lj42 / sonification

What happens when you mix data science and music?
5 stars 0 forks source link

Find security dataset with 3 to 5 variables to analyze #1

Closed sewardlee337 closed 6 years ago

sewardlee337 commented 6 years ago

@wayward710 Find a network security file with interesting variables to analyze/sonify, plus any additional relevant info.

@sewardlee337 To look at data afterwards and play around with it.

sewardlee337 commented 6 years ago

@wayward710 Is it possible to get a subset of the data as a CSV to play around with?

sewardlee337 commented 6 years ago

Possible resources -- posting here to keep track:

sewardlee337 commented 6 years ago

These look like CSV files -- will inspect to see if these files are interest: https://nesg.ugr.es/nesg-ugr16/index.php#CAL

sewardlee337 commented 6 years ago

I think the following file is a good candidate for input for a first attempt at sonification: https://nesg.ugr.es/nesg-ugr16/march_week3.php#INI (the file attack_ts_march_week3.csv)

lj42 commented 6 years ago

I took the data and just changed the colours to quickly see where there was a 1 and a 0

For the purposes of this exercise: sounds are STATE (LOOPS) : Stable / Monitoring/ Yellow / Red DING (ONESHOTS): Ding Stable, Ding Monitoring, Ding Yellow, Ding Red

As part of the exercise we could have 1min realtime = 0.375sec for musical purposes making a BPM of 90, around about the tempo of slow hiphop / R&B music. 90BPM would mean the loops will fit together perfectly.

The eventual aim would be do to this live i.e. direct triggers of sound as a result of incident.

state change

Musically this data might work as follows: Blacklist: a simple state change from stable to attack and then back to stable I think. when Blacklist = 1, state goes from stable to monitoring. When Blacklist = 0 state goes back to stable unless there are other anomalies.

Below is a screenshot from later on in the data (minute 488ish) where there are 2 events we can sonify alongside the stable/attack state.

interesting bit

Anomaly-spam: a one-shot 'Ding' notice that there's something up. When Anomaly-spam = 1 and Blacklist = 1, state goes from monitoring to Yellow. If Blacklist = 0, these Dings are Monitoring

Anomaly-sshscan: a one-shot 'Ding' from Red. If Anomaly-sshscan=1, state goes directly Red, regardless of other data. 5mins after Anomaly-sshscan = 0, Ding goes Yellow. 10 mins, Ding = Monitoring.

sewardlee337 commented 6 years ago

Looks like we've decided upon our first dataset to use:

https://nesg.ugr.es/nesg-ugr16/march_week3.php#INI (the file attack_ts_march_week3.csv)

Closing...