TY - GEN
T1 - Server sounds and network noises
AU - Rinderle-Ma, Stefanie
AU - Hildebrandt, Tobias
N1 - Publisher Copyright:
© 2015 IEEE.
PY - 2016/1/25
Y1 - 2016/1/25
N2 - For server and network administrators, it is a challenge to keep an overview of their systems to detect potential intrusions and security risks in real-time as well as in retrospect. Most security tools leverage our inherent ability for pattern detection by visualizing different types of security data. Several studies suggest that complementing visualization with sonification (the presentation of data using sound) can alleviate some of the challenges of visual monitoring (such as the need for constant visual focus). This paper therefore provides an overview of the current state of research regarding auditory-based and multimodal tools in computer security. Most existing research in this area is geared towards supporting users in real-time network and server monitoring, while there are only few approaches that are designed for retrospective data analysis. There exist several sonification-based tools in a mature state, but their effectiveness has hardly been tested in formal user and usability studies. Such studies are however needed to provide a solid basis for deciding which type of sonification is most suitable for which kind of scenarios and how to best combine the two modalities, visualization and sonification, to support users in their daily routines.
AB - For server and network administrators, it is a challenge to keep an overview of their systems to detect potential intrusions and security risks in real-time as well as in retrospect. Most security tools leverage our inherent ability for pattern detection by visualizing different types of security data. Several studies suggest that complementing visualization with sonification (the presentation of data using sound) can alleviate some of the challenges of visual monitoring (such as the need for constant visual focus). This paper therefore provides an overview of the current state of research regarding auditory-based and multimodal tools in computer security. Most existing research in this area is geared towards supporting users in real-time network and server monitoring, while there are only few approaches that are designed for retrospective data analysis. There exist several sonification-based tools in a mature state, but their effectiveness has hardly been tested in formal user and usability studies. Such studies are however needed to provide a solid basis for deciding which type of sonification is most suitable for which kind of scenarios and how to best combine the two modalities, visualization and sonification, to support users in their daily routines.
UR - http://www.scopus.com/inward/record.url?scp=84966545457&partnerID=8YFLogxK
U2 - 10.1109/CogInfoCom.2015.7390562
DO - 10.1109/CogInfoCom.2015.7390562
M3 - Conference contribution
AN - SCOPUS:84966545457
T3 - 6th IEEE Conference on Cognitive Infocommunications, CogInfoCom 2015 - Proceedings
SP - 45
EP - 50
BT - 6th IEEE Conference on Cognitive Infocommunications, CogInfoCom 2015 - Proceedings
PB - Institute of Electrical and Electronics Engineers Inc.
T2 - 6th IEEE Conference on Cognitive Infocommunications, CogInfoCom 2015
Y2 - 19 October 2015 through 21 October 2015
ER -