Visual DDoS Representation and Its Ramifications 104
winterbc writes "Prolexic has a report on Zombie infections that bring a visual representation of a DDoS attack. Besides being a rather cool picture, it brings to mind a possible future of personal computing. I would love to see a real-time picture of my 'net connections as my desktop picture, allowing me to change my 'net habits based on what I see. For example, I can download new images from the OPTE Project and set my desktop that way, but a more individual pathway highlighted with my favorite color could happen someday. My point is that while DDoS are painfully ubiquitous today, tomorrow visual mapping in real-time could be a path to the source of the problem."
In the future will we have net traffic reports? (Score:5, Insightful)
isn't the whole point that there's redundancy and stuff to make things reliable and invisible to the end user?
time spent visualising problems is a total waste unless you use it to stop the problem happening again. and prevention is better than cure.
What's the surprise? (Score:3, Insightful)
What is surprising is the European zombie count is higher than that of the United States. I wonder why.
DDoS protection (Score:2, Insightful)
Re:LOL... (Score:3, Insightful)
Re:Relevant info missing (Score:4, Insightful)
Along that same line of thought... (Score:3, Insightful)
Re:And what is being done about this? (Score:3, Insightful)
Finding out who these people are isn't hard, we often know who they are, and even where they live, but nobody cares. These kiddies start by playing around DDoSing a few IRC servers here or there, but then they move on to bigger things like extortion rackets etc. Almost all of the people being put away for various High profile Cybercrimes have at one stage or another been well known by IRC administrators, but nobody cares until they've turned their sights on bigger fish than IRC networks.
Re:And what is being done about this? (Score:4, Insightful)
we often know who they are, and even where they live
Easy. Make a public list.
Put up a description of all incidents and all related information (IP-Address -> ISP -> personal info) that you have gathered.
The kids don't like to read their real name on a website.