Carnegie Mellon Tool Displays Visualization of Malware Attack Patterns

A security research project at Carnegie Mellon University could simplify the process of identifying how malware is being distributed through visualization. Researchers at the institution's CyLab Security and Privacy Institute have created a tool that lets a network or security administrator display network traffic in a way that helps identify the changes and patterns The results could eventually help organizations stop the kind of distributed denial of service (DDoS) attack that brought down major websites in late October.

Carnegie Mellon Tool Displays Visualization of Malware Attack Patterns 

Traditionally, network traffic identification is handled through static reports that show little more than IP addresses and timestamps, making the identification of traffic patterns challenging. The tool, in contrast, generates a dynamically changing graph of a malware distribution network to show top-level-domain data collected from Google Safe Browsing reports across a given period. It was created by Yang Cai, senior systems scientist for CyLab, and Sebastian Peryt, first author on a paper about the project and a research assistant in CyLab.

As Cai explained in a video, "Visualization helps us connect to the dots so we can see the overall changes. We can see the malware propagation patterns over time and that's very important."

Based on those visualization graphs, "analysts can focus on critical areas to help shut down a malware distribution network, or in the case of a DDoS attack, target a critical node to thwart the attack," added Peryt, a research assistant in CyLab.

In the future the team hopes to make the tool more usable, taking into account human interface factors, and to integrate it into a virtual reality platform.

About the Author

Dian Schaffhauser is a former senior contributing editor for 1105 Media's education publications THE Journal, Campus Technology and Spaces4Learning.

Featured

  • Abstract digital cloudscape of glowing interconnected clouds and radiant lines

    Cloud Complexity Outpacing Human Defenses, Report Warns

    According to the 2026 Cloud Security Report from Fortinet, while cloud security budgets are rising, 66% of organizations lack confidence in real-time threat detection across increasingly complex multi-cloud environments, with identity risks, tool sprawl, and fragmented visibility creating persistent operational gaps despite significant investment increases.

  • large group of college students sitting on an academic quad

    Student Readiness: Learning to Learn

    Melissa Loble, Instructure's chief academic officer, recommends a focus on 'readiness' as a broader concept as we try to understand how to build meaningful education experiences that can form a bridge from the university to the workplace. Here, we ask Loble what readiness is and how to offer students the ability to 'learn to learn'.

  • Interconnected Light Particles in Vibrant Streams

    Rubrik Agent Cloud Expands Policy Controls for Agent Prompts/Responses

    Rubrik has made Rubrik Agent Cloud generally available, adding expanded governance controls that enforce predefined and custom policies on both AI agent prompts and responses.

  • abstract AI technology with glowing digital interfaces

    Snowflake, OpenAI Partner to Embed AI Models in Enterprise Data Workflows

    Snowflake and OpenAI have announced a multi-year, $200 million partnership that will make OpenAI models available on Snowflake's platform.