...
首页> 外文期刊>Computers & Security >Hearing attacks in network data: An effectiveness study
【24h】

Hearing attacks in network data: An effectiveness study

机译:网络数据中的听力攻击:有效性研究

获取原文
获取原文并翻译 | 示例

摘要

Sonification, in which data is represented as sound, can be used to turn network attacks and network-security information into audio signals. This could complement the range of security-monitoring tools currently used in Security Operations Centres (SOCs). Prior work in sonification for network monitoring has not assessed the effectiveness of the technique for enabling users to monitor network-security information. To this end, we aim to investigate the viability of using sonified network datasets to enable humans to detect (recognise the presence of some) and identify (understand the type of) network attacks. In this paper we report the results of a user study in which we assessed the utility of a network-traffic sonification system for representing network attacks. Our results show that by listening to the sonified network data, participants could detect attacks accurately and efficiently, including combinations of attacks, and identify the types of attacks. Musical experience had no significant effect on the ability of participants to use the sonification, and participants could detect attacks without training, yet improved performance through training. The results support the potential of sonification for use in network-security monitoring tasks.
机译:声音可以将声音表示为声音的声音,可以将网络攻击和网络安全信息转换为音频信号。这可以补充当前在安全运营中心(SOC)中使用的安全监视工具的范围。用于网络监视的超声波处理的先前工作尚未评估使用户能够监视网络安全信息的技术的有效性。为此,我们旨在调查使用分类的网络数据集使人类能够检测(识别某些威胁)和识别(了解网络攻击的类型)的可行性。在本文中,我们报告了一项用户研究的结果,在该研究中,我们评估了代表代表网络攻击的网络流量超声系统的效用。我们的结果表明,通过听取声音的网络数据,参与者可以准确有效地检测攻击,包括攻击的组合,并确定攻击的类型。音乐经验对参加者使用超音波的能力没有显着影响,参加者无需训练即可检测到攻击,但通过训练可以提高演奏性能。结果支持在网络安全监视任务中使用超音波的可能性。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号