Quantifying the carbon cost of cyber attacks β turning cybersecurity into a verifiable ESG metric.
SDG 13 (Climate Action) Γ Cybersecurity | April 18β19, 2026
Live Attack Dashboard β Real-time traffic monitoring under DDoS attack:
Shield OFF β Attack traffic consuming wasted compute:
Carbon Formula β Transparent methodology:
1 req = 0.12g COβ
Attack Origins β Geographic threat intelligence with intensity-scaled pulses:
Threat Log β Terminal-style live stream of attack events:
Idle State β Clean dashboard when no attack is in progress:
Nobody tracks the carbon footprint of cyber attacks.
- A single DDoS attack can consume 150+ kWh of wasted server compute
- Global bot traffic accounts for 30-40% of all internet requests
- This invisible energy waste generates millions of tons of COβ annually
BotCarbon is a real-time SOC dashboard that:
- Quantifies the energy wasted by malicious bot traffic (kWh per request)
- Visualizes the carbon impact with live charts and equivalency metrics
- Demonstrates the environmental benefit of edge protection (Cloudflare)
- Proves that cybersecurity IS sustainability
The "fix" for a bad BotCarbon score is literally: "Route through Cloudflare."
| Feature | Description |
|---|---|
| Traffic Monitor | Real-time area chart showing blocked vs. passed attack traffic |
| Carbon Gauge | Live COβ savings counter with equivalency comparisons |
| Shield Toggle | Enable/disable Cloudflare Edge Shield in real-time |
| Attack Map | Geographic threat origins with intensity-scaled pulses |
| Threat Log | Terminal-style live stream of attack events |
| Formula Tooltip | Transparent methodology: 1 req = 0.12g COβ |
Energy per request: 0.0003 kWh (SWD Model)
Grid emission factor: 0.400 kg COβ/kWh (US average)
COβ per blocked req: 0.12g
β 1,000,000 blocked requests = 120 kg COβ prevented
β Equivalent to driving 292 miles π
Source: Sustainable Web Design Model (SWD), DIMPACT Project
botcarbon/
βββ src/
β βββ app/ # Next.js 16 App Router
β β βββ layout.tsx # Root layout (fonts, metadata, SEO)
β β βββ page.tsx # Main SOC dashboard page
β β βββ globals.css # Design system (glassmorphism, glow, grid)
β βββ components/ # 8 dashboard components
β β βββ TrafficChart # Real-time Recharts area chart
β β βββ CarbonGauge # COβ savings + equivalencies
β β βββ ShieldToggle # Cloudflare edge toggle
β β βββ AttackMap # Geographic threat origins
β β βββ AttackLog # Terminal-style event stream
β β βββ FormulaTooltip # Methodology transparency
β β βββ MetricCard # Glowing stat cards
β β βββ Header # SOC-style nav bar
β βββ lib/ # Shared utilities
β βββ carbon.ts # COβ math (SWD Model)
β βββ constants.ts # Attack types, thresholds
β βββ mock-data.ts # Real-time data generation
βββ scripts/
β βββ attack.py # DDoS simulator (Python)
βββ public/ # Screenshots, logos
βββ .env.example # Environment template
βββ package.json
| Layer | Technology |
|---|---|
| Frontend | Next.js 16, React 19 |
| Styling | Tailwind CSS v4 |
| Charts | Recharts |
| Animations | Framer Motion |
| Edge | Cloudflare Edge (simulated) |
| Fonts | Inter, JetBrains Mono, Orbitron |
| Deploy | Vercel |
- Cloudflare (Technical Partner): Edge Shield simulation in
src/components/ShieldToggle.tsx. Carbon offset calculations insrc/lib/carbon.ts. Attack filtering logic driven by shield state throughout the dashboard. - SDG 13 β Climate Action: Core formula (
1 req = 0.12g COβ) from the Sustainable Web Design Model, implemented insrc/lib/carbon.ts. - Cybersecurity (OWASP-aligned): 8 attack types simulated (DDoS, SQL Injection, XSS, Brute Force, Credential Stuffing, etc.) β see
scripts/attack.py.
# 1. Clone
git clone https://github.com/edycutjong/botcarbon.git
cd botcarbon
# 2. Install
npm install
# 3. Set up env (optional β app works without any keys)
cp .env.example .env.local
# 4. Run
npm run dev
# β http://localhost:3000π Note for Judges: No API keys, accounts, or setup required! The dashboard runs entirely client-side with simulated real-time data. Just
npm run devand you're live.
# In a separate terminal
python scripts/attack.py --intensity high- 0:00 β Open the dark-mode SOC dashboard. Traffic is calm.
- 0:05 β Run
python attack.pyin a terminal. Dashboard lights up red. - 0:10 β Charts spike: "Warning: Attack consuming 150 kWh of wasted compute."
- 0:15 β Click "Enable Cloudflare Edge Shield" toggle.
- 0:20 β Attack traffic drops to zero. Green counter animates: "150 kWh saved. 60kg COβ prevented."
- 0:25 β Show equivalencies: "That's like preventing 146 miles of driving."
- 0:30 β Formula tooltip: "1 req = 0.12g COβ (SWD Model)"
- Primary: SDG 13 β Climate Action
- Secondary: Cybersecurity (OWASP-aligned)
- Sponsor: Cloudflare (Technical Partner)
MIT β Built for HackOWASP 8.0
