Digital Attack Map is a live data visualization of DDoS attacks around the globe, built through a collaboration between Google Ideas and Arbor Networks.  The tool surfaces anonymous attack traffic data to let users explore historic trends and find reports of outages happening on a given day.

( – Distributed Denial of Service attacks (DDoS) prevent information from being seen and/or disseminated on the Internet. Google Ideas and Arbor Networks explain that, “Sites covering elections are brought down to influence their outcome, media sites are attacked to censor stories, and businesses are taken offline by competitors looking for a leg up.” This is a concerning and widely occurring problem. It is also a problem that is not widely understood and by no means intuitive. According to, “As a result, the impact, scale and scope of the challenge can be easily overlooked.” DigitalAttackMaps WHOGoogle Ideas, Big Picture Group and Arbor Networks have joined forces and designed this amazing tool to bolster understanding of the issue in general, and in hopes “it triggers a dialogue about how we can work together to reduce the threat of DDoS attacks, improving the Internet for everyone.”

This tool can be used to correlate what is happening in the world with cyber-attacks. Take for instance this “large and internal attack observed on the day after Christmas in the USA.”

This huge attack which occurred December 26, 2013 in the United States can be correlated with  the following graphic which shows selected Web & News results for December 26-28, 2013.

SEARCH DAM 1226thru282013

Other notable events can be observed like the protests in Thailand on December 3, 2013, reports of attacks on the Philippine government on Oct. 2, 2013, and a multi-source fragmentation attack on Qatar on Sept. 11, 2013.

Sept. 11, 2013 Qatar Attack


Thailand Dec. 3, 2013


Philippines Attack Oct. 2, 2013


There are many types of DDoS attacks DDoS Attack Types (ICMP Flood, UDP FloodSmurf AttackSYN Flood, Get Request, Frag Flood, DNS Amplification Attack, etc.).  More information regarding this serious threat can be found in the following two video playlists.