At Duke, STINGAR has helped to increase the security team’s blocking capabilities from 10 million malicious connection attempts per day to 2 billion per day at the height of the Mirai botnet. The honeypot portion of STINGAR accounts for a significant chunk of these blocks and also has increased the fidelity of what we block, reducing false positives.
We believe that honeypots provide an excellent source of local threat data with a high signal-to-noise ratio.
We would love for other universities and research organizations to join the STINGAR community. We’re looking for:
- Feedback on options for integrating STINGAR data with your current network blocking infrastructure
- Interest and willingness to sharing your honeypot data back to a larger community