Viruses and computer hacking have become common terms we all hear regularly in news reports and online. And while the concept of a virus is easy to understand, mainly because we are all taught how biological viruses work in our own body, it’s difficult to understand exactly what is going on during an attack inside your PC.
What we need is a realistic visualization of exactly what is happening as an attack happens, and how the security measures put in place try to counter and block those attacks works. Thanks to Ben Reardon of dataviz Australia, that’s exactly what we now have to look at.
The video below is a visual representation of a hack on a Voice over Internet Protocol (VoIP) service. On the left hand side of the video is the server which serves up unprotected accounts represented by the blue data entries that keep appearing. The blue bubbles that fall down the screen represent calls being made. In a system free of hacker activity that’s all the visualization would show, but as is the case with a lot of publicly accessible systems, someone is always trying to find a weakness.
On the right hand side you see red and white bubbles appear. These are malicious scans being carried out on the system trying to locate a pool of information that can be hacked. In this case that would be the blue bubbles, so the security in place needs to stop that happening. The green bubbles are what’s meant to do that and form a honeypot for the hacker’s scans.
As long as those green bubbles keep appearing in enough quantities the hacker’s scan will be blocked from the real data, and therefore the system remains safe. If one gets through it can latch on to a blue bubble and attempt to steal important information such as a password or full login details.
While it may seem like things are under control in the video, imagine dealing with hundreds of attacks a day all trying different techniques to bypass your security and stop the green bubbles from deploying. After watching such an attack in action it’s easy to see how some hacks manage to succeed and breakthrough the defenses.
- The Customer Edge Drives the Need for NaaS - June 25, 2023
- Blockchain Evolves And Secures - January 13, 2019
- Bessemer Ventures’ 2018 Cloud Computing Trends - February 25, 2018