Reflecting on the use of sonification for network monitoringReport as inadecuate




Reflecting on the use of sonification for network monitoring - Download this document for free, or read online. Document in PDF available to download.

Reference: Axon, L, Creese, S, Goldsmith, M et al., (2016). Reflecting on the use of sonification for network monitoring.Citable link to this page:

 

Reflecting on the use of sonification for network monitoring

Abstract: In Security Operations Centres (SOCs), computer networks are generally monitored using a combination of anomaly detection techniques, Intrusion Detection Systems (IDS) and data presented in visual and text-based forms. In the last two decades significant progress has been made in developing novel sonification systems to further support network monitoring tasks. A range of systems has been proposed in which sonified network data is presented for incorporation into the network monitoring process. Unfortunately, many of these have not been sufficiently validated and there is a lack of uptake in SOCs. In this paper, we describe and reflect critically on the shortcomings of traditional network-monitoring methods and identify the key role that sonification, if implemented correctly, could play in improving current monitoring capabilities. The core contribution of this position paper is in the outline of a research agenda for sonification for network monitoring, based on a review of prior research. In particular, we identify requirements for an aesthetic approach that is suitable for continuous real-time network monitoring; formalisation of an approach to designing sonifications in this space; and refinement and validation through comprehensive user testing.

Peer Review status:Reviewed (other)Publication status:PublishedVersion:Publisher's versionConference Details: SECURWARE 2016: The Tenth International Conference on Emerging Security Information, Systems and TechnologiesNotes:© IARIA 2016. This article was presented at "SECURWARE 2016: The Tenth International Conference on Emerging Security Information, Systems and Technologies" (Nice, France: 24-28 July 2016). It is freely available online at [www.thinkmind.org/index.php?view=articleandarticleid=securware_2016_13_10_30103]

Bibliographic Details

Publisher: ThinkMind

Publisher Website: http://www.thinkmind.org/

Host: SECURWARE 2016: The Tenth International Conference on Emerging Security Information, Systems and Technologiessee more from them

Publication Website: http://www.thinkmind.org/index.php?view=eventandevent=SECURWARE

Issue Date: 2016-07-24Identifiers

Urn: uuid:b4b1c8a5-cfec-4d12-8fc0-8128a9059512

Source identifier: 628236 Item Description

Type: Conference;

Version: Publisher's versionKeywords: Sonification Network Security Anomaly Detection Network Monitoring Research Agenda Tiny URL: pubs:628236

Relationships





Author: Axon, L - institutionUniversity of Oxford Oxford, MPLS, Computer Science - - - Creese, S - institutionUniversity of Oxford Oxford

Source: https://ora.ox.ac.uk/objects/uuid:b4b1c8a5-cfec-4d12-8fc0-8128a9059512



DOWNLOAD PDF




Related documents