Literature DB >> 23829034

Cyber situation awareness: modeling detection of cyber attacks with instance-based learning theory.

Varun Dutt1, Young-Suk Ahn, Cleotilde Gonzalez.   

Abstract

OBJECTIVE: To determine the effects of an adversary's behavior on the defender's accurate and timely detection of network threats.
BACKGROUND: Cyber attacks cause major work disruption. It is important to understand how a defender's behavior (experience and tolerance to threats), as well as adversarial behavior (attack strategy), might impact the detection of threats. In this article, we use cognitive modeling to make predictions regarding these factors.
METHOD: Different model types representing a defender, based on Instance-Based Learning Theory (IBLT), faced different adversarial behaviors. A defender's model was defined by experience of threats: threat-prone (90% threats and 10% nonthreats) and nonthreat-prone (10% threats and 90% nonthreats); and different tolerance levels to threats: risk-averse (model declares a cyber attack after perceiving one threat out of eight total) and risk-seeking (model declares a cyber attack after perceiving seven threats out of eight total). Adversarial behavior is simulated by considering different attack strategies: patient (threats occur late) and impatient (threats occur early).
RESULTS: For an impatient strategy, risk-averse models with threat-prone experiences show improved detection compared with risk-seeking models with nonthreat-prone experiences; however, the same is not true for a patient strategy.
CONCLUSIONS: Based upon model predictions, a defender's prior threat experiences and his or her tolerance to threats are likely to predict detection accuracy; but considering the nature of adversarial behavior is also important. APPLICATION: Decision-support tools that consider the role of a defender's experience and tolerance to threats along with the nature of adversarial behavior are likely to improve a defender's overall threat detection.

Entities:  

Mesh:

Year:  2013        PMID: 23829034     DOI: 10.1177/0018720812464045

Source DB:  PubMed          Journal:  Hum Factors        ISSN: 0018-7208            Impact factor:   2.888


  7 in total

1.  Security under Uncertainty: Adaptive Attackers Are More Challenging to Human Defenders than Random Attackers.

Authors:  Frédéric Moisan; Cleotilde Gonzalez
Journal:  Front Psychol       Date:  2017-06-22

Review 2.  The Future Cybersecurity Workforce: Going Beyond Technical Skills for Successful Cyber Performance.

Authors:  Jessica Dawson; Robert Thomson
Journal:  Front Psychol       Date:  2018-06-12

3.  Understanding Human Decision Making in an Interactive Landslide Simulator Tool via Reinforcement Learning.

Authors:  Pratik Chaturvedi; Varun Dutt
Journal:  Front Psychol       Date:  2021-02-10

4.  Development of Network Security Based on the Neural Network PSD Algorithm.

Authors:  Jianxun Li; Song Ji; Yiran Jiang
Journal:  Comput Intell Neurosci       Date:  2022-09-30

Review 5.  The Role of User Behaviour in Improving Cyber Security Management.

Authors:  Ahmed A Moustafa; Abubakar Bello; Alana Maurushat
Journal:  Front Psychol       Date:  2021-06-18

Review 6.  Simulations in Cyber-Security: A Review of Cognitive Modeling of Network Attackers, Defenders, and Users.

Authors:  Vladislav D Veksler; Norbou Buchler; Blaine E Hoffman; Daniel N Cassenti; Char Sample; Shridat Sugrim
Journal:  Front Psychol       Date:  2018-05-15

7.  Cyber Security: Effects of Penalizing Defenders in Cyber-Security Games via Experimentation and Computational Modeling.

Authors:  Zahid Maqbool; Palvi Aggarwal; V S Chandrasekhar Pammi; Varun Dutt
Journal:  Front Psychol       Date:  2020-01-28
  7 in total

北京卡尤迪生物科技股份有限公司 © 2022-2023.