Post on 14-Feb-2017
© 2016 Aptima, Inc.
Mapping Virtual Traffic in Real Space
and Time
Ryan MullinsCaroline Ziemkiewicz
Adam Fouse
© 2016 Aptima, Inc. 2
The Problem
§ Computer networks are everywhere… and vulnerable– Sony Hack– OPM Breach– DNC Hack
§ Different threats effecting information– Confidentiality: data exfiltration– Integrity: man-in-the-middle– Availability: denial of service
§ Real-time defense is possible– Adapt to availability threats– Lack decision support systems enabling response
© 2016 Aptima, Inc. 3
The Goal
Help network defenders see where, how, and why networks are being effected
Needs
o Where are network nodes? o How are nodes connected?o How far apart are nodes?o Which nodes are impacted?o How are nodes impacted?
Challenges
o Lots of nodeso Lots of connections
o Sub-networkso Routing possibilities
© 2016 Aptima, Inc. 4
Click to edit Master title styleThe Inspiration
http://www.nytimes.com/imagepages/2007/03/17/nyregion/nyregionspecial2/20070318_TRAIN_GRAPHIC.html
© 2016 Aptima, Inc. 5
The Creation
© 2016 Aptima, Inc. 6
Click to edit Master title style
§ Good– Salient representation of
logical structure– Persistent picture as
nodes “change”– Deterministic layout
§ Not-so-good– Logical >> Spatial– Overt bearing info is
irrelevant– Needs more spatial
context (i.e., terrain)– Multi-path representation– Sub-network exploration
The Feedback
© 2016 Aptima, Inc.
Ryan Mullins | Research EngineerLead, Interactive Intelligent Systemsrmullins@aptima.comDirect: 781-496-2452
Aptima, Inc. | www.aptima.com12 Gill Street, Suite 1400Woburn, MA 01801
The research reported in this presentation was performed in connection with contract #FA8750-15-C-0210 with the U.S. Air Force Research Laboratory. The views and conclusions contained in this presentation are those of the authors and should not be interpreted as presenting the official policies or position, either expressed or implied, of the U.S. Air Force Research Laboratory or the U.S. Government unless so designated by other authorized documents.