Impact of computer users on cyber defense strategies

被引:2
|
作者
Colvett, Christopher Daniel [1 ]
Petty, Mikel D. [2 ,4 ]
Bland, John A. [3 ]
机构
[1] Univ Alabama, Ind & Syst Engn & Engn Management, Huntsville, AL USA
[2] Univ Alabama, Comp Sci, Huntsville, AL USA
[3] Univ Alabama, Comp Engn, Huntsville, AL USA
[4] Univ Alabama, Comp Sci, 301 Sparkman Dr NW, Huntsville, AL 35899 USA
关键词
SEE26 modeling and simulation; cybersecurity; Petri nets; reinforcement learning;
D O I
10.1002/sys.21737
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
Cybersecurity research often focuses primarily or exclusively on the interactions between the attacker, trying to exploit the computer system, and the defender, trying to protect it. However, including the computer users is important because the users' requirements are the reason the computer system exists.An extension of the Petri net formalism, Petri Nets with Players, Strategies, and Costs (PNPSC) was used to model cyberattacks described in the MITRE Common Attack Pattern Enumeration and Classification database. PNPSC models include the attacker, defender, and computer user as "players" attempting to achieve competing goals. Each player can observe the current marking of a subset of the PNPSC net's places and change the stochastic firing rates of a subset of the net's transitions in order to achieve their goals. A mapping between the markings of a player's observable places and the desired firing rates of player's controllable transitions is the player's strategy.A reinforcement learning algorithm was integrated with PNPSC models of three cyberattack patterns to learn strategies for the defender in simulations both with and without a representation of the computer user. A simulation experiment showed that the defender's reward was lower and the defender's learned strategy was different when the user was represented. A second simulation experiment and statistical analysis confirmed that the differences were not due simply to randomness. With the user represented, the system defender must balance security against usability. This research provides a more complete cyberattack model and shows that user models are important in future cybersecurity simulation.
引用
收藏
页码:532 / 555
页数:24
相关论文
共 50 条
  • [31] Building Resilient Cyber Defense
    Kharwal, Rakesh
    PROCEEDINGS OF THE FIFTH INTERNATIONAL CONFERENCE ON SECURITY OF INFORMATION AND NETWORKS, 2012, : 5 - 5
  • [32] Neuroevolution for Autonomous Cyber Defense
    Heckel, Kade M.
    PROCEEDINGS OF THE 2023 GENETIC AND EVOLUTIONARY COMPUTATION CONFERENCE COMPANION, GECCO 2023 COMPANION, 2023, : 651 - 654
  • [33] Architecture of a Cyber Defense competition
    Schepens, WJ
    James, JR
    2003 IEEE INTERNATIONAL CONFERENCE ON SYSTEMS, MAN AND CYBERNETICS, VOLS 1-5, CONFERENCE PROCEEDINGS, 2003, : 4300 - 4305
  • [34] Denial and Deception in Cyber Defense
    Heckman, Kristin E.
    Stech, Frank J.
    Schmoker, Ben S.
    Thomas, Roshan K.
    COMPUTER, 2015, 48 (04) : 36 - 44
  • [35] Protecting Users of the Cyber Commons
    Lukasik, Stephen J.
    COMMUNICATIONS OF THE ACM, 2011, 54 (09) : 54 - 61
  • [36] Defense on the Move: Ant-Based Cyber Defense
    Fink, Glenn A.
    Haack, Jereme N.
    McKinnon, A. David
    Fulp, Errin W.
    IEEE SECURITY & PRIVACY, 2014, 12 (02) : 36 - 43
  • [37] Problems and Accommodation Strategies Reported by Computer Users with Rheumatoid Arthritis or Fibromyalgia
    Nancy A. Baker
    Elaine N. Rubinstein
    Joan C. Rogers
    Journal of Occupational Rehabilitation, 2012, 22 : 353 - 362
  • [38] Problems and Accommodation Strategies Reported by Computer Users with Rheumatoid Arthritis or Fibromyalgia
    Baker, Nancy A.
    Rubinstein, Elaine N.
    Rogers, Joan C.
    JOURNAL OF OCCUPATIONAL REHABILITATION, 2012, 22 (03) : 353 - 362
  • [39] Cyber Security of Cyber Physical Systems: Cyber Threats and Defense of Critical Infrastructures
    Shukla, Sandeep K.
    2016 29TH INTERNATIONAL CONFERENCE ON VLSI DESIGN AND 2016 15TH INTERNATIONAL CONFERENCE ON EMBEDDED SYSTEMS (VLSID), 2016, : 30 - 31
  • [40] Defense Strategies for Epidemic Cyber Security Threats: Modeling and Analysis by Using a Machine Learning Approach
    Sulaiman, Muhammad
    Waseem, Muhammad
    Ali, Addisu Negash
    Laouini, Ghaylen
    Alshammari, Fahad Sameer
    IEEE ACCESS, 2024, 12 : 4958 - 4984