MuSec: Sonification of Alarms Generated by a SIEM | SpringerLink
Skip to main content

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 615))

Included in the following conference series:

  • 863 Accesses

Abstract

The information generated by a network monitoring system is overwhelming. Monitoring is imperative but very difficult to accomplish due to several reasons. More so for the case of non tech-savvy home users. Security Information Event Management applications generate alarms that correlate multiple occurrences on the network. These events are classified accordingly to their risk. An application that allows the sonification of events generated by a Security Information Event Management can facilitate the security monitoring of a home network by a less tech-savvy user by allowing him to just listen to the result of the sonification of such events.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
¥17,985 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
JPY 3498
Price includes VAT (Japan)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
JPY 17159
Price includes VAT (Japan)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
JPY 21449
Price includes VAT (Japan)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Afzaal, M., Di Sarno, C., Dantonio, S., Romano, L.: An intrusion and fault tolerant forensic storage for a SIEM system. In: 2012 Eighth International Conference on Signal Image Technology and Internet Based Systems (SITIS), pp. 579–586, Nov 2012

    Google Scholar 

  2. Alamanni, M.: OSSIM: A careful, free and always available guardian for your network. Linux J. 2014(242) (2014). http://dl.acm.org/citation.cfm?id=2642922.2642924

  3. Alienvault: Alienvault OSSIM: The world’s most widely used open source SIEM. https://www.alienvault.com/products/ossim. Accessed 15 Dec 2015

  4. AlienVault, U.: USM 5.1-5.2 asset management guide, rev.2. https://www.alienvault.com/doc-repo/usm/asset-management/AlienVault-USM-5.1-5.2-Asset-Management-Guide.pdf (2015). Accessed 17 Feb 2016

  5. Alves, J.: Gestão de eventos de segurança de informação siem. Projeto Integrado, Licenciatura em Segurança Informática em Redes de Computadores, ESTGF, Politécnico do Porto. http://www.estgf.ipp.pt/~apinto/students/jalves_undergrad_2015.pdf (Nov 2015)

  6. Ballora, M., Giacobe, N.A., Hall, D.L.: Songs of cyberspace: an update on sonifications of network traffic to support situational awareness. In: SPIE Defense, Security, and Sensing, pp. 80640P–80640P. International Society for Optics and Photonics (2011)

    Google Scholar 

  7. Gilfix, M., Couch, A.L.: Peep (the network auralizer): monitoring your network with sound. In: LISA, pp. 109–117 (2000)

    Google Scholar 

  8. Giot, R., Courbe, Y.: Intention–Interactive Network Sonification. Georgia Institute of Technology (2012)

    Google Scholar 

  9. Hermann, T.: Taxonomy and Definitions for Sonification and Auditory Display. International Community for Auditory Display (2008)

    Google Scholar 

  10. Hermann, T., Hunt, A., Neuhoff, J.G.: The Sonification Handbook. Logos Verlag Berlin, GE (2011)

    Google Scholar 

  11. Hildebrandt, T., Hermann, T., Rinderle-Ma, S.: A sonification system for process monitoring as secondary task. In: 2014 5th IEEE Conference on Cognitive Infocommunications (CogInfoCom), pp. 191–196. IEEE (2014)

    Google Scholar 

  12. Kapur, A.: Programming for Musicians and Digital Artists. Manning Publications (2015)

    Google Scholar 

  13. Kebert, A., Banerjee, B., George, G., Solano, J., Solano, W.: Detecting distributed SQL injection attacks in a eucalyptus cloud environment. In: Proceedings of the 12th International Conference on Security and Management (SAM-13), Las Vegas, NV, July (2013)

    Google Scholar 

  14. Kimoto, M., Ohno, H.: Design and implementation of Stetho—network sonification system. In: Proceedings of the 2002 International Computer Music Conference, pp. 273–279 (2002)

    Google Scholar 

  15. Malandrino, D., Mea, D., Negro, A., Palmieri, G., Scarano, V.: NeMoS: Network Monitoring with Sound. Georgia Institute of Technology (2003)

    Google Scholar 

  16. Mancuso, V.F., Greenlee, E.T., Funke, G., Dukes, A., Menke, L., Brown, R., Miller, B.: Augmenting cyber defender performance and workload through sonified displays. Proc. Manuf. 3, 5214–5221 (2015)

    Google Scholar 

  17. Software, I.: OSC protocol library written in Java. http://www.illposed.com/software/javaosc.html. Accessed 17 Dec 2015

  18. Vickers, P., Laing, C., Fairfax, T.: Sonification of a network’s self-organized criticality. arXiv:1407.4705 (2014)

  19. Wang, G.: Chuck : Strongly-timed, concurrent, and on-the-fly music programming language. http://chuck.cs.princeton.edu. Accessed 17 Dec 2015

  20. Wolf, K.E., Fiebrink, R.: Sonnet: A code interface for sonifying computer network data. In: NIME’13—13th International Conference on New Interfaces for Musical Expression, pp. 503–506 (2013)

    Google Scholar 

  21. Worrall, D.: Realtime sonification and visualisation of network metadata. In: International Conference on Auditory Display (2015)

    Google Scholar 

  22. Wright, M., Freed, A., Lee, A., Madden, T., Momeni, A.: Managing complexity with explicit mapping of gestures to sound control with OSC. In: International Computer Music Conference, pp. 314–317. Citeseer (2001)

    Google Scholar 

  23. Wright, M., Freed, A., Momeni, A.: OpenSound control: state of the art 2003. In: Proceedings of the 2003 Conference on New Interfaces for Musical Expression. NIME ’03, National University of Singapore, Singapore, Singapore, pp. 153–160. http://dl.acm.org/citation.cfm?id=1085714.1085751 (2003)

  24. Yeo, W.S., Berger, J., Lee, Z.: SonART: A framework for data sonification, visualization and networked multimedia applications. In: Proceedings of the 2004 International Computer Music Conference, pp. 180–184 (2004)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to António Pinto .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer International Publishing AG

About this paper

Cite this paper

Sousa, L., Pinto, A. (2017). MuSec: Sonification of Alarms Generated by a SIEM. In: De Paz, J., Julián, V., Villarrubia, G., Marreiros, G., Novais, P. (eds) Ambient Intelligence– Software and Applications – 8th International Symposium on Ambient Intelligence (ISAmI 2017). ISAmI 2017. Advances in Intelligent Systems and Computing, vol 615. Springer, Cham. https://doi.org/10.1007/978-3-319-61118-1_5

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-61118-1_5

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-61117-4

  • Online ISBN: 978-3-319-61118-1

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics