Reflecting on the use of sonification for network monitoring

In Security Operations Centres (SOCs), computer networks are generally monitored using a combination of anomaly detection techniques, Intrusion Detection Systems (IDS) and data presented in visual and text-based forms. In the last two decades significant progress has been made in developing novel so...

Full description

Bibliographic Details
Main Authors: Axon, L, Creese, S, Goldsmith, M, Nurse, J
Format: Conference item
Published: ThinkMind 2016
_version_ 1797090031108620288
author Axon, L
Creese, S
Goldsmith, M
Nurse, J
author_facet Axon, L
Creese, S
Goldsmith, M
Nurse, J
author_sort Axon, L
collection OXFORD
description In Security Operations Centres (SOCs), computer networks are generally monitored using a combination of anomaly detection techniques, Intrusion Detection Systems (IDS) and data presented in visual and text-based forms. In the last two decades significant progress has been made in developing novel sonification systems to further support network monitoring tasks. A range of systems has been proposed in which sonified network data is presented for incorporation into the network monitoring process. Unfortunately, many of these have not been sufficiently validated and there is a lack of uptake in SOCs. In this paper, we describe and reflect critically on the shortcomings of traditional network-monitoring methods and identify the key role that sonification, if implemented correctly, could play in improving current monitoring capabilities. The core contribution of this position paper is in the outline of a research agenda for sonification for network monitoring, based on a review of prior research. In particular, we identify requirements for an aesthetic approach that is suitable for continuous real-time network monitoring; formalisation of an approach to designing sonifications in this space; and refinement and validation through comprehensive user testing.
first_indexed 2024-03-07T03:12:37Z
format Conference item
id oxford-uuid:b4b1c8a5-cfec-4d12-8fc0-8128a9059512
institution University of Oxford
last_indexed 2024-03-07T03:12:37Z
publishDate 2016
publisher ThinkMind
record_format dspace
spelling oxford-uuid:b4b1c8a5-cfec-4d12-8fc0-8128a90595122022-03-27T04:28:10ZReflecting on the use of sonification for network monitoringConference itemhttp://purl.org/coar/resource_type/c_5794uuid:b4b1c8a5-cfec-4d12-8fc0-8128a9059512Symplectic Elements at OxfordThinkMind2016Axon, LCreese, SGoldsmith, MNurse, JIn Security Operations Centres (SOCs), computer networks are generally monitored using a combination of anomaly detection techniques, Intrusion Detection Systems (IDS) and data presented in visual and text-based forms. In the last two decades significant progress has been made in developing novel sonification systems to further support network monitoring tasks. A range of systems has been proposed in which sonified network data is presented for incorporation into the network monitoring process. Unfortunately, many of these have not been sufficiently validated and there is a lack of uptake in SOCs. In this paper, we describe and reflect critically on the shortcomings of traditional network-monitoring methods and identify the key role that sonification, if implemented correctly, could play in improving current monitoring capabilities. The core contribution of this position paper is in the outline of a research agenda for sonification for network monitoring, based on a review of prior research. In particular, we identify requirements for an aesthetic approach that is suitable for continuous real-time network monitoring; formalisation of an approach to designing sonifications in this space; and refinement and validation through comprehensive user testing.
spellingShingle Axon, L
Creese, S
Goldsmith, M
Nurse, J
Reflecting on the use of sonification for network monitoring
title Reflecting on the use of sonification for network monitoring
title_full Reflecting on the use of sonification for network monitoring
title_fullStr Reflecting on the use of sonification for network monitoring
title_full_unstemmed Reflecting on the use of sonification for network monitoring
title_short Reflecting on the use of sonification for network monitoring
title_sort reflecting on the use of sonification for network monitoring
work_keys_str_mv AT axonl reflectingontheuseofsonificationfornetworkmonitoring
AT creeses reflectingontheuseofsonificationfornetworkmonitoring
AT goldsmithm reflectingontheuseofsonificationfornetworkmonitoring
AT nursej reflectingontheuseofsonificationfornetworkmonitoring