You are here:

Best Practices for Applying Sonification to Support Teaching and Learning of Network Intrusion Detection
PROCEEDINGS

, College of Telematics, University of Colima, Mexico ; , , Faculty of Business and IT, University of Ontario Institute of Technology, Canada ; , Faculty of Health Sciences, University of Ontario Institute of Technology, Canada ; , College of Telematics, University of Colima, Mexico

EdMedia + Innovate Learning, in Toronto, Canada ISBN 978-1-880094-81-5 Publisher: Association for the Advancement of Computing in Education (AACE), Waynesville, NC

Abstract

In conventional lectures on computer security, the instructor presents the students with the concepts on network intrusion detection, letting students use an actual Network Intrusion Detection System (NIDS) to reinforce and practice the concepts learned. This can be meticulous, and some difficulties can arise affecting learning experience, due to extensive visual output of the NIDS, among other reasons. To overcome this, we have developed a NIDS that employs sonification techniques to translate network traffic characteristics into structured musical sounds, complementing visual information on network traffic, and alerting students on malicious attacks. Based on our sonification research, we are currently working on a set of best practices for applying sonifications on network intrusion detection in educational settings. Human-computer interaction, psychoacoustics, collaborative learning, and instructional design of sonifications, are also addressed in our best practices.

Citation

Garcia-Ruiz, M.A., Vargas Martin, M., Kapralos, B., Tashiro, J.S. & Acosta-Diaz, R. (2010). Best Practices for Applying Sonification to Support Teaching and Learning of Network Intrusion Detection. In J. Herrington & C. Montgomerie (Eds.), Proceedings of ED-MEDIA 2010--World Conference on Educational Multimedia, Hypermedia & Telecommunications (pp. 752-757). Toronto, Canada: Association for the Advancement of Computing in Education (AACE). Retrieved July 18, 2019 from .

References

View References & Citations Map

These references have been extracted automatically and may have some errors. Signed in users can suggest corrections to these mistakes.

Suggest Corrections to References