Senin, 06 Oktober 2014

IP Viking From Norse Corp, New Way To Monitoring Hacking Activity

If you don't know about IP Viking, you can go to their link and see it http://map.ipviking.com/.


What do you think? Is this some kind of games? No, as you can see there are no navigation tool to control this. Is this a hacking simulation? No, all the news says it is real, it means they are really tracking all the attack and display it as an animation like you could see in that link.

Norse corporation made this so they can monitor cyber attack and possibly combat them. This is the first cyber risk intelligence system that is able to monitor cyber attacks as they happen, in real time, anywhere on the planet so the security can possibly stop them within minutes.

How IP Viking Work?

When see that, you must be thinking, "How the heck it is possibly work? How they can manage to monitoring all that traffic all over the world?". Honestly, at first I think this IP Viking is some kind of joke about hacking. But when I try to search information about it, I start to understand what it really is. :D
The main point is they are using "Honeypots". Honeypots are basically like mouse traps for attackers. These honeypots spoof as enterprises, banks etc which are distributed worldwide. So, it is like you put some decoy and when attacker attack that decoy you can CATCH that attack and analyze who send it, what type of attack, etc. Norse use this security idea and they creates versatile honeypots which mimic as Microsoft Exchange servers, Linux systems, ATMs, etc. And they have over 5 million of it! When once IP Viking has pinpointed some “unethical traffic,” they can know it and that's why they can monitoring that attack all over the world.

Future Development

In the next generation, maybe goverment or cyber security will be more easy to detect the hacking activity. When the attacker attacking some server, Internet Service Provider (ISP) can simply disconnect them from the internet so they can't continuing their hacking activity and the attacked server will be safe.
It is possible, isn't?

But when the network defense development are grow, the network attack development are evolve too. We can't exactly predict what happen in the future, so I am really looking forward for it. :)

0 komentar:

Posting Komentar