Impact of computer users on cyber defense strategies

被引:2
|
作者
Colvett, Christopher Daniel [1 ]
Petty, Mikel D. [2 ,4 ]
Bland, John A. [3 ]
机构
[1] Univ Alabama, Ind & Syst Engn & Engn Management, Huntsville, AL USA
[2] Univ Alabama, Comp Sci, Huntsville, AL USA
[3] Univ Alabama, Comp Engn, Huntsville, AL USA
[4] Univ Alabama, Comp Sci, 301 Sparkman Dr NW, Huntsville, AL 35899 USA
关键词
SEE26 modeling and simulation; cybersecurity; Petri nets; reinforcement learning;
D O I
10.1002/sys.21737
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
Cybersecurity research often focuses primarily or exclusively on the interactions between the attacker, trying to exploit the computer system, and the defender, trying to protect it. However, including the computer users is important because the users' requirements are the reason the computer system exists.An extension of the Petri net formalism, Petri Nets with Players, Strategies, and Costs (PNPSC) was used to model cyberattacks described in the MITRE Common Attack Pattern Enumeration and Classification database. PNPSC models include the attacker, defender, and computer user as "players" attempting to achieve competing goals. Each player can observe the current marking of a subset of the PNPSC net's places and change the stochastic firing rates of a subset of the net's transitions in order to achieve their goals. A mapping between the markings of a player's observable places and the desired firing rates of player's controllable transitions is the player's strategy.A reinforcement learning algorithm was integrated with PNPSC models of three cyberattack patterns to learn strategies for the defender in simulations both with and without a representation of the computer user. A simulation experiment showed that the defender's reward was lower and the defender's learned strategy was different when the user was represented. A second simulation experiment and statistical analysis confirmed that the differences were not due simply to randomness. With the user represented, the system defender must balance security against usability. This research provides a more complete cyberattack model and shows that user models are important in future cybersecurity simulation.
引用
收藏
页码:532 / 555
页数:24
相关论文
共 50 条
  • [1] Impact of the Computer System User When Creating Cyber Defense Strategies
    Colvett, C. Daniel
    Petty, Mikel D.
    Bland, John A.
    Maxwell, Katia P.
    Rosenhoover, Marshall
    ACMSE 2022: PROCEEDINGS OF THE 2022 ACM SOUTHEAST CONFERENCE, 2022, : 74 - 81
  • [2] Impact analysis for cyber defense optimization
    Noel, Steven
    JOURNAL OF DEFENSE MODELING AND SIMULATION-APPLICATIONS METHODOLOGY TECHNOLOGY-JDMS, 2023, 20 (01): : 39 - 39
  • [3] A methodological review on attack and defense strategies in cyber warfare
    Ramaswamy Swarnammal Shaji
    V. Sachin Dev
    Thomas Brindha
    Wireless Networks, 2019, 25 : 3323 - 3334
  • [4] A methodological review on attack and defense strategies in cyber warfare
    Shaji, Ramaswamy Swarnammal
    Dev, V. Sachin
    Brindha, Thomas
    WIRELESS NETWORKS, 2019, 25 (06) : 3323 - 3334
  • [5] A Game Theoretic Approach to Model Cyber Attack and Defense Strategies
    Attiah, Afraa
    Chatterjee, Mainak
    Zou, Cliff C.
    2018 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2018,
  • [6] ACCOMMODATION STRATEGIES REPORTED BY COMPUTER USERS WITH OSTEOARTHRITIS
    Baker, N. A.
    Theis, K.
    ANNALS OF THE RHEUMATIC DISEASES, 2015, 74 : 1304 - 1304
  • [7] Adaptive Cyber Defense Technique Based on Multiagent Reinforcement Learning Strategies
    Alshamrani, Adel
    Alshahrani, Abdullah
    INTELLIGENT AUTOMATION AND SOFT COMPUTING, 2023, 36 (03): : 2757 - 2771
  • [8] Intelligent planning method for cyber defense strategies based on bounded rationality
    Liu Y.
    Guo Y.
    Fang C.
    Li Y.
    Chen Q.
    Tongxin Xuebao/Journal on Communications, 2023, 44 (05): : 52 - 63
  • [9] Cyber Attacks and Defense Strategies in India: An Empirical Assessment of Banking Sector
    Bamrara, Atul
    Singh, Gajendra
    Bhatt, Mamta
    INTERNATIONAL JOURNAL OF CYBER CRIMINOLOGY, 2013, 7 (01): : 49 - 61
  • [10] Protection strategies of active defense in cyber-physical power systems
    Chen, Lei
    Gorbachev, Sergey
    Yue, Dong
    Dou, Chunxia
    Li, Shengquan
    Ge, Hui
    Cheng, Zihao
    EPL, 2021, 136 (03)