Last Updated on September 10, 2015
Finally let’s close this series of posts dedicated to the attack maps made available by security vendors (Part I and Part II) with an additional compilation of more useful resources (once again reported in rigorous alphabetical order).
Despite this time the list is shorter, and the reported visualization tools are not as spectacular as the previous ones (but you will find one of them particularly funny), they are equally useful to understand the threat landscape and to rise awareness on the level of activity that happens daily on the internet.
In addition to its own map, Akamai also proposes this additional visualization tool that shows the most recent 5000 DDoS attacks mitigated by Akamai. Despite the rendering is not particularly smooth, and zooming has a strange multiplication effect, the map allows to customize the view by zooming in or out. It is also possible to turn off cluster data, lines, source and/or destination. Scrolling down the page, will show two more interesting charts representing the country rankings and the attack types.
Radware offers a map showing the most recent DDoS attacks worldwide. Each red dot represents a cluster of attacks occurred in a certain macro region of the globe: clicking on it, will drill down into the specific attacks happened in that region. It is also possible to click on each single attack to reveal further details such as: type of attack (network or application), the specific target vertical, the vector and, when available, also the tool used to carry on the attack.
Team Cymru has built his own threat map in movie form, representing a daily snapshot of malicious activity worldwide over various recent periods of time. The map is updated daily and the intensity of the activity is shown in “heatmap” style, with the color gradient reflecting the level of threat. The same page contains an additional map representing a summary of malicious activity seen on the Internet over the past 30 days, mapping the IP space using a Hilbert Curve.
Why should security vendors be the only ones allowed to use silly, animated visualizations to “compensate”? Now, you can have your very own IP attack map that’s just as useful as everyone else’s.
I hope you enjoyed this additional compilation. Of course fell free to reach me out in case you are aware of additional visualization tools that deserve to be added.