Sri Lanka Institute of Information Technology
MasterofScience(InformationManagement)DegreeProgram
Information and Network Security
Assignment 4
DDoS attacks
W.M.J.H. Fernando
MS18901290
2
Arbor Networks DDoS Attack Map.
Arbor Networks brings you one of today’s most popular attack maps. This map is dedicated to tracking down
incidents related to DDoS attacks around the globe.
The data is gathered by the Arbor Networks ATLAS® global threat intelligence system, coming from a
worldwide analysis of 300+ ISPs with over 130 Tbps of live traffic. Stats are updated hourly, but the digital
map also allows you to explore historical data sets.
Its features include:
 Show stats per country
 View attack source + destination
 Show different types of attacks (large, unusual, combined, etc.)
 Color-coded attacks by type, source port, duration and destination port
 Show size of the DDoS attack in Gbps
 Get embed code to insert the map in your own website
 Sort by TCP connection, volumetric, fragmentation and application
3
Kaspersky Cyber Malware and DDoS Real-Time Map
The Kaspersky cyber threat map is one of the most comprehensive maps available, and it also serves as the
best when it comes to graphical interface. It also looks amazingly sleek, although of course, what it signifies
is Internet devastation.
When you open the map, it detects your current location and displays stats for your country, also including
top local attacks and infections from the past week.
Here are the activities detected by the Kaspersky map:
 On-Access Scan
 On-Demand Scan
 Mail Anti-Virus
 Web Anti-Virus
 Intrusion Detection Scan
 Vulnerability Scan
 Kaspersky Anti-Spam
 Botnet Activity Detection
Here are some other features this map offers:
 Switch to globe view
 Toggle map color
 Zoom in/out
 Enable/disable demo mode
 Embed map using iframe
 Buzz tap which includes helpful articles
4
5
ThreatCoud Live Cyber Attack Threat map
CheckPoint designed the ThreatCloud map, which is another cyber-attack map offering a hi-tech way to
detect DDoS attacks from around the globe. It’s not the most advanced map in our list, but it does succeed
in showing live stats for recent attacks.
ThreatCloud displays live stats, which include new attacks, the source of the attacks, and their various
destinations. Another interesting feature is the “Top targets by country” feature, which offers threat stats
for the past week and month, as well as the average infection rate and percentage of most frequent attack
sources for some countries.
At the time of this writing, the Philippines was the top country attacked, with the United States in second.

More Related Content

PDF
CC_OverviewBrochure
PDF
ICU TRACKSMITH
PPTX
Crime analysis
PDF
2016 payment threats trends report
PDF
2015-cloud-security-report-q2
DOCX
Journal of Computer and System Sciences 80 (2014) 973–993Con
DOCX
Journal of Computer and System Sciences 80 (2014) 973–993Con.docx
PDF
Defeating Cyber Threats
CC_OverviewBrochure
ICU TRACKSMITH
Crime analysis
2016 payment threats trends report
2015-cloud-security-report-q2
Journal of Computer and System Sciences 80 (2014) 973–993Con
Journal of Computer and System Sciences 80 (2014) 973–993Con.docx
Defeating Cyber Threats

Similar to Assingment 4 - DDos (20)

PDF
The Value of Shared Threat Intelligence
PDF
3D Security Report
PDF
A SYNCHRONIZED DISTRIBUTED DENIAL OF SERVICE PREVENTION SYSTEM
PDF
CTI Report
PDF
Invesitigation of Malware and Forensic Tools on Internet
PDF
20160316_tbk_bit_module7
PDF
comparing-approaches-for-web-dns-infrastructure-security-white-paper
PDF
IBM X Force threat intelligence quarterly 1Q 2014
PDF
McAFEE LABS THREATS REPORT - Fourth Quarter 2013
PDF
XDOSER, A BENCHMARKING TOOL FOR SYSTEM LOAD MEASUREMENT USING DENIAL OF SERVI...
PDF
XDOSER, A BENCHMARKING TOOL FOR SYSTEM LOAD MEASUREMENT USING DENIAL OF SERVI...
PDF
Ijmet 10 02_045
PDF
Web vulnerabilities
PDF
IP Traceback for Flooding attacks on Internet Threat Monitors (ITM ) Using Ho...
PDF
Product brochure-print-spread
PDF
Web Attack Survival Guide
PDF
Sophos security-threat-report-2014-na
PDF
Survey of different Web Application Attacks & Its Preventive Measures
PDF
F5 Hero Asset - Inside the head of a Hacker Final
PDF
Cyber Crime Multi-State Information Sharing and Analysis Center
The Value of Shared Threat Intelligence
3D Security Report
A SYNCHRONIZED DISTRIBUTED DENIAL OF SERVICE PREVENTION SYSTEM
CTI Report
Invesitigation of Malware and Forensic Tools on Internet
20160316_tbk_bit_module7
comparing-approaches-for-web-dns-infrastructure-security-white-paper
IBM X Force threat intelligence quarterly 1Q 2014
McAFEE LABS THREATS REPORT - Fourth Quarter 2013
XDOSER, A BENCHMARKING TOOL FOR SYSTEM LOAD MEASUREMENT USING DENIAL OF SERVI...
XDOSER, A BENCHMARKING TOOL FOR SYSTEM LOAD MEASUREMENT USING DENIAL OF SERVI...
Ijmet 10 02_045
Web vulnerabilities
IP Traceback for Flooding attacks on Internet Threat Monitors (ITM ) Using Ho...
Product brochure-print-spread
Web Attack Survival Guide
Sophos security-threat-report-2014-na
Survey of different Web Application Attacks & Its Preventive Measures
F5 Hero Asset - Inside the head of a Hacker Final
Cyber Crime Multi-State Information Sharing and Analysis Center
Ad

More from Jeewanthi Fernando (20)

PDF
Assingment 5 - ENSA
DOCX
Assingment 3 - Bug bounty
PDF
Assingment 2 - Law
PDF
Assingment 1 - Google haker
PPTX
Ob group presentation
PDF
OB group assignment
PPTX
PPTX
Assignment - Maliban
PDF
Assignment 1
PPTX
BPM presentation
PDF
Business Process Management Doc
PPTX
Group assingment
PDF
Class activity 5
PDF
Class activity 4
PDF
Class activity 3
PPTX
Professional networking
PDF
Assignment 1
PDF
PDF
ALSS Assingment 1
Assingment 5 - ENSA
Assingment 3 - Bug bounty
Assingment 2 - Law
Assingment 1 - Google haker
Ob group presentation
OB group assignment
Assignment - Maliban
Assignment 1
BPM presentation
Business Process Management Doc
Group assingment
Class activity 5
Class activity 4
Class activity 3
Professional networking
Assignment 1
ALSS Assingment 1
Ad

Recently uploaded (20)

PDF
A Late Bloomer's Guide to GenAI: Ethics, Bias, and Effective Prompting - Boha...
PDF
Hybrid horned lizard optimization algorithm-aquila optimizer for DC motor
PDF
CloudStack 4.21: First Look Webinar slides
PPTX
The various Industrial Revolutions .pptx
PPTX
Configure Apache Mutual Authentication
PDF
How ambidextrous entrepreneurial leaders react to the artificial intelligence...
PPTX
Final SEM Unit 1 for mit wpu at pune .pptx
PPT
Geologic Time for studying geology for geologist
PDF
sustainability-14-14877-v2.pddhzftheheeeee
PDF
From MVP to Full-Scale Product A Startup’s Software Journey.pdf
PPTX
Microsoft Excel 365/2024 Beginner's training
PDF
A review of recent deep learning applications in wood surface defect identifi...
PDF
Flame analysis and combustion estimation using large language and vision assi...
PDF
Two-dimensional Klein-Gordon and Sine-Gordon numerical solutions based on dee...
PDF
Enhancing emotion recognition model for a student engagement use case through...
PDF
Architecture types and enterprise applications.pdf
PDF
Zenith AI: Advanced Artificial Intelligence
PDF
The influence of sentiment analysis in enhancing early warning system model f...
PPTX
AI IN MARKETING- PRESENTED BY ANWAR KABIR 1st June 2025.pptx
PDF
Hindi spoken digit analysis for native and non-native speakers
A Late Bloomer's Guide to GenAI: Ethics, Bias, and Effective Prompting - Boha...
Hybrid horned lizard optimization algorithm-aquila optimizer for DC motor
CloudStack 4.21: First Look Webinar slides
The various Industrial Revolutions .pptx
Configure Apache Mutual Authentication
How ambidextrous entrepreneurial leaders react to the artificial intelligence...
Final SEM Unit 1 for mit wpu at pune .pptx
Geologic Time for studying geology for geologist
sustainability-14-14877-v2.pddhzftheheeeee
From MVP to Full-Scale Product A Startup’s Software Journey.pdf
Microsoft Excel 365/2024 Beginner's training
A review of recent deep learning applications in wood surface defect identifi...
Flame analysis and combustion estimation using large language and vision assi...
Two-dimensional Klein-Gordon and Sine-Gordon numerical solutions based on dee...
Enhancing emotion recognition model for a student engagement use case through...
Architecture types and enterprise applications.pdf
Zenith AI: Advanced Artificial Intelligence
The influence of sentiment analysis in enhancing early warning system model f...
AI IN MARKETING- PRESENTED BY ANWAR KABIR 1st June 2025.pptx
Hindi spoken digit analysis for native and non-native speakers

Assingment 4 - DDos

  • 1. Sri Lanka Institute of Information Technology MasterofScience(InformationManagement)DegreeProgram Information and Network Security Assignment 4 DDoS attacks W.M.J.H. Fernando MS18901290
  • 2. 2 Arbor Networks DDoS Attack Map. Arbor Networks brings you one of today’s most popular attack maps. This map is dedicated to tracking down incidents related to DDoS attacks around the globe. The data is gathered by the Arbor Networks ATLAS® global threat intelligence system, coming from a worldwide analysis of 300+ ISPs with over 130 Tbps of live traffic. Stats are updated hourly, but the digital map also allows you to explore historical data sets. Its features include:  Show stats per country  View attack source + destination  Show different types of attacks (large, unusual, combined, etc.)  Color-coded attacks by type, source port, duration and destination port  Show size of the DDoS attack in Gbps  Get embed code to insert the map in your own website  Sort by TCP connection, volumetric, fragmentation and application
  • 3. 3 Kaspersky Cyber Malware and DDoS Real-Time Map The Kaspersky cyber threat map is one of the most comprehensive maps available, and it also serves as the best when it comes to graphical interface. It also looks amazingly sleek, although of course, what it signifies is Internet devastation. When you open the map, it detects your current location and displays stats for your country, also including top local attacks and infections from the past week. Here are the activities detected by the Kaspersky map:  On-Access Scan  On-Demand Scan  Mail Anti-Virus  Web Anti-Virus  Intrusion Detection Scan  Vulnerability Scan  Kaspersky Anti-Spam  Botnet Activity Detection Here are some other features this map offers:  Switch to globe view  Toggle map color  Zoom in/out  Enable/disable demo mode  Embed map using iframe  Buzz tap which includes helpful articles
  • 4. 4
  • 5. 5 ThreatCoud Live Cyber Attack Threat map CheckPoint designed the ThreatCloud map, which is another cyber-attack map offering a hi-tech way to detect DDoS attacks from around the globe. It’s not the most advanced map in our list, but it does succeed in showing live stats for recent attacks. ThreatCloud displays live stats, which include new attacks, the source of the attacks, and their various destinations. Another interesting feature is the “Top targets by country” feature, which offers threat stats for the past week and month, as well as the average infection rate and percentage of most frequent attack sources for some countries. At the time of this writing, the Philippines was the top country attacked, with the United States in second.