Cargando…

Simulations in Cyber-Security: A Review of Cognitive Modeling of Network Attackers, Defenders, and Users

Computational models of cognitive processes may be employed in cyber-security tools, experiments, and simulations to address human agency and effective decision-making in keeping computational networks secure. Cognitive modeling can addresses multi-disciplinary cyber-security challenges requiring cr...

Descripción completa

Detalles Bibliográficos
Autores principales: Veksler, Vladislav D., Buchler, Norbou, Hoffman, Blaine E., Cassenti, Daniel N., Sample, Char, Sugrim, Shridat
Formato: Online Artículo Texto
Lenguaje:English
Publicado: Frontiers Media S.A. 2018
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC5967149/
https://www.ncbi.nlm.nih.gov/pubmed/29867661
http://dx.doi.org/10.3389/fpsyg.2018.00691
_version_ 1783325574154944512
author Veksler, Vladislav D.
Buchler, Norbou
Hoffman, Blaine E.
Cassenti, Daniel N.
Sample, Char
Sugrim, Shridat
author_facet Veksler, Vladislav D.
Buchler, Norbou
Hoffman, Blaine E.
Cassenti, Daniel N.
Sample, Char
Sugrim, Shridat
author_sort Veksler, Vladislav D.
collection PubMed
description Computational models of cognitive processes may be employed in cyber-security tools, experiments, and simulations to address human agency and effective decision-making in keeping computational networks secure. Cognitive modeling can addresses multi-disciplinary cyber-security challenges requiring cross-cutting approaches over the human and computational sciences such as the following: (a) adversarial reasoning and behavioral game theory to predict attacker subjective utilities and decision likelihood distributions, (b) human factors of cyber tools to address human system integration challenges, estimation of defender cognitive states, and opportunities for automation, (c) dynamic simulations involving attacker, defender, and user models to enhance studies of cyber epidemiology and cyber hygiene, and (d) training effectiveness research and training scenarios to address human cyber-security performance, maturation of cyber-security skill sets, and effective decision-making. Models may be initially constructed at the group-level based on mean tendencies of each subject's subgroup, based on known statistics such as specific skill proficiencies, demographic characteristics, and cultural factors. For more precise and accurate predictions, cognitive models may be fine-tuned to each individual attacker, defender, or user profile, and updated over time (based on recorded behavior) via techniques such as model tracing and dynamic parameter fitting.
format Online
Article
Text
id pubmed-5967149
institution National Center for Biotechnology Information
language English
publishDate 2018
publisher Frontiers Media S.A.
record_format MEDLINE/PubMed
spelling pubmed-59671492018-06-04 Simulations in Cyber-Security: A Review of Cognitive Modeling of Network Attackers, Defenders, and Users Veksler, Vladislav D. Buchler, Norbou Hoffman, Blaine E. Cassenti, Daniel N. Sample, Char Sugrim, Shridat Front Psychol Psychology Computational models of cognitive processes may be employed in cyber-security tools, experiments, and simulations to address human agency and effective decision-making in keeping computational networks secure. Cognitive modeling can addresses multi-disciplinary cyber-security challenges requiring cross-cutting approaches over the human and computational sciences such as the following: (a) adversarial reasoning and behavioral game theory to predict attacker subjective utilities and decision likelihood distributions, (b) human factors of cyber tools to address human system integration challenges, estimation of defender cognitive states, and opportunities for automation, (c) dynamic simulations involving attacker, defender, and user models to enhance studies of cyber epidemiology and cyber hygiene, and (d) training effectiveness research and training scenarios to address human cyber-security performance, maturation of cyber-security skill sets, and effective decision-making. Models may be initially constructed at the group-level based on mean tendencies of each subject's subgroup, based on known statistics such as specific skill proficiencies, demographic characteristics, and cultural factors. For more precise and accurate predictions, cognitive models may be fine-tuned to each individual attacker, defender, or user profile, and updated over time (based on recorded behavior) via techniques such as model tracing and dynamic parameter fitting. Frontiers Media S.A. 2018-05-15 /pmc/articles/PMC5967149/ /pubmed/29867661 http://dx.doi.org/10.3389/fpsyg.2018.00691 Text en Copyright © 2018 Veksler, Buchler, Hoffman, Cassenti, Sample and Sugrim. http://creativecommons.org/licenses/by/4.0/ This is an open-access article distributed under the terms of the Creative Commons Attribution License (CC BY). The use, distribution or reproduction in other forums is permitted, provided the original author(s) and the copyright owner are credited and that the original publication in this journal is cited, in accordance with accepted academic practice. No use, distribution or reproduction is permitted which does not comply with these terms.
spellingShingle Psychology
Veksler, Vladislav D.
Buchler, Norbou
Hoffman, Blaine E.
Cassenti, Daniel N.
Sample, Char
Sugrim, Shridat
Simulations in Cyber-Security: A Review of Cognitive Modeling of Network Attackers, Defenders, and Users
title Simulations in Cyber-Security: A Review of Cognitive Modeling of Network Attackers, Defenders, and Users
title_full Simulations in Cyber-Security: A Review of Cognitive Modeling of Network Attackers, Defenders, and Users
title_fullStr Simulations in Cyber-Security: A Review of Cognitive Modeling of Network Attackers, Defenders, and Users
title_full_unstemmed Simulations in Cyber-Security: A Review of Cognitive Modeling of Network Attackers, Defenders, and Users
title_short Simulations in Cyber-Security: A Review of Cognitive Modeling of Network Attackers, Defenders, and Users
title_sort simulations in cyber-security: a review of cognitive modeling of network attackers, defenders, and users
topic Psychology
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC5967149/
https://www.ncbi.nlm.nih.gov/pubmed/29867661
http://dx.doi.org/10.3389/fpsyg.2018.00691
work_keys_str_mv AT vekslervladislavd simulationsincybersecurityareviewofcognitivemodelingofnetworkattackersdefendersandusers
AT buchlernorbou simulationsincybersecurityareviewofcognitivemodelingofnetworkattackersdefendersandusers
AT hoffmanblainee simulationsincybersecurityareviewofcognitivemodelingofnetworkattackersdefendersandusers
AT cassentidanieln simulationsincybersecurityareviewofcognitivemodelingofnetworkattackersdefendersandusers
AT samplechar simulationsincybersecurityareviewofcognitivemodelingofnetworkattackersdefendersandusers
AT sugrimshridat simulationsincybersecurityareviewofcognitivemodelingofnetworkattackersdefendersandusers