scispace - formally typeset
Search or ask a question
Journal ArticleDOI

Sonification of a network’s self-organized criticality for real-time situational awareness

01 Apr 2017-Displays (Elsevier)-Vol. 47, pp 12-24
TL;DR: A system is described that sonifies in real time an information infrastructure’s self-organized criticality to alert the network administrators of both normal and abnormal network traffic and operation.
About: This article is published in Displays.The article was published on 2017-04-01 and is currently open access. It has received 8 citations till now. The article focuses on the topics: Sonification & Network monitoring.

Summary (5 min read)

1. Introduction

  • With the large volumes of traffic passing across networks it is important to know about the state of the various components involved (servers, routers, switches, firewalls, computers, network-attached storage devices, etc.) and the types and volume of the data traffic passing through the network.
  • In military circles there is debate about whether cyberspace has become the fifth warfighting domain (the others being sea, land, air, and space) [4].
  • Sonification is a process of computational perceptualisation which Vickers [5] suggested is well suited to the monitoring of time-dependent processes and phenomena such as computer networks.
  • When network incidents occur experience shows that the speed and accuracy of the initial response are critical to a successful resolution of the situation.

1.1. Sonification for Network Monitoring

  • Sonification has been applied to many different types of data analysis (for a recent and broad coverage see The Sonification Handbook [7]).
  • One task for which it seems particularly well suited is live monitoring, as would be required in situational awareness applications [5].
  • It has been suggested that understanding the patterns of network traffic is essential to the analysis of a network’s survivability [8].
  • It remains to be determined how effective this deliberate approach to consider musical aesthetics was.
  • Worrall’s NetSon project [18] is a network sonification tool that aims to “sonically reveal aspects of the temporal structure of computer network data flows in a relatively large-scale organization”.

2. Self Organized Criticality in Network Traffic

  • In the case of the sandpile the external driving force is the addition of sand grains and the internal relaxation process is the avalanche.
  • Since then, SOC has been demonstrated in other natural systems such as earthquakes (in which the relaxation process can take seconds compared to the years or decades involved in the external driving force) and forest fires and has subsequently been observed in artificial systems such as stock markets and, latterly, computer networks.
  • In a wavelet analysis of the burstiness of self-similar computer network traffic Yang et al. [24] demonstrated that the avalanche volume, duration time, and the interevent time of traffic flow fluctuations obey power law distributions.
  • This supports Fukuda et al. [25]’s suggestion that that self-organized criticality could be the origin of the fluctuation of burstiness in network traffic.

2.1. Identifying and Measuring the SOC

  • SOC is not a discrete variable that can be identified and monitored directly.
  • Again the characteristic burstiness can be seen in the residuals, this time slightly more intense and regular.
  • Both figures plot the same data sets, but Figure 2(b) is a representation of the denoised residuals of normal traffic data that is also carrying malicious traffic data.
  • Firstly, at approximately 500 (x-axis) in Figure 2(b), a small amount of SOC activity can be observed ).
  • In the next section the authors describe a system for sonifying the SOC characteristics of network traffic.

3. The SOC Sonification System

  • A prototype SOC sonification system, socs, was designed and constructed to facilitate the real-time auditory perception of the SOC properties of network traffic.
  • For purposes of illustration, the example chosen here sonifies the log returns of the following time-dependent network traffic data items: number of bytes sent, number of packets sent, number of bytes received, number of packets received by the network which the authors call bs, ps, br, pr respectively.
  • (5) This may result in negative values for the log return which can be used to indicate the direction of a SOC event’s change in level (i.e., an increase in value means a step up to the next level of steady state, whilst a decrease means a step down).
  • In addition, all values can be squared with the sign retained or discarded.
  • The Python script calculates the log return values and feeds them as input to the sonification engine.

3.1. Sonification Parameters

  • There are many possible mappings between the input data values and the various parameters that affect the audio.
  • This may be done by increasing/decreasing the amplitude, altering a sound’s position in a sound field (e.g., left-right pan in a stereo field, front/back/left/right in a surround-sound field, or front/back/left/right and azimuth in a full threedimensional sound field), altering the sound’s phase, or altering its spectral characteristics (e.g., by changing the parameters of a filter).
  • The following sections describe the processes that were used in the system.

3.1.1. Scaling

  • Therefore, it was necessary to scale all incoming data so a scaler module was built that takes four arguments: the minimum and maximum values of the input range and the minimum and maximum of the desired output range.
  • Any any value received on the scaler’s input is converted to a corresponding value in the specified output range.

3.1.2. Amplitude Control

  • An amplitude control module was constructed that adjusts the amplitude, or level, of the output sound according to the value of the module’s input variable, in this case, the log return values.
  • The lower the log return value the quieter the sound, the higher it is the louder the sound that is played back.
  • Thus, the real-time monitoring of the network leads to constant fluctuations in the amplitude of the output, but only large changes in level are readily perceived.

3.1.3. Filtering

  • There are several ways that the spectral characteristics of an audio signal may be processed, each of which will cause a change in the timbre of the audio.
  • The advantage of a biquad filter is that it offers a richer set of filtering options than a single type of dedicated (e.g., band pass) filter and its coefficients can be altered in run time to changed the sound processing in real time.
  • The higher the resonance the wider the band of frequencies that are allowed to pass through.
  • The choice of filter depends on the kinds of sounds being loaded into the system.
  • The filter’s initial parameters are hard-coded into the loopChannel3 sub patch to best fit the sonic material being used but ultimately it is intended to expose this functionality to the end user.

3.1.4. Sampled and Synthesized Voices

  • Because the prototype system monitored four variables four voices or channels were used, one per variable.
  • The loop playback method incorporates a sub patch designed by Farnell [29] which loads a wave audio file and plays it continuously, restarting it when it reaches the end.
  • Thus, the log return value of each data stream is used to modulate the corresponding voice.
  • In the version described here, the channels contained different sounds that combined to make a countryside soundscape.
  • Any wave files can be loaded into the system.

3.2. System Architecture

  • Figure 3 shows the architecture of the sonification design used for sonifying four data streams.
  • Network traffic is captured from a log file or a live packet sniffer program by the custom Python script, also known as 1. Capture network traffic.
  • Modulates the amplitude of the voice by the log return value, also known as 5. Amplitude control.
  • The four audio channels are combined into a single stereo output which is then sent to the audio system of the host computer.
  • The channel processing section contains four similar units: three for dealing with audio loop playback and one for dealing with synthesized tone playback.

4. Discussion

  • The system was driven by a number of traffic data sets captured from live networks.
  • Traffic data were aggregated over 1 s intervals and the number of bytes and packets sent and received per interval were fed to the socs application via the Python script.
  • Each time a set of log return values is received the system uses the values to modulate the four respective audio channels.
  • Using the mappings described above one hears a soundscape comprising the combination of sounds described above.
  • When one or more very large log returns occur (such as would be expected during a dynamic system relaxation event) the corresponding soundscape experiences a very noticeable change: the amplitude varies greatly and the timbre alters as filters are adjusted .

4.1. Audio examples

  • Audio files demonstrating the system output can be found in the project repository [28].
  • Running the Python script at different playback rates and with signed, unsigned, and squared log return values leads to different auditory outputs.
  • Running the system using signed log returns (the system default) reveals that the traffic spikes shown in Fig. 5 are both negative.
  • This renders all large changes as positive spikes which results in all spikes being heard as large increases in amplitude and filtering effects.
  • In the audio file multiSpike 1s.wav the negative spikes are clearly heard as gaps in the soundscape whilst the positive spike is very audible, particularly in the wind sound which represents the received bytes variable.

4.2. The Situational Awareness Loop

  • On hearing an events such as described above (situational awareness level 1— Perception) the network aministrator would be drawn to inspecting the state of the network (situational awareness level 2 — Comprehension) to decide whether any action needs to be taken (situational awareness level 3 — Projection).
  • After deciding what action to take (level 3) then comes the stage of managing the action, which itself requires situational awareness as actions are taken to address the situation.
  • Some of these events may go unnoticed by the administrator (if, for example, they left the monitoring station for a short period of time) but individual events are not a matter of great concern.
  • What will be of particular interest is when there is an extended series of repeated high log return values which might indicate growing instability in the network.

4.3. Timescales

  • The system was run with log return intervals of 1 s and 20 ms.
  • The running of the socs system at a higher rate than the traffic data’s initial sample rate allowed historical feeds to be listened to post-hoc in a manner analogous to spooling quickly through an audio tape (the main difference being that there is no consequent alteration of pitch).
  • This means that logs can be auditioned quickly and interesting areas of activity spotted.
  • This is useful for post-incident investigations and means that the system can be used for more than live monitoring.
  • The Python script can be supplied with run-time arguments to focus on certain sections of the traffic data, and/or to slow down playback once a particular point is reached.

5. Concluding Remarks

  • The combination of using a system’s self-organized criticality as the underlying data set for situational awareness and a tool for sonifying this SOC offers a number of potential advantages.
  • While the work described here focused on the traditional traffic metrics of bytes and packets sent and received, it is important to explore what other variables and characteristics are implicated in a network’s SOC and this is the subject of ongoing work.
  • The underlying system architecture promotes interactivity by letting the user select the combination of incoming data streams to be sonified and the sonic balance of the auditory streams.
  • A tangible user interface object (e.g., a cube) with a fiducial marker on its bottom surface is placed above the router.
  • In this way the administrator can gain intelligence about the state of the network in a hands-on way.

Did you find this useful? Give us your feedback

Figures (9)
Citations
More filters
Journal ArticleDOI
19 Apr 2018-PLOS ONE
TL;DR: SoNSTAR (Sonification of Networks for SiTuational AwaReness), a real-time sonification system for monitoring computer networks to support network administrators’ situational awareness, is presented.
Abstract: Maintaining situational awareness of what is happening within a computer network is challenging, not only because the behaviour happens within machines, but also because data traffic speeds and volumes are beyond human ability to process. Visualisation techniques are widely used to present information about network traffic dynamics. Although they provide operators with an overall view and specific information about particular traffic or attacks on the network, they often still fail to represent the events in an understandable way. Also, because they require visual attention they are not well suited to continuous monitoring scenarios in which network administrators must carry out other tasks. Here we present SoNSTAR (Sonification of Networks for SiTuational AwaReness), a real-time sonification system for monitoring computer networks to support network administrators’ situational awareness. SoNSTAR provides an auditory representation of all the TCP/IP traffic within a network based on the different traffic flows between between network hosts. A user study showed that SoNSTAR raises situational awareness levels by enabling operators to understand network behaviour and with the benefit of lower workload demands (as measured by the NASA TLX method) than visual techniques. SoNSTAR identifies network traffic features by inspecting the status flags of TCP/IP packet headers. Combinations of these features define particular traffic events which are mapped to recorded sounds to generate a soundscape that represents the real-time status of the network traffic environment. The sequence, timing, and loudness of the different sounds allow the network to be monitored and anomalous behaviour to be detected without the need to continuously watch a monitor screen.

19 citations


Cites background from "Sonification of a network’s self-or..."

  • ...[19, 45, 46] applied sonification to the inherent self-organised criticality observed in network traffic....

    [...]

Journal ArticleDOI
TL;DR: This paper reviews the previous research on utilizing human senses and capabilities in cryptography, and proposes several topics and problems that need to be solved in order to build cryptography that is more accessible to humans.

9 citations

Proceedings ArticleDOI
23 Aug 2017
TL;DR: Using a variety of sonification techniques, this work examines the user context, how this sonification leads to system design considerations, and feeds back into the user experience.
Abstract: The existing sonification of networks mainly focuses on security. Our novel approach is framed by the ways in which network traffic changes over the national JANET network. Using a variety of sonification techniques, we examine the user context, how this sonification leads to system design considerations, and feeds back into the user experience.

6 citations

Journal ArticleDOI
01 Jul 2021
TL;DR: “CyberWarner” is introduced, a sonification sandbox that can be installed on the Google Chrome browser to enable auditory representations of certain security threats and cues that are designed based on several URL heuristics that are feasible to develop sonified cyber security threat indicators that users intuitively understand with minimal experience and training.
Abstract: This paper reports a formative evaluation of auditory representations of cyber security threat indicators and cues, referred to as sonifications, to warn users about cyber threats. Most Internet browsers provide visual cues and textual warnings to help users identify when they are at risk. Although these alarming mechanisms are very effective in informing users, there are certain situations and circumstances where these alarming techniques are unsuccessful in drawing the user’s attention: (1) security warnings and features (e.g., blocking out malicious Websites) might overwhelm a typical Internet user and thus the users may overlook or ignore visual and textual warnings and, as a result, they might be targeted, (2) these visual cues are inaccessible to certain users such as those with visual impairments. This work is motivated by our previous work of the use of sonification of security warnings to users who are visually impaired. To investigate the usefulness of sonification in general security settings, this work uses real Websites instead of simulated Web applications with sighted participants. The study targets sonification for three different types of security threats: (1) phishing, (2) malware downloading, and (3) form filling. The results show that on average 58% of the participants were able to correctly remember what the sonification conveyed. Additionally, about 73% of the participants were able to correctly identify the threat that the sonification represented while performing tasks using real Websites. Furthermore, the paper introduces “CyberWarner”, a sonification sandbox that can be installed on the Google Chrome browser to enable auditory representations of certain security threats and cues that are designed based on several URL heuristics.

5 citations

Proceedings ArticleDOI
23 Aug 2017
TL;DR: This paper investigates the use of data sonification as a narrative tool in soundscape composition, and shows a strong ability in participants to decode and comprehend additional layers of narrative information communicated through the soundscape.
Abstract: Soundscape composition is an art form that has grown from acoustic ecology and soundscape studies. Current practices foster a wide range of approaches, from the educational and documentary function of the world soundscape project (WSP) to the creation of imaginary sonic worlds supported by theories of acousmatic and electroacoustic music.Sonification is the process of rendering audio in response to data, and is often used in scenarios where visual representations of data are impractical. The field of auditory display has grown in isolation to soundscape composition, however fosters conceptual similarities in its representation of information in sonic form.This paper investigates the use of data sonification as a narrative tool in soundscape composition. A soundscape has been created using traditional concrete sounds (fixed media recorded sound objects), augmented with sonified real-time elements. An online survey and listening experiment was conducted, which asked participants to rate the soundscape on its ability to communicate specific detail with regard to environmental and social elements contained within. Research data collected shows a strong ability in participants to decode and comprehend additional layers of narrative information communicated through the soundscape.

4 citations

References
More filters
Journal ArticleDOI
01 Sep 2012
TL;DR: A panel of six experts in cognitive engineering to provide perspectives on the cyber security problem and promising solutions are assembled.
Abstract: The cyber security task is an intensely cognitive task that is embedded in a large multi-layered sociotechnical system of analysts, computers, and networks. Effective performance in this world is hampered by enormous size and complexity of the network data, the adaptive nature of intelligent adversaries, the lack of ground truth to assess performance, the high number of false alarms presented by automated alerting systems, by organizational stove pipes thwarting collaboration, and by technology that is thrown at the problem without an adequate understanding of the human needs. Further, the consequences of effective system performance in the cyber security domain are unparalleled because our world is so dependent on its cyber infrastructure. We have assembled a panel of six experts in cognitive engineering to provide perspectives on the cyber security problem and promising solutions.

29 citations


"Sonification of a network’s self-or..." refers background in this paper

  • ...Situational awareness, as Cook put it, “requires that various pieces of information be connected in space and time” (Nancy Cooke in McNeese [3])....

    [...]

  • ...D’Amico (see McNeese (2012)) put the challenge of designing visualizations for situational awareness this way: . . . visualization designers must focus on the specific role of the target user, and the stage of situational awareness the visualizations are intended to support: perception, comprehension, or projection....

    [...]

  • ...Endsley and Connor (in McNeese (2012)) came to the same conclusion stating that the “extreme volume of data and the speed at which that data flows rapidly exceeds human cognitive limits and capabilities.”...

    [...]

  • ...D’Amico (see McNeese (2012)) put the challenge of designing visualizations for situational awareness this way: . . . visualization designers must focus on the specific role of the target user, and the stage of situational awareness the visualizations are intended to support: perception,…...

    [...]

  • ...Endsley and Connor (in McNeese [3]) came to the same conclusion, stating that the “extreme volume of data and the speed at which that data flows rapidly exceeds human cognitive limits and capabilities....

    [...]

27 Jun 2018
TL;DR: In this paper, the authors consider auditory display as an activity of perceptualization, that is, the process of making perceptible to humans aspects or features of a given data set or system.
Abstract: Auditory display is concerned with the use of non-speech sound to communicate information. If the term seems at first oxymoronic, then consider auditory display as an activity of perceptualization, that is, the process of making perceptible to humans aspects or features of a given data set or system. Most commonly this is done using visual representations (which process we call visualization) but it is not limited to the visual channel and recent years have witnessed the increased use of auditory representations in the production of tools for exploring data. By way of semiotics and an aesthetic perspective shift this article posits that auditory display may be considered a form of organized sound and explores the listening experience in this context.

20 citations

Proceedings ArticleDOI
01 Jun 2013
TL;DR: The design and implementation of the SonNet system are presented, and a pilot evaluation of the system is discussed, which discusses compositional applications of SonNet and illustrates the use of the System in an example composition.
Abstract: As any computer user employs the Internet to accomplish everyday activities, a flow of data packets moves across the network, forming their own patterns in response to his or her actions. Artists and sound designers who are interested in accessing that data to make music must currently possess low-level knowledge of Internet protocols and spend significant effort working with low-level networking code. We have created SonNet, a new software tool that lowers these practical barriers to experimenting and composing with network data. SonNet executes packet-sniffing and network connection state analysis automatically, and it includes an easy-touse ChucK object that can be instantiated, customized, and queried from a user’s own code. In this paper, we present the design and implementation of the SonNet system, and we discuss a pilot evaluation of the system with computer music composers. We also discuss compositional applications of SonNet and illustrate the use of the system in an example composition.

16 citations


"Sonification of a network’s self-or..." refers background in this paper

  • ...Wolf and Fiebrink [17] designed the SonNet system to help users (artists or people have an interest in network traffic information) to easily access network traffic through a simple coding interface without requiring knowledge of Internet protocols....

    [...]

Book ChapterDOI
01 Jan 2012
TL;DR: This chapter provides an introduction to traditional data fusion models and adapts them to the domain of cyber security, and proposes a novel means of situational awareness involving an auditory representation (sonification) of network traffic.
Abstract: INTRODUCTION Historically, an enormous amount of research and development on information fusion has been conducted in support of military operations (e.g., fusion of multi-sensor data for target tracking, identification, and threat assessment and situation awareness) (Hall and McMullen, 2004) (Liggins et al., 2008). The research has included development of process models, creation of algorithms for signal and image processing, pattern recognition , state estimation, automated reasoning, and dynamic resource allocation. ABSTRACT Computer networks no longer simply enable military and civilian operations, but have become vital infrastructures for all types of operations ranging from sensing and command/control to logistics, power distribution, and many other functions. Consequently, network attacks have become weapons of choice for adversaries engaged in asymmetric warfare. Traditionally, data and information fusion techniques were developed to improve situational awareness and threat assessment by combining data from diverse sources, and have recently been extended to include both physical (" hard ") sensors and human observers (acting as " soft " sensors). This chapter provides an introduction to traditional data fusion models and adapts them to the domain of cyber security. Recent advances in hard and soft information fusion are summarized and applied to the cyber security domain. Research on the use of sound for human-in-the-loop pattern recognition (sonification) is also introduced. Finally, perspectives are provided on the future for data fusion in cyber security research. This chapter adapts these models to the domain of cyber security. This is a field in which data fusion techniques and terminology are becoming increasingly relevant, given the complex tasks of maintaining overall awareness of a network's current status, projecting future actions of adversaries , and making timely adjustments. Following a discussion of hard and soft information fusion and their relevance to the cyber security domain, we propose a novel means of situational awareness involving an auditory representation (sonification) of network traffic. This chapter is organized as follows. We begin by exploring of some of the background research in three areas of interest – use of humans as soft sensors, data fusion technologies in cyber security , and sonification. The first content area of human-centric information fusion outlines the use of humans as " soft " sensors. The second content area presents the general data fusion framework (the JDL model) as it applies to the cyber security context. The third main content area, sonification, is construed as a cognitive refinement. The chapter concludes with a …

15 citations


"Sonification of a network’s self-or..." refers background in this paper

  • ...[12, 13, 14] built on these ideas to address the particular case of situational awareness....

    [...]

01 Jun 2012
TL;DR: An inn0vative appr0ach in m0nit0ring netw0rk traffic is presented by adding a new dimensi0n: the s0und by helping the administrat0r in detecting efficiently the hacking and abuse of the infrastructure.
Abstract: This paper presents an inn0vative appr0ach in m0nit0ring netw0rk traffic by adding a new dimensi0n: the s0und. InteNti0n (Interactive Netw0rk S0nificati0n) is a pr0ject aimed at mapping netw0rk activity t0 musical aesthetic. The netw0rk traffic analysis is made with the SharpPCap library (a p0rt 0f WinPCap t0 C# envir0nment). Fr0m this analysis, the c0llected data are c0nverted int0 MIDI (Musical Instrument Digital Interface) messages and sent t0 dedicated synthesizers, which generate s0unds dynamically mixed t0gether. The wh0le pr0cess results in an interactive s0undscape. This n0vel appr0ach will initiate tw0 0pp0rtunities f0r techn0l0gical devel0pment. It all0ws users t0 actively take part in an interactive exhibiti0n system thr0ugh simple acti0ns inv0lving netw0rk access, including streaming radi0 0ver the Internet, sharing music 0n Twitter, d0wnl0ading mp3 files and 0thers. This pr0ject initiates als0 a new dimensi0n in m0nit0ring the netw0rk by helping the administrat0r in detecting efficiently the hacking and abuse 0f the infrastructure.

14 citations


"Sonification of a network’s self-or..." refers background in this paper

  • ...Like Stetho, Giot and Courbe’s InteNtion (Interactive Network Sonification) system mapped network activity to a musical aesthetic via MIDI [16]....

    [...]

Frequently Asked Questions (1)
Q1. What contributions have the authors mentioned in the paper "Sonification of a network’s self-organized criticality for real-time situational awareness" ?

This article focuses on the combination of two dissimilar research concepts, namely sonification ( a form of auditory display ) and self-organized criticality ( SOC ). Implications for how such a system may support real-time situational awareness and posthoc incident analysis are discussed.