At Duke University, STINGAR has helped to increase the security team’s blocking capabilities from 10 million malicious connection attempts per day to 2 billion per day at the height of the Mirai botnet. The honeypot portion of STINGAR accounts for a significant chunk of these blocks and also has increased the fidelity of what they block, reducing false positives. Come hear information on STINGAR and consider how it might help manage and protect your users from malicious attacks against your campus.