scispace - formally typeset
Search or ask a question
Journal ArticleDOI

Sonification of a network’s self-organized criticality for real-time situational awareness

01 Apr 2017-Displays (Elsevier)-Vol. 47, pp 12-24
TL;DR: A system is described that sonifies in real time an information infrastructure’s self-organized criticality to alert the network administrators of both normal and abnormal network traffic and operation.
About: This article is published in Displays.The article was published on 2017-04-01 and is currently open access. It has received 8 citations till now. The article focuses on the topics: Sonification & Network monitoring.

Summary (5 min read)

1. Introduction

  • With the large volumes of traffic passing across networks it is important to know about the state of the various components involved (servers, routers, switches, firewalls, computers, network-attached storage devices, etc.) and the types and volume of the data traffic passing through the network.
  • In military circles there is debate about whether cyberspace has become the fifth warfighting domain (the others being sea, land, air, and space) [4].
  • Sonification is a process of computational perceptualisation which Vickers [5] suggested is well suited to the monitoring of time-dependent processes and phenomena such as computer networks.
  • When network incidents occur experience shows that the speed and accuracy of the initial response are critical to a successful resolution of the situation.

1.1. Sonification for Network Monitoring

  • Sonification has been applied to many different types of data analysis (for a recent and broad coverage see The Sonification Handbook [7]).
  • One task for which it seems particularly well suited is live monitoring, as would be required in situational awareness applications [5].
  • It has been suggested that understanding the patterns of network traffic is essential to the analysis of a network’s survivability [8].
  • It remains to be determined how effective this deliberate approach to consider musical aesthetics was.
  • Worrall’s NetSon project [18] is a network sonification tool that aims to “sonically reveal aspects of the temporal structure of computer network data flows in a relatively large-scale organization”.

2. Self Organized Criticality in Network Traffic

  • In the case of the sandpile the external driving force is the addition of sand grains and the internal relaxation process is the avalanche.
  • Since then, SOC has been demonstrated in other natural systems such as earthquakes (in which the relaxation process can take seconds compared to the years or decades involved in the external driving force) and forest fires and has subsequently been observed in artificial systems such as stock markets and, latterly, computer networks.
  • In a wavelet analysis of the burstiness of self-similar computer network traffic Yang et al. [24] demonstrated that the avalanche volume, duration time, and the interevent time of traffic flow fluctuations obey power law distributions.
  • This supports Fukuda et al. [25]’s suggestion that that self-organized criticality could be the origin of the fluctuation of burstiness in network traffic.

2.1. Identifying and Measuring the SOC

  • SOC is not a discrete variable that can be identified and monitored directly.
  • Again the characteristic burstiness can be seen in the residuals, this time slightly more intense and regular.
  • Both figures plot the same data sets, but Figure 2(b) is a representation of the denoised residuals of normal traffic data that is also carrying malicious traffic data.
  • Firstly, at approximately 500 (x-axis) in Figure 2(b), a small amount of SOC activity can be observed ).
  • In the next section the authors describe a system for sonifying the SOC characteristics of network traffic.

3. The SOC Sonification System

  • A prototype SOC sonification system, socs, was designed and constructed to facilitate the real-time auditory perception of the SOC properties of network traffic.
  • For purposes of illustration, the example chosen here sonifies the log returns of the following time-dependent network traffic data items: number of bytes sent, number of packets sent, number of bytes received, number of packets received by the network which the authors call bs, ps, br, pr respectively.
  • (5) This may result in negative values for the log return which can be used to indicate the direction of a SOC event’s change in level (i.e., an increase in value means a step up to the next level of steady state, whilst a decrease means a step down).
  • In addition, all values can be squared with the sign retained or discarded.
  • The Python script calculates the log return values and feeds them as input to the sonification engine.

3.1. Sonification Parameters

  • There are many possible mappings between the input data values and the various parameters that affect the audio.
  • This may be done by increasing/decreasing the amplitude, altering a sound’s position in a sound field (e.g., left-right pan in a stereo field, front/back/left/right in a surround-sound field, or front/back/left/right and azimuth in a full threedimensional sound field), altering the sound’s phase, or altering its spectral characteristics (e.g., by changing the parameters of a filter).
  • The following sections describe the processes that were used in the system.

3.1.1. Scaling

  • Therefore, it was necessary to scale all incoming data so a scaler module was built that takes four arguments: the minimum and maximum values of the input range and the minimum and maximum of the desired output range.
  • Any any value received on the scaler’s input is converted to a corresponding value in the specified output range.

3.1.2. Amplitude Control

  • An amplitude control module was constructed that adjusts the amplitude, or level, of the output sound according to the value of the module’s input variable, in this case, the log return values.
  • The lower the log return value the quieter the sound, the higher it is the louder the sound that is played back.
  • Thus, the real-time monitoring of the network leads to constant fluctuations in the amplitude of the output, but only large changes in level are readily perceived.

3.1.3. Filtering

  • There are several ways that the spectral characteristics of an audio signal may be processed, each of which will cause a change in the timbre of the audio.
  • The advantage of a biquad filter is that it offers a richer set of filtering options than a single type of dedicated (e.g., band pass) filter and its coefficients can be altered in run time to changed the sound processing in real time.
  • The higher the resonance the wider the band of frequencies that are allowed to pass through.
  • The choice of filter depends on the kinds of sounds being loaded into the system.
  • The filter’s initial parameters are hard-coded into the loopChannel3 sub patch to best fit the sonic material being used but ultimately it is intended to expose this functionality to the end user.

3.1.4. Sampled and Synthesized Voices

  • Because the prototype system monitored four variables four voices or channels were used, one per variable.
  • The loop playback method incorporates a sub patch designed by Farnell [29] which loads a wave audio file and plays it continuously, restarting it when it reaches the end.
  • Thus, the log return value of each data stream is used to modulate the corresponding voice.
  • In the version described here, the channels contained different sounds that combined to make a countryside soundscape.
  • Any wave files can be loaded into the system.

3.2. System Architecture

  • Figure 3 shows the architecture of the sonification design used for sonifying four data streams.
  • Network traffic is captured from a log file or a live packet sniffer program by the custom Python script, also known as 1. Capture network traffic.
  • Modulates the amplitude of the voice by the log return value, also known as 5. Amplitude control.
  • The four audio channels are combined into a single stereo output which is then sent to the audio system of the host computer.
  • The channel processing section contains four similar units: three for dealing with audio loop playback and one for dealing with synthesized tone playback.

4. Discussion

  • The system was driven by a number of traffic data sets captured from live networks.
  • Traffic data were aggregated over 1 s intervals and the number of bytes and packets sent and received per interval were fed to the socs application via the Python script.
  • Each time a set of log return values is received the system uses the values to modulate the four respective audio channels.
  • Using the mappings described above one hears a soundscape comprising the combination of sounds described above.
  • When one or more very large log returns occur (such as would be expected during a dynamic system relaxation event) the corresponding soundscape experiences a very noticeable change: the amplitude varies greatly and the timbre alters as filters are adjusted .

4.1. Audio examples

  • Audio files demonstrating the system output can be found in the project repository [28].
  • Running the Python script at different playback rates and with signed, unsigned, and squared log return values leads to different auditory outputs.
  • Running the system using signed log returns (the system default) reveals that the traffic spikes shown in Fig. 5 are both negative.
  • This renders all large changes as positive spikes which results in all spikes being heard as large increases in amplitude and filtering effects.
  • In the audio file multiSpike 1s.wav the negative spikes are clearly heard as gaps in the soundscape whilst the positive spike is very audible, particularly in the wind sound which represents the received bytes variable.

4.2. The Situational Awareness Loop

  • On hearing an events such as described above (situational awareness level 1— Perception) the network aministrator would be drawn to inspecting the state of the network (situational awareness level 2 — Comprehension) to decide whether any action needs to be taken (situational awareness level 3 — Projection).
  • After deciding what action to take (level 3) then comes the stage of managing the action, which itself requires situational awareness as actions are taken to address the situation.
  • Some of these events may go unnoticed by the administrator (if, for example, they left the monitoring station for a short period of time) but individual events are not a matter of great concern.
  • What will be of particular interest is when there is an extended series of repeated high log return values which might indicate growing instability in the network.

4.3. Timescales

  • The system was run with log return intervals of 1 s and 20 ms.
  • The running of the socs system at a higher rate than the traffic data’s initial sample rate allowed historical feeds to be listened to post-hoc in a manner analogous to spooling quickly through an audio tape (the main difference being that there is no consequent alteration of pitch).
  • This means that logs can be auditioned quickly and interesting areas of activity spotted.
  • This is useful for post-incident investigations and means that the system can be used for more than live monitoring.
  • The Python script can be supplied with run-time arguments to focus on certain sections of the traffic data, and/or to slow down playback once a particular point is reached.

5. Concluding Remarks

  • The combination of using a system’s self-organized criticality as the underlying data set for situational awareness and a tool for sonifying this SOC offers a number of potential advantages.
  • While the work described here focused on the traditional traffic metrics of bytes and packets sent and received, it is important to explore what other variables and characteristics are implicated in a network’s SOC and this is the subject of ongoing work.
  • The underlying system architecture promotes interactivity by letting the user select the combination of incoming data streams to be sonified and the sonic balance of the auditory streams.
  • A tangible user interface object (e.g., a cube) with a fiducial marker on its bottom surface is placed above the router.
  • In this way the administrator can gain intelligence about the state of the network in a hands-on way.

Did you find this useful? Give us your feedback

Figures (9)
Citations
More filters
Journal ArticleDOI
06 Oct 2017
TL;DR: The results suggest that sonification can be advantageous under certain conditions, though they do not indicate the overall advantage of using sound in terms of task duration at a 5% level of significance.
Abstract: Comprehension of computer programs is daunting, due in part to clutter in the software developer's visual environment and the need for frequent visual context changes. Previous research has shown that nonspeech sound can be useful in understanding the runtime behavior of a program. We explore the viability and advantages of using nonspeech sound in an ecological framework to help understand the static structure of software. We describe a novel concept for auditory display of program elements in which sounds indicate characteristics and relationships among a Java program's classes, interfaces, and methods. An empirical study employing this concept was used to evaluate 24 sighted software professionals and students performing maintenance-oriented tasks using a 2×2 crossover. Viability is strong for differentiation and characterization of software entities, less so for identification. The results suggest that sonification can be advantageous under certain conditions, though they do not indicate the overall advantage of using sound in terms of task duration at a 5% level of significance. The results uncover other findings such as differences in comprehension strategy based on the available tool environment. The participants reported enthusiasm for the idea of software sonification, mitigated by lack of familiarity with the concept and the brittleness of the tool. Limitations of the present research include restriction to particular types of comprehension tasks, a single sound mapping, a single programming language, and limited training time, but the use of sound in program comprehension shows sufficient promise for continued research.

2 citations


Cites background from "Sonification of a network’s self-or..."

  • ...Vickers et al. (2016) provide an up-to-date literature survey of purely musical approaches to sonification of dynamic network comprehension, real-time complex systems, and so forth....

    [...]

Journal ArticleDOI
TL;DR: Analysis of quantitative ratings and qualitative comments of 37 participants revealed that the sound design strategies succeeded in communicating the nature of the computer processes, and participants showed in general an appreciation of the aesthetics of the peculiar sound models used in this study.
Abstract: Software is intangible, invisible, and at the same time pervasive in everyday devices, activities, and services accompanying our life. Therefore, citizens hardly realize its complexity, power, and impact in many aspects of their daily life. In this study, we report on one experiment that aims at letting citizens make sense of software presence and activity in their everyday lives, through sound: the invisible complexity of the processes involved in the shutdown of a personal computer. We used sonification to map information embedded in software events into the sound domain. The software events involved in a shutdown have names related to the physical world and its actions: write events (information is saved into digital memories), kill events (running processes are terminated), and exit events (running programs are exited). The research study presented in this article has a “double character.” It is an artistic realization that develops specific aesthetic choices, and it has also pedagogical purposes informing the causal listener about the complexity of software behavior. Two different sound design strategies have been applied: one strategy is influenced by the sonic characteristics of the Glitch music scene, which makes deliberate use of glitch-based sound materials, distortions, aliasing, quantization noise, and all the “failures” of digital technologies; and a second strategy based on the sound samples of a subcontrabass Paetzold recorder, an unusual and special acoustic instrument which unique sound has been investigated in the contemporary art music scene. Analysis of quantitative ratings and qualitative comments of 37 participants revealed that the sound design strategies succeeded in communicating the nature of the computer processes. Participants also showed in general an appreciation of the aesthetics of the peculiar sound models used in this study.

1 citations

Journal ArticleDOI
TL;DR: In this paper , a sonification design named SonAir was developed based on the outcome of the workshops, and was integrated with an RTC simulator for evaluating to what degree SonAir could support air traffic controllers in their work.
Abstract: Abstract Along with the increase of digitalization and automation, a new kind of working environment is emerging in the field of air traffic control. Instead of situating the control tower at the airport, it is now possible to remotely control the airport at any given location, i.e. in a remote tower center (RTC). However, by controlling the airport remotely, the situational awareness and sense of presence might be compromised. By using directional sound, a higher situational awareness could potentially be achieved while also offloading the visual perception which is heavily used in air traffic control. Suitable use cases for sonification in air traffic control were found through workshops with air traffic controllers. A sonification design named SonAir was developed based on the outcome of the workshops, and was integrated with an RTC simulator for evaluating to what degree SonAir could support air traffic controllers in their work. The results suggest that certain aspects of SonAir could be useful for air traffic controllers. A continuous sonification where the spatial positioning of aircraft were conveyed was experienced to be partially useful, but the intrusiveness of SonAir should be further considered to fit the air traffic controllers’ needs. An earcon that conveyed when an aircraft enters the airspace and from which direction was considered useful to support situational awareness.
References
More filters
Journal ArticleDOI
TL;DR: A theoretical model of situation awareness based on its role in dynamic human decision making in a variety of domains is presented and design implications for enhancing operator situation awareness and future directions for situation awareness research are explored.
Abstract: This paper presents a theoretical model of situation awareness based on its role in dynamic human decision making in a variety of domains. Situation awareness is presented as a predominant concern in system operation, based on a descriptive view of decision making. The relationship between situation awareness and numerous individual and environmental factors is explored. Among these factors, attention and working memory are presented as critical factors limiting operators from acquiring and interpreting information from the environment to form situation awareness, and mental models and goal-directed behavior are hypothesized as important mechanisms for overcoming these limits. The impact of design features, workload, stress, system complexity, and automation on operator situation awareness is addressed, and a taxonomy of errors in situation awareness is introduced, based on the model presented. The model is used to generate design implications for enhancing operator situation awareness and future directio...

7,470 citations


"Sonification of a network’s self-or..." refers background in this paper

  • ...three-level situational awareness model (the third being project) [2] align themselves with Pierre Schaeffer’s two fundamental modes of musical listening, écouter (hearing, the auditory equivalent of perception) and entendre (literally ‘understanding’, the equivalent of comprehension)....

    [...]

  • ...…on network data we note that the perceive and comprehend stages in Endsley’s three-level situational awareness model (the third being project) (Endsley, 1995) align themselves with Pierre Schaeffer’s two fundamental modes of musical listening, écouter (hearing, the auditory equivalent of…...

    [...]

  • ...and others have followed (notably Endsley’s three-level model [2])....

    [...]

  • ...This problem of information presentation and interpretation, or ‘situational awareness’, was addressed by the military leading to Boyd’s OODA (observe, orient, decide, act) model (see (Angerman, 2004)), and others have followed (notably Endsley’s three-level model (Endsley, 1995))....

    [...]

Journal ArticleDOI
TL;DR: It is shown that dynamical systems with spatial degrees of freedom naturally evolve into a self-organized critical point, and flicker noise, or 1/f noise, can be identified with the dynamics of the critical state.
Abstract: We show that dynamical systems with spatial degrees of freedom naturally evolve into a self-organized critical point. Flicker noise, or 1/f noise, can be identified with the dynamics of the critical state. This picture also yields insight into the origin of fractal objects.

6,486 citations


"Sonification of a network’s self-or..." refers background in this paper

  • ...Thus, a system can exhibit many many differing states, each of which is ‘barely stable’, a condition called metastability (Bak et al., 1987)....

    [...]

  • ...According to Bak et al. (1987) such power law distributions in complex systems are evidence of self-organized criticality (SOC)....

    [...]

  • ...Thus, a system can exhibit many many differing states, each of which is ‘barely stable’, a condition called metastability [19]....

    [...]

  • ...[19] such power law distributions in complex systems are evidence of SOC....

    [...]

  • ...In 1987 Bak, Tang, and Wiesenfeld [19] brought together the concept of emergent complexity in simple systems, the mathematics describing the complexity of fractals in natural systems, and the scale-invariant power laws, fractal geometries, and the pink (1/ f ) noise observed at the critical points between phase transitions in physical systems in a single explanatory model they termed self-organized criticality, or SOC....

    [...]

Journal ArticleDOI
TL;DR: It is shown that the self-similarity in WWW traffic can be explained based on the underlying distributions of WWW document sizes, the effects of caching and user preference in file transfer, the effect of user "think time", and the superimposition of many such transfers in a local-area network.
Abstract: The notion of self-similarity has been shown to apply to wide-area and local-area network traffic. We show evidence that the subset of network traffic that is due to World Wide Web (WWW) transfers can show characteristics that are consistent with self-similarity, and we present a hypothesized explanation for that self-similarity. Using a set of traces of actual user executions of NCSA Mosaic, we examine the dependence structure of WWW traffic. First, we show evidence that WWW traffic exhibits behavior that is consistent with self-similar traffic models. Then we show that the self-similarity in such traffic can be explained based on the underlying distributions of WWW document sizes, the effects of caching and user preference in file transfer, the effect of user "think time", and the superimposition of many such transfers in a local-area network. To do this, we rely on empirically measured distributions both from client traces and from data independently collected at WWW servers.

2,608 citations

Proceedings ArticleDOI
01 Oct 1993
TL;DR: In this paper, the authors demonstrate that Ethernet local area network (LAN) traffic is statistically self-similar, that none of the commonly used traffic models is able to capture this fractal behavior, and that such behavior has serious implications for the design, control, and analysis of high-speed, cell-based networks.
Abstract: We demonstrate that Ethernet local area network (LAN) traffic is statistically self-similar, that none of the commonly used traffic models is able to capture this fractal behavior, and that such behavior has serious implications for the design, control, and analysis of high-speed, cell-based networks. Intuitively, the critical characteristic of this self-similar traffic is that there is no natural length of a "burst": at every time scale ranging from a few milliseconds to minutes and hours, similar-looking traffic bursts are evident; we find that aggregating streams of such traffic typically intensifies the self-similarity ("burstiness") instead of smoothing it.Our conclusions are supported by a rigorous statistical analysis of hundreds of millions of high quality Ethernet traffic measurements collected between 1989 and 1992, coupled with a discussion of the underlying mathematical and statistical properties of self-similarity and their relationship with actual network behavior. We also consider some implications for congestion control in high-bandwidth networks and present traffic models based on self-similar stochastic processes that are simple, accurate, and realistic for aggregate traffic.

1,089 citations

Book
01 Jan 1998

610 citations

Frequently Asked Questions (1)
Q1. What contributions have the authors mentioned in the paper "Sonification of a network’s self-organized criticality for real-time situational awareness" ?

This article focuses on the combination of two dissimilar research concepts, namely sonification ( a form of auditory display ) and self-organized criticality ( SOC ). Implications for how such a system may support real-time situational awareness and posthoc incident analysis are discussed.