Skip to main content
Kent Academic Repository

A Formalised Approach to Designing Sonification Systems for Network-Security Monitoring

Axon, Louise, Nurse, Jason R. C., Goldsmith, Michael, Creese, Sadie (2017) A Formalised Approach to Designing Sonification Systems for Network-Security Monitoring. International Journal on Advances in Security, 10 . pp. 26-47. ISSN 1942-2636. (KAR id:67474)

Abstract

Sonification systems, in which data are represented through sound, have the potential to be useful in a number of network-security monitoring applications in Security Operations Centres (SOCs). Security analysts working in SOCs generally monitor networks using a combination of anomaly-detection techniques, Intrusion Detection Systems and data presented in visual and text-based forms. In the last two decades significant progress has been made in developing novel sonification systems to further support network-monitoring tasks, but many of these systems have not been sufficiently validated, and there is a lack of uptake in SOCs. Furthermore, little guidance exists on design requirements for the sonification of network data. In this paper, we identify the key role that sonification, if implemented correctly, could play in addressing shortcomings of traditional network-monitoring methods. Based on a review of prior research, we propose an approach to developing sonification systems for network monitoring. This approach involves the formalisation of a model for designing sonifications in this space; identification of sonification design aesthetics suitable for realtime network monitoring; and system refinement and validation through comprehensive user testing. As an initial step in this system development, we present a formalised model for designing sonifications for network-security monitoring. The application of this model is demonstrated through our development of prototype sonification systems for two different use-cases within network security monitoring.

Item Type: Article
Uncontrolled keywords: Sonification; Network Security; Anomaly Detection; Network Monitoring; Formalised Model; Situational Awareness
Subjects: Q Science
T Technology
Divisions: Divisions > Division of Computing, Engineering and Mathematical Sciences > School of Computing
Depositing User: Jason Nurse
Date Deposited: 03 Jul 2018 14:00 UTC
Last Modified: 05 Nov 2024 11:07 UTC
Resource URI: https://kar.kent.ac.uk/id/eprint/67474 (The current URI for this page, for reference purposes)

University of Kent Author Information

  • Depositors only (login required):

Total unique views for this document in KAR since July 2020. For more details click on the image.