Data • Data
Data Prepossessing • Data Filter • Example: • destIP: 37.170.30.250 has 9638 communications with ALL the sourceIP • unlikely to be the suspect’s contact • it can be filtered
Data Prepossessing • Data size pattern
Data Prepossessing • Abnormal Records
Visualization metaphor • Time bar
Visualization metaphor Prox data of building entrance
Visualization metaphor Prox data of classified region entrance
Visualization metaphor Network flow
Data Explor • Overall view
Stories found demo
Results Results #31 10th Jan #56 29th Jan #21 23rd Jan
Results Results #17 15th Jan #5 4th Jan
Left to be Done • Suspect transfer function • Data size based on statistics • DestIP connecting times • Pattern based transfer function • Interactive data operations: filter etc. • Higher resolution: day-view • Office grouping • Automatic highest suspicious detect • More interactions
Left to be Done • Focus+context method, using sigma lens to magnify to identify patterns