Thursday 

Room 1 

13:40 - 14:40 

(UTC+01

Talk (60 min)

Connecting the dots to go from tabular security incident data to behavioral graph understanding

From alerts to logs to telemetry, security data is typically stored as tables… but that does not mean you need to view it that way too. As more and more big platforms add first class graph support, an increasing number of investigators have access to this powerful tool.

Security Tooling
Tools

Using real activity data, this talk journeys through graph approaches to visual analysis that answer questions that are difficult to see in traditional table-based views. We’ll walk through the following techniques in going from tables to graphs:

- Graph shaping: One of the most important decisions is how to represent tabular security data like logs, alerts, and telemetry as graph structures. We’ll start by identifying entities like users, hosts, and processes as nodes, and dynamic events and static relationships as edges, such as authentication, network traffic, and file access.
- Surfacing patterns, outliers, and behaviors: We’ll show how to use the resulting graph topology to quickly identify malicious behavior such as reconnaissance scanning and lateral movement. The before/after views give a clear view of how, for both machine and human use, the graph modeling turns seemingly complex correlation rules into obvious graph insights.
- Contextualizing Investigations: Understanding standard security alerts like credential compromises is hard because they require correlating multiple diverse data sources with entirely different kinds of data. That pushes the work onto the analyst to mentally integrate them for understanding the true scope, while graphs solve this almost for free.
- Handling time: Timelining is one of the most fundamental tasks in a security investigation, yet traditional tabular views make it hard to see what is happening when multiple entities are interacting over time. We will show how to solve such temporal multi-dimensional analysis problems for the incident with a few simple graph tricks.

We will introduce an end-to-end framework for transforming security tables into graphs that make complex threats visible at a glance.

Sindre Breda

Police officer turned computer forensic investigator, turned analyst/developer. Sindre started his career as a street cop that quickly switched to computer forensics/mobile forensics with key focus on online child abuse.
From 2018 he worked at the Norwegian "National Criminal Investigation Service", more commonly known as Kripos.
At Kripos he worked with analyzing data that the commercial forensic toolkits did not parse/present, most actively in the investigations of the ransomware attack against Norsk Hydro in 2019. Currently working as a Solutions architect at Graphistry.

Manfred Cheung

Manfred is a visualization engineer at Graphistry with a deep background in graph visualization rendering and experience in visualization design. Previously he was one of the core maintainers of CytoscapeJS - a leading graph visualization library, and of Grafer - a high performance GL visualization library. He co-authored the “Best Paper” at the IEEE VIS 2021 conference for graph approaches to large-scale biomedical knowledge exploration.