Welcome!

News Feed Item

ADDING MULTIMEDIA OpenDNS Open Sources 3D Security Visualization Engine for Big Data

OpenDNS, a leading provider of cloud-delivered security, today announced that it has released OpenGraphiti, an interactive open source data visualization engine. OpenGraphiti enables security analysts, researchers and data scientists to pair visualization and Big Data to create 3D representations of threats. Much like virologists use known patterns of diseases to recognize a particular virus, OpenGraphiti can uncover sophisticated behaviors and relationships associated with cyber-attacks.

OpenDNS will demonstrate OpenGraphiti at Black Hat USA booth 964. In addition, OpenGraphiti’s creator, OpenDNS security researcher Thibault Reuille, and OpenDNS senior security research lead Andrew Hay, will present a session on the engine at Mandalay Bay tomorrow at 2:15PM PT in the Jasmine Ballroom.

CLICK TO TWEET: .@opendns releases open source data visualization engine for #infosec analysts, researchers and data scientists at #BHUSA http://bit.ly/WXuQMX

Seeing is Better than Reading

Research has proven that many people process information more efficiently when it is presented in visual rather than text form. According to one study, the human retina can transmit data at roughly the rate of an Ethernet connection. The OpenGraphiti engine enables 2D and 3D visualization of data by harnessing the computational power of both CPUs[1] and GPUs[2], a technique most commonly seen in the video game industry. The engine allows for the visualization of any data, however loosely related, in a medium that is easy to generate, navigate and articulate.

The OpenGraphiti engine and methodologies have been used by OpenDNS to analyze many threats including Cryptolocker and CryptoDefense ransomware, Red October malware, and the Kelihos botnet. It has even provided visualization to trace specific Syrian Electronic Army (SEA) campaigns.

Cryptolocker Use Case

Last year, OpenDNS used OpenGraphiti to detect the Cryptolocker ransomware and block it before it could affect customers. Cryptolocker casts a vast, yet predictable, DGA[3] “net” of domains which, when visualized, show an immediately identifiable interconnected pattern. Despite the fact the Cryptolocker DGAs changed and evolved, OpenGraphiti was able to visually trace their underlying replication scheme, identify future outbreaks and block them.

“We are open sourcing OpenGraphiti to lower the barrier to entry for those looking to visualize complex related data sets,” said Dan Hubbard, CTO of OpenDNS. “Combining intelligent data mining techniques with smart data visualization is the key to detecting and blocking complex attacks before they can cause damage.”

Availability

OpenGraphiti is available immediately from OpenDNS. Please visit www.opengraphiti.com for more information.

Resources

OpenGraphiti Overview: http://www.opengraphiti.com/

OpenGraphiti Screenshot: http://www.opengraphiti.com/gallery/cryptolocker-bfs4.png

OpenGraphiti Video: https://www.youtube.com/watch?v=TE9qsYBu8MM

Supporting Quotes

“OpenGraphiti projects complex data into a three-dimensional space, enabling the user to quickly and easily spot patterns and anomalies in their data.”

- Jay Jacobs, Co-Author of Data-Driven Security: Analysis, Visualization and Dashboards.

“It is hard to find tools that help visualize large datasets. OpenGraphiti scales quite well and its open architecture allows users to expand the engine with their own capabilities. We need more tools like this that help users gain deeper insight into their data.”

- Raffael Marty, CEO at Pixlcloud and author of Applied Security Visualization.

About OpenDNS

OpenDNS is a leading provider of network security and DNS services, enabling the world to connect to the Internet with confidence on any device, anywhere, anytime. The Umbrella cloud-delivered network security service blocks advanced attacks, as well as malware, botnets and phishing threats regardless of port, protocol or application. Its predictive intelligence uses machine learning to automate protection against emergent threats before they can reach customers. OpenDNS protects all devices globally without hardware to install or software to maintain. For more information, please visit: www.opendns.com.

[1] Central Processing Unit

[2] Graphical Processing Unit

[3] Domain Generation Algorithms are used by malware to periodically generate a large number of domain names that can be used as rendezvous points with their controllers.

More Stories By Business Wire

Copyright © 2009 Business Wire. All rights reserved. Republication or redistribution of Business Wire content is expressly prohibited without the prior written consent of Business Wire. Business Wire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

Latest Stories
You think you know what’s in your data. But do you? Most organizations are now aware of the business intelligence represented by their data. Data science stands to take this to a level you never thought of – literally. The techniques of data science, when used with the capabilities of Big Data technologies, can make connections you had not yet imagined, helping you discover new insights and ask new questions of your data. In his session at @ThingsExpo, Sarbjit Sarkaria, data science team lead ...
Much of the value of DevOps comes from a (renewed) focus on measurement, sharing, and continuous feedback loops. In increasingly complex DevOps workflows and environments, and especially in larger, regulated, or more crystallized organizations, these core concepts become even more critical. In his session at @DevOpsSummit at 18th Cloud Expo, Andi Mann, Chief Technology Advocate at Splunk, will show how, by focusing on 'metrics that matter,' you can provide objective, transparent, and meaningfu...
Struggling to keep up with increasing application demand? Learn how Platform as a Service (PaaS) can streamline application development processes and make resource management easy.
If there is anything we have learned by now, is that every business paves their own unique path for releasing software- every pipeline, implementation and practices are a bit different, and DevOps comes in all shapes and sizes. Software delivery practices are often comprised of set of several complementing (or even competing) methodologies – such as leveraging Agile, DevOps and even a mix of ITIL, to create the combination that’s most suitable for your organization and that maximize your busines...
In his session at @ThingsExpo, Chris Klein, CEO and Co-founder of Rachio, will discuss next generation communities that are using IoT to create more sustainable, intelligent communities. One example is Sterling Ranch, a 10,000 home development that – with the help of Siemens – will integrate IoT technology into the community to provide residents with energy and water savings as well as intelligent security. Everything from stop lights to sprinkler systems to building infrastructures will run ef...
SYS-CON Events announced today that Peak 10, Inc., a national IT infrastructure and cloud services provider, will exhibit at SYS-CON's 18th International Cloud Expo®, which will take place on June 7-9, 2016, at the Javits Center in New York City, NY. Peak 10 provides reliable, tailored data center and network services, cloud and managed services. Its solutions are designed to scale and adapt to customers’ changing business needs, enabling them to lower costs, improve performance and focus inter...
In the world of DevOps there are ‘known good practices’ – aka ‘patterns’ – and ‘known bad practices’ – aka ‘anti-patterns.' Many of these patterns and anti-patterns have been developed from real world experience, especially by the early adopters of DevOps theory; but many are more feasible in theory than in practice, especially for more recent entrants to the DevOps scene. In this power panel at @DevOpsSummit at 18th Cloud Expo, moderated by DevOps Conference Chair Andi Mann, panelists will dis...
Up until last year, enterprises that were looking into cloud services usually undertook a long-term pilot with one of the large cloud providers, running test and dev workloads in the cloud. With cloud’s transition to mainstream adoption in 2015, and with enterprises migrating more and more workloads into the cloud and in between public and private environments, the single-provider approach must be revisited. In his session at 18th Cloud Expo, Yoav Mor, multi-cloud solution evangelist at Cloudy...
Artificial Intelligence has the potential to massively disrupt IoT. In his session at 18th Cloud Expo, AJ Abdallat, CEO of Beyond AI, will discuss what the five main drivers are in Artificial Intelligence that could shape the future of the Internet of Things. AJ Abdallat is CEO of Beyond AI. He has over 20 years of management experience in the fields of artificial intelligence, sensors, instruments, devices and software for telecommunications, life sciences, environmental monitoring, process...
Increasing IoT connectivity is forcing enterprises to find elegant solutions to organize and visualize all incoming data from these connected devices with re-configurable dashboard widgets to effectively allow rapid decision-making for everything from immediate actions in tactical situations to strategic analysis and reporting. In his session at 18th Cloud Expo, Shikhir Singh, Senior Developer Relations Manager at Sencha, will discuss how to create HTML5 dashboards that interact with IoT devic...
See storage differently! Storage performance problems have only gotten worse and harder to solve as applications have become largely virtualized and moved to a cloud-based infrastructure. Storage performance in a virtualized environment is not just about IOPS, it is about how well that potential performance is guaranteed to individual VMs for these apps as the number of VMs keep going up real time. In his session at 18th Cloud Expo, Dhiraj Sehgal, in product and marketing at Tintri, will discu...
So, you bought into the current machine learning craze and went on to collect millions/billions of records from this promising new data source. Now, what do you do with them? Too often, the abundance of data quickly turns into an abundance of problems. How do you extract that "magic essence" from your data without falling into the common pitfalls? In her session at @ThingsExpo, Natalia Ponomareva, Software Engineer at Google, will provide tips on how to be successful in large scale machine lear...
SYS-CON Events announced today that SoftLayer, an IBM Company, has been named “Gold Sponsor” of SYS-CON's 18th Cloud Expo, which will take place on June 7-9, 2016, at the Javits Center in New York, New York. SoftLayer, an IBM Company, provides cloud infrastructure as a service from a growing number of data centers and network points of presence around the world. SoftLayer’s customers range from Web startups to global enterprises.
The IoTs will challenge the status quo of how IT and development organizations operate. Or will it? Certainly the fog layer of IoT requires special insights about data ontology, security and transactional integrity. But the developmental challenges are the same: People, Process and Platform. In his session at @ThingsExpo, Craig Sproule, CEO of Metavine, will demonstrate how to move beyond today's coding paradigm and share the must-have mindsets for removing complexity from the development proc...
SYS-CON Events announced today that Ericsson has been named “Gold Sponsor” of SYS-CON's @ThingsExpo, which will take place on June 7-9, 2016, at the Javits Center in New York, New York. Ericsson is a world leader in the rapidly changing environment of communications technology – providing equipment, software and services to enable transformation through mobility. Some 40 percent of global mobile traffic runs through networks we have supplied. More than 1 billion subscribers around the world re...