Impact of the Computer System User When Creating Cyber Defense Strategies

被引:1
|
作者
Colvett, C. Daniel [1 ]
Petty, Mikel D. [1 ]
Bland, John A. [1 ]
Maxwell, Katia P. [2 ]
Rosenhoover, Marshall [1 ]
机构
[1] Univ Alabama, Huntsville, AL 35899 USA
[2] Athens State Univ, Athens, AL USA
关键词
Cybersecurity; Petri Nets; Reinforcement Learning; PNPSC;
D O I
10.1145/3476883.3520208
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Petri nets with Players, Strategies, and Costs (PNPSC) is an extension of Petri nets that can model cyberattacks and defenses. Previous work has created PNPSC nets for cyberattack patterns based on the MITRE Common Attack Pattern Enumeration and Classification (CAPEC) database. The previous PNPSC nets modeled two players, the attacker and defender, but did not account for the computer system user. This research enhances previously developed PNPSC nets by adding representation for the computer system user. The research also builds on previous work in which cyber defense strategies were generated and improved with an epsilon-greedy reinforcement learning algorithm. The results show that including a representation for computer system users impacts the strategies developed by the defender, who must now balance computer system usability with computer system security.
引用
收藏
页码:74 / 81
页数:8
相关论文
共 50 条
  • [1] Impact of computer users on cyber defense strategies
    Colvett, Christopher Daniel
    Petty, Mikel D.
    Bland, John A.
    [J]. SYSTEMS ENGINEERING, 2024, 27 (03) : 532 - 555
  • [2] Creating The Computer Network Security Defense System
    Zhang, Huimin
    Wang, Yanping
    Xue, Bo
    [J]. PROCEEDINGS OF 2009 INTERNATIONAL CONFERENCE OF MANAGEMENT ENGINEERING AND INFORMATION TECHNOLOGY, VOLS 1 AND 2, 2009, : 562 - 565
  • [3] Impact analysis for cyber defense optimization
    Noel, Steven
    [J]. JOURNAL OF DEFENSE MODELING AND SIMULATION-APPLICATIONS METHODOLOGY TECHNOLOGY-JDMS, 2023, 20 (01): : 39 - 39
  • [4] Participative system implementation for creating user oriented computer systems in human services
    Monnickendam, M
    [J]. ADMINISTRATION IN SOCIAL WORK, 2000, 24 (01): : 57 - +
  • [5] Active and Passive Defense Strategies of Cyber-Physical Power System against Cyber Attacks Considering Node Vulnerability
    Qu, Zhengwei
    Shi, Hualiang
    Wang, Yunjing
    Yin, Guiliang
    Abu-Siada, Ahmed
    [J]. PROCESSES, 2022, 10 (07)
  • [6] A methodological review on attack and defense strategies in cyber warfare
    Ramaswamy Swarnammal Shaji
    V. Sachin Dev
    Thomas Brindha
    [J]. Wireless Networks, 2019, 25 : 3323 - 3334
  • [7] A methodological review on attack and defense strategies in cyber warfare
    Shaji, Ramaswamy Swarnammal
    Dev, V. Sachin
    Brindha, Thomas
    [J]. WIRELESS NETWORKS, 2019, 25 (06) : 3323 - 3334
  • [8] Cyber Immunity A Bio-Inspired Cyber Defense System
    Wlodarczak, Peter
    [J]. BIOINFORMATICS AND BIOMEDICAL ENGINEERING, IWBBIO 2017, PT II, 2017, 10209 : 199 - 208
  • [9] Creating an efficient, user-friendly computer workplace
    [J]. Power Transm Des, 4 (51-53):
  • [10] CREATING A COMPACT COMPUTER SYSTEM
    COLE, G
    [J]. MINI-MICRO SYSTEMS, 1978, 11 (08): : 72 - &