Songs of cyberspace: an update on sonifications of network traffic to support situational awareness

@inproceedings{Ballora2011SongsOC,
  title={Songs of cyberspace: an update on sonifications of network traffic to support situational awareness},
  author={Mark Ballora and N. Giacobe and D. Hall},
  booktitle={Defense + Commercial Sensing},
  year={2011}
}
Building on our previous work, we extend sonification techniques to common network security data. In this current work, we examine packet flow and the creation of socket connections between a requestor's IP address and port number with the server's IP address and port number. Our goals for the aural rendering are twofold: to make certain conditions immediately apparent to untrained listeners, and to create a sound model capable of enough nuance that there is the possibility of unexpected… Expand
35 Citations
Sonification of a network's self-organized criticality for real-time situational awareness
  • 17
  • PDF
Interactive sonification of network traffic to support cyber security situational awareness
  • Highly Influenced
  • PDF
MuSec: Sonification of Alarms Generated by a SIEM
  • PDF
Sonification of network traffic flow for monitoring and situational awareness
  • 10
  • PDF
A Network of Noise: Designing with a Decade of Data to Sonify JANET
  • 5
  • PDF
SonNet: A Code Interface for Sonifying Computer Network Data
  • 14
  • PDF
Polymedia Design for Network Metadata Monitoring
Use of sonification in the detection of anomalous events
  • 12
Perception of delay tolerant network behavior with cognitive sonfication controller
  • 1
...
1
2
3
4
...

References

SHOWING 1-10 OF 16 REFERENCES
Do you see what I hear: experiments in multi-channel sound and 3D visualization for network monitoring?
  • 15
Network security through conservation of complexity
  • 20
Application of the JDL data fusion process model for cyber security
  • N. Giacobe
  • Computer Science, Engineering
  • Defense + Commercial Sensing
  • 2010
  • 40
  • PDF
An application of information theory to intrusion detection
  • E. Eiland, L. Liebrock
  • Computer Science
  • Fourth IEEE International Workshop on Information Assurance (IWIA'06)
  • 2006
  • 27
  • PDF
Evaluating intrusion detection systems: the 1998 DARPA off-line intrusion detection evaluation
  • 947
  • PDF
Revisions to the JDL data fusion model
  • 865
  • PDF
JDL level 5 fusion model: user refinement issues and applications in group tracking
  • E. Blasch, S. Plano
  • Computer Science, Engineering
  • SPIE Defense + Commercial Sensing
  • 2002
  • 190
  • PDF
The Computer Music Tutorial
  • 1,077
...
1
2
...