Home / News / NICT Daedalus Gives Startling Function and Beauty to Cyber Security

NICT Daedalus Gives Startling Function and Beauty to Cyber Security

NICT Daedalus Gives Startling Function and Beauty to Cyber Security
NICT Daedalus Gives Startling Function and Beauty to Cyber Security

Meg Jones
VirtualThreat Guest Writer


NICT Daedalus.  It’s an unfortunate fact that many people fail to realize, but advancements in technology also lead to advancements in criminal activity. Yes, even the technologies that are intended for our safekeeping, security, and protection. In short, the bad guys can nearly always find a way to break in—whether it’s into the locks and alarm systems on our homes, into our email accounts, personal computers, a company’s network or the government’s computers.

Viruses, spammers, hackers, spyware, identify thieves, and even cyber-terrorists can wreak havoc on the Internet, as well as our lives. Anyone who has experienced it can agree, but just imagine the stress you’d be under if someone found and used information—that you thought was secure—to access your bank accounts, credit cards, and more.

Exciting New Advancement in Cyber Security: Can Things Be Locked from Criminals?

Cyber security is a hot topic in publications ranging from Mashable to The Washington Post. US Homeland Security Secretary Janet Napolitano, who is striving for efforts to better secure American computer networks, has even gone as far as admitting that she doesn’t use email!

The market is already saturated with security software, programs, and plain old how-to suggestions and advice, but one new product may help truly keep security and networks under lock and key. Better yet? It’s absolutely gorgeous!

NICT Daedalus Keeping Japan Safe and Secure

There’s definitely nothing pretty about a cyber attack, but Japan’s National Institute of Information and Communications Technology (NICT) has developed NICT Daedalus, which is being called a “cyber-attack alert system.” First unveiled at an IT and network computing conference in Tokyo in 2012, it artfully renders potential security attacks in real time with a 3D visualization system that looks straight out of the future.

There’s no need to be a network security specialist to understand how NICT’s Daedalus works. It is currently monitoring roughly 190,000 IP addresses across Japan and it creates a visual representation of the data that can be viewed from any angle. This initially sounds like something straight out of a futuristic science fiction movie, but it’s as real as can be. The beautiful visuals can even be zoomed in and out for greater detail.

There’s no need for mere humans to pick through seemingly immeasurable amounts of data because Daedalus can do it for them. It turns IP addresses into an organized stream of lines, allowing viewers to see networks, subnets and even unused IP addresses. The system lights up when a potential attack is sensed—such as when an IP begins pinging an unused IP and a virus spreads like wildfire. NICT plans on offering Daedalus to universities if their networks are capable and the product should eventually be available commercially.

You already have a good idea of how quickly your own family’s lives could be turned upside down with a security breach. Just imagine the tragedy if security was breached at your school, workplace, or a government agency. Always remember that keeping your email accounts, banking information, computers, smart phones, tablets and all other Internet devices secure is just as important as locking the doors to your house and always keeping your car keys safe.

Resources / References




Meg Jones works with Phoenix Lock Master, a locksmith Phoenix, AZ calls its own. She enjoys writing about exciting technologies that seem to be developing overnight, as well as security issues for homes, businesses, and families.  

Check Also

Angry Birds Website Hacked Following NSA Leak

Angry Birds Website Hacked Following NSA Leaks

  Originally Posted on RT   “Spying Birds” Defacement Result of Angry Birds NSA Leaks Hackers briefly …

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.