Impact of computer users on cyber defense strategies

被引:2
|
作者
Colvett, Christopher Daniel [1 ]
Petty, Mikel D. [2 ,4 ]
Bland, John A. [3 ]
机构
[1] Univ Alabama, Ind & Syst Engn & Engn Management, Huntsville, AL USA
[2] Univ Alabama, Comp Sci, Huntsville, AL USA
[3] Univ Alabama, Comp Engn, Huntsville, AL USA
[4] Univ Alabama, Comp Sci, 301 Sparkman Dr NW, Huntsville, AL 35899 USA
关键词
SEE26 modeling and simulation; cybersecurity; Petri nets; reinforcement learning;
D O I
10.1002/sys.21737
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
Cybersecurity research often focuses primarily or exclusively on the interactions between the attacker, trying to exploit the computer system, and the defender, trying to protect it. However, including the computer users is important because the users' requirements are the reason the computer system exists.An extension of the Petri net formalism, Petri Nets with Players, Strategies, and Costs (PNPSC) was used to model cyberattacks described in the MITRE Common Attack Pattern Enumeration and Classification database. PNPSC models include the attacker, defender, and computer user as "players" attempting to achieve competing goals. Each player can observe the current marking of a subset of the PNPSC net's places and change the stochastic firing rates of a subset of the net's transitions in order to achieve their goals. A mapping between the markings of a player's observable places and the desired firing rates of player's controllable transitions is the player's strategy.A reinforcement learning algorithm was integrated with PNPSC models of three cyberattack patterns to learn strategies for the defender in simulations both with and without a representation of the computer user. A simulation experiment showed that the defender's reward was lower and the defender's learned strategy was different when the user was represented. A second simulation experiment and statistical analysis confirmed that the differences were not due simply to randomness. With the user represented, the system defender must balance security against usability. This research provides a more complete cyberattack model and shows that user models are important in future cybersecurity simulation.
引用
收藏
页码:532 / 555
页数:24
相关论文
共 50 条
  • [21] Active and Passive Defense Strategies of Cyber-Physical Power System against Cyber Attacks Considering Node Vulnerability
    Qu, Zhengwei
    Shi, Hualiang
    Wang, Yunjing
    Yin, Guiliang
    Abu-Siada, Ahmed
    PROCESSES, 2022, 10 (07)
  • [22] Optimal Cyber-Defense Strategies for Advanced Persistent Threats: A Game Theoretical Analysis
    Acquaviva, Jeffrey
    Mahon, Mark
    Einfalt, Bruce
    LaPorta, Tom
    2017 IEEE 36TH INTERNATIONAL SYMPOSIUM ON RELIABLE DISTRIBUTED SYSTEMS (SRDS), 2017, : 204 - 213
  • [23] Improved Cyber Defense Modeling Framework for Modeling and Simulating the Lifecycle of Cyber Defense Activities
    Kim, Donghwa
    Ahn, Myung Kil
    Lee, Seongkee
    Lee, Donghwan
    Park, Moosung
    Shin, Dongkyoo
    IEEE ACCESS, 2023, 11 : 114187 - 114200
  • [24] Combining Cybersecurity and Cyber Defense to achieve Cyber Resilience
    Galinec, Darko
    Steingartner, William
    2017 IEEE 14TH INTERNATIONAL SCIENTIFIC CONFERENCE ON INFORMATICS, 2017, : 87 - 93
  • [25] Agile monitoring for cyber Defense
    Doyle, J
    Kohane, I
    Long, W
    Shrobe, H
    Szolovits, P
    DISCEX'01: DARPA INFORMATION SURVIVABILITY CONFERENCE & EXPOSITION II, VOL I, PROCEEDINGS, 2001, : 318 - 328
  • [26] Cyber defense: Tough standards
    不详
    INTECH, 2004, 51 (11) : 11 - 11
  • [27] Pentagon flunks cyber defense
    Mann, P
    AVIATION WEEK & SPACE TECHNOLOGY, 1999, 150 (15): : 69 - 70
  • [28] Organized cyber defense competitions
    Dodge, RC
    Ragsdale, DJ
    IEEE INTERNATIONAL CONFERENCE ON ADVANCED LEARNING TECHNOLOGIES, PROCEEDINGS, 2004, : 768 - 770
  • [29] Foundations for Cyber Zone Defense
    Mitchell, Robert
    Sery, Paul
    Klitsner, Tom
    2016 25TH INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATIONS AND NETWORKS (ICCCN), 2016,
  • [30] Cyber defense: Art to science
    Saydjari, OS
    COMMUNICATIONS OF THE ACM, 2004, 47 (03) : 52 - 57