Reflecting on the Use of Sonification for Network Monitoring
نویسندگان
چکیده
In Security Operations Centres (SOCs), computer networks are generally monitored using a combination of anomaly detection techniques, Intrusion Detection Systems (IDS) and data presented in visual and text-based forms. In the last two decades significant progress has been made in developing novel sonification systems to further support network monitoring tasks. A range of systems has been proposed in which sonified network data is presented for incorporation into the network monitoring process. Unfortunately, many of these have not been sufficiently validated and there is a lack of uptake in SOCs. In this paper, we describe and reflect critically on the shortcomings of traditional network-monitoring methods and identify the key role that sonification, if implemented correctly, could play in improving current monitoring capabilities. The core contribution of this position paper is in the outline of a research agenda for sonification for network monitoring, based on a review of prior research. In particular, we identify requirements for an aesthetic approach that is suitable for continuous real-time network monitoring; formalisation of an approach to designing sonifications in this space; and refinement and validation through comprehensive user testing. Keywords–Sonification; Network Security; Anomaly Detection; Network Monitoring; Research Agenda.
منابع مشابه
A Formalised Approach to Designing Sonification Systems for Network-Security Monitoring
Sonification systems, in which data are represented through sound, have the potential to be useful in a number of network-security monitoring applications in Security Operations Centres (SOCs). Security analysts working in SOCs generally monitor networks using a combination of anomaly-detection techniques, Intrusion Detection Systems and data presented in visual and text-based forms. In the las...
متن کاملA Formalised Approach to Designing Sonification Systems
Sonification systems, in which data are represented through sound, have the potential to be useful in a number of network-security monitoring applications in Security Operations Centres (SOCs). Security analysts working in SOCs generally monitor networks using a combination of anomaly-detection techniques, Intrusion Detection Systems and data presented in visual and text-based forms. In the las...
متن کاملOn the use of multi-agent systems for the monitoring of industrial systems
The objective of the current paper is to present an intelligent system for complex process monitoring, based on artificial intelligence technologies. This system aims to realize with success all the complex process monitoring tasks that are: detection, diagnosis, identification and reconfiguration. For this purpose, the development of a multi-agent system that combines multiple intelligences su...
متن کاملSonification Aesthetics and Listening for Network Situational Awareness
This paper looks at the problem of using sonification to enable network administrators to maintaining situational awareness about their network environment. Network environments generate a lot of data and the need for continuous monitoring means that sonification systems must be designed in such a way as to maximise acceptance while minimising annoyance and listener fatigue. It will be argued t...
متن کاملOperating Theatre Patient Monitoring: The Effects of Self Paced Distracter Tasks and Experimental Control on Sonification Evaluations
Three experiments were conducted to explore the effectiveness of continuous auditory displays, or sonifications, to convey information about simulated patient physiological state in dual task trials. Participants’ patient monitoring performance under different dual task conditions was investigated to determine if anaesthetic training was required to successfully use the sonification. A patient ...
متن کامل