An Additional Compilation of Attack Maps (Including a Tool to Build Your Own)

Finally let’s close this series of posts dedicated to the attack maps made available by security vendors (Part I and Part II) with an additional compilation of more useful resources (once again reported in rigorous alphabetical order).

Despite this time the list is shorter, and the reported visualization tools are not as spectacular as the previous ones (but you will find one of them particularly funny), they are equally useful to understand the threat landscape and to rise awareness on the level of activity that happens daily on the internet.


[State of the internet] Powered by Akamai

State of the internet
[State of the internet] Powered by Akamai

In addition to its own map, Akamai also proposes this additional visualization tool that shows the most recent 5000 DDoS attacks mitigated by Akamai. Despite the rendering is not particularly smooth, and zooming has a strange multiplication effect, the map allows to customize the view by zooming in or out. It is also possible to turn off cluster data, lines, source and/or destination. Scrolling down the page, will show two more interesting charts representing the country rankings and the attack types.


Radware Current DDoS Attacks

Radware Current DDoS Attacks
Radware Current DDoS Attacks

Radware offers a map showing the most recent DDoS attacks worldwide. Each red dot represents a cluster of attacks occurred in a certain macro region of the globe: clicking on it, will drill down into the specific attacks happened in that region. It is also possible to click on each single attack to reveal further details such as: type of attack (network or application), the specific target vertical, the vector and, when available, also the tool used to carry on the attack.


Team Cymru World Map

Team Cymru
Team Cymru World Map

Team Cymru has built his own threat map in movie form, representing a daily snapshot of malicious activity worldwide over various recent periods of time. The map is updated daily and the intensity of the activity is shown in “heatmap” style, with the color gradient reflecting the level of threat. The same page contains an additional map representing a summary of malicious activity seen on the Internet over the past 30 days, mapping the IP space using a Hilbert Curve.


And last but not least… Build your own attack map with IPew

pewpew
IPew Attack Map

Why should security vendors be the only ones allowed to use silly, animated visualizations to “compensate”? Now, you can have your very own IP attack map that’s just as useful as everyone else’s.

IPew is a D3 / javascript visualization framework that lets everybody build his own threat map, using a custom dataset, but with a very particular feature: the ability to add sound effects, such as: Star Wars, Star Trek, WarGames, Babylon 5, a classic arcade sound, and… Somewhat disturbing human-made “pew-pew” sound (SIC). The outcome is really funny and Threatbutt is an example of what can be done with Ipew (but turn off your computer’s speaker before opening the link… Oh no! Too late!).


I hope you enjoyed this additional compilation. Of course fell free to reach me out in case you are aware of additional visualization tools that deserve to be added.

Leave a Reply

%d bloggers like this: