Sign In

Communications of the ACM

ACM TechNews

Do You Hear What I Hear? A Cyberattack.


View as: Print Mobile App Share: Send by email Share on reddit Share on StumbleUpon Share on Hacker News Share on Tweeter Share on Facebook
Listening for a cybersecurity data alert.

Researchers at Carnegie Mellon University have shown demonstrated how cybersecurity data can be made audible, in the form of music.

Credit: beltonedfw.com

Carnegie Mellon University's Yang Cai and colleagues have designed a method of making abnormal network traffic audible by rendering cybersecurity data musically.

The researchers explored several sound mapping algorithms, converting numeral datasets into music with diverse melodies, harmonies, time signatures, and tempos.

They produced music using network traffic data from an actual malware distribution network, and presented it to non-musicians, who could accurately identify pitch shifts when played on different instruments.

Said the researchers, "We are not only making music, but turning abstract data into something that humans can process."

Said Cai, “The process of sonification—using audio to perceptualize data—is not new, but sonification to make data more appealing to the human ear is.”

From Carnegie Mellon University CyLab Security and Privacy Institute
View Full Article

 

Abstracts Copyright © 2021 SmithBucklin, Washington, DC, USA


 

No entries found