Abstract

Computational models of cognitive processes may be employed in cyber-security tools, experiments, and simulations to address human agency and effective decision-making in keeping computational networks secure. Cognitive modeling can addresses multi-disciplinary cyber-security challenges requiring cross-cutting approaches over the human and computational sciences such as the following: (a) adversarial reasoning and behavioral game theory to predict attacker subjective utilities and decision likelihood distributions, (b) human factors of cyber tools to address human system integration challenges, estimation of defender cognitive states, and opportunities for automation, (c) dynamic simulations involving attacker, defender, and user models to enhance studies of cyber epidemiology and cyber hygiene, and (d) training effectiveness research and training scenarios to address human cyber-security performance, maturation of cyber-security skill sets, and effective decision-making. Models may be initially constructed at the group-level based on mean tendencies of each subject's subgroup, based on known statistics such as specific skill proficiencies, demographic characteristics, and cultural factors. For more precise and accurate predictions, cognitive models may be fine-tuned to each individual attacker, defender, or user profile, and updated over time (based on recorded behavior) via techniques such as model tracing and dynamic parameter fitting.

Highlights

  • Computer simulations are of great importance in the field of cyber-security

  • Defender state of mind is largely ignored in cyber-security tools, research in cybernetics and automation suggests that cognitive modeling can aid greatly in this domain, as well (e.g., Cassenti and Veksler, 2017)

  • As a message exits the virtual network interface of a virtual machine (VM) that houses the software under test, it is tagged with a virtual LAN (VLAN) id that uniquely identifies this traffic to the simulator

Read more

Summary

INTRODUCTION

Computer simulations are of great importance in the field of cyber-security. Simulations are useful as components of network security software and in training exercises for security professionals, as well as software aids designed for network users. A simulation of the network and its users, provides the ability to test various network policies without real-world consequences Such simulations may be employed to reveal holes in the procedures and potentially counter-intuitive best-practices. A high-fidelity cyber simulation should include human users’ individual differences Through such a simulation, we may find that certain training procedures produce healthier overall networks than others. Process models of cognition and behavior can aid in a better understanding of the minds of cyber attackers, defenders, and users, which will further improve network security. Defender state of mind is largely ignored in cyber-security tools, research in cybernetics and automation suggests that cognitive modeling can aid greatly in this domain, as well (e.g., Cassenti and Veksler, 2017). The discussion focuses on how specific modeling techniques can be employed in the domain (e.g., model embedding in large-scale network simulations, model tracing, parameter fitting), and outlines prior work that has begun to move the field along these paths

THE PROBLEM OF CYBER-SECURITY
COGNITIVE MODELING IN CYBER-SECURITY
STANDALONE MODEL INTEGRATION IN CYBER SIMULATIONS
Modeling a Network
What Can Be Done With the Hybrid Network Emulator
MODEL TRACING FOR BETTER PREDICTIONS OF ATTACKER BEHAVIOR
MODEL TRACING FOR BETTER AUTOMATION
MODEL INITIALIZATION IN THE CONTEXT OF CYBER
CONCLUSIONS
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call