Home » About

About

At Duke, STINGAR has helped to increase the security team’s blocking capabilities from 10 million malicious connection attempts per day to 2 billion per day at the height of the Mirai botnet. The honeypot portion of STINGAR accounts for a significant chunk of these blocks and also has increased the fidelity of what we block, reducing  false positives.

We believe that honeypots provide an excellent source of local threat data with a high signal-to-noise ratio.

We would love for other universities and research organizations to join the STINGAR community. We’re looking for:

  • Feedback on options for integrating STINGAR data with your current network blocking infrastructure
  • Interest and willingness to  sharing your honeypot data back to a larger community
Email the STINGAR team (info@forewarned.io) for more information or to receive an invite to the Slack channel.

Join private STINGAR mailing list

Interested parties are encouraged to interact with the team via the slack channel : stingar.slack.com or join the email list.

Institutions can email info@forewarned.io to be added to the private STINGAR mailing list and Slack workspace.

Please include information about your organization’s interest in the STINGAR project in your request.

This material is based upon work supported by the National Science Foundation under Grant Number NSF1815691 and Grant Number NSF1840034.

Any opinions, findings, and conclusions or recommendations expressed in this material are those of the author(s) and do not necessarily reflect the views of the National Science Foundation.

Powered by WordPress / Academica WordPress Theme by WPZOOM