Agent-Based Modeling of User Circumvention of Security

被引:2
|
作者
Kothari, Vijay [1 ]
Blythe, Jim [2 ]
Smith, Sean [1 ]
Koppel, Ross [3 ]
机构
[1] Dartmouth Coll, Dept Comp Sci, Hanover, NH 03755 USA
[2] Univ Southern Calif, Inst Informat Sci, Los Angeles, CA 90089 USA
[3] Univ Penn, Dept Sociol, Philadelphia, PA 19104 USA
关键词
D O I
10.1145/2602945.2602948
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Security subsystems are often designed with flawed assumptions arising from system designers' faulty mental models. Designers tend to assume that users behave according to some textbook ideal, and to consider each potential exposure/interface in isolation. However, fieldwork continually shows that even well-intentioned users often depart from this ideal and circumvent controls in order to perform daily work tasks, and that "incorrect" user behaviors can create unexpected links between otherwise "independent" interfaces. When it comes to security features and parameters, designers try to find the choices that optimize security utility-except these flawed assumptions give rise to an incorrect curve, and lead to choices that actually make security worse, in practice. We propose that improving this situation requires giving designers more accurate models of real user behavior and how it influences aggregate system security. Agent-based modeling can be a fruitful first step here. In this paper, we study a particular instance of this problem, propose user-centric techniques designed to strengthen the security of systems while simultaneously improving the usability of them, and propose further directions of inquiry.
引用
收藏
页数:4
相关论文
共 50 条
  • [1] Agent-based ubiquitous user modeling
    Lorenz, A
    [J]. USER MODELING 2005, PROCEEDINGS, 2005, 3538 : 512 - 514
  • [2] Agent-based Security System for User Verification
    Dovgan, Erik
    Kaluza, Bostjan
    Tusar, Tea
    Gams, Matjaz
    [J]. 2009 IEEE/WIC/ACM INTERNATIONAL JOINT CONFERENCES ON WEB INTELLIGENCE (WI) AND INTELLIGENT AGENT TECHNOLOGIES (IAT), VOL 3, 2009, : 331 - 334
  • [3] Knowledge acquisition in user modeling and agent-based technology
    Chen, Q
    Wang, J
    [J]. IKE'03: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON INFORMATION AND KNOWLEDGE ENGINEERING, VOLS 1 AND 2, 2003, : 515 - 516
  • [4] Improving user verification by implementing an agent-based security system
    Dovgan, Erik
    Kaluza, Bostjan
    Tusar, Tea
    Gams, Matjaz
    [J]. JOURNAL OF AMBIENT INTELLIGENCE AND SMART ENVIRONMENTS, 2010, 2 (01) : 21 - 30
  • [5] Agent-based communication security
    Pimentao, JP
    Sousa, PAC
    Amaral, P
    Steiger-Garcao, A
    [J]. MULTIAGENT SYSTEM TECHNOLOGIES, PROCEEDINGS, 2004, 3187 : 73 - 84
  • [6] Agent-Based Modeling
    Khazaii, Javad
    [J]. ASHRAE JOURNAL, 2016, 58 (02) : 62 - 64
  • [7] A system of agent-based software patterns for user modeling based on usage mining
    Girardi, R
    Marinho, LB
    de Oliveira, IR
    [J]. INTERACTING WITH COMPUTERS, 2005, 17 (05) : 567 - 591
  • [8] Putting the agent in agent-based modeling
    Wellman, Michael P.
    [J]. AUTONOMOUS AGENTS AND MULTI-AGENT SYSTEMS, 2016, 30 (06) : 1175 - 1189
  • [9] Putting the agent in agent-based modeling
    Michael P. Wellman
    [J]. Autonomous Agents and Multi-Agent Systems, 2016, 30 : 1175 - 1189
  • [10] An introduction to agent-based user equilibria
    Wagner, Peter
    [J]. 2015 IEEE 18TH INTERNATIONAL CONFERENCE ON INTELLIGENT TRANSPORTATION SYSTEMS, 2015, : 2831 - 2836