Impact of computer users on cyber defense strategies

被引:2
|
作者
Colvett, Christopher Daniel [1 ]
Petty, Mikel D. [2 ,4 ]
Bland, John A. [3 ]
机构
[1] Univ Alabama, Ind & Syst Engn & Engn Management, Huntsville, AL USA
[2] Univ Alabama, Comp Sci, Huntsville, AL USA
[3] Univ Alabama, Comp Engn, Huntsville, AL USA
[4] Univ Alabama, Comp Sci, 301 Sparkman Dr NW, Huntsville, AL 35899 USA
关键词
SEE26 modeling and simulation; cybersecurity; Petri nets; reinforcement learning;
D O I
10.1002/sys.21737
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
Cybersecurity research often focuses primarily or exclusively on the interactions between the attacker, trying to exploit the computer system, and the defender, trying to protect it. However, including the computer users is important because the users' requirements are the reason the computer system exists.An extension of the Petri net formalism, Petri Nets with Players, Strategies, and Costs (PNPSC) was used to model cyberattacks described in the MITRE Common Attack Pattern Enumeration and Classification database. PNPSC models include the attacker, defender, and computer user as "players" attempting to achieve competing goals. Each player can observe the current marking of a subset of the PNPSC net's places and change the stochastic firing rates of a subset of the net's transitions in order to achieve their goals. A mapping between the markings of a player's observable places and the desired firing rates of player's controllable transitions is the player's strategy.A reinforcement learning algorithm was integrated with PNPSC models of three cyberattack patterns to learn strategies for the defender in simulations both with and without a representation of the computer user. A simulation experiment showed that the defender's reward was lower and the defender's learned strategy was different when the user was represented. A second simulation experiment and statistical analysis confirmed that the differences were not due simply to randomness. With the user represented, the system defender must balance security against usability. This research provides a more complete cyberattack model and shows that user models are important in future cybersecurity simulation.
引用
收藏
页码:532 / 555
页数:24
相关论文
共 50 条
  • [41] A study of Cyber-defense strategies adopted by major Public and Private sector Banks of India
    Patidar, Neha
    Sen, Anshuman
    2022 INTERNATIONAL CONFERENCE ON DECISION AID SCIENCES AND APPLICATIONS (DASA), 2022, : 551 - 555
  • [42] Changing the Face of Cyber Warfare with International Cyber Defense Collaboration
    Grobler, Marthie
    van Vuuren, Joey Jansen
    Zaaiman, Jannie
    PROCEEDINGS OF THE 6TH INTERNATIONAL CONFERENCE ON INFORMATION WARFARE AND SECURITY, 2011, : 92 - 98
  • [43] Cyber Crime Hospitals lack the Money for a successful Cyber Defense
    不详
    GESUNDHEITSOEKONOMIE UND QUALITAETSMANAGEMENT, 2021, 26 (01): : 21 - +
  • [44] Structuring for Strategic Cyber Defense: A Cyber Manhattan Project Blueprint
    Saydjari, O. Sami
    24TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS, 2008, : 3 - 10
  • [45] The Role of Situational Awareness in Cyber Security and Cyber Defense Strategy
    Onwubiko, Cyril
    2015 International Conference on Cyber Situational Awareness, Data Analytics and Assessment (CyberSA), 2015,
  • [46] Cyber Teaming and Role Specialization in a Cyber Security Defense Competition
    Buchler, Norbou
    La Fleur, Claire Genevieve
    Hoffman, Blaine
    Rajivan, Prashanth
    Marusich, Laura
    Lightner, Lewis
    FRONTIERS IN PSYCHOLOGY, 2018, 9
  • [47] Cyber Security and Cyber Criminality of Mobile Device Users in Slovenia
    Markelj, Blaiz
    Zgaga, Sabina
    REVIJA ZA KRIMINALISTIKO IN KRIMINOLOGIJO, 2018, 69 (01): : 15 - 29
  • [48] Cyber Immunity A Bio-Inspired Cyber Defense System
    Wlodarczak, Peter
    BIOINFORMATICS AND BIOMEDICAL ENGINEERING, IWBBIO 2017, PT II, 2017, 10209 : 199 - 208
  • [49] Strategies comparison for game theoretic cyber situational awareness and impact assessment
    Shen, Dan
    Chen, Genshe
    Haynes, Leonard
    Blasch, Erik
    2007 PROCEEDINGS OF THE 10TH INTERNATIONAL CONFERENCE ON INFORMATION FUSION, VOLS 1-4, 2007, : 888 - +
  • [50] Three cyber-security strategies to mitigate the impact of a data breach
    Densham, Ben
    Network Security, 2015, 2015 (01) : 5 - 8