تجاوز إلى المحتوى الرئيسي
User Image

Dr Bushra Alahmadi | د. بشرى عبدالرحمن الأحمدي

Assistant Professor

أستاذ مساعد, قسم تقنية المعلومات

علوم الحاسب والمعلومات
TBD
المنشورات
ورقة مؤتمر
2018
تم النشر فى:

Sonification in security operations centres: what do security practitioners think?

In Security Operations Centres (SOCs) security practitioners work using a range of tools to detect and mitigate malicious computer-network activity. Sonification, in which data is represented as sound, is said to have potential as an approach to addressing some of the unique challenges faced by SOCs. For example, sonification has been shown to enable peripheral monitoring of processes, which could aid practitioners multitasking in busy SOCs. The perspectives of security practitioners on incorporating sonification into their actual working environments have not yet been examined, however. The aim of this paper therefore is to address this gap by exploring attitudes to using sonification in SOCs. We report on the results of a study consisting of an online survey (N=20) and interviews (N=21) with security practitioners working in a range of different SOCs. Our contribution is a refined appreciation of the contexts in which sonification could aid in SOC working practice, and an understanding of the areas in which sonification may not be beneficial or may even be problematic.We also analyse the critical requirements for the design of sonification systems and their integration into the SOC setting. Our findings clarify insights into the potential benefits and challenges of introducing sonification to support work in this vital security-monitoring environment.

مزيد من المنشورات
publications

Security practitioners working in Security Operations Centres (SOCs) are responsible for detectingand mitigating malicious computer network activity.

2020
publications

In Security Operations Centres (SOCs) security practitioners work using a range of tools to detect and mitigate malicious computer-network activity. Sonification, in which data is represented as…

2018
publications

Botnets continue to be a threat to organizations, thus various machine learning-based botnet detectors have been proposed. However, the capability of such systems in detecting new or unseen…

2020