Cookies help us display personalized product recommendations and ensure you have great shopping experience.

By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
SmartData CollectiveSmartData Collective
  • Analytics
    AnalyticsShow More
    data mining to find the right poly bag makers
    Using Data Analytics to Choose the Best Poly Mailer Bags
    12 Min Read
    data analytics for pharmacy trends
    How Data Analytics Is Tracking Trends in the Pharmacy Industry
    5 Min Read
    car expense data analytics
    Data Analytics for Smarter Vehicle Expense Management
    10 Min Read
    image fx (60)
    Data Analytics Driving the Modern E-commerce Warehouse
    13 Min Read
    big data analytics in transporation
    Turning Data Into Decisions: How Analytics Improves Transportation Strategy
    3 Min Read
  • Big Data
  • BI
  • Exclusive
  • IT
  • Marketing
  • Software
Search
© 2008-25 SmartData Collective. All Rights Reserved.
Reading: Daedalus, a cyber-attack alert visualization system (incredible video)
Share
Notification
Font ResizerAa
SmartData CollectiveSmartData Collective
Font ResizerAa
Search
  • About
  • Help
  • Privacy
Follow US
© 2008-23 SmartData Collective. All Rights Reserved.
SmartData Collective > IT > Security > Daedalus, a cyber-attack alert visualization system (incredible video)
Security

Daedalus, a cyber-attack alert visualization system (incredible video)

BobGourley
BobGourley
4 Min Read
SHARE

Daedalus is a cyber-attack alert system developed by the Japanese National Institute of Information and Communications Technology (NICT). It provides awe-inspiring visualizations of cyber information. Security professionals will be quick to remind us that any visualization is only as good as the data that feeds it, but this visualization is so cool you have to check it out. My sense is it can really help analysts working real time issues, assuming  well instrumented networks are being monitored.

Daedalus is a cyber-attack alert system developed by the Japanese National Institute of Information and Communications Technology (NICT). It provides awe-inspiring visualizations of cyber information. Security professionals will be quick to remind us that any visualization is only as good as the data that feeds it, but this visualization is so cool you have to check it out. My sense is it can really help analysts working real time issues, assuming  well instrumented networks are being monitored.

Check out the video below 

More Read

cybersecurity measures to prevent data breaches in 2022
Why Are Organizations Focusing on Data Security?
Online Tech Speaks at Data Security Seminar
How the Financial Services Industry Should Use Big Data to Regain Trust
Tactics to Protect Against Most Common Cyber Attacks
It’s Your Life, Starring Your Data

Here is more from: http://www.diginfo.tv/v/12-0116-r-en.php

Daedalus renders attacks on networks visible in real time. The sphere in the center represents the Internet, and the circles moving around it represent networks under observation. The state of an attack is shown using 3D graphics, and can be viewed from any perspective.

“We previously created a system called nicterfor observing cyber-attacks. We also built an observation network in Japan, called the Darknet Observation Network, to cover IP addresses not used in nicter. Now, we’re observing 190,000 IP addresses in Japan. Daedalus is an alert system using that observation network.”

Today’s cyber-attacks breach boundary defenses from inside and outside organizations, including the spread of malware via USB memory sticks and mail attachments, as well as zero-day exploits. So, using Daedalus together with conventional boundary systems is expected to improve network security within organizations.

“The blue part in this organization shows IP addresses that are used, and the black part shows addresses that are not used. This character indicates an alert. When you click on the alert, a message showing the cause appears. In this case, only two packets have been sent. But because the packets go from an address that’s used to an address that’s not used, this indicates that a virus is starting to spread within the organization.”

“If this kind of situation is input to our observation network, we can observe it, and find out things like that. The system automatically sends an alert, saying, ‘This IP address of yours is spreading a virus using this protocol at this time’.”

The technology for this system will be transferred to clwit, which will include it in a commercial alert service called SiteVisor. NICT also provides the system free of charge to educational institutions where nicter sensors can be installed.

This post by BobGourley was first published at CTOvision.com.

Share This Article
Facebook Pinterest LinkedIn
Share

Follow us on Facebook

Latest News

data mining to find the right poly bag makers
Using Data Analytics to Choose the Best Poly Mailer Bags
Analytics Big Data Exclusive
data science importance of flexibility
Why Flexibility Defines the Future of Data Science
Big Data Exclusive
payment methods
How Data Analytics Is Transforming eCommerce Payments
Business Intelligence
cybersecurity essentials
Cybersecurity Essentials For Customer-Facing Platforms
Exclusive Infographic IT Security

Stay Connected

1.2kFollowersLike
33.7kFollowersFollow
222FollowersPin

You Might also Like

Digital Universe Study: The Big Hype

5 Min Read

FedCyber Webinar: The Security Development Lifecycle

0 Min Read
BYOD and security
ITMobilityPrivacySecurity

Mobile Apps, Business Apps and Network Security

6 Min Read
data protection tips
Security

5 Online Security Tips to Protect Your Company from Data Breaches

8 Min Read

SmartData Collective is one of the largest & trusted community covering technical content about Big Data, BI, Cloud, Analytics, Artificial Intelligence, IoT & more.

giveaway chatbots
How To Get An Award Winning Giveaway Bot
Big Data Chatbots Exclusive
AI and chatbots
Chatbots and SEO: How Can Chatbots Improve Your SEO Ranking?
Artificial Intelligence Chatbots Exclusive

Quick Link

  • About
  • Contact
  • Privacy
Follow US
© 2008-25 SmartData Collective. All Rights Reserved.
Go to mobile version
Welcome Back!

Sign in to your account

Username or Email Address
Password

Lost your password?