Internet attack relationship mapping


Relationships.
Amongst a mass of unstructured data, hidden patterns can emerge.
These ‘link graphs’ show some compelling relationships between attacker and victim in the realm of Internet security.

Adding color to these graphs further adds to the value of the diagram by showing active nodes in the center (in red) and quieter attackers on the outside (in green).

Leave a Reply

Up ↑

%d bloggers like this: