You are here:

Best Practices for Applying Sonification to Support Teaching and Learning of Network Intrusion Detection
PROCEEDINGS

, College of Telematics, University of Colima, Mexico ; , , Faculty of Business and IT, University of Ontario Institute of Technology, Canada ; , Faculty of Health Sciences, University of Ontario Institute of Technology, Canada ; , College of Telematics, University of Colima, Mexico

EdMedia + Innovate Learning, in Toronto, Canada ISBN 978-1-880094-81-5 Publisher: Association for the Advancement of Computing in Education (AACE), Waynesville, NC

Abstract

In conventional lectures on computer security, the instructor presents the students with the concepts on network intrusion detection, letting students use an actual Network Intrusion Detection System (NIDS) to reinforce and practice the concepts learned. This can be meticulous, and some difficulties can arise affecting learning experience, due to extensive visual output of the NIDS, among other reasons. To overcome this, we have developed a NIDS that employs sonification techniques to translate network traffic characteristics into structured musical sounds, complementing visual information on network traffic, and alerting students on malicious attacks. Based on our sonification research, we are currently working on a set of best practices for applying sonifications on network intrusion detection in educational settings. Human-computer interaction, psychoacoustics, collaborative learning, and instructional design of sonifications, are also addressed in our best practices.

Citation

Garcia-Ruiz, M.A., Vargas Martin, M., Kapralos, B., Tashiro, J.S. & Acosta-Diaz, R. (2010). Best Practices for Applying Sonification to Support Teaching and Learning of Network Intrusion Detection. In J. Herrington & C. Montgomerie (Eds.), Proceedings of ED-MEDIA 2010--World Conference on Educational Multimedia, Hypermedia & Telecommunications (pp. 752-757). Toronto, Canada: Association for the Advancement of Computing in Education (AACE). Retrieved April 19, 2019 from .

View References & Citations Map

References

These references have been extracted automatically and may have some errors. If you see a mistake in the references above, please contact info@learntechlib.org.