You are here:

Best Practices for Applying Sonification to Support Teaching and Learning of Network Intrusion Detection
PROCEEDINGS

, College of Telematics, University of Colima, Mexico ; , , Faculty of Business and IT, University of Ontario Institute of Technology, Canada ; , Faculty of Health Sciences, University of Ontario Institute of Technology, Canada ; , College of Telematics, University of Colima, Mexico

EdMedia + Innovate Learning, in Toronto, Canada ISBN 978-1-880094-81-5 Publisher: Association for the Advancement of Computing in Education (AACE), Waynesville, NC

Abstract

In conventional lectures on computer security, the instructor presents the students with the concepts on network intrusion detection, letting students use an actual Network Intrusion Detection System (NIDS) to reinforce and practice the concepts learned. This can be meticulous, and some difficulties can arise affecting learning experience, due to extensive visual output of the NIDS, among other reasons. To overcome this, we have developed a NIDS that employs sonification techniques to translate network traffic characteristics into structured musical sounds, complementing visual information on network traffic, and alerting students on malicious attacks. Based on our sonification research, we are currently working on a set of best practices for applying sonifications on network intrusion detection in educational settings. Human-computer interaction, psychoacoustics, collaborative learning, and instructional design of sonifications, are also addressed in our best practices.

Citation

Garcia-Ruiz, M.A., Vargas Martin, M., Kapralos, B., Tashiro, J.S. & Acosta-Diaz, R. (2010). Best Practices for Applying Sonification to Support Teaching and Learning of Network Intrusion Detection. In J. Herrington & C. Montgomerie (Eds.), Proceedings of ED-MEDIA 2010--World Conference on Educational Multimedia, Hypermedia & Telecommunications (pp. 752-757). Toronto, Canada: Association for the Advancement of Computing in Education (AACE). Retrieved February 17, 2019 from .

View References & Citations Map

References

  1. Barra, M., Cillo, T., DeSantis, A., Petrillo, U.F., Negro, A., & Scarano, V. (2001). Personal WebMelody: Customized sonification of web servers. In Proceedings of the International Conference on Auditory Display (ICAD), Espoo, Finland.
  2. Brewster, S.A., Wright, P.C. & Edwards, A.D.N. (1995). Experimentally derived guidelines for the creation of earcons. In Adjunct Proceedings of HCI'95, Huddersfield, UK.
  3. Brown, L.M., Brewster, S.A., Ramloll, R., Burton, M. & Riedel, B. (2003). Design guidelines for audio presentation of graphs and tables. In Proceedings of ICAD 2003 Workshop on Auditory Displays In Assistive Technologies (Boston, MA), pp. 284-287.
  4. Brown, A., Vargas Martin, M., Kapralos, B., Garcia-Ruiz, M.A. & Green, M. (2009). SONIDO: Using sonification to enhance teaching and learning of network intrusion detection. In Proceedings of the 12th International Conference on Humans and Computers (HC 2009), December 9-10, Hamamatsu, Japan.
  5. Garcia-Ruiz, M.A. & Gutierrez-Pulido, J.R. (2006). An overview of auditory display to assist comprehension of molecular information. Interacting with Computers, 18(4), pp. 853-868.
  6. Garcia-Ruiz, M.A., Edwards, A., Aquino-Santos, R., Vargas Martin, M. & El Seoud, S. (2008). Auditory display as a tool for teaching network intrusion detection. International Journal of Educational Technologies (iJET), 3(2), pp. 59-62.
  7. Gilfix, M. & Couch, A. (2000). Peep (The network auralizer): Monitoring your network with sound. In Proceedings of 14th System Administration Conference (LISA XIV), New Orleans (LA), USA.
  8. Gopinath, M.C. (2004). Auralization of intrusion detection system using Jlisten. Unpublished thesis, Birla Institute of Technology and Science, India.
  9. Irvine, C.E. & Thompson, M. (2003). Teaching objectives of a simulation game for computer security. In Proceedings of Informing Science and Information Technology Joint Conference, Pori, Finland.
  10. Kramer, G. (1994). An introduction to auditory display. In Kramer, G. (ed.) Auditory display: Sonification, audification, and auditory interfaces. Santa Fe Institute Studies in the Sciences of Complexity, Proc. Vol. XVIII. Reading, MA: Addison-Wesley.
  11. Mayer, R.E. (2001). Multimedia learning. New York: Cambridge University Press.
  12. Schweitzer, D., Collins, M. & Baird, L. (2007). A visual approach to teaching formal access models in security. In Proceedings of the 11th Colloquium for Information Systems Security Education. Boston University, Boston, MA.
  13. Shneiderman, B. & Plaisant, C. (2009). Designing the User Interface: Strategies for Effective Human-Computer Interaction. Fifth edition. Boston, MA: Addison-Wesley.
  14. Seep, B., Glosemeyer, R., Hulce, E., Linn, M. & Aytar, P. (2000). Classroom acoustics, a resource for creating learning environments with desirable listening conditions. Technical Committee on Architectural Acoustics.
  15. Yurcik, W. & Doss, D. (2001). Different approaches in the teaching of information systems security. In Proceedings of the Information Systems Education Conference (ISECON) 2001, Cincinnati OH, USA.

These references have been extracted automatically and may have some errors. If you see a mistake in the references above, please contact info@learntechlib.org.