• Skip to primary navigation
  • Skip to main content
  • Skip to footer

Cisco Umbrella

Enterprise network security

  • Contact Sales
  • Login
    • Umbrella Login
    • Cloudlock Login
  • Why Us
    • Why Cisco Umbrella
      • Why Try Umbrella
      • Why DNS Security
      • Why Umbrella SASE
      • Our Customers
      • Customer Stories
      • Why Cisco Secure
    • Fast Reliable Cloud
      • Global Cloud Architecture
      • Cloud Network Status
      • Global Cloud Network Activity
    • Unmatched Intelligence
      • A New Approach to Cybersecurity
      • Interactive Intelligence
      • Cyber Attack Prevention
      • Umbrella and Cisco Talos Threat Intelligence
    • Extensive Integrations
      • IT Security Integrations
      • Hardware Integrations
      • Meraki Integration
      • Cisco Umbrella and SecureX
  • Products
    • Cisco Umbrella Products
      • Cisco Umbrella Cloud Security Service
      • Recursive DNS Services
      • Cisco Umbrella SIG
      • Umbrella Investigate
      • What’s New
    • Product Packages
      • Cisco Umbrella Package Comparison
      • – DNS Security Essentials Package
      • – DNS Security Advantage Package
      • – SIG Essentials Package
      • – SIG Advantage Package
      • Umbrella Support Packages
    • Functionality
      • DNS-Layer Security
      • Secure Web Gateway
      • Cloud Access Security Broker (CASB)
      • Cloud Data Loss Prevention (DLP)
      • Cloud-Delivered Firewall
      • Cloud Malware Protection
      • Remote Browser Isolation (RBI)
    • Man on a laptop with headphones on. He is attending a Cisco Umbrella Live Demo
  • Solutions
    • SASE & SSE Solutions
      • Cisco Umbrella SASE
      • Secure Access Service Edge (SASE)
      • What is SASE
      • What is Security Service Edge (SSE)
    • Functionality Solutions
      • Web Content Filtering
      • Secure Direct Internet Access
      • Shadow IT Discovery & App Blocking
      • Fast Incident Response
      • Unified Threat Management
      • Protect Mobile Users
      • Securing Remote and Roaming Users
    • Network Solutions
      • Guest Wi-Fi Security
      • SD-WAN Security
      • Off-Network Endpoint Security
    • Industry Solutions
      • Government and Public Sector Cybersecurity
      • Financial Services Security
      • Cybersecurity for Manufacturing
      • Higher Education Security
      • K-12 Schools Security
      • Healthcare, Retail and Hospitality Security
      • Enterprise Cloud Security
      • Small Business Cybersecurity
  • Resources
    • Content Library
      • Top Resources
      • Cybersecurity Webinars
      • Events
      • Research Reports
      • Case Studies
      • Videos
      • Datasheets
      • eBooks
      • Solution Briefs
    • International Documents
      • Deutsch/German
      • Español/Spanish
      • Français/French
      • Italiano/Italian
      • 日本語/Japanese
    • For Customers
      • Support
      • Customer Success Webinars
      • Cisco Umbrella Studio
    • Get the 2022 Cloud Scurity Comparison Guide
  • Trends & Threats
    • Market Trends
      • Hybrid Workforce
      • Rise of Remote Workers
      • Secure Internet Gateway (SIG)
    • Security Threats
      • How to Stop Phishing Attacks
      • Malware Detection and Protection
      • Ransomware is on the Rise
      • Cryptomining Malware Protection
      • Cybersecurity Threat Landscape
      • Global Cyber Threat Intelligence
      • Cyber Threat Categories and Definitions
    •  
    • Woman connecting confidently to any device anywhere
  • Partners
    • Channel Partners
      • Partner Program
      • Become a Partner
    • Service Providers
      • Secure Connectivity
      • Managed Security for MSSPs
      • Managed IT for MSPs
    •  
    • Person looking down at laptop. They are connecting and working securely
  • Blog
    • News & Product Posts
      • Latest Posts
      • Products & Services
      • Customer Focus
      • Feature Spotlight
    • Cybersecurity Posts
      • Security
      • Threats
      • Cybersecurity Threat Spotlight
      • Research
    •  
    • Register for a webinar - with illustration of connecting securely to the cloud
  • Contact Us
  • Umbrella Login
  • Cloudlock Login
  • Free Trial
Research

Networks in Space: When data goes supernova

By Thibault Reuille
Posted on August 13, 2013
Updated on July 23, 2020

Share

FacebookTweetLinkedIn

The universe is big, mysterious and full of secrets.

Every day, servers exchange enormous amounts of data. Usually, this data is kept and archived for a defined period of time. As we store more and more information, our desire to understand its behavior grows. The reason is simple: knowledge is powerful. So, if we identify a pattern in our past, we master the present – then we can predict the future.

Today’s data scientists are the modern oracles, always trying to discover ingenious ways to analyze information in order to identify new patterns and anomalies. Just like the first astronomers raised their eyes to the sky and clouds to predict the seasons, we are constantly analyzing a deluge of digital messages to monitor the general state of the system. It is crucial to step back and take a look at the big picture and understand that abstraction is the key to mastering the present. 

Visualize the universe

When it comes to patterns, semantic graphs are one of the most beautiful data structures out there. They can represent anything and can be applied to a wide range of problems, from social networks to artificial brains. Graph nodes can define any type of information and edges can model arbitrary connections between them.

Sure, it sounds simple in theory, but in practice we are dealing with billions and billions of nodes and edges! When it comes to visualization, there is a tremendous challenge in building an engine that can handle the vast amount of data that the universe holds. Even more importantly, the graph has to be dynamic and constantly changing over time. The goal is to build a robust and stable tool to establish, try, and confirm our hypotheses.

How does it work? The engine recreates a physical force system where connected nodes attract each other and disconnected nodes repulse each other. At first, all the nodes are placed at approximately the same position, forming a point of high density. Of course, at this stage it’s still impossible to see anything clearly. But then, we heat the node particles at a high temperature and let the physics engine do the rest!

Temperature creates a random particle movement and the messy network structure expands in space at high speed, throwing nodes in every direction.

That’s right, an explosion of data!

After this stage, the structure progressively reaches equilibrium. This is the true beauty of this method: we artificially reimplemented a natural force directed system and therefore natural structures emerge. We cool down the temperature progressively and as the particle acceleration decreases, the network structure crystallizes.

Demonstration

Since a picture is worth a thousand words, we’re sharing with you a WebGL application and a couple of screenshots of our visualization tool to illustrate this algorithm.

You may note that the process has been intentionally slowed down to make the attraction-repulsion forces more obvious. 

Controls:

  • Click play to start animation
  • Navigate with the mouse and keyboard arrows
  • Double click on a node to zoom in and target a node
  • Click anywhere to go back to FPS view
  • Select various display modes in the menu

NOTE: The engine may take a while to load, please be patient.

Umbrella Security Graph Data Sets

Using this visualization method, we can process the massive amounts of data flowing into to the Umbrella Security Graph at any given time – watching for new malicious patterns or any other unusual activity. It’s always interesting to navigate around certain unknown domains, exploring their infected neighbors to determine the likelihood of the domains becoming compromised as well. Below, you will see actual data sets extracted from the Umbrella Security Graph database, representing relationships between domains.

Domain neighborhood with a depth of 3 :

1

Domain neighborhood with a depth of 4 :

3
5
4

References :

https://en.wikipedia.org/wiki/Force-directed_graph_drawing

Previous Post:

Previous Article

Next Post:

Next Article

Follow Us

  • Twitter
  • Facebook
  • LinkedIn
  • YouTube

Footer Sections

What we make

  • Cloud Security Service
  • DNS-Layer Network Security
  • Secure Web Gateway
  • Security Packages

Who we are

  • Global Cloud Architecture
  • Cloud Network Status
  • Cloud Network Activity
  • OpenDNS is now Umbrella
  • Cisco Umbrella Blog

Learn more

  • Webinars
  • Careers
  • Support
  • Cisco Umbrella Live Demo
  • Contact Sales
Umbrella by Cisco
208.67.222.222+208.67.220.220
2620:119:35::35+2620:119:53::53
Sign up for a Free Trial
  • Cisco Online Privacy Statement
  • Terms of Service
  • Sitemap

© 2023 Cisco Umbrella