Impact of the Computer System User When Creating Cyber Defense Strategies

被引:1
|
作者
Colvett, C. Daniel [1 ]
Petty, Mikel D. [1 ]
Bland, John A. [1 ]
Maxwell, Katia P. [2 ]
Rosenhoover, Marshall [1 ]
机构
[1] Univ Alabama, Huntsville, AL 35899 USA
[2] Athens State Univ, Athens, AL USA
关键词
Cybersecurity; Petri Nets; Reinforcement Learning; PNPSC;
D O I
10.1145/3476883.3520208
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Petri nets with Players, Strategies, and Costs (PNPSC) is an extension of Petri nets that can model cyberattacks and defenses. Previous work has created PNPSC nets for cyberattack patterns based on the MITRE Common Attack Pattern Enumeration and Classification (CAPEC) database. The previous PNPSC nets modeled two players, the attacker and defender, but did not account for the computer system user. This research enhances previously developed PNPSC nets by adding representation for the computer system user. The research also builds on previous work in which cyber defense strategies were generated and improved with an epsilon-greedy reinforcement learning algorithm. The results show that including a representation for computer system users impacts the strategies developed by the defender, who must now balance computer system usability with computer system security.
引用
收藏
页码:74 / 81
页数:8
相关论文
共 50 条
  • [41] Impact of Interaction Strategies on User Relevance Feedback
    Khan, Omar Shahbaz
    Jonsson, Bjorn Thor
    Zahalka, Jan
    Rudinac, Stevan
    Worring, Marcel
    [J]. PROCEEDINGS OF THE 2021 INTERNATIONAL CONFERENCE ON MULTIMEDIA RETRIEVAL (ICMR '21), 2021, : 590 - 598
  • [42] A human-like computer character user interface by creating communicational gestures
    Lu, S
    Yoshizaka, S
    Miyai, H
    [J]. NEC RESEARCH & DEVELOPMENT, 1996, 37 (02): : 275 - 282
  • [43] Understanding User Strategies When Touching Arbitrary Shaped Objects
    Roy, Quentin
    Perrault, Simon Tangi
    Fennedy, Katherine
    Pietrzak, Thomas
    Roudaut, Anne
    [J]. PROCEEDINGS OF 23RD ACM INTERNATIONAL CONFERENCE ON MOBILE HUMAN-COMPUTER INTERACTION (MOBILEHCI 2021): MOBILE APART, MOBILE TOGETHER, 2021,
  • [44] Teachers' pedagogical strategies when creating digital stories with young children
    Undheim, Marianne
    Jernes, Margrethe
    [J]. EUROPEAN EARLY CHILDHOOD EDUCATION RESEARCH JOURNAL, 2020, 28 (02) : 256 - 271
  • [45] Optimal Cyber-Defense Strategies for Advanced Persistent Threats: A Game Theoretical Analysis
    Acquaviva, Jeffrey
    Mahon, Mark
    Einfalt, Bruce
    LaPorta, Tom
    [J]. 2017 IEEE 36TH INTERNATIONAL SYMPOSIUM ON RELIABLE DISTRIBUTED SYSTEMS (SRDS), 2017, : 204 - 213
  • [46] A survey of the security assessment and security defense of a cyber physical power system under cyber failure threat
    Zhu B.
    Guo Y.
    Guo C.
    Jiang Z.
    Zhang X.
    Yuan X.
    [J]. Dianli Xitong Baohu yu Kongzhi/Power System Protection and Control, 2021, 49 (01): : 178 - 187
  • [47] Design and analysis of control strategies for a cyber physical system
    Gawanmeh, Amjad
    Abu Omar, Abdullah
    April, Alain
    [J]. COMPUTER SYSTEMS SCIENCE AND ENGINEERING, 2017, 32 (05): : 397 - 403
  • [48] Formal Verification of Control Strategies for a Cyber Physical System
    Gawanmeh, Amjad
    Alwadi, Ali
    Parvin, Sazia
    [J]. 2017 IEEE 37TH INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS WORKSHOPS (ICDCSW), 2017, : 91 - 96
  • [49] Collective Learning for Developing Cyber Defense Consciousness: An Activity System Analysis
    Gross, Melissa
    Ho, Shuyuan M.
    [J]. Journal of Information Systems Education, 2021, 32 (01) : 65 - 77
  • [50] Resource Allocation for Threat Defense in Cyber-security IoT system
    Wang, Manxi
    Liu, Bingjie
    Xu, Haitao
    [J]. 2019 28TH WIRELESS AND OPTICAL COMMUNICATIONS CONFERENCE (WOCC), 2019, : 1 - 3