ATTENTION: You are viewing a page formatted for mobile devices; to view the full web page, click HERE.

Main Area and Open Discussion > Living Room

Project Honeynet's HoneyMap displays cyberattacks in real time

(1/3) > >>

40hz:
This is pretty interesting. Project Honeynet has just put up a realtime visualization of cyberattacks on locations which are hosting one or more of the project's passive sensor tools. The visualization doesn't necessarily show "targeted" (i.e. human directed against a specific target) attacks. But it does show suspicious scanning and other activities detected by their sensors. Most are likely to be automated vulnerability scans. But it does provide a sense of just how prevalent vulnerability probing is considering the relatively small number of networks that are involved with Project Honeynet compared to the total number of networks out there.

Check out their website for full details.

Link to Project Honeynet homepage here.

Direct link to the HoneyMap is here.

Here's a screenshot taken around 10:15 EST.

Project Honeynet's HoneyMap displays cyberattacks in real time


The HoneyMap shows a real-time visualization of attacks against the Honeynet Project's sensors deployed around the world. It leverages the internal data sharing protocol hpfeeds as its data source. Read this post to learn about the technical details and frequently asked questions. Before going into explanations, take a look at the map itself: map.honeynet.org!

We have seen attack visualizations for quite some time in various forms and availabilities. So far, we only had a GTK canvas based solution and a project around Google Earth and WebGL that would show attacks against our honeypot systems. The most awesome related projects are coming from our Australian folks (thanks Ben) - make sure to take a look at their site.

Despite earlier nice approaches, a pure web based one that could easily be shared was not existing. With better abstractions, more libraries and cool HTML5/CSS3 stuff becoming available for web browsers, Florian decided to try a similar visualization that could be made available as a service without any setup requirements. After the first initial proof-of-concept code, we decided to throw some real data onto the map.

Internally, the Honeynet Project uses hpfeeds for collecting data from honeypots and sharing it across different analysis components and data storage setups. Thus, we added hpfeeds support to our map back-end and translated all IP addresses of our events to geographic locations through the MaxMind IP geolocation. After a short while we had a real-time event visualization that used our already existing honeypot data - and it looked awesome!
--- End quote ---

Renegade:
That's really cool. Sad that it's needed, but still pretty cool.

Stoic Joker:
That would be a great visual for a client that didn't think hacking was real problem.

mouser:
would make a nice screensaver..

Stoic Joker:
would make a nice screensaver..-mouser (October 05, 2012, 12:04 PM)
--- End quote ---

That is tempting, but I don't think there is enough movement.

Navigation

[0] Message Index

[#] Next page

Go to full version