Cookies help us display personalized product recommendations and ensure you have great shopping experience.

By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
SmartData CollectiveSmartData Collective
  • Analytics
    AnalyticsShow More
    predictive analytics risk management
    How Predictive Analytics Is Redefining Risk Management Across Industries
    7 Min Read
    data analytics and gold trading
    Data Analytics and the New Era of Gold Trading
    9 Min Read
    composable analytics
    How Composable Analytics Unlocks Modular Agility for Data Teams
    9 Min Read
    data mining to find the right poly bag makers
    Using Data Analytics to Choose the Best Poly Mailer Bags
    12 Min Read
    data analytics for pharmacy trends
    How Data Analytics Is Tracking Trends in the Pharmacy Industry
    5 Min Read
  • Big Data
  • BI
  • Exclusive
  • IT
  • Marketing
  • Software
Search
© 2008-25 SmartData Collective. All Rights Reserved.
Reading: Daedalus, a cyber-attack alert visualization system (incredible video)
Share
Notification
Font ResizerAa
SmartData CollectiveSmartData Collective
Font ResizerAa
Search
  • About
  • Help
  • Privacy
Follow US
© 2008-23 SmartData Collective. All Rights Reserved.
SmartData Collective > IT > Security > Daedalus, a cyber-attack alert visualization system (incredible video)
Security

Daedalus, a cyber-attack alert visualization system (incredible video)

BobGourley
BobGourley
4 Min Read
SHARE

Daedalus is a cyber-attack alert system developed by the Japanese National Institute of Information and Communications Technology (NICT). It provides awe-inspiring visualizations of cyber information. Security professionals will be quick to remind us that any visualization is only as good as the data that feeds it, but this visualization is so cool you have to check it out. My sense is it can really help analysts working real time issues, assuming  well instrumented networks are being monitored.

Daedalus is a cyber-attack alert system developed by the Japanese National Institute of Information and Communications Technology (NICT). It provides awe-inspiring visualizations of cyber information. Security professionals will be quick to remind us that any visualization is only as good as the data that feeds it, but this visualization is so cool you have to check it out. My sense is it can really help analysts working real time issues, assuming  well instrumented networks are being monitored.

Check out the video below 

More Read

AI and big data
Will Hackers Eventually Use Big Data and AI Against Us?
A 2022 Guide to Zero Trust for Data Protection
The Cyber Power Index
The Impact Of AI On Cybersecurity: Are Humans Still Your Best Asset?
Data Privacy and Internet Safety Tips for College Students

Here is more from: http://www.diginfo.tv/v/12-0116-r-en.php

Daedalus renders attacks on networks visible in real time. The sphere in the center represents the Internet, and the circles moving around it represent networks under observation. The state of an attack is shown using 3D graphics, and can be viewed from any perspective.

“We previously created a system called nicterfor observing cyber-attacks. We also built an observation network in Japan, called the Darknet Observation Network, to cover IP addresses not used in nicter. Now, we’re observing 190,000 IP addresses in Japan. Daedalus is an alert system using that observation network.”

Today’s cyber-attacks breach boundary defenses from inside and outside organizations, including the spread of malware via USB memory sticks and mail attachments, as well as zero-day exploits. So, using Daedalus together with conventional boundary systems is expected to improve network security within organizations.

“The blue part in this organization shows IP addresses that are used, and the black part shows addresses that are not used. This character indicates an alert. When you click on the alert, a message showing the cause appears. In this case, only two packets have been sent. But because the packets go from an address that’s used to an address that’s not used, this indicates that a virus is starting to spread within the organization.”

“If this kind of situation is input to our observation network, we can observe it, and find out things like that. The system automatically sends an alert, saying, ‘This IP address of yours is spreading a virus using this protocol at this time’.”

The technology for this system will be transferred to clwit, which will include it in a commercial alert service called SiteVisor. NICT also provides the system free of charge to educational institutions where nicter sensors can be installed.

This post by BobGourley was first published at CTOvision.com.

Share This Article
Facebook Pinterest LinkedIn
Share

Follow us on Facebook

Latest News

microsoft 365 data migration
Why Data-Driven Businesses Consider Microsoft 365 Migration
Big Data Exclusive
real time data activation
How to Choose a CDP for Real-Time Data Activation
Big Data Exclusive
street address database
Why Data-Driven Companies Rely on Accurate Street Address Databases
Big Data Exclusive
predictive analytics risk management
How Predictive Analytics Is Redefining Risk Management Across Industries
Analytics Exclusive Predictive Analytics

Stay Connected

1.2KFollowersLike
33.7KFollowersFollow
222FollowersPin

You Might also Like

FedCyber Webinar: The Security Development Lifecycle

0 Min Read

Yesterday’s Security vs Today’s Threats

5 Min Read
ai and cybersecurity
Security

Advances in AI Are Driving Major Changes in Cybersecurity

7 Min Read
file sharing errors
Business IntelligenceBusiness RulesITSecurity

Avoid Data-Driven Cyber Attacks By Avoiding These 5 File Sharing Errors

6 Min Read

SmartData Collective is one of the largest & trusted community covering technical content about Big Data, BI, Cloud, Analytics, Artificial Intelligence, IoT & more.

ai chatbot
The Art of Conversation: Enhancing Chatbots with Advanced AI Prompts
Chatbots
giveaway chatbots
How To Get An Award Winning Giveaway Bot
Big Data Chatbots Exclusive

Quick Link

  • About
  • Contact
  • Privacy
Follow US
© 2008-25 SmartData Collective. All Rights Reserved.
Go to mobile version
Welcome Back!

Sign in to your account

Username or Email Address
Password

Lost your password?