Hearing attacks in network data: an effectiveness study

Sonification, in which data is represented as sound, can be used to turn network attacks and network-security information into audio signals. This could complement the range of security-monitoring tools currently used in Security Operations Centres (SOCs). Prior work in sonification for network moni...

Full description

Bibliographic Details
Main Authors: Axon, L, Happa, J, Goldsmith, M, Creese, S
Format: Journal article
Published: Elsevier 2019
_version_ 1797092601476677632
author Axon, L
Happa, J
Goldsmith, M
Creese, S
author_facet Axon, L
Happa, J
Goldsmith, M
Creese, S
author_sort Axon, L
collection OXFORD
description Sonification, in which data is represented as sound, can be used to turn network attacks and network-security information into audio signals. This could complement the range of security-monitoring tools currently used in Security Operations Centres (SOCs). Prior work in sonification for network monitoring has not assessed the effectiveness of the technique for enabling users to monitor network-security information. To this end, we aim to investigate the viability of using sonified network datasets to enable humans to detect (recognise the presence of some) and identify (understand the type of) network attacks. In this paper we report the results of a user study in which we assessed the utility of a network-traffic sonification system for representing network attacks. Our results show that by listening to the sonified network data, participants could detect attacks accurately and efficiently, including combinations of attacks, and identify the types of attacks. Musical experience had no significant effect on the ability of participants to use the sonification, and participants could detect attacks without training, yet improved performance through training. The results support the potential of sonification for use in network-security monitoring tasks.
first_indexed 2024-03-07T03:48:19Z
format Journal article
id oxford-uuid:c04c9551-8b2b-4d32-a396-801c59ffc6c2
institution University of Oxford
last_indexed 2024-03-07T03:48:19Z
publishDate 2019
publisher Elsevier
record_format dspace
spelling oxford-uuid:c04c9551-8b2b-4d32-a396-801c59ffc6c22022-03-27T05:53:32ZHearing attacks in network data: an effectiveness studyJournal articlehttp://purl.org/coar/resource_type/c_dcae04bcuuid:c04c9551-8b2b-4d32-a396-801c59ffc6c2Symplectic Elements at OxfordElsevier2019Axon, LHappa, JGoldsmith, MCreese, SSonification, in which data is represented as sound, can be used to turn network attacks and network-security information into audio signals. This could complement the range of security-monitoring tools currently used in Security Operations Centres (SOCs). Prior work in sonification for network monitoring has not assessed the effectiveness of the technique for enabling users to monitor network-security information. To this end, we aim to investigate the viability of using sonified network datasets to enable humans to detect (recognise the presence of some) and identify (understand the type of) network attacks. In this paper we report the results of a user study in which we assessed the utility of a network-traffic sonification system for representing network attacks. Our results show that by listening to the sonified network data, participants could detect attacks accurately and efficiently, including combinations of attacks, and identify the types of attacks. Musical experience had no significant effect on the ability of participants to use the sonification, and participants could detect attacks without training, yet improved performance through training. The results support the potential of sonification for use in network-security monitoring tasks.
spellingShingle Axon, L
Happa, J
Goldsmith, M
Creese, S
Hearing attacks in network data: an effectiveness study
title Hearing attacks in network data: an effectiveness study
title_full Hearing attacks in network data: an effectiveness study
title_fullStr Hearing attacks in network data: an effectiveness study
title_full_unstemmed Hearing attacks in network data: an effectiveness study
title_short Hearing attacks in network data: an effectiveness study
title_sort hearing attacks in network data an effectiveness study
work_keys_str_mv AT axonl hearingattacksinnetworkdataaneffectivenessstudy
AT happaj hearingattacksinnetworkdataaneffectivenessstudy
AT goldsmithm hearingattacksinnetworkdataaneffectivenessstudy
AT creeses hearingattacksinnetworkdataaneffectivenessstudy