Map of cyber attacks

Discussion in 'Science and Technology' started by farmkid, Jun 30, 2014.

  1. farmkid

    farmkid Commodore Commodore

    Joined:
    Jun 1, 2005
    A website has published a real-time map of cyber attacks as they happen. First of all, it's fascinating to watch what's going on on line. As you sit and stare at it, every so often you'll see a mass of attacks all directed at one location, perhaps coming from one location or from all over the world. Like this:
    [​IMG]

    It usually looks more like this:
    [​IMG]

    I have to wonder, though, how does this website get the information it's displaying? Or are they just making it up?
     
  2. Spider

    Spider Dirty Old Man Premium Member

    Joined:
    May 23, 2004
    Location:
    Lost in time
    Most large data centers have folks who monitor internet traffic and watch for attacks on the local company network with commercial software. Also, there are internet appliances you stick not only inside your network, but in your DMZ that have really cool interfaces like this one to monitor what's coming into your network from the outside internet.

    The software at that site would have to be powerful (not to mention their actual computing power) to do this real time. I'm sure it exists, you know damn well our government has this stuff, and it's probably much better.
     
  3. Haggis and tatties

    Haggis and tatties Vice Admiral Admiral

    Joined:
    Dec 27, 2002
    Location:
    Glasgow
    Reminds me of War games.
     
  4. publiusr

    publiusr Admiral Admiral

    Joined:
    Mar 22, 2010
    Location:
    publiusr
  5. Amaris

    Amaris Guest

    That is way too cool! I mean, not the attacks, but the monitoring software. That is awesome.
     
  6. Random_Spock

    Random_Spock Vice Admiral Admiral

    Joined:
    Sep 4, 2009
    Location:
    Random_Spock
    Yea it is. It's one good way of keeping an eye on those SOB's.

    Ran into some issues with Echtel before on my laptop -_-. VERY annoying they are.
     
  7. Dryson

    Dryson Commodore Commodore

    Joined:
    Apr 13, 2014
    You may not be able to counter - hack a password hacker or data miner that hacks into networks to steal passwords....but you can leave behind nasty little psychological counter-hacks in the form of passwords.

    One such password would be "Imgettinintoyourheadagain", or "Stillhacking", "Iknowwhereyougotoschool", "Icanseeyourreflectioninthemirrorasyouaredriving", "Iknowyourtaxicabsroute", etc. that are passive by theirself but when sifted through by hackers selling the data will be like a trip wire across the path that causes a grenade to go off.
     
    Last edited: Jul 25, 2014
  8. Dryson

    Dryson Commodore Commodore

    Joined:
    Apr 13, 2014
    Network Working Group R. Vida, Ed.
    Request for Comments: 3810 L. Costa, Ed.
    Updates: 2710 LIP6
    Category: Standards Track June 2004


    Multicast Listener Discovery Version 2 (MLDv2) for IPv6

    Status of this Memo

    This document specifies an Internet standards track protocol for the
    Internet community, and requests discussion and suggestions for
    improvements. Please refer to the current edition of the "Internet
    Official Protocol Standards" (STD 1) for the standardization state
    and status of this protocol. Distribution of this memo is unlimited.

    Copyright Notice

    Copyright (C) The Internet Society (2004).

    Abstract

    This document updates RFC 2710, and it specifies Version 2 of the
    Multicast Listener Discovery Protocol (MLDv2). MLD is used by an
    IPv6 router to discover the presence of multicast listeners on
    directly attached links, and to discover which multicast addresses
    are of interest to those neighboring nodes. MLDv2 is designed to be
    interoperable with MLDv1. MLDv2 adds the ability for a node to
    report interest in listening to packets with a particular multicast
    address only from specific source addresses or from all sources
    except for specific source addresses.


    Basically a Remote Monitoring Program that is using technology to record all screen activities as if the other person was sitting in the same room with me watching my monitor?
     
  9. Kemaiku

    Kemaiku Admiral Admiral

    Joined:
    Dec 23, 2004
    Location:
    Northern Ireland
  10. rhubarbodendron

    rhubarbodendron Vice Admiral Admiral

    Joined:
    May 1, 2011
    Location:
    milky way, outer spiral arm, Sol 3
    If they added the NSA's activities the screen would explode :D