SecViz has the details on a new visualization contest that attempts to bring graphical order to the typical chaos of network traces, following a reference dataset of internet attacks against a host.

The Challenge:

Design and build a visualization that describes the attacks that were analyzed in FC5. Use the three prize winners’ solutions as references and to give you a head start on the data analysis. Use the FC5 dataset to create your FC10 visualization.

As an example, the visualization may have a geographic element, represented as a map, link graphs, histogram, or parallel coordinates, that sheds light on the following:

  • Where the attacks came from
  • The volumes of attacks originating from various locations
  • The success or failure of these attacks
  • The nature of the attacks. For example which are “primary” and which are the “secondary” phases.
  • Can the attacks be color coded to describe groups of attacks/attackers?
  • Use external data sources such as the many freely available geomapping databases.

The output can be anything that you like – from a still image, to interactive flash/java, dynamically updating, dashboard style, magazine infographic, holograms are also accepted.

via “Attack Visualization” Honeynet Project Forensic Challenge #10. Entries close December 18 | SecViz.