Measuring Expertise and Bias in Cyber Security Using Cognitive and Neuroscience Approaches

被引:0
|
作者
Krawczyk, Daniel [1 ]
Bartlett, James [1 ]
Kantarcioglu, Murat [1 ]
Hamlen, Kevin [1 ]
Thuraisingham, Bhavani [1 ]
机构
[1] Univ Texas Dallas, Richardson, TX 75083 USA
关键词
Cognitive newro science; cyber security; honeypot; chess expert; fMRI; decoys; hackers; PERFORMANCE; CORTEX;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Toward the ultimate goal of enhancing human performance in cyber security, we attempt to understand the cognitive components of cyber security expertise. Our initial focus is on cyber security attackers - often called "hackers". Our first aim is to develop behavioral measures of accuracy and response time to examine the cognitive processes of pattern-recognition, reasoning and decision-making that underlie the detection and exploitation of security vulnerabilities. Understanding these processes at a cognitive level will lead to theory development addressing questions about how cyber security expertise can be identified, quantified, and trained. In addition to behavioral measures our plan is to conduct a functional magnetic resonance imaging ( fMRI) study of neural processing patterns that can differentiate persons with different levels of cyber security expertise. Our second aim is to quantitatively assess the impact of attackers' thinking strategies - conceptualized by psychologists as heuristics and biases - on their susceptibility to defensive techniques ( e. g., "decoys," "honeypots"). Honeypots are an established method to lure attackers into exploiting a dummy system containing misleading or false content, distracting their attention from genuinely sensitive information, and consuming their limited time and resources. We use the extensive research and experimentation that we have carried out to study the minds of successful chess players in order to study the minds of hackers with the ultimate goal of enhancing the security of current systems. This paper outlines our approach.
引用
收藏
页码:364 / 367
页数:4
相关论文
共 50 条
  • [1] Cognitive neuroscience -: Area of expertise
    López, JC
    [J]. NATURE REVIEWS NEUROSCIENCE, 2003, 4 (04): : 243 - 243
  • [2] Approaches for Vehicle Cyber Security
    Onishi, Hiro
    [J]. 2014 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY (CNS), 2014, : 506 - 507
  • [3] Synthetic approaches to cognitive neuroscience
    Sporns, O
    [J]. BEHAVIORAL AND BRAIN SCIENCES, 2000, 23 (04) : 548 - +
  • [4] Cognitive neuroscience approaches to ADHD
    不详
    [J]. INTERNATIONAL JOURNAL OF PSYCHOPHYSIOLOGY, 2016, 108 : 28 - 28
  • [5] What kind of cyber security? Theorising cyber security and mapping approaches
    Fichtner, Laura
    [J]. INTERNET POLICY REVIEW, 2018, 7 (02):
  • [6] Measuring the Energy Consumption of Cyber Security
    Caviglione, Luca
    Gaggero, Mauro
    Cambiaso, Enrico
    Aiello, Maurizio
    [J]. IEEE COMMUNICATIONS MAGAZINE, 2017, 55 (07) : 58 - 63
  • [7] Measuring Cyber Essentials Security Policies
    Bartha, Sandor
    Ballantine, Russell
    Aspinall, David
    [J]. PROCEEDINGS OF 17TH CYBER SECURITY EXPERIMENTATION AND TEST WORKSHOP, CSET 2024, 2024, : 8 - 17
  • [8] Cognitive and affective neuroscience: approaches and applications
    Schenk, Susan
    Waldie, Karen
    Grimshaw, Gina
    [J]. JOURNAL OF THE ROYAL SOCIETY OF NEW ZEALAND, 2021, 51 (01) : 1 - 3
  • [9] A Review on Cognitive Neuroscience in Information Security Behavior
    Wang, Zhiying
    Deng, Hangyu
    Wang, Nianxin
    Ge, Shilun
    [J]. PROCEEDINGS OF EIGHTEENTH WUHAN INTERNATIONAL CONFERENCE ON E-BUSINESS, 2019, : 471 - 478
  • [10] Decision support approaches for cyber security investment
    Fielder, Andrew
    Panaousis, Emmanouil
    Malacaria, Pasquale
    Hankin, Chris
    Smeraldi, Fabrizio
    [J]. DECISION SUPPORT SYSTEMS, 2016, 86 : 13 - 23