ZETAR: Modeling and Computational Design of Strategic and Adaptive Compliance Policies

被引:0
|
作者
Huang, Linan [1 ]
Zhu, Quanyan [2 ]
机构
[1] Tsinghua Univ, Beijing Natl Res Ctr Informat Sci & Technol BNRist, Beijing 100084, Peoples R China
[2] NYU, Dept Elect & Comp Engn, Brooklyn, NY 11201 USA
基金
美国国家科学基金会;
关键词
Bayesian persuasion; incentive learning; incentive mechanism; information design; insider threat; zero-trust; INCENTIVE MECHANISM DESIGN;
D O I
10.1109/TCSS.2023.3323539
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Compliance management plays an important role in mitigating insider threats. Incentive design is a proactive and noninvasive approach to achieving compliance by aligning an insider's incentive with the defender's security objective, which motivates (rather than commands) an insider to act in the organization's interests. Controlling insiders' incentives for population-level compliance is challenging because they are neither precisely known nor directly controllable. To this end, we develop ZEro-Trust Audit with strategic Recommendation (ZETAR), a zero-trust audit and recommendation framework, to provide a quantitative approach to model insiders' incentives and design customized recommendation policies to improve their compliance. We formulate primal and dual convex programs to compute the optimal bespoke recommendation policies. We create the theoretical underpinning for understanding trust, compliance, and satisfaction, which leads to scoring mechanisms of how compliant and persuadable an insider is. After classifying insiders as malicious, self-interested, or amenable based on their incentive misalignment levels with the defender, we establish bespoke information disclosure principles for these insiders of different incentive categories. We identify the policy separability principle and the set convexity, which enable finite-step algorithms to efficiently learn the completely trustworthy (CT) policy set when insiders' incentives are unknown. Finally, we present a case study to corroborate the design. Our results show that ZETAR can well adapt to insiders with different risk and compliance attitudes and significantly improve compliance. Moreover, trustworthy recommendations can provably promote cyber hygiene and insiders' satisfaction.
引用
收藏
页码:4001 / 4015
页数:15
相关论文
共 50 条
  • [31] Adaptive optimization algorithm for the computational design of nanophotonic structures
    Beilina, Larisa
    Mpinganzima, Lydie
    Tassin, Philippe
    [J]. PROCEEDINGS OF THE 2016 INTERNATIONAL CONFERENCE ON ELECTROMAGNETICS IN ADVANCED APPLICATIONS (ICEAA), 2016, : 420 - 423
  • [32] Design of a Compliance Index for Privacy Policies: A Study of Mobile Wallet and Remittance Services
    Akanfe, Oluwafemi
    Valecha, Rohit
    Rao, H. Raghav
    [J]. IEEE TRANSACTIONS ON ENGINEERING MANAGEMENT, 2023, 70 (03) : 864 - 876
  • [33] Asymmetric information, strategic transfers, and the design of long-term care policies
    Canta, Chiara
    Cremer, Helmuth
    [J]. OXFORD ECONOMIC PAPERS-NEW SERIES, 2023, 75 (01): : 117 - 141
  • [34] Computational Modeling of Adaptive Trusses with Shape Memory Alloy Members
    Toi, Yutaka
    Tsukamoto, Kazunori
    [J]. ENGINEERING LETTERS, 2011, 19 (01) : 31 - 37
  • [35] Computational quantum chemistry and adaptive ligand modeling in mechanistic QSAR
    De Benedetti, Pier G.
    Fanelli, Francesca
    [J]. DRUG DISCOVERY TODAY, 2010, 15 (19-20) : 859 - 866
  • [36] Adaptive multi-scale computational Modeling of composite materials
    Raghavan, P
    Ghosh, S
    [J]. CMES-COMPUTER MODELING IN ENGINEERING & SCIENCES, 2004, 5 (02): : 151 - 170
  • [37] Quantifying compliance with COVID-19 mitigation policies in the US: A mathematical modeling study
    Yamamoto, Nao
    Jiang, Bohan
    Wang, Haiyan
    [J]. INFECTIOUS DISEASE MODELLING, 2021, 6 : 503 - 513
  • [38] Modeling adaptive access control policies using answer set programming
    Sartoli, Sara
    Namin, Akbar Siami
    [J]. JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2019, 44 : 49 - 63
  • [39] Development of a computational modeling laboratory for examining tobacco control policies: Tobacco Town
    Hammond, Ross A.
    Combs, Todd B.
    Mack-Crane, Austen
    Kasman, Matt
    Sorg, Amy
    Snider, Doneisha
    Luke, Douglas A.
    [J]. HEALTH & PLACE, 2020, 61
  • [40] A Novel Adaptive Monitoring Compliance Design Pattern for Autonomic Computing Systems
    Mannava, Vishnuvardhan
    Ramesh, T.
    [J]. ADVANCES IN COMPUTING AND COMMUNICATIONS, PT I, 2011, 190 : 250 - +