Journal article
A formalised approach to designing sonification systems for network-security monitoring
- Abstract:
- Sonification systems, in which data are represented through sound, have the potential to be useful in a number of network-security monitoring applications in Security Operations Centres (SOCs). Security analysts working in SOCs generally monitor networks using a combination of anomaly-detection techniques, Intrusion Detection Systems and data presented in visual and text-based forms. In the last two decades significant progress has been made in developing novel sonification systems to further support network-monitoring tasks, but many of these systems have not been sufficiently validated, and there is a lack of uptake in SOCs. Furthermore, little guidance exists on design requirements for the sonification of network data. In this paper, we identify the key role that sonification, if implemented correctly, could play in addressing shortcomings of traditional network-monitoring methods. Based on a review of prior research, we propose an approach to developing sonification systems for network monitoring. This approach involves the formalisation of a model for designing sonifications in this space; identification of sonification design aesthetics suitable for realtime network monitoring; and system refinement and validation through comprehensive user testing. As an initial step in this system development, we present a formalised model for designing sonifications for network-security monitoring. The application of this model is demonstrated through our development of prototype sonification systems for two different use-cases within networksecurity monitoring.
- Publication status:
- Published
- Peer review status:
- Peer reviewed
Actions
Authors
- Publisher:
- International Academy, Research, and Industry Association
- Journal:
- International Journal On Advances in Security More from this journal
- Volume:
- 10
- Issue:
- 1-2
- Pages:
- 26-47
- Publication date:
- 2017-07-13
- Acceptance date:
- 2017-05-04
- ISSN:
-
1942-2636
- Keywords:
- Pubs id:
-
pubs:698603
- UUID:
-
uuid:b4ddd3df-5403-4589-8de3-0fb8352b5de3
- Local pid:
-
pubs:698603
- Source identifiers:
-
698603
- Deposit date:
-
2017-06-07
Terms of use
- Copyright holder:
- Axon et al
- Copyright date:
- 2017
- Notes:
- Copyright © 2017 the authors. This is the accepted manuscript version of the article. The final version is available online from the publisher at: http://www.iariajournals.org/security/tocv10n12.html
If you are the owner of this record, you can report an update to it here: Report update to this record