Siren songs: a novel sonification method for network traffic and intrusion detection
Live and retrospective analysis of network traffic is a challenging task in any busy IT Department or Network Operating Centre. Examining graphs and log files is time-consuming, and alerts can be missed. As an alternative to visual representations this research investigates sonification, turning net...
| Main Author: | Skarth-Hayley, Luke |
|---|---|
| Format: | Dissertation (University of Nottingham only) |
| Language: | English |
| Published: |
2017
|
| Subjects: | |
| Online Access: | https://eprints.nottingham.ac.uk/48565/ |
Similar Items
A network of noise: designing with a decade of data to sonify JANET
by: Emsley, Iain, et al.
Published: (2017)
by: Emsley, Iain, et al.
Published: (2017)
Rule Generalisation in Intrusion Detection Systems using Snort
by: Aickelin, Uwe, et al.
Published: (2007)
by: Aickelin, Uwe, et al.
Published: (2007)
A super-peer architecture to improve intrusion detection and scalability in collaborative intrusion detection network
by: Bakhdlaghi, Yousef Abdullah
Published: (2020)
by: Bakhdlaghi, Yousef Abdullah
Published: (2020)
An efficient anomaly intrusion detection method with evolutionary neural network
by: Sarvari, Samira
Published: (2020)
by: Sarvari, Samira
Published: (2020)
Sensing Danger: Innate Immunology for Intrusion Detection
by: Aickelin, Uwe, et al.
Published: (2007)
by: Aickelin, Uwe, et al.
Published: (2007)
Immune System Approaches to Intrusion Detection - A Review
by: Kim, Jungwon, et al.
Published: (2007)
by: Kim, Jungwon, et al.
Published: (2007)
Improving visual-to-auditory cross-modality information conversions
by: Tan, Shern Shiou
Published: (2019)
by: Tan, Shern Shiou
Published: (2019)
Features selection for intrusion detection system using hybridize PSO-SVM
by: Tabaan, Alaa Abdulrahman
Published: (2016)
by: Tabaan, Alaa Abdulrahman
Published: (2016)
Seismic data conditioning and neural network-based attribute selection for enhanced fault detection
by: Chehrazi, A., et al.
Published: (2013)
by: Chehrazi, A., et al.
Published: (2013)
Hyper-heuristic approaches for data stream-based iIntrusion detection in the Internet of Things
by: Hadi, Ahmed Adnan
Published: (2022)
by: Hadi, Ahmed Adnan
Published: (2022)
Jay Chou's Zhongguo Feng: Songs and identity / Su Zekai
by: Su , Zekai
Published: (2018)
by: Su , Zekai
Published: (2018)
The musical descriptor using Fast Fourier Transform (FFT): examples in P Ramlee songs
by: Musib, Ahmad Faudzi, et al.
Published: (2024)
by: Musib, Ahmad Faudzi, et al.
Published: (2024)
Improving intrusion detection for better anomaly detection based on x-means clustering and multi-layer perceptron classification
by: Abbas, Borkan Ahmed
Published: (2016)
by: Abbas, Borkan Ahmed
Published: (2016)
Immune System Approaches to Intrusion Detection - A Review
by: Kim, Jungwon, et al.
Published: (2007)
by: Kim, Jungwon, et al.
Published: (2007)
Message from The Heart?: An exploratory study on songs / Ching Lai Hock
by: Ching, Lai Hock
Published: (1985)
by: Ching, Lai Hock
Published: (1985)
Gender messages in contemporary Malay songs
by: Collin, Jerome
Published: (2013)
by: Collin, Jerome
Published: (2013)
Orthogonal Frequency Division Multiple Access resource unit allocation algorithms for IEEE 802.11AX medium access control protocol
by: Zazali, Azyyati Adiah
Published: (2024)
by: Zazali, Azyyati Adiah
Published: (2024)
A landscape of design: interaction, interpretation and the development of experimental expressive interfaces
by: Chamberlain, Alan, et al.
Published: (2018)
by: Chamberlain, Alan, et al.
Published: (2018)
Adaptive alert throttling for intrusion detection systems
by: Tedesco, Gianni, et al.
Published: (2003)
by: Tedesco, Gianni, et al.
Published: (2003)
Oral transmission and stylistic issues in Malay Asli song in Johor / Fadzril Nidzam Ishak
by: Fadzril Nidzam , Ishak
Published: (2018)
by: Fadzril Nidzam , Ishak
Published: (2018)
Projek Pistol back with hit song Sulu Serata Dunya,23 November 2012
by: The Star, .
Published: (2012)
by: The Star, .
Published: (2012)
Evaluation of virtual private network employing secure on demand IP based connection (SeDIC) / Mohamed Sulaiman Sultan Suhaibuddeen
by: Sultan Suhaibuddeen, Mohamed Sulaiman
Published: (2010)
by: Sultan Suhaibuddeen, Mohamed Sulaiman
Published: (2010)
The brain symphony for post stroke rehabilitation – A pilot randomised controlled study with P.Ramlee songs / Beh Wen Fen
by: Beh , Wen Fen
Published: (2018)
by: Beh , Wen Fen
Published: (2018)
A comparative melodic analysis on pop country songs between two songwriters of different eras case study: Diane Warren, how do i live & Taylor Swift, love story / Wan Nurzawani Wan Abdullah
by: Wan Abdullah, Wan Nurzawani
Published: (2012)
by: Wan Abdullah, Wan Nurzawani
Published: (2012)
Intrusion notification via SMS / Aziz Kasmir Mat Yunos
by: Mat Yunos, Aziz Kasmir
Published: (2006)
by: Mat Yunos, Aziz Kasmir
Published: (2006)
战后台湾闽南流行歌曲的兴起与演变:以行业歌曲为例 (The Emergence And Evolution Of Post-War Minnan Popular Songs In Taiwan: A Case Study Of Industry Songs)
by: Teh, Ke Li
Published: (2019)
by: Teh, Ke Li
Published: (2019)
An ethnographic exploration of studio production practice
by: McGrath, Sean, et al.
Published: (2016)
by: McGrath, Sean, et al.
Published: (2016)
Provenance network analytics: an approach to data analytics using data provenance
by: Huynh, Trung Dong, et al.
Published: (2018)
by: Huynh, Trung Dong, et al.
Published: (2018)
Path recovery for ad-hoc on-demamd distance 6lowpan routing protocol
by: Ee, Gee Keng
Published: (2013)
by: Ee, Gee Keng
Published: (2013)
A critical and reflective commentary on a portfolio of compositions
by: Slater, Angela Elizabeth
Published: (2016)
by: Slater, Angela Elizabeth
Published: (2016)
An analysis on the role of word formation process in the lyrics of Malaysia’s top 10 English songs
by: Ong, Su Ke
Published: (2022)
by: Ong, Su Ke
Published: (2022)
Kesan instruksi audio visual terhadap pembelajaran caklempong di sekolah menengah daerah Sepang, Selangor
by: Mohammad, Evawanialisza
Published: (2012)
by: Mohammad, Evawanialisza
Published: (2012)
Multi-channel support for data-gathering trees in wireless sensor networks
by: Alfraihat, Wasan Ahmad Sulieman
Published: (2010)
by: Alfraihat, Wasan Ahmad Sulieman
Published: (2010)
Data Reduction in Intrusion Alert Correlation
by: Tedesco, Gianni, et al.
Published: (2006)
by: Tedesco, Gianni, et al.
Published: (2006)
A comparative study of songs and singing styles of Teresa Teng and Faye Wong / Chai Zilong
by: Chai, Zilong
Published: (2018)
by: Chai, Zilong
Published: (2018)
Development of a Saltwater Intrusion Software Using Visual Basic
by: Tan, Chiau Siang
Published: (2001)
by: Tan, Chiau Siang
Published: (2001)
Portfolio of compositions
by: Lamb, E. J. G.
Published: (2023)
by: Lamb, E. J. G.
Published: (2023)
Name-signature lookup system: a security enhancement to named data networking
by: Song, Zhicheng, et al.
Published: (2021)
by: Song, Zhicheng, et al.
Published: (2021)
A hybrid algorithm for finding shortest path in network routing.
by: Soltan Aghaei, Mohammad Reza, et al.
Published: (2009)
by: Soltan Aghaei, Mohammad Reza, et al.
Published: (2009)
A survey on perception of teachers, parents and students in learning songs with explicit lyrics / Jeanie Ling Ching
by: Jeanie Ling , Ching
Published: (2018)
by: Jeanie Ling , Ching
Published: (2018)
Similar Items
-
A network of noise: designing with a decade of data to sonify JANET
by: Emsley, Iain, et al.
Published: (2017) -
Rule Generalisation in Intrusion Detection Systems using Snort
by: Aickelin, Uwe, et al.
Published: (2007) -
A super-peer architecture to improve intrusion detection and scalability in collaborative intrusion detection network
by: Bakhdlaghi, Yousef Abdullah
Published: (2020) -
An efficient anomaly intrusion detection method with evolutionary neural network
by: Sarvari, Samira
Published: (2020) -
Sensing Danger: Innate Immunology for Intrusion Detection
by: Aickelin, Uwe, et al.
Published: (2007)