Sonification in security operations centres: what do security practitioners think?

07/17/2018
by   Louise M. Axon, et al.
0

In Security Operations Centres (SOCs) security practitioners work using a range of tools to detect and mitigate malicious computer-network activity. Sonification, in which data is represented as sound, is said to have potential as an approach to addressing some of the unique challenges faced by SOCs. For example, sonification has been shown to enable peripheral monitoring of processes, which could aid practitioners multitasking in busy SOCs. The perspectives of security practitioners on incorporating sonification into their actual working environments have not yet been examined, however. The aim of this paper therefore is to address this gap by exploring attitudes to using sonification in SOCs. We report on the results of a study consisting of an online survey (N=20) and interviews (N=21) with security practitioners working in a range of different SOCs. Our contribution is a refined appreciation of the contexts in which sonification could aid in SOC working practice, and an understanding of the areas in which sonification may not be beneficial or may even be problematic.We also analyse the critical requirements for the design of sonification systems and their integration into the SOC setting. Our findings clarify insights into the potential benefits and challenges of introducing sonification to support work in this vital security-monitoring environment.

READ FULL TEXT
research
07/05/2021

An Empirical Analysis of Practitioners' Perspectives on Security Tool Integration into DevOps

Background: Security tools play a vital role in enabling developers to b...
research
07/21/2021

Automated Identification of Security Discussions in Microservices Systems: Industrial Surveys and Experiments

Lack of awareness and knowledge of microservices-specific security chall...
research
12/30/2021

An Empirical Study of Security Practices for Microservices Systems

Despite the numerous benefits of microservices systems, security has bee...
research
03/16/2022

Understanding motivations and characteristics of financially-motivated cybercriminals

Background: Cyber offences, such as hacking, malware creation and distri...
research
07/26/2019

Leveraging the Mob Mentality: An Experience Report on Mob Programming

Mob Programming, or "mobbing", is a relatively new collaborative program...
research
05/08/2021

Mental Models of Adversarial Machine Learning

Although machine learning (ML) is widely used in practice, little is kno...
research
10/06/2022

Scaffolding Ethics-Focused Methods for Practice Resonance

Numerous methods and tools have been proposed to motivate or support eth...

Please sign up or login with your details

Forgot password? Click here to reset