Network-based Opportunistic Attacks: A Slice in Time

Network-based Opportunistic Attacks: A Slice in Time

Any and every computer connected to the internet is receiving packets from would-be attackers. By simply logging these packets on a few different hosts we can paint a picture of what opportunistic attacks are after on the internet: 1) remote access to the host or data or 2) open relays to bounce off of.

Add a Comment

Login or register to post comments
 
Posted Aug 31, 2012
 
Views: 806
Tags Cyber Security, cybercrime
Tools Python, Tableau
Data No data sets referenced yet.
Share
Embed
<iframe src="http://visualizing.org/embedded/42127" width="620" height="450" frameborder="0" scrolling="no" marginheight="0" marginwidth="0"></iframe>
Need help embedding?