Server sounds and network noises

For server and network administrators, it is a challenge to keep an overview of their systems to detect potential intrusions and security risks in real-time as well as in retrospect. Most security tools leverage our inherent ability for pattern detection by visualizing different types of security data. Several studies suggest that complementing visualization with sonification (the presentation of data using sound) can alleviate some of the challenges of visual monitoring (such as the need for constant visual focus). This paper therefore provides an overview of the current state of research regarding auditory-based and multimodal tools in computer security. Most existing research in this area is geared towards supporting users in real-time network and server monitoring, while there are only few approaches that are designed for retrospective data analysis. There exist several sonification-based tools in a mature state, but their effectiveness has hardly been tested in formal user and usability studies. Such studies are however needed to provide a solid basis for deciding which type of sonification is most suitable for which kind of scenarios and how to best combine the two modalities, visualization and sonification, to support users in their daily routines.

[1]  John R. Goodall,et al.  Introduction to Visualization for Computer Security , 2007, VizSEC.

[2]  Hiroyuki Ohno,et al.  Design and Implementation of Stetho: Network Sonificiation System , 2002, ICMC.

[3]  Tobias Hildebrandt Towards Enhancing Business Process Monitoring with Sonification , 2013 .

[4]  Arthur Edwards Block,et al.  Auditory Display as a Tool for Teaching Network Intrusion Detection , 2007, Int. J. Emerg. Technol. Learn..

[5]  Miguel A. Garcia-Ruiz,et al.  Towards a Multimodal Human-Computer Interface to Analyze Intrusion Detection in Computer Networks , 2006 .

[6]  Alberto Negro,et al.  NeMoS: Network monitoring with sound , 2003 .

[7]  Greg Conti Security data visualization , 2007 .

[8]  Mta Sztaki,et al.  Overview of Auditory Representations in Human-Machine Interfaces , 2013 .

[9]  Ali A. Ghorbani,et al.  A Survey of Visualization Systems for Network Security , 2012, IEEE Transactions on Visualization and Computer Graphics.

[10]  Paul Vickers,et al.  Network Situational Awareness: Sonification and Visualization in the Cyber Battlespace , 2014 .

[11]  Paul Vickers,et al.  Sonification of a network's self-organized criticality for real-time situational awareness , 2014, Displays.

[12]  Chris Schmandt,et al.  "LISTENIN" TO DOMESTIC ENVIRONMENTS FROM REMOTE LOCATIONS , 2003 .

[13]  John G. Neuhoff,et al.  Sonification Report: Status of the Field and Research Agenda Prepared for the National Science Foundation by members of the International Community for Auditory Display , 1999 .

[14]  Alva L. Couch,et al.  Peep (The Network Auralizer): Monitoring Your Network with Sound , 2000, LISA.

[15]  Umberto Ferraro Petrillo,et al.  Multimodal Monitoring of Web Server , 2002, IEEE Multim..

[16]  Philip E. Varner,et al.  Monitoring and Visualization of Emergent Behavior in Large Scale Intrusion Tolerant Distributed Systems , .

[17]  M. I. T. Media Lab,et al.  “ LISTENIN ” TO DOMESTIC ENVIRONMENTS FROM REMOTE LOCATIONS , 2003 .

[18]  Stefanie Rinderle-Ma,et al.  A sonification system for process monitoring as secondary task , 2014, 2014 5th IEEE Conference on Cognitive Infocommunications (CogInfoCom).

[19]  Rudi Giot,et al.  InteNtion – Interactive Network Sonification , 2012 .

[20]  David L. Hall,et al.  Preliminary Steps in Sonifying Web Log Data , 2010 .

[21]  Greg,et al.  Security data visualization : graphical techniques for network analysis , 2007 .

[22]  Katharina Vogt,et al.  Sonification of a streaming-server logfile , 2015, ICAD.

[23]  Bill Kapralos,et al.  Toward Sound-Assisted Intrusion Detection Systems , 2007, OTM Conferences.

[24]  William W. Gaver,et al.  Effective sounds in complex systems: the ARKOLA simulation , 1991, CHI.

[25]  Alexander A. Sawchuk,et al.  CyberSeer: 3D audio-visual immersion for network security and management , 2004, VizSEC/DMSEC '04.

[26]  John C. Knight,et al.  Security Monitoring, Visualization, and System Survivability: A Position Paper for ISW-2001 , 2001 .

[27]  Nicklaus A. Giacobe,et al.  Songs of cyberspace: an update on sonifications of network traffic to support situational awareness , 2011, Defense + Commercial Sensing.

[28]  Jean Vanderdonckt,et al.  A Method to Design Information Security Feedback Using Patterns and HCI-Security Criteria , 2008, CADUI.

[29]  David L. Hall,et al.  Do you see what I hear: experiments in multi-channel sound and 3D visualization for network monitoring? , 2010, Defense + Commercial Sensing.

[30]  B. Kapralos,et al.  Poster : Towards Music-Assisted Intrusion Detection , 2009 .

[31]  Paul Vickers,et al.  Sonification for Process Monitoring , 2011 .

[32]  David Worrall Realtime sonification and visualisation of network metadata , 2015 .