Related:
How to Detect and Analyze DDoS Attacks Using Log Analysis
Holographic analysis of Wi-Fi data generates 3-D images of the vicinity