Cookies help us display personalized product recommendations and ensure you have great shopping experience.

By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
SmartData CollectiveSmartData Collective
  • Analytics
    AnalyticsShow More
    media monitoring
    Signals In The Noise: Using Media Monitoring To Manage Negative Publicity
    5 Min Read
    data analytics
    How Data Analytics Can Help You Construct A Financial Weather Map
    4 Min Read
    financial analytics
    Financial Analytics Shows The Hidden Cost Of Not Switching Systems
    4 Min Read
    warehouse accidents
    Data Analytics and the Future of Warehouse Safety
    10 Min Read
    stock investing and data analytics
    How Data Analytics Supports Smarter Stock Trading Strategies
    4 Min Read
  • Big Data
  • BI
  • Exclusive
  • IT
  • Marketing
  • Software
Search
© 2008-25 SmartData Collective. All Rights Reserved.
Reading: Daedalus, a cyber-attack alert visualization system (incredible video)
Share
Notification
Font ResizerAa
SmartData CollectiveSmartData Collective
Font ResizerAa
Search
  • About
  • Help
  • Privacy
Follow US
© 2008-23 SmartData Collective. All Rights Reserved.
SmartData Collective > IT > Security > Daedalus, a cyber-attack alert visualization system (incredible video)
Security

Daedalus, a cyber-attack alert visualization system (incredible video)

BobGourley
BobGourley
4 Min Read
SHARE

Daedalus is a cyber-attack alert system developed by the Japanese National Institute of Information and Communications Technology (NICT). It provides awe-inspiring visualizations of cyber information. Security professionals will be quick to remind us that any visualization is only as good as the data that feeds it, but this visualization is so cool you have to check it out. My sense is it can really help analysts working real time issues, assuming  well instrumented networks are being monitored.

Daedalus is a cyber-attack alert system developed by the Japanese National Institute of Information and Communications Technology (NICT). It provides awe-inspiring visualizations of cyber information. Security professionals will be quick to remind us that any visualization is only as good as the data that feeds it, but this visualization is so cool you have to check it out. My sense is it can really help analysts working real time issues, assuming  well instrumented networks are being monitored.

Check out the video below 

More Read

email threat landscape
Role Of Predictive Analytics In The Shifting Email Threat Landscape
How Hackers Use SSL Strip to Obtain Secure Passwords [VIDEO]
An Analysis of A NASA Dbase Hack-and-Dump
Fortifying Enterprise Digital Security Against Hackers Weaponizing AI
AI Underscores Passwordless Authentication Risks for Internet Users

Here is more from: http://www.diginfo.tv/v/12-0116-r-en.php

Daedalus renders attacks on networks visible in real time. The sphere in the center represents the Internet, and the circles moving around it represent networks under observation. The state of an attack is shown using 3D graphics, and can be viewed from any perspective.

“We previously created a system called nicterfor observing cyber-attacks. We also built an observation network in Japan, called the Darknet Observation Network, to cover IP addresses not used in nicter. Now, we’re observing 190,000 IP addresses in Japan. Daedalus is an alert system using that observation network.”

Today’s cyber-attacks breach boundary defenses from inside and outside organizations, including the spread of malware via USB memory sticks and mail attachments, as well as zero-day exploits. So, using Daedalus together with conventional boundary systems is expected to improve network security within organizations.

“The blue part in this organization shows IP addresses that are used, and the black part shows addresses that are not used. This character indicates an alert. When you click on the alert, a message showing the cause appears. In this case, only two packets have been sent. But because the packets go from an address that’s used to an address that’s not used, this indicates that a virus is starting to spread within the organization.”

“If this kind of situation is input to our observation network, we can observe it, and find out things like that. The system automatically sends an alert, saying, ‘This IP address of yours is spreading a virus using this protocol at this time’.”

The technology for this system will be transferred to clwit, which will include it in a commercial alert service called SiteVisor. NICT also provides the system free of charge to educational institutions where nicter sensors can be installed.

This post by BobGourley was first published at CTOvision.com.

Share This Article
Facebook Pinterest LinkedIn
Share

Follow us on Facebook

Latest News

data security issues with annotation outsourcing
Data Annotation Outsourcing and Risk Mitigation Strategies
Big Data Exclusive Security
NO-CODE
Breaking down SPARC Emulation Technology: Zero Code Re-write
Exclusive News Software
online business using analytics
Why Some Businesses Seem to Win Online Without Ever Feeling Like They Are Trying
Exclusive News
edi compliance with AI
AI Is Transforming EDI Compliance Services
Exclusive News

Stay Connected

1.2KFollowersLike
33.7KFollowersFollow
222FollowersPin

You Might also Like

IoT Security
ExclusiveInternet of ThingsSecurity

Ensuring Cybersecurity When Rolling Out IoT Across Your Business Operations

8 Min Read
smart home technology makes homes more secure
Security

Surprising Benefits of Smart Technology for Home Security

5 Min Read
AI and cybersecurity
Artificial Intelligence

AI Leads to Powerful New Fraud Detection Software for E-commerce

5 Min Read

Evolving Approaches to Cyber Threats

4 Min Read

SmartData Collective is one of the largest & trusted community covering technical content about Big Data, BI, Cloud, Analytics, Artificial Intelligence, IoT & more.

ai chatbot
The Art of Conversation: Enhancing Chatbots with Advanced AI Prompts
Chatbots
ai is improving the safety of cars
From Bolts to Bots: How AI Is Fortifying the Automotive Industry
Artificial Intelligence

Quick Link

  • About
  • Contact
  • Privacy
Follow US
© 2008-25 SmartData Collective. All Rights Reserved.
Welcome Back!

Sign in to your account

Username or Email Address
Password

Lost your password?