Hearing attacks in network data: an effectiveness study
Sonification, in which data is represented as sound, can be used to turn network attacks and network-security information into audio signals. This could complement the range of security-monitoring tools currently used in Security Operations Centres (SOCs). Prior work in sonification for network moni...
Main Authors: | Axon, L, Happa, J, Goldsmith, M, Creese, S |
---|---|
Format: | Journal article |
Published: |
Elsevier
2019
|
Similar Items
-
Towards a model facilitating discussions about Cyber Attacks and Defences
by: Happa, J, et al.
Published: (2014) -
CyberVis: Visualizing the Potential Impact of Cyber Attacks on the Wider Enterprise
by: Creese, S, et al.
Published: (2013) -
CyberVis: Visualizing the Potential Impact of Cyber Attacks on the Wider Enterprise
by: Creese, S, et al.
Published: (2013) -
Sonification to support the monitoring tasks of security operations centres
by: Axon, L, et al.
Published: (2019) -
Deception in network defences using unpredictability
by: Happa, J, et al.
Published: (2021)