Sonification in security operations centres: what do security practitioners think?
In Security Operations Centres (SOCs) security practitioners work using a range of tools to detect and mitigate malicious computer-network activity. Sonification, in which data is represented as sound, is said to have potential as an approach to addr…
Authors: Louise M. Axon, Bushra Alahmadi, Jason R. C. Nurse
Sonification in Security Operations Centres: What do Security Practitioners Think? Louise Axon, Bushra Alahmadi, Jason R. C. Nurse, Michael Goldsmith and Sadie Creese Department of Computer Science, Univ ersity of Oxford { louise.axon, bushra.alahmadi, jason.nurse, michael.goldsmith, sadie.creese } @cs.ox.ac.uk Abstract —In Security Operations Centres (SOCs) security practitioners work using a range of tools to detect and mitigate malicious computer -network activity . Sonification, in which data is r epresented as sound, is said to have potential as an approach to addressing some of the unique challenges faced by SOCs. For example, sonification has been shown to enable peripheral monitoring of processes, which could aid practitioners multitask- ing in busy SOCs. The perspectives of security practitioners on incorporating sonification into their actual working en vironments hav e not yet been examined, howev er . The aim of this paper theref ore is to address this gap by exploring attitudes to using sonification in SOCs. W e report on the results of a study consisting of an online survey (N=20) and interviews (N=21) with security practitioners working in a range of different SOCs. Our contribution is a r efined appreciation of the contexts in which sonification could aid in SOC working practice, and an understanding of the ar eas in which sonification may not be beneficial or may e ven be problematic. W e also analyse the critical requir ements for the design of sonification systems and their integration into the SOC setting. Our findings clarify insights into the potential benefits and challenges of introducing sonification to support work in this vital security-monitoring envir onment. I . I N T RO D U C T I O N The threats to the cybersecurity of today’ s organisations are numerous, vastly varied and constantly ev olving. Security Operations Centres (SOCs) run within and on behalf of organ- isations, and are responsible for the security of networks and critical infrastructure. In SOCs, security practitioners w ork, often under high pressure [1], interacting with a range of security tools to detect and prev ent malicious activity . There is a requirement for monitoring tools for use in SOCs that are effecti ve and meet the needs of security practitioners. In recent years, the incorporation of sonification, in which data is represented as sound, into SOCs has been considered. Sonification is defined as “the use of non-speech audio to con ve y information” [2]. The outputs of sonification systems are often referred to as “sonified displays”, or “auditory displays”. A body of research e xists into the use of sonifi- cation for monitoring processes, exploring data, and alerting [3]. Based on existing research, the properties afforded by sonification align with some kno wn requirements of SOCs. Articles exploring the sonification of network-security data indicate its promise as a technique for attack detection [4], [5], [6], improv ed methods for which are critical to SOCs. Furthermore, sonification is an ef fectiv e medium for peripheral monitoring of information as a non-primary task [7]. This could be useful to busy practitioners in bustling SOCs. On the other hand, there are concerns about the fatigue and distraction that could be caused by sonification, which raise questions about its true utility in these dynamic en vironments. Despite these potential benefits, there has to-date been no research exploring practitioners’ perspectiv es on the contexts in which sonification could integrate into SOC workflo w . It is therefore unclear how these practitioners regard the incorpo- ration of sonification into SOCs. Understanding the needs of users, howe ver , is crucial to incorporating new technologies into their working en vironment [8]. T o address this gap, we consult practitioners working in SOCs, to explore their per- spectiv es on incorporating sonification into this unique setting. As an initial stage in the user-centred design process [9], our aim is to identify and refine contexts of use for sonification in SOCs, and analyse integration and design requirements. This paper reports on the results of a study in volving an online surve y and semi-structured interviews. Firstly , we designed tentati ve use-cases for sonification in SOCs, us- ing information gathered from existing literature and the responses of security practitioners in an online surve y . W e then carried out semi-structured interviews with security prac- titioners working in SOCs. In these interviews we presented participants with a network-packet sonification prototype we dev eloped, in order to familiarise them with the concept of sonification. The proposed tentati ve use-cases were then explored, and participants’ vie ws on integration and design discussed. W e thus refined contexts of use, discarding use- cases that were not considered to hav e promise, and analysed user needs with regard to integration and design [10]. The paper makes the following contributions to the Human- Computer Interaction (HCI) and Usable Security domains: • Identifies and refines the contexts in which sonification systems could improv e working practice in SOCs. • Establishes an empirical understanding of the challenges of integrating sonification into the SOC setting. • Extracts design requirements for sonification tools that would be ef fectiv e and usable for SOC practitioners. Our findings can inform sonification interface development, and future studies into the use of sonification in SOCs. W orkshop on Usable Security (USEC) 2018 18 February 2018, San Diego, CA, USA ISBN 1-891562-53-3 https://dx.doi.org/10.14722/usec.2018.23024 www .ndss-symposium.or g I I . B A C K G RO U N D A N D R E L A T E D W O R K W e begin with an overvie w of the work of security practi- tioners in SOCs. W e then revie w HCI studies on SOC work, and applications of sonification to network-security tasks. A. Security Operations Centr es (SOCs) The objective of a SOC is primarily to mitigate cyber - security threats towards the organisations for which they are responsible [11]. Internal SOCs are responsible for the organisations they are placed within, while multitenanted SOCs monitor network security on behalf of multiple client organisations. Figure II-A is an example of a SOC, with security data presented to security practitioners on computer monitors. Practitioners are frequently required to work long shifts, including night shifts, looking at multiple screens for extended time periods [12]. The resulting pressure and demanding nature of SOC work have been highlighted in HCI research [1], [12]. Fig. 1. A Security Operations Centre (SOC) (U. S. Air Force photo) [13] Security practitioners interact with automated security tools, such as signature- or anomaly-based intrusion-detection sys- tems (IDSs), which produce security events. This data is often collated in integrated security incident and e vent management (SIEM) solutions [12]. The role of security analysts can include preliminary detection, triage of events, and responding to customer tick ets. Security engineers are also responsible for maintaining infrastructure and creating detection rules, for example [12]. By “security practitioner”, we denote a person who works in a SOC (an analyst, engineer , or manager). It is important that humans are presented with network- security information, such that the y are best able to detect anomalies that do not fit automated detection profiles, and to triage machine-based detection inaccuracies [14]. The pro- vision of effecti ve techniques for presenting security data to humans is important for SOCs, and an area of continuing aca- demic research [15]. Security visualizations and text-based in- terfaces present automated system output, as well as unparsed network packets, which can enable security practitioners to recognise anomalous activity [16]. B. HCI Studies in SOCs A number of HCI articles hav e focused on examining the work of security practitioners in SOCs, and the challenges faced. This has included interview-based research [17], [18], [19], and ethnographic fieldwork [20], [12], [21]. Below , we reflect on some of the most pertinent to our research. Sundaramurthy et al. conducted anthropological fieldwork in SOCs spanning 4 years. Students trained in anthropological methods were embedded in three dif ferent SOCs as security analysts [1], [12], [22], [11]. Activity Theory was used to model SOC operations, and the successes and failures encoun- tered in integrating ne w technologies into SOCs studied. The implications of the findings for improving SOC operations were described, including the need for useful ne w tools to be dynamic and constantly resolve emerging conflicts [22]. Factors contributing to security analyst burnout, rates of which are consistently high, were modelled as a cycle linking factors concerning skills, empowerment, creativity and growth [1]. W erlinger et al. used interviews and participatory observa- tion to identify the interactions of security practitioners [21], [18], [23]. They found that the existing tools used were not sufficient to support complex security tasks, with the high number of false positi ves produced by IDSs highlighted [18]. In extended research, W erlinger et al. used semi-structured interviews to understand security incident response practices [19]. Findings included a tendenc y for complication of incident diagnosis by usability issues with security tools, and by a need for practitioners to rely on their own knowledge. D’Amico et al. in vestigated the workflo w , decision pro- cesses, and tool use of security practitioners in SOCs using cognitiv e task analysis [20]. Cognitiv e challenges including the massiv e amounts of network data were identified. D’Amico et al. also explored the perspectives of security practitioners on the use of security visualizations in their work [14]. Findings indicated that visualizations could support data analysis. While HCI studies have identified approaches to improv- ing SOC operations, approaches using sonification have not been explored. The use of sonification has been examined only insofar as its utility in network-security tasks has been assessed, in studies not specific to SOCs (reported in Section II-C). Incorporating sonification into SOCs has not, to our knowledge, been explored from an HCI perspecti ve. C. Sonification for Network-Security Monitoring Prior work has applied sonification in security-monitoring tasks. Axon et al. surveyed existing articles [4], highlighting sonification systems designed for network-attack detection [5], [24], [25], [26], [6], [27], [28]. The utility of sonification for SOCs is proposed, based on the challenges SOCs face, and evidence of the potential benefits of sonification [4]. Sonification can enable humans either to identify a general change in status, without knowing exactly what changed, or to actually understand the meaning of the information represented. Researchers hav e reported the ability to hear attacks using a range of mappings from network traffic features to parameters of sound [5], [28]. Qi et al. mapped network-traf fic parameters to sound, and stated that a range of attack scenarios were distinguishable [28]. Ballora et al. sonified network traffic with a view to aiding anomaly detection, and reported the ability to hear patterns associated with port-scanning and distributed denial-of-service (DDoS) attacks [5]. Gilfix et al. detected 2 unusual network conditions such as excessi ve traf fic using a mapping from network traf fic to natural sounds [25]. User studies hav e been carried using with sonification sys- tems for network-security monitoring tasks. Gopinath sonified a range of security events in Snort IDS [29]. Results indicated that sonification may increase user awareness in intrusion detection [29]. Mancuso et al. assessed the detection of packets with particular characteristics by cyber operators using a sonification whilst searching through a packet capture. The particular sonification design used in that study , howe ver , did not improv e participants’ packet-detection capabilities [6]. Kaczmarek et al. found that non-expert participants’ failure rates in carrying out security-critical tasks were lower when auditory cues were played [30]. Less complex stimuli im- prov ed performance, while more complex stimuli worsened it [31]. These results are consistent with the Brain Arousal model: moderate noise can improv e cogniti ve performance, while excessi ve or insufficient noise are detrimental [32]. The findings support the potential for the improvement of network-security monitoring task performance through audio cues designed with appropriate lev els of complexity . While the potential utility of sonification for con ve ying network-security information is evidenced in prior work, and the integration of sonification into SOCs has been proposed, users’ perspectiv es on this technology hav e not been explored. This is the research gap that our article seeks to address. I I I . M E T H O D O L O G Y A. Researc h Appr oach W e aimed to identify requirements in sonification design and integration, and contexts of use for sonification in SOCs, as part of the user-centred design process [9]. By contexts of use, we refer to the conditions under which sonification could be used in SOC work [33]. The stages of our study are shown in Figure 2, in relation to the requirements analysis process. This requirements analysis approach is widely used in prior literature and described by Maguire et al. [9]. Stages of our study: Related stages of the requirements analysis process [9]: Information gathering Identify user needs En visioning and ev aluation Requirements specification Literature and online surve y T entative use-cases Semi- structured interviews (Refined contexts of use, integration and design) Fig. 2. Study Methodology: Requirements Analysis Process As illustrated in Figure 2, we dre w on existing literature and the results of an online survey to design tentativ e use-cases: descriptions of conditions in which sonification might be used in SOCs, the dev elopment of which is presented in Section IV. W e refined those use-cases that participants felt had some utility in the interviews, to produce contexts of use. By exploring the use-cases in interviews, we identified the potential for integrating sonification into SOCs, and chal- lenges. Questions remain to be answered, ho wev er , before a full requirements specification (the final stage in Figure 2) can be produced. The refined contexts of use, and integration and design requirements that we contribute in this paper are initial work that can form the basis of a requirements specification. In Section VIII, we highlight the areas that remain to be addressed experimentally and through further interaction with users in the construction of a full requirements specification. T o ensure face validity [34] of the online survey and in- terview questions, both were discussed with, and incorporated feedback from, a field expert (a researcher in HCI), and three subject matter e xperts (who worked, or had pre viously worked, in SOCs). Both the survey and interview questions were also answered by subject matter experts in a pilot study . W e recruited a conv enience sample of 20 participants for the online surve y , and 21 participants for the interview . Par- ticipants were security practitioners who worked in SOCs with which we had previously established relationships, and were recruited through spoken or email contact with those responsible for the SOC. W e targeted organisations that ran internal or multitenanted SOCs. There was likely some o verlap between surve y and interview participants, since the same SOCs were inv olved in each. The extent of this ov erlap is unknown, since survey responses were anonymised. Ethical approv al for this study was granted by the Central Univ erity Research Ethics Committee, University of Oxford (reference: R48822/RE001). W e ensured ethical handling of collected data through an informed consent process for partic- ipants, storage of data in password-protected files viewed only by the researchers, and anonymisation of published results. B. Developing T entative Use-Cases W e drew on existing literature in developing ideas for tentativ e use-cases for sonification in SOCs [35], [36], [5], [37], [14], [38], [7], [39], [28], [12], [40], [15]. From this, we identified areas requiring validation, and constructed questions on these aspects. For example, one area in need of validation was the extent to which security practitioners were required to use multiple screens in SOCs, and for this we developed questions pertaining to the need to watch multiple monitors or dashboards. These questions were asked in an online surve y of 20 security practitioners, in which participants were asked to indicate their lev el of agreement with 6 assertions. Lev el of agreement with assertions was indicated using a Likert-type scale [41] with response categories “ Str ongly disagr ee ” (=1) - “ Strongly agr ee ” (=5). W e selected the Likert- type scale as an efficient method of collecting participants’ attitudes [42]. Based on these responses, we designed 5 tentativ e use-cases, which are presented in Section IV. 3 C. Semi-Structured Interviews Face-to-face interviews took place at the or ganisations at which participants worked, in rooms exterior to the SOC. The exception was two participants who were intervie wed through a li ve video chat due to travel constraints. Intervie ws were audio-recorded and lasted approximately 30 minutes. First, participants were introduced to the sonification pro- totype, a system that maps properties of network packets to music. The system reads a packet capture in (mock) real-time, and generates sound events based on sampled packets. T able I, which we pro vide to enable replication of our research approach, describes the mappings used from properties of packets to musical properties. The prototype design is not the focus of this paper, so we do not detail the implementation. Further details on our technical approach can be found in [4]. T ABLE I S O NI FI C A T IO N P ROT OT Y P E M A PP I N G S Packet property Musical property IP/port common-ness Consonance of pitch Source/destination IP/port Octav e of pitch Packet size Amplitude Direction of traffic Pan of sound The prototype was pre-recorded running on a synthetically- generated dataset containing port scan, DDoS, and data exfil- tration attacks. Our aim here was to familiarise participants with the concept of sonification; this was particularly impor- tant given that the technique is relativ ely little known, and not operational in SOCs. Early prototyping is key to user-centred design, to con vey to users an understanding of the system, elicit ideas for discussion, and enable users to play a role in the iterativ e design process [10]. This is also crucial for creating security interfaces that are ef fectiv e, yet usable [43]. The researchers described the system and mappings from data to sound. Participants then listened to an audio recording of the prototype using headphones. Next, the interview took place, guided by the questions presented below . W e chose to conduct semi-structured interviews, with the aim of extending discussion based on the flow of con versation. [1-5.] W e ar e considering the use of sonification for [tentative Use-Cases 1–5] in SOCs. What is your view on the potential of sonification in this use-case? This can include this particular pr ototype, and also the concept of sonification as a whole for SOCs. Before these questions were asked, participants were giv en the 5 use-cases on paper . Participants then answered each question, and discussion ensued with the researchers, expand- ing on topics brought up by the participant such as other use-cases, and challenges in integration. W e encouraged both criticisms and positive responses. Throughout the intervie w , we highlighted that the participant could consider different sonification designs to the prototype presented. W e ensured that this was clear , since the aim of the interview w as to discuss the potential for the concept of sonification in SOCs in general. Participants were then asked to rate the potential utility of each of the 5 tentative use-cases presented, using a Likert-type scale : “ Please rate the potential utility of sonification in this use-case, fr om 1: not at all useful, to 5: very useful ”. This rating stage was placed at the end of the discussion of each use-case to allow participants to formulate their views. D. Data Analysis Giv en discrepancy in the community as to how to treat Likert scale data [44], [45], [46], we calculated the mode and median to analyse both the responses to the assertions in the online survey , and the ratings giv en to each use-case in the interviews. W e considered that a mode or median rating higher than 3 constituted overall agreement with an assertion, since 3 was the middle v alue. W e also calculated a comparison of non- neutral scores (CNNS), in which we took the ratio of scores less than (1, 2) and greater than (4, 5) the neutral v alue (3). The three measures support the same conclusions, considered alongside the analysis of the interview data. W e analysed the intervie ws using template analysis [47]. This technique if useful for qualitativ e data analysis in which the researcher has some understanding of the concepts to be identified. W e first dev eloped a-priori themes to be identified in the data: use-case utility; integration questions; and design requirements. W e manually transcribed our interview record- ings, producing transcripts for each discussion, and spent time becoming familiarised with the data. W e then coded the interview transcript dataset initially , attaching rele vant parts of the transcriptions to the a-priori themes. Relev ant sections of data that did not fit into these themes were assigned new codes. W e thus produced an initial template of codes, which we then dev eloped through iterative application to the dataset, modifying the template as appropriate to the data. Through this refinement we produced a final template and dataset coded according to it. W e then interpreted the data and wrote up the findings within the themes of the template. During the interpretation and write-up process, we engaged in frequent reflections to av oid bias and the influence of personal beliefs. I V . D E V E L O P M E N T O F T E N T A T I V E U S E - C A S E S W e summarise our development of ideas using existing literature on SOC working practice and sonification, indicat- ing potential uses for sonification in SOCs. W e present the outstanding questions ( OQ s) that we identified and addressed to support the ev olution of these ideas, and their formulation into assertions in an online survey . Finally , we present the 5 tentativ e use-cases deriv ed. A. Developing Ideas Using Existing Literatur e Anomaly-detection approaches for security monitoring are widely researched, including visualization-based techniques to enable detection of abnormal activity by humans [38], [15]. A wide array of experimental results evidence the utility of sonification for detecting anomalous patterns in data in fields including Medicine and Astrophysics, for example [35], [37], 4 T ABLE II O N LI N E S U RV EY R E SU LT S : R E S PO N S E S T O A S SE RT I ON S ( R ES P , O R DE R E D F RO M “ Str ongly disagr ee ” ( = 1 ) – “Strongly agr ee ” ( = 5 ) ): M O D E , M E D IA N ( M ED ) , A N D C O M P A R I SO N O F N O N -N E U TR A L S C O R ES – D I SA GR E E ( 1 - 2 ): A G R E E ( 4 - 5) ( C N NS : D : A) Assertion Resp Mode Med CNNS Anomaly detection by humans (pertains to OQ1 ) Assertion 1 : Human analysts monitoring the network are capable of detecting network anomalies missed by automated systems 0,1,5,10 4 4 1:14 Assertion 2 : The monitoring setup I use enables me to detect network anomalies that are missed by automated systems 0,4,11,4,1 3 3 4:5 Assertion 3 : I sometimes rely on my experience and intuition to detect network anomalies rather than monitoring system alerts 0,2,7,7,4 3.5 4 2:11 Multitasking/non-primary task monitoring (pertains to OQ2 ) Assertion 4 : I am required to monitor the network, while carrying out other tasks simultaneously (e.g., responding to emails) 0,2,2,13,3 4 4 2:16 Monitoring across multiple screens (pertains to OQ3 ) Assertion 5 : In monitoring, I am required to watch multiple monitors depicting different data at one time 0,1,2,12,5 4 4 1:17 Assertion 6 : I am required to watch multiple dashboards on the same monitor depicting data at one time 0,3,4,9,4 4 4 3:13 [39], [40]. Furthermore, prior work has supported the use of sonification for hearing network attacks [5], [28]. W e therefore posit that it is important to e xplore the potential for sonification to enable humans working in SOCs to detect anomalies in the network traf fic, and seek to address the following question: OQ1. Do security practitioners feel capable of de- tecting anomalies directly from the network traf fic? Security practitioners may be required to carry out other tasks while monitoring the network; for example, managing email inboxes [12]. Prior literature indicates the utility of sonification as a solution to enabling monitoring as a non- primary task. Hildebrandt et al. showed that using sonification to monitor a process as a secondary task while performing a different primary task had no significant effect on performance in either task [7]. The use of sonification for peripheral monitoring may extend to cases in which security practitioners wish to continue to monitor whilst outside of the SOC. W e consider that this may be true particularly for practitioners alone on shift, while taking breaks for example. T o support the ev olution of this idea, we seek to address the following question: OQ2. T o what extent are security practitioners re- quired to multitask while monitoring in SOCs? The information required for monitoring in SOCs is often distributed across multiple monitors used by security prac- titioners [14], including large screens at the front of the SOC. Security practitioners may therefore be required to focus their visual attention in multiple directions, yet it has been shown that visual perceptual clutter leads to increased errors in judgement [36]. Furthermore, security practitioners, depending on their role, can be required to monitor screens for extended time periods, focusing on visual representations of the data and monitoring alerts from SIEM solutions, for example [12], which may lead to visual fatigue. Presenting sonified data could reduce the emphasis on visual monitoring. This could mean either reducing the number of directions in which visual focus is required, or providing an alternati ve monitoring method for visually-fatigued practitioners. W e seek to address the following question in dev eloping this idea: OQ3. T o what extent are security practitioners re- quired to visually monitor information presented on multiple screens? B. Exploring Ideas Using an Online Survey The 6 assertions dev eloped to assess the OQ s, and partici- pants’ responses to them, are presented in T able II. The online surve y was completed by 20 participants working in SOCs: 2 SOC managers; 14 security analysts, 5 of whom were “senior” security analysts; and 4 (2 senior) security engineers. Fiv e of the assertions obtained mode and median ratings greater than 3, which we consider agreement, as e xplained in Section III. The exception is Assertion 2 , which indicates that while practitioners feel capable of detecting anomalies, they are less confident that their existing monitoring setups enable this, and this is supported by the CNNS. This result supports experimentation with new methods of enabling this capability . The survey results can therefore be seen to affirm the 3 OQ s. C. T entative Use-Cases Based on the survey results presented in T able II, and the prior literature, we deri ved the follo wing 5 tentativ e use-cases to carry forward to the intervie ws. 1) Detecting anomalies in the network traffic. Presenting high-resolution sonifications of the network traffic, to enable humans to hear network anomalies. 2) Monitoring as a non-primary task. Sonifying network- security data to be monitored as a secondary task, enabling the user to carry out a separate primary task simultaneously . 3) Monitoring data presented across multiple screens. Sonifying parts of information that are currently pre- sented across multiple screens, reducing the directions for focus of visual attention by users. 5 4) Alleviating fatigue from monitoring screens. Enabling users to monitor with reduced strain on visual attention, by providing the option to use sonification. 5) Enabling monitoring whilst outside of the SOC. Enabling users to continue monitoring work (e.g., using wireless earpieces) whilst outside of the SOC. Use-Case 1 was supported by the assertions of survey partic- ipants that detecting anomalies directly from the traffic was a capability of practitioners. The requirement to monitor across multiple screens moti vated the de velopment of Use-Case 3. Use-Case 4 was supported by the requirement for extended periods of visual monitoring reported in prior literature [12] The requirement af firmed by the surve y to multitask while monitoring the network justified the dev elopment of Use-Cases 2 and 5. W e considered that multitasking might occur while carrying out other work inside the SOC, or while carrying out activities when away from the SOC, but still on duty . V . I N T E RV I E W R E S U L T S In this section we present demographics of interview par- ticipants. W e report interview results relating to use-cases, integration, and design requirements, in Sections VI and VII. A. P articipants W e interviewed 21 participants between May and June 2017. Participants were security practitioners working in 7 different SOCs. From 3 different internal SOCs, responsible for the security of a single organisation, 12 participants were interviewed. W e also interviewed 9 participants from 4 dif- ferent multitenanted SOCs, who provided managed services for client organisations. Of the participants, 4 were SOC managers; 10 were security analysts (3 senior); 2 were both security analyst and engineer; 2 were security engineers. T able III sho ws the job role and or ganisation type of each participant. T ABLE III I N TE RV I EW P ART I C I P A N T ( P ) D E M O GR A P HI C S Internal SOC Multitenanted SOC Manager 3 (P1/2/17) 1 (P6) Senior Analyst 0 3 (P7/15/16) Analyst 7 (P3/4/13/18-21) 3 (P10-12) Engineer 2 (P5/14) 0 Analyst & Engineer 0 2 (P8/9) V I . P E R S P E C T I V E S O N U T I L I T Y O F U S E - C A S E S W e present the interview results on each tentative use- case, as well as ne w use-cases proposed by participants. Participants’ views on the potential utility and challenges of each use-case are analysed, with the aim of refining promising contexts for the use of sonification in SOCs. In Section VIII, we reflect critically on the requirements for these contexts of use. A. Use-Case 1: Detecting Anomalies in the Network T raf fic Overall, participants felt that sonification had potential in this use-case. A number of participants felt that humans were capable of detecting anomalies when presented with network data. The belief that it was mostly humans who detect network anomalies was expressed (P15), and it was suggested that humans hav e the capacity to recognise more subtle anomalies than machines: “ ther e’ s still a lot of human analysis, and a machine can only determine the r eally obvious ones ” (P8). Security visualizations were frequently specified as a class of tool that enabled participants to detect anomalies, showing anomalous spikes in traf fic volume, for example. Possible benefits of sonification over existing anomaly- detection approaches were explored. The potential of sonifica- tion for detecting anomalies not apparent from visualizations was described, because “ the thing with a graph is – it’ s not how much you can see, it’ s how much you can pr esent ” (P6). The trustworthiness of the information con ve yed by the sonification was highlighted as an advantage over automated approaches, which can produce false-positiv es: “ it can’ t ever lie because it’ s just going on what it’ s seeing, it’ s not saying it’ s malicious it’ s just saying that that’ s what I am seeing ” (P10). The ways in which anomalies might be detected using sonification were discussed; in particular, the potential to learn some baseline sound of the network, and from this basis detect anomalies. This included hearing deviations to greater traffic throughput. The potential to “ get used to the sound ” such that deviations were apparent was also highlighted: “ when say a DoS attack or some other form of attack would take place, I’m sur e it would stand out because you would get used to hearing a certain type of tune or hum fr om day-to-day activity ” (P15). In general, participants felt that sonification had promise in this use-case. Assessment of the key points highlighted is required – the ability to hear deviations from a “baseline” sound, and the comparison of a sonification-based approach to anomaly detection with automated and visualization-based approaches. This comparison is important giv en that, while many participants believ ed humans could detect anomalies in the data, some felt that anomaly-detection currently was pre- dominantly machine-dri ven. Another participant noted that the real solution may be some where in between, i.e., that anomaly- detection capabilities differ between individuals (P16). B. Use-Case 2: Monitoring as a Non-Primary T ask The general concensus was that sonification could pro ve valuable in this use-case. Participants stated that they were required to multitask in their role, and reported a range of tasks during which the y were required to multitask whilst mon- itoring. These included researching new threats, composing reports, sending emails, or in vestigating cyber incidents: One issue we have is that when we see something of inter est, and we ar e r esear ching [...] you’r e no longer monitoring . So, at points in time wher e you’r e not monitoring, if there was an audible cue that “oh 6 actually , ther e is something happening right now , maybe my attention should be back there” (P13). The current requirement to use a visual means in multiple tasks was highlighted as a challenge: “ If we’r e investigating something else [...] I’ve only got thr ee scr eens, and I’ve only got one pair of e yes ” (P10). P articipants described the potential value of sonification for monitoring without focused visual attention: “ you could just be monitoring or listening to that backgr ound rather than having to keep looking up ” (P8). This extended to the use of sonification for monitoring alerts generated by automated systems, removing the need to keep “ viewing the alarm view while I’m doing other things ” (P7). The discussion of both sonified network traffic, and of audi- tory alerts, brings into question the types of information most appropriate for sonification in this multitasking application. The information content of sonified network packets, com- pared with auditory alerts, was highlighted as advantageous by one participant: “ the music can tell me, something else has happened [...] and not just as an – alert, alert, alert ” (P8). In summary , perspectiv es on this use-case were positiv e, subject to some design and capability questions. A ke y ques- tion was the type of information to be sonified – both network packets, and alert data, were discussed as adv antageous. Partic- ipants voiced concerns about the possible ef fect of monitoring using sonification on their primary task, and vice versa. While Hildebrandt et al. sho wed that these ef fects were not significant in a different context [7], assessment with SOC-specific tasks, which are often time-pressured, and require high lev els of attention, is required. The nature of SOC tasks could affect the performance of users multitasking using sonification. C. Use-Case 3: Monitoring Data Pr esented Acr oss Multiple Scr eens The potential for sonification in this use-case divided opin- ion. Firstly , the extent to which practitioners felt that they were required to monitor across multiple screens differed between SOCs. Some (8/21) stated that multiple screens (between 2 and 7) were used to sho w alarms, devices, and chat feeds, for example. In other SOCs, all monitoring information was presented within a single pane of glass (6/21). Some challenges in the use of multiple screens were re- ported. Information could be missed because of its distribution across multiple screens. Missed information on monitors at the front of the SOC was reported, if practitioners were engaged by other screens: “ something on this [front] screen could be r ed, but if they’ r e alr eady doing a priority 1, the y’r e not going to look over ther e seeing the other priority 1 ” (P6). For these participants, monitoring across multiple screens was a challenge sonification could help alle viate. Both sonifi- cation of alerts and of network traf fic were mentioned: Ther e ar e analysts sitting down ther e, and you have a massive dashboar d, so they are still requir ed to be looking at that at all times, and looking at their own scr een. Sound will help in minimising that, just looking, as it avoids constant attention (P17) . For some participants, ho wev er , the use of multiple screens did not pose a challenge, and it was considered con venient to hav e dedicated screens for ex ecuting commands, for example. These participants stated sonification would not be useful in this application, and did not wish to reduce the number of screens: “ I will still use 7 [scr eens], even if I have all the sound in the world ” (P12). One participant reported that reducing the number of screens would cause inconv enience: “ If I don’t have enough scr eens, I’ve got to constantly minimise, maximise , and copy this and go her e and it can be very difficult ” (P7). On the whole, participants were divided as to whether sonification had the potential to be useful in this use-case. The type of information that might usefully be represented by the sonification was unclear, and a number of participants did not desire any fewer screens. While it is clear that the spread of screen locations can cause information to be missed, it is likely that other technologies would be more effecti ve solutions than sonification, meeting the needs of a greater proportion of security practitioners. Some participants suggested that the combination of this information into a single pane of glass would be a solution preferable to sonification in this instance. D. Use-Case 4: Alleviating F atigue F r om Monitoring Scr eens In general, sonification was not perceiv ed to have potential as a solution here. Some participants (6/21) stated that they were sometimes visually fatigued by their monitoring work in the SOC, yet others stated that they were not visually fatigued as the y were accustomed to looking at screens. It was suggested that the extent to which fatigue was felt differed between individuals and types of role: “ nowadays I am doing stuff all the time, but ther e was a period when I was just staring at, I think it was, 3 differ ent monitors at once ” (P9). Methods used for mitigating fatigue currently included encouraging workers to take regular breaks. Another approach adopted was automating as much as possible. Participants questioned the practicality of using sonification as an alter - nativ e for visually fatigued practitioners. If the sonification played only when practitioners were fatigued, their ability to interpret information from it might be limited: I can see it as an alternative to visualization for when you get to a point when your eyes ar e tir ed [...] the thing is if you only switch it on when you get to that point, then I think you won’ t really understand what normal would be, so you would still need it on in the backgr ound to some extent (P15). A number of participants felt that sonification would not be useful for them in this application. V isual fatigue was already prev ented through other approaches (automation and regular breaks), such that participants were not (or were unaw are that they were) fatigued by visual monitoring work, stating that they would continue to look at screens even with sonification. The utility of sonification in this use-case was questionable, and the ways in which it might work in practice unclear . 7 E. Use-Case 5: Monitoring Whilst Outside of the SOC Participants generally felt sonification had strong potential in this use-case: “ if you wer e just going out and you pop a pair of headphones on or whatever and you can hear , something is going on, I can jump back in ” (P10). Specific times that could necessitate monitoring whilst outside of the SOC included during fire alarms, and while making drinks, on break, or going to the shop. This was particularly true for participants who were required to work one-man shifts: “ today it’s only me her e, and I did have to leave to the shop earlier ” (P11). It was noted that using sonification in this application could be particularly useful for practitioners alone on shift: “ the first ever job I did in a SOC I was the only person in the r oom. Y ou could definitely say that would help with that one ” (P9). Smaller SOCs, in which one-man shifts occurred, as well as companies running their o wn SOCs, were mentioned as situations in which this capability might be especially helpful: “ the guy running his own SOC, the SOC won’t be his only task, he might be plumbing computers in the main office , and want to come back in if something big happens ” (P6). It was reported that there were existing approaches to monitoring whilst outside of the SOC. This included emails sent to cellphones, and a sonic alarm used when on break: “ when I leave, I unmute it, so that I can go and put my feet up, and then if there’ s an alarm I would come ” (P11). The potential value of a more informativ e sonic approach (than the simple alarm currently used) was discussed by this participant: If we had a melody like yours r epresenting that, and I knew what the melody was playing and what it was, then maybe I wouldn’t have to come and look at it [on-screen alerts] , because I would be like ok it’ s something normal for this time [...] with the curr ent beep, we don’t know until we actually log in (P11). The placement of monitoring screens in the break room was another approach currently used to indicate to practitioners that they were required in the SOC. A number of participants discussed being wav ed at through the window by other SOC workers, to attract their attention while on break. This was particularly true for analysts with higher skill lev els, required for specific ev ents. Participants felt that sonification could be useful as an approach to informing practitioners on break that they are required in the SOC, played through speakers in break areas (e.g., the kitchen), or through an earphone worn while on break: “ they wouldn’t need to rush back, keep chec king, the y could just go about their business and know ‘right, when I hear that sound, I need to take whatever action’ ” (P7). The desire to use sonification for monitoring outside of the SOC might dif fer . For example, one SOC manager was of the opinion that monitoring should not be continued whilst on break, as it would defeat the purpose of the break. In general, howe ver , this use-case was considered a promising solution to actual challenges faced by security practitioners. F . Use-Case Ratings T able IV presents participants’ ratings for each use-case. T ABLE IV R A T I NG S G I VE N T O U S E - C A S E S B Y P A RTI C I P A N T S : ( R E SP , O R D E RE D F RO M “ Not at all useful ” ( = 1 ) – “V ery useful ” ( = 5 )) : M O DE , M E DI A N ( M ED ) , A N D C O M P A R I SO N O F N O N -N E U TR A L S C O R ES – N OT U S E F UL ( 1 -2 ) : U S E F UL ( 4 - 5) ( C N NS : N : U) Use-Case Resp Mode Med CNNS 1: Anomaly detection 1,1,7,7,5 3.5 4 2:12 2: Multitasking 1,4,4,4,8 5 4 5:12 3: Multiple screens 3,2,2,8,6 4 4 5:14 4: Visual fatigue 3,6,4,3,5 2 3 9:8 5: Outside-SOC activities 0,1,1,3,16 5 5 1:19 Use-Cases 1, 2, 3 and 5 obtained mode and median ratings greater than 3, which we consider indicates overall agreement with potential utility (see Section III). The CNNS shows that these four uses-cases were rated abov e neutral by most participants. Based on these results, we selected Use-Cases 1, 2 and 5 to form the basis of our refined contexts of use, presented in Section VIII. Although Use-Case 3 also scored ratings greater than 3, we chose to omit it from the contexts of use, based on the qualitativ e interview analysis, from which we concluded that other solutions to the challenge of multiple screens may be more appropriate for SOCs. G. Other Use-Cases Suggested by P articipants Aside from the use-cases we presented, other uses were suggested by participants, falling under the following themes. 1) Occasional use: It was suggested that the sonification could be used to occasionally check the sound of the network: “ I might listen to it once an hour , and go ‘[...]it doesn’ t sound the same at 1 o’clock today as it did at 1 o’clock the last three days’ ” (P6). Sonification could be played for the duration of particular ev ents, which could be useful for con ve ying the length of ev ents, since: “ sometimes looking at data you might not fully understand when it started and when it ended ” (P11). Similarly , sonification could be played in the background particularly at times when high-se verity incidents were being dealt with, to act as an indicator for SOC workers when a new incident may require their attention (P8). 2) Hunting for Anomalies: One participant suggested the use of sonification as a threat-hunting tool, for analysts re- quired to search data for anomalies retrospectively: “ if I put that on for five minutes, and it sounds anomalous, then I know ther e’ s five minutes’ worth of packets worth looking at. Otherwise I might spend an hour just looking at some pack ets with nothing particularly inter esting in ” (P6). The potential to listen to the sonification at increased speed (fast-forwarding), both for conducting audio revie ws of data retrospectiv ely (“ if you’ve got an alarm or a period that you’ r e inter ested in ”), and for real-time monitoring was discussed: If you had a baseline amount of traffic, you could go “I’ll listen to a minute of that, now I’m going to listen to a minute of what has just gone thr ough the sensors”, maybe accelerated, you will then start straight away going “that doesn’ t sound right” (P6). 8 3) Impr oving SOC workflow: It was suggested that a con- tinuous soundtrack could improv e SOC workflow by making practitioners aware more efficiently of events that are relev ant to them, without the need for others to escalate to them: At the minute, it relies on the first person who sees those events to r ecognise it’s bad, to then escalate [...] if you hear d lots of anomalies, the people who it would be eventually escalated to would instantly know that, and could maybe start on it earlier (P8). A manager suggested that sonification could take ov er some of their alert-handling workload, by verbally presenting the queue of alerts and their se verity ratings: “ an audio pr ompt would give me mor e time: [...] if it’ s not shouting numbers out, I don’ t need to look at the queue ” (P6). V I I . P E R S P E C T I V E S O N I N T E G R A T I O N A N D D E S I G N W e present key themes identified relating to the integration of sonification into the SOC en vironment, and to sonification design. W e consolidate these results in Section VIII, and highlight challenges and implications for system de velopment. A. Headphones or Speakers? A number of participants discussed whether the sonifi- cation would be best played through speakers or personal headphones. Some participants highlighted potential problems with playing the sonification through speakers – for example, that if the sonification was made the soundtrack to the SOC, practitioners who were not monitoring would still ha ve to listen to it “ when they’ r e trying to concentrate on doing something else ” (P2). Some participants, howe ver , felt that headphones were not always a desirable solution, as wearing headphones could isolate practitioners, or hamper collaboration. Alternati ve so- lutions were suggested, including the use of a single earpiece rather than headphones, suggested by two different partici- pants, to enable practitioners to continue to collaborate. B. Existing SOC W orkflow and Soundscape Some participants focused on integrating sonification with necessary SOC workflow in an unobtrusive way , noting that it should not prev ent “ people being able to talk about what’ s going on ” (P10). A need to standardise responses to sounds heard was suggested: “ e verything we do is based ar ound a pr ocedur e, so I’m not sur e how you would [...] get everyone to conform to, ‘when you hear this, you do this’ ” (P7). Participants described existing SOC soundscapes. In some SOCs there was currently a soundtrack, such as radio for the whole room. In others, there was no deliberate noise, with practitioners listening to music at times through headphones: “ we don’t have any audio [...] Occasionally people use head- phones to listen to music, and on the odd occasion we will put music on ” (P15). If integrated into SOCs sonification must work appropriately with this range of existing soundscapes. C. Complexity of Networks Participants discussed the difficulty of finding unusual be- haviour in networks: “ the more complex your network is, the mor e difficulty you have working out what is unusual ” (P6). A suggested approach to dealing with large amounts of network traffic was filtering sound by particular IP addresses or assets. One participant highlighted the issue of network complexity in the multitenanted SOC they worked in: “ I think if it was for an internal SOC for a specific company that pr obably would work better . Here because we’r e a managed services pr ovider , I think there would be too many things going on ” (P10). Further research into differences in required design solutions for dif ferent SOC types is needed, such as filtering sound to focus on single networks for multitenanted SOCs. D. Sonification of Alerts Sonification of alerts was mentioned by a number of partic- ipants (6/21), as an approach to communicating critical ev ents, or alerting on particular systems: “ using this would benefit us, if only the DDoS mitigation stuff that we use, or a subset of alarms or devices alerts us to anomalies via sound ” (P7). It was suggested that sonified alerts could be layered with the sonified low-le vel network traffic: “ you could tell the system to play music not just based upon the pack et captures but based upon outputs of other things, signatur es, outputs of x, y , z. Then you can build up two layers of that, so you could listen to the underlying traf fic as part of an incident ” (P8). E. Mitigating F atigue A number of participants (8/21) stated that they felt they would be fatigued by continuous exposure to the sonification. The potential for occasional use of the sonification was dis- cussed in the context of listening fatigue: “ I guess you could use it as and when, but I think if you put that on somebody’ s head for a day , I think you would struggle with that ” (P6). The potential for the sonification to be unobtrusi ve unless required was highlighted: “ music you can switch off to, but equally the anomalies in there, your brain is going to pic k up on them and go that’ s changed, that’ s differ ent ” (P8). Designing sonifications that are unobtrusiv e in this way is a potential approach to mitigating fatiguing effects. V I I I . D I S C U S S I O N A N D I M P L I C A T I O N S W e reflect on the results presented, with a vie w to summaris- ing our three main contributions, listed in Section I. W e refine contexts of use, then consider the implications for sonification design and integration. This can guide interface designers in dev eloping sonification systems for SOCs. A. Refined Contexts of Use Based on the interview results relating to use-case utility , we refine contexts of use, identifying the potential actors, key usage scenarios, and relev ant SOC workflo w factors [9]. 9 1) Monitoring whilst outside of the SOC: There are times when it is ideal for security practitioners to be able to continue their monitoring work whilst outside of the SOC. This is particularly true for smaller SOCs, in which work ers undertake one-man night shifts. Such workers, who might leav e the SOC for a short time (e.g., to make a drink) or for a longer time (e.g., to go to the shop) sa w potential value in the use of sonification to enable their monitoring work to continue. In larger SOCs, listening to sonification in break areas could improv e SOC workflo w for more experienced practitioners, who might currently be called (e.g., wav ed at physically) back into the SOC by others when their expertise is needed. This capability could be enabled through wireless earpieces worn by workers when venturing outside the SOC, or by speakers playing sonification in break areas. As well as the network-packet sonification approach, of which the prototype presented was an example, sonified alert streams were high- lighted as information that could be monitored at times outside the SOC. Sonification designs that enable both packet and alert representation, individually or in combination, would therefore be appropriate. Monitoring accuracy and attention during out-of-SOC activities should be compared with inside- SOC capabilities, to support the dev elopment of this use. 2) Detecting anomalies in network traf fic: Situations in which sonification of network traf fic has potential value as an anomaly-detection approach include long-term, continuous listening to the sonification for real-time detection of devia- tions. T o support this use, anomaly-detection capabilities using sonification should be compared with those using security visualizations and automated tools. Prior sonification work indicates that malicious network activity can be detected using sonification [5], [28], but does not make this comparison. Short-term anomaly-detection uses include occasional checking of the sonification – e.g., once per hour – to compare with pre vious times. Another promising short-term use is retro- spectiv e analysis. Practitioners tasked with hunting retrospec- tiv ely through data for anomalies suggested sonifications of the data could enable location of interesting packets requiring closer inspection. Research is needed into approaches to enable users to link anomalous sounds heard to the relevant data (in a text or visual form). For such tasks, listening to sonification played at increased speeds could enable users to sift through data from extended time periods more quickly . 3) Multitasking whilst monitoring as a non-primary task: Sonification is potentially useful for aiding security practi- tioners in carrying out monitoring tasks while conducting other primary tasks. It is important to assess this capability experimentally; in particular , the effect of primary tasks on secondary-task sonification monitoring, and vice versa. Such work can draw on the aforementioned work of Hildebrandt, which showed that such monitoring had no significant effect on either primary or secondary task [7]. Howe ver , context- specific assessment is important, using primary tasks relev ant to SOCs: sending emails, writing threat intelligence reports, and in vestigating incidents were some tasks described. B. The Need for Flexiblity in Interface Design Some key differences in opinion were highlighted, with implications for sonification design. Participants dif fered in their opinion on whether the sonification should use head- phones, speakers, or single earpieces, and whether continuous or occasional use w ould be most appropriate. It is clear that the different approaches may suit dif ferent users and scenarios. It is therefore appropriate for sonification designs to be flexible, depending on use-case and user preference. Playing the audio through all mediums discussed should all be viable (e.g., spatialisation of different sounds through different ears is unsuitable for single earpiece listening), and the sonification approach should support both continuous and occasional use. The analysis highlights a dif ference in requirements between multitentanted and internal SOCs. A participant working in a multitenanted SOC described the potential difficulty of using sonification in that en vironment, with large amounts of data for many customers, compared with an internal SOC. Further research into differences in the required design solutions across different SOC types is necessary . A solution for multitenanted SOC en vironments might be the provision of tool features to filter sound by the single SOCs to be monitored. The prototype design presented in this study initiates the participatory design process [10]. This should be iterative, and as such future design of sonification systems for this application can draw on the design requirements we identified. Consulting users in the dev elopment process is especially important gi ven that the technology is not operational in SOCs. C. Challenges in Inte grating Sonification into SOCs Some challenges in integrating sonification into SOCs emerged from the interview responses. Appropriate integration of sonification with the existing SOC soundscapes reported is key if the technology is to be unobtrusiv e to users. In SOCs where the soundscape is silent, headphones or a sonification design that is unobtrusiv e could be used. Equally , the exist- ing soundscape may affect sonification listening: the sounds produced may be drowned out in noisy SOCs. It was highlighted that sonification should not distract users in a way detrimental to SOC activity . Sonification systems should be designed with appropriate sound complexity for particular tasks, since complexity of auditory stimuli has been shown to af fect cogniti ve performance [32]. Reducing cog- nitiv e load is a ke y consideration for creating usable security interfaces [43]. Less complex sound is needed for non-primary tasks, since less comple x background auditory stimuli have been shown to improv e the performance of security-critical tasks [31]. Mapping highly complex network data to lo w- complexity sounds will pose a challenge. The copious amounts of complex data present on networks exacerbates the challenge of designing sonification systems suitable for the SOC en vironment, since it makes finding a baseline of “normal” beha viour dif ficult. Concerns were v oiced in interviews that sonification systems representing such data could become cacophonous, and tuning systems to some network baseline would take time. The need to train users to 10 use these systems, and understand the sounds of the networks monitored such that abnormalities could be identified, was also discussed as a potential challenge. The time required for adequate training of users, and for tuning of systems to networks, is a key factor affecting the utility of the approach. Listening to sonification for extended time periods may be fatiguing. Fatigue caused by previous sonification designs has been reported [3] and was highlighted as a potential pitfall by a large number of participants. In integrating sonification into SOCs, therefore, it is important to consider mitigating fatiguing effects. Kramer argued that dev eloping aesthetic sonifications can reduce listener fatigue, and prior work in such aesthetic sonification can be drawn on [48]. Another approach to mitigating fatigue, to be assessed experimentally , is to enable personalisation of the sounds listened to. D. Study Limitations Owing to the nature of the semi-structured interviews we conducted, there was variation in the level of detail in which different participants discussed each question. Furthermore, this paper can report only those contexts of use, challenges in integration, and design requirements highlighted in this study . It is possible that others would emerge in con versation with other participants. Consolidation of these findings through further studies would ensure cov erage of all requirements. The presentation and discussion of the technology with practitioners could have caused acquiescence bias, in which participants agreed with statements by default. T o mitigate this, we encouraged discussion around criticisms as well as positiv e responses in the interviews, and explored challenges raised by participants pertaining to en vironmental factors such as the noisiness of the SOC, complexity of networks, and the distractions that could be caused by sonification. I X . C O N C L U S I O N A N D F U T U R E W O R K Sonification has promise as an approach to improving security practitioners’ working practices in SOCs, based on SOC workflo w and challenges, and evidence of the benefits sonification can offer . Using an online survey and semi- structured interview responses from practitioners, we explored perspectiv es on the incorporation of sonification into SOCs. Our results show that security practitioners see high potential for the use of sonification in a range of use-cases; in particular, for peripheral monitoring – while multitasking with other work tasks, or whilst outside of the SOC. Participants also saw value in using sonification for anomaly detection, in an approach similar to the existing visualization techniques used in SOCs. W e identified challenges in inte gration, and requirements for design, that should be addressed in future research. In order to be appropriate for a range of different SOC types, SOC sound- scapes, and practitioners’ job roles, sonification tools should be flexible in design. More specifically , sonification should be playable through a range of mediums, and suitable for a range of different types and lengths of use. Sonification of alerts was a key area highlighted for further design in vestigation, as well as approaches to mitigating listener fatigue. As future work, we intend to address the design and integration questions highlighted in this study . W e also intend to validate experimentally the capability of SOC practitioners to use sonification in our refined conte xts of use, in comparison with other SOC tools. Experimentation with sonification in real SOC settings, and in realistically complex networks, will be key to assessing the utility of sonification for SOCs, and the effect of sonification on the SOC and vice versa. R E F E R E N C E S [1] S. C. Sundaramurthy , A. G. Bardas, J. Case, X. Ou, M. W esch, J. McHugh, and S. R. Rajagopalan, “ A human capital model for mitigating security analyst burnout. ” in Symposium on Usable Privacy and Security (SOUPS) , 2015, pp. 347–359. [2] G. Kramer , B. W alker et al. , “The sonification report: Status of the field and research agenda. report prepared for the national science foundation by members of the international community for auditory display , ” in Pr oceedings of the International Conference on Auditory Display , 1999. [3] T . Hermann, A. Hunt, and J. Neuhof f, The sonification handbook . Logos V erlag Berlin, GE, 2011. [4] L. Axon, J. R. C. Nurse, M. Goldsmith, and S. Creese, “ A formalised approach to designing sonification systems for network-security moni- toring, ” International Journal on Advances in Security , vol. 10, no. 1&2, pp. 26–47, 2017. [5] M. Ballora, N. Giacobe, and D. Hall, “Songs of cyberspace: an update on sonifications of network traffic to support situational awareness, ” in SPIE Defense, Security, and Sensing . International Society for Optics and Photonics, 2011, pp. 80 640P–80 640P . [6] V . F . Mancuso, E. T . Greenlee, G. Funke, A. Dukes, L. Menk e, R. Bro wn, and B. Miller , “ Augmenting cyber defender performance and workload through sonified displays, ” Procedia Manufacturing , vol. 3, pp. 5214– 5221, 2015. [7] T . Hildebrandt, T . Hermann, and S. Rinderle-Ma, “Continuous sonifi- cation enhances adequacy of interactions in peripheral process moni- toring, ” International Journal of Human-Computer Studies , vol. 95, pp. 54–65, 2016. [8] N. Bev an, “International standards for hci and usability , ” International Journal of Human-Computer Studies , vol. 55, no. 4, pp. 533–552, 2001. [9] M. Maguire and N. Bev an, “User requirements analysis, ” in Usability . Springer , 2002, pp. 133–148. [10] J. Gulliksen, B. G ¨ oransson, I. Boivie, S. Blomkvist, J. Persson, and ˚ A. Cajander, “Key principles for user-centred systems design, ” Be- haviour and Information T echnology , vol. 22, no. 6, pp. 397–409, 2003. [11] S. C. Sundaramurthy , M. W esch, X. Ou, J. McHugh, S. R. Rajagopalan, and A. G. Bardas, “Humans are dynamic-our tools should be too, ” IEEE Internet Computing , vol. 21, no. 3, pp. 40–46, 2017. [12] S. C. Sundaramurthy , J. Case, T . Truong, L. Zomlot, and M. Hoffmann, “ A tale of three security operation centers, ” in Pr oceedings of the 2014 ACM W orkshop on Security Information W orkers . A CM, 2014, pp. 43–50. [13] C. Pellerin, “ Airmen must understand business of cyber , general says, ” 2013, american Forces Press Service, retrieved 19/09/2017 from http://www .166aw .ang.af.mil/News/Article- Display/Article/448041/ airmen- must- understand- business- of- c yber- general- says/. [14] A. D’Amico, L. Buchanan, D. Kirkpatrick, and P . W alczak, “Cyber operator perspectives on security visualization, ” in Advances in Human F actors in Cybersecurity . Springer , 2016, pp. 69–81. [15] Y . Zhang, Y . Xiao, M. Chen, J. Zhang, and H. Deng, “ A survey of security visualization for computer network logs, ” Security and Communication Networks , vol. 5, no. 4, pp. 404–421, 2012. [16] D. Botta, R. W erlinger, A. Gagn ´ e, K. Beznosov , L. Iverson, S. Fels, and B. Fisher , “T owards understanding it security professionals and their tools, ” in Proceedings of the 3rd symposium on Usable privacy and security . A CM, 2007, pp. 100–111. [17] A. D’Amico and K. Whitley , “The real work of computer network defense analysts, ” in V izSEC 2007 . Springer , 2008, pp. 19–37. [18] W erlinger , Rodrigo and Hawkey , Kirstie and Beznosov , K onstantin, “ An integrated view of human, organizational, and technological challenges of it security management, ” Information Management & Computer Security , vol. 17, no. 1, pp. 4–19, 2009. 11 [19] R. W erlinger , K. Muldner , K. Hawkey , and K. Beznosov , “Preparation, detection, and analysis: the diagnostic work of it security incident response, ” Information Management & Computer Security , v ol. 18, no. 1, pp. 26–42, 2010. [20] A. D’Amico, K. Whitley , D. T esone, B. O’Brien, and E. Roth, “ Achiev- ing cyber defense situational awareness: A cognitiv e task analysis of information assurance analysts, ” in Proceedings of the Human F actors and Ergonomics Society Annual Meeting , vol. 49, no. 3. SA GE Publications Sage CA: Los Angeles, CA, 2005, pp. 229–233. [21] R. W erlinger , K. Hawkey , and K. Beznosov , “Security practitioners in context: their acti vities and interactions, ” in CHI’08 Extended Abstracts on Human F actors in Computing Systems . ACM, 2008, pp. 3789–3794. [22] S. C. Sundaramurthy , J. McHugh, X. Ou, M. W esch, A. G. Bardas, and S. R. Rajagopalan, “T urning contradictions into innov ations or: Ho w we learned to stop whining and improv e security operations, ” in Symposium on Usable Privacy and Security (SOUPS) , 2016. [23] R. W erlinger, K. Hawke y , D. Botta, and K. Beznosov , “Security practitioners in context: Their acti vities and interactions with other stakeholders within organizations, ” International Journal of Human- Computer Studies , vol. 67, no. 7, pp. 584–606, 2009. [24] A. Brown, M. Martin, B. Kapralos, M. Green, and M. Garcia-Ruiz, “Poster: T o wards music-assisted intrusion detection, ” 2009, poster pre- sented at IEEE W orkshop on Statistical Signal Processing. [25] M. Gilfix and A. Couch, “Peep (the network auralizer): Monitoring your network with sound. ” in Pr oceedings of the Larg e Installation System Administration Conference , 2000, pp. 109–117. [26] R. Giot and Y . Courbe, “Intention–interactive network sonification, ” in Pr oceedings of the International Conference on Auditory Display . Georgia Institute of T echnology , 2012, pp. 235–236. [27] C. Papadopoulos, C. Kyriakakis, A. Sawchuk, and X. He, “Cyberseer: 3d audio-visual immersion for network security and management, ” in Pr oceedings of the A CM W orkshop on V isualization and Data Mining for Computer Security . A CM, 2004, pp. 90–98. [28] L. Qi, M. Martin, B. Kapralos, M. Green, and M. Garc ´ ıa-Ruiz, “T o ward sound-assisted intrusion detection systems, ” in On the Move to Mean- ingful Internet Systems 2007: CoopIS, DO A, ODBASE, GADA, and IS . Springer , 2007, pp. 1634–1645. [29] M. Gopinath, “Auralization of intrusion detection system using Jlisten, ” Development , vol. 22, p. 3, 2004. [30] T . Kaczmarek, A. Kobsa, R. Sy , and G. Tsudik, “ An unattended study of users performing security critical tasks under adversarial noise, ” in Pr oceedings of the NDSS W orkshop on Useable Security , 2015, p. 14. [31] B. Berg, T . Kaczmarek, A. Kobsa, and G. Tsudik, “ An exploration of the effects of sensory stimuli on the completion of security tasks, ” T o appear in IEEE Privacy & Security , vol. 15, p. 6, 2017. [32] G. S ¨ oderlund et al. , “Positive effects of noise on cognitiv e performance: Explaining the moderate brain arousal model, ” in The 9th Congress of the International Comisssion on the Biological Ef fects of Noise . Leibniz Gemeinschaft, 2008, pp. 378–386. [33] M. Maguire, “Context of use within usability activities, ” International Journal of Human-Computer Studies , vol. 55, no. 4, pp. 453–483, 2001. [34] B. Nevo, “Face validity re visited, ” Journal of Educational Measurement , vol. 22, no. 4, pp. 287–293, 1985. [35] G. Baier, T . Hermann, and U. Stephani, “Event-based sonification of eeg rhythms in real time, ” Clinical Neur ophysiology , vol. 118, no. 6, pp. 1377–1386, 2007. [36] S. Baldassi, N. Megna, and D. C. Burr, “V isual clutter causes high- magnitude errors, ” PLoS Biology , vol. 4, no. 3, p. e56, 2006. [37] M. Ballora, R. J. Cole, H. Kruesi, H. Greene, G. Monahan, and D. L. Hall, “Use of sonification in the detection of anomalous ev ents, ” in SPIE Defense, Security , and Sensing . International Society for Optics and Photonics, 2012, pp. 84 070S–84 070S. [38] R. E. Etoty and R. F . Erbacher, “ A survey of visualization tools assessed for anomaly-based intrusion detection analysis, ” DTIC Document, T ech. Rep., 2014. [39] D. Merced and L. W anda, “Sound for the exploration of space physics data, ” Ph.D. dissertation, University of Glasgow , 2013. [40] R. van Ee, J. J. van Boxtel, A. L. Parker , and D. Alais, “Multisensory congruency as a mechanism for attentional control over perceptual selection, ” Journal of Neur oscience , vol. 29, no. 37, pp. 11 641–11 649, 2009. [41] R. Likert, “ A technique for the measurement of attitudes. ” Arc hives of Psychology , 1932. [42] M. C. Kaptein, C. Nass, and P . Markopoulos, “Powerful and consistent analysis of likert-type rating scales, ” in Proceedings of the SIGCHI Confer ence on Human F actors in Computing Systems . A CM, 2010, pp. 2391–2394. [43] J. R. C. Nurse, S. Creese, M. Goldsmith, and K. Lamberts, “Guidelines for usable cybersecurity: Past and present, ” in Cyberspace Safety and Security (CSS), 2011 Thir d International W orkshop on . IEEE, 2011, pp. 21–26. [44] S. Jamieson et al. , “Likert scales: how to (ab) use them, ” Medical education , vol. 38, no. 12, pp. 1217–1218, 2004. [45] G. Norman, “Likert scales, levels of measurement and the laws of statistics, ” Advances in health sciences education , vol. 15, no. 5, pp. 625–632, 2010. [46] J. Robertson, “Likert-type scales, statistical methods, and effect sizes, ” Communications of the A CM , vol. 55, no. 5, pp. 6–7, 2012. [47] N. King, “T emplate analysis, ” Qualitative Methods and Analysis in Or ganisational Researc h: A Practical Guide , 1998. [48] G. Kramer, Auditory display: Sonification, audification, and auditory interfaces . Perseus Publishing, 1993. 12
Original Paper
Loading high-quality paper...
Comments & Academic Discussion
Loading comments...
Leave a Comment