daedalus-1a.jpg
daedalus-1b.png

A Japanese-developed cyber-attack warning visualisation system has lately been earning massive praise for its beautiful graphics, and almost as attention again for its unmistakable similarities to a certain cyberpunk anime…

A video demonstrating the system, dubbed DAEDALUS (“Direct Alert Environment for Darknet And Livenet Unified Security”) and developed by NICT:

Briefly, the trails passing from the central sphere (the Internet) to the orbiting circles (networks) represent external traffic, and generate alerts if identified as suspicious, and the system also identifies and displays traffic patterns passing between networks.

A major objective of the system is monitoring malware activity within and without the network, and watching for DDoS attacks.

The system generates its alerts as XML data which can also be displayed as the boring charts and graphs full of endless hack attempts familiar to anyone charged with monitoring a computer connected to the Internet.

daedalus-2.png
daedalus-3.png
daedalus-4.png

Although it seems to have impressed less technical Japanese and non-Japanese alike with its pretty graphics and clear suitability as a screensaver, there is a certain amount of scepticism about just how useful it is:

“Cool!”

“Looks beautiful, finally we are in the 21st century!”

“It certainly looks easy to understand, but if your network security people can’t manage to monitor your network without something like this you have bigger problems… still, it looks cool.”

“Pretty pointless really, isn’t it?”

“A total rip-off of Ghost in the Shell!”

“They are obviously GitS-inspired. Looks so nice.”

“The ‘warning’ characters are straight from GitS or Eva.”

“Must have been made by aniota.”

“And the guys who made this are a government agency…”

“They said they intended to make it available to the private sector too. It looks great, but I get the impression once you get boarded of it you’ll be returning to your terminal screen.”

“Why is it only the overseas you guys are rejoicing!?”

“Really, this is just a screen-saver.”

“What is the point of making this 3D?”

“A simple graph would probably be more effective?”

“Next you will have people competing to see who can make the most cool looking attack on this system…”

“You couldn’t wait to be attacked if you had a system like this!”


    Post Comment »
    82 Comments
    Sort by: Date | Score
    Comment by Anonymous
    08:23 22/06/2012 # ! Good (+0.6)

    Chart of 100 lines of utter crap.
    Some red, some bolded out...

    or...

    Above?

    It reacts in real time.
    It shows things of interest, aka more used = bigger.
    Blue turns to red when something is up.

    Heck yes. Easy to use and looks great. Sign me up.

    Avatar of Falos
    Comment by Falos
    06:06 22/06/2012 # ! Good (+0.6)

    "Unnecessary" I understand, "waste of resources to produce" I can get. These aren't really relevant to already-complete software though, it's too late.

    And aren't charts and graphs also a convenient visual representation of numerical data? Not that this glorified aquarium puts function before form, of course.

    Comment by Anonymous
    07:07 22/06/2012 # ! Neutral (+0.4)

    The real question at this point is effectiveness. Is the way it is displaying data effective? Can humans make sense of it? And, does the software accurately detect intrusions?

    Comment by Anonymous
    12:04 22/06/2012 # ! Neutral (0)

    By the time humans make sense of it, it's came and gone.

    If the automated scripts do their jobs to block out sources of DDoS making too many calls, that "visualization" won't show anything remarkable. If it does, it's because it already failed.

    The popularized idea of rows of operators typing on keyboards against cyber attackers is utterly stupid.

    Comment by Anonymous
    13:35 22/06/2012 # ! Good (+0.8)

    The purpose of this program is to allow administrators to watch porn all day, alt-tabbing to the fancy graphics whenever the boss comes around. With all those lines and warning signs, there'll be no doubt they are working their asses off doing a critical job.

    Comment by Anonymous
    21:16 22/06/2012 # ! Neutral (+0.2)

    This is Phase 2 of the Gundam plan.

    Phase 1 was to make a frame that actually stood up, and it worked.

    Phase 2:
    A system that detects incoming threats such as missiles and enemy movements. The system shown above.

    Phase 3 will be interacting with the Phase 2 interface to enter battle mode.

    Avatar of kratos
    Comment by kratos
    07:17 22/06/2012 # ! Neutral (+0.2)

    agreed this this is totaly useless. It may be funny for 10mn but when shit gets serious you'll have get back charts and OS console

    the orbiting thing sure is pretty but just makes it harder to follow

    Comment by Anonymous
    11:43 22/06/2012 # ! Neutral (0)

    Yeah right, because showing a security system off is gonna make hackers shy away from it....

    /sarcasm

    Comment by Anonymous
    07:14 22/06/2012 # ! Neutral (0)

    If by "waste of resources" you mean, a weekend pet project by one of the developers, then yes. It's not really that time consuming to make a 3D screensaver like that if the developer is already familiar with 3D development and some college math.

    These aren't really relevant to already-complete software though, it's too late.

    There is no such thing as "complete software". All software is in development or deprecated. (well that's not really true, but you will be surprised how close it is)

    And aren't charts and graphs also a convenient visual representation of numerical data?

    Well duh,what do you think the words "chart" and "graph" mean?

    Comment by Anonymous
    12:42 22/06/2012 # ! Neutral (0)

    You people don't get it.
    No one expect network admins to spend all day watching this thing. However, it will be very useful when they have to explain why their network was screwed. Rather than showing the higher-ups a table with a bunch of IPs their firewall should have filtered out, they pull out this. Instantly, it will seem they were doing their best against a sophisticated intruder.

    Comment by Anonymous
    00:09 24/06/2012 # ! Neutral (0)

    It would also make it easier for the average twit to figure out what's going on when their computer craps out.

    Avatar of Uncommon0taku
    Comment by Uncommon0taku
    08:18 22/06/2012 # ! Neutral (0)

    everything "evolves" not that the naysayers like yourself will do any different as they have always been doing.

    but there are other people who will adapt to new ways of doing things - either because its new or they simply have a better appreciation for new tech as it is released into the new market.

    it to will evolve as time goes by.
    this is totally unavoidable - its called progress.

    Comment by Anonymous
    10:44 22/06/2012 # ! Neutral (0)

    Not everything evolves. In particular things without the capacity to mutate have a major problem with it. Rocks for example are literally as old as time itself, but they have a surprising resistance to sentience or any form of adaptation for that matter.

    Comment by Anonymous
    12:02 22/06/2012 # ! Neutral (0)

    It can only observe the Internet not prevent network attacks.

    Comment by Anonymous
    10:06 22/06/2012 # ! Neutral (0)

    it won't spread I mean

    Comment by Anonymous
    10:05 22/06/2012 # ! Neutral (0)

    That's not quite it. This isn't a matter of progress but of something being user friendly. The exact opposite happens when a new technology is developed. If it is difficult to use it hinders it spread and usually ends up forgotten for something easier.

    What most people don't understand is that you can't make something original for originality's sake and expect it to be a success. Development is much more successful if you improve upon and add new uses to familiar tech. This is progress. This is "evolution" and not "revolution" which no one knows how it will turn out.

    Comment by Anonymous
    03:29 23/06/2012 # ! Neutral (+0.2)

    Technology isn't difficult to use, people are just too lazy to read the fucking manual.

    Comment by Anonymous
    09:12 23/06/2012 # ! Neutral (0)

    People ARE 2 Fucking lazy

    Comment by Anonymous
    15:19 22/06/2012 # ! Neutral (+0.4)

    Mean while. All the real hackers are laughing their ass off.

    Avatar of Shadow C
    Comment by Shadow C
    07:26 22/06/2012 # ! Neutral (+0.2)

    As a Ghost in the shell fan, I must say I'm very.....hhhhhhggggggggggnnnnnnnnnnnnnnnn.....Sorry, my heart stopped for a moment.

    Comment by Anonymous
    08:37 22/06/2012 # ! Neutral (0)

    They don't connect people's brains to web though.

    Comment by Anonymous
    08:47 22/06/2012 # ! Neutral (+0.2)

    I believe the word you're looking for there is: Yet.

    They don't connect people's brains to the web, yet..

    Comment by Anonymous
    00:11 24/06/2012 # ! Neutral (0)

    They can connect your brain to prosthetic limbs, it's been done before. It's only a matter of time, I'd say a few decades at most, before you can wire yourself to your computer.

    Avatar of Erranty
    Comment by Erranty
    07:14 22/06/2012 # ! Neutral (+0.2)

    Its definitely themed like GitS, but is that really a bad thing? We mainly liked GitS because it was a nice look at our possible future, and every step we take in that direction just makes it look more and more like the ideal.

    Admittedly, this fancy looking program is useless at the moment when compared with the more practical way that currently exists, but eventually it'll get more complex as the internet does and will be the easier of the 2 options.

    It may become so automated that it filters malware out before it gets to the "gate."

    Comment by Anonymous
    08:36 22/06/2012 # ! Neutral (+0.2)

    Totally agree with you, sir. When there is lot of critical realtime information some kind of visualizer is a must.

    Comment by Anonymous
    06:52 22/06/2012 # ! Neutral (+0.2)

    I think this looks pretty boss. The graphics look like something out of GitS, Eva, or Macross Frontier.

    Avatar of Benoist
    Comment by Benoist
    19:57 22/06/2012 # ! Neutral (0)

    coolest (not-so-)useless display since toshiba laptops' wifi radar" from 6 years ago

    Comment by Anonymous
    21:03 22/06/2012 # ! Neutral (0)

    Stuxnet and Flame don't stand a chance against such formidable graphics!

    Comment by Anonymous
    12:56 28/06/2012 # ! Neutral (0)

    It will soon be hacked.

    Avatar of Maytaurus
    Comment by Maytaurus
    20:09 22/06/2012 # ! Neutral (0)

    Now I can just implement this system into my Zaku.

    Comment by Anonymous
    07:10 30/06/2012 # ! Neutral (0)

    XD well whats wrong with basing technology being based off fiction as long as it works, now i want a guyver

    Comment by Anonymous
    20:17 07/07/2012 # ! Neutral (0)

    A visual interface that can auto-detect a problem and troubleshoot is better than reading a line of code any day

    Comment by Anonymous
    13:07 22/06/2012 # ! Neutral (0)

    Where do I pick up my cyborg body? I would like to keep my penis though, I don't play that "your plug isn't compatible" stuff.

    Comment by Anonymous
    13:42 22/06/2012 # ! Neutral (0)

    The most effective and awesome acronym for a system I've ever heard.

    That entire acronym made perfect sense!!!!!!!

    Comment by Anonymous
    14:05 22/06/2012 # ! Neutral (0)

    We are one step away from Summer wars.....

    Comment by Anonymous
    15:32 22/06/2012 # ! Neutral (0)

    Time to develop that Type-666 firewall as seen in Evangelion.

    Avatar of Alexeon
    Comment by Alexeon
    17:01 22/06/2012 # ! Neutral (0)

    So how do I run this on my PC (and hopefully in English)?

    Comment by Anonymous
    03:32 23/06/2012 # ! Neutral (0)

    *facepalm*
    This is not the kind of software you install on your computer.

    Comment by Anonymous
    08:56 25/06/2012 # ! Neutral (0)

    successfully hacked into your rage

    Avatar of Firaku
    Comment by Firaku
    19:29 23/06/2012 # ! Neutral (0)

    “Next you will have people competing to see who can make the most cool looking attack on this system…”

    Pssst, don't feed the hackers.

    Avatar of DarkWisdom
    Comment by DarkWisdom
    10:49 24/06/2012 # ! Neutral (0)

    I'm still waiting for the laughing man to appear on one of those circular symbols.

    Comment by Anonymous
    06:20 25/06/2012 # ! Neutral (0)

    that movie sucked anyways

    Avatar of Cabulb
    Comment by Cabulb
    23:53 24/06/2012 # ! Neutral (0)

    Minority Report

    Comment by Anonymous
    16:30 23/06/2012 # ! Neutral (0)

    attack China's system first than their whole bullying and pirating stuff.

    Avatar of Ryuhouji
    Comment by Ryuhouji
    04:15 26/06/2012 # ! Neutral (0)

    OOOOOOOOOH Preety...... I found me a new DreamScene.

    Comment by Anonymous
    06:20 25/06/2012 # ! Neutral (0)

    hactivist propaganda maybe?

    Comment by Anonymous
    08:56 25/06/2012 # ! Neutral (0)

    i think this is pointless

    Avatar of kache
    Comment by kache
    05:15 23/06/2012 # ! Neutral (0)

    So the purpose is to make companies buy computers with good 3d video card even for the the pc managing the servers?

    Comment by Anonymous
    13:01 22/06/2012 # ! Neutral (0)

    Come on, anime remake of Hackers (1995) -- do it, Japan!

    Avatar of Riiku
    Comment by Riiku
    23:02 22/06/2012 # ! Neutral (0)

    That's how real computer security looks:

    http://i48.tinypic.com/vxm8uo.png

    not this bullshit





    Post Comment »

Popular

Recent News

Recent Galleries

Recent Comments