publication . Article . Other literature type . 2018

Simulations in Cyber-Security: A Review of Cognitive Modeling of Network Attackers, Defenders, and Users

Vladislav D. Veksler; Norbou Buchler; Blaine Hoffman; Daniel N. Cassenti; Char Sample; Shridatt Sugrim;
Open Access
  • Published: 01 May 2018 Journal: Frontiers in Psychology, volume 9 (eissn: 1664-1078, Copyright policy)
  • Publisher: Frontiers Media SA
Abstract
Computational models of cognitive processes may be employed in cyber-security tools, experiments, and simulations to address human agency and effective decision-making in keeping computational networks secure. Cognitive modeling can addresses multi-disciplinary cyber-security challenges requiring cross-cutting approaches over the human and computational sciences such as the following: (a) adversarial reasoning and behavioral game theory to predict attacker subjective utilities and decision likelihood distributions, (b) human factors of cyber tools to address human system integration challenges, estimation of defender cognitive states, and opportunities for autom...
Persistent Identifiers
Subjects
free text keywords: General Psychology, Review, cognitive modeling, behavioral simulations, cyber-security, human factors, model tracing, network simulations, embedded cognition, training effectiveness, Behavioral game theory, User profile, Agency (philosophy), Automation, business.industry, business, Cognitive model, Cognition, Psychology, Computational model, Human–computer interaction, Tracing, lcsh:Psychology, lcsh:BF1-990
Related Organizations
74 references, page 1 of 5

Abbasi Y. D.Short M.Sinha A.Sintov N.Zhang C.Tambe M. (2015). Human adversaries in opportunistic crime security games: evaluating competing bounded rationality models, in Third Annual Confe rence on Advances in Cognitive Systems ACS-2015. Atlanta, GA.

Aggarwal P.Gonzalez C.Dutt V. (2016). Cyber-security: role of deception in cyber-attack detection, in Advances in Intelligent Systems and Computing, vol. 501 (Orlando, FL: Springer), 85–96.

Alpcan T.Başar T. (2010). Network Security: A Decision and Game-Theoretic Approach. Cambridge, UK: Cambridge University Press.

Altmann E. M.Trafton J. G. (2002). Memory for goals: an activation-based model. Cogn. Sci. 26, 39–83. 10.1207/s15516709cog2601_2 [DOI]

Anderson J. R. (2007). How Can the Human Mind Occur in the Physical Universe? Oxford series on cognitive models and architectures. Oxford; New York: Oxford University Press.

Anderson J. R.Corbett A. T.Koedinger K. R.Pelletier R. (1995). Cognitive tutors: lessons learned. J. Learn. Sci. 4, 167–207. 10.1207/s15327809jls0402_2 [DOI]

Anderson J. R.Lebiere C. (1998). The Atomic Components of Thought. Mahwah, NJ: Lawrence Erlbaum Associates Publishers.

Arora A.Dutt V. (2013). cyber-security : evaluating the effects of attack strategy and base rate through instance - based learning, in Proceedings of the 12th International Conference on Cognitive Modeling, ICCM 2013 (Ottawa, ON), 336–341.

Ball J.Myers C.Heiberg A.Cooke N. J.Matessa M.Freiman M. (2010). The synthetic teammate project. Comput. Math. Organ. Theory 16, 271–299.

Barham P.Dragovic B.Fraser K.Hand S.Harris T.Ho A. (2003). Xen and the art of virtualization, in ACM SIGOPS Operating Systems Review, vol. 37 (Bolton Landing, NY: ACM), 164–177. [OpenAIRE]

Boss S. R.Kirsch L. J.Angermeier I.Shingler R. A.Boss R. W. (2009). If someone is watching, i'll do what i'm asked: mandatoriness, control, and information security. Eur. J. Inform. Syst. 18, 151–164. 10.1057/ejis.2009.8 [OpenAIRE] [DOI]

Bowen B. M.Devarajan R.Stolfo S. (2011). Measuring the human factor of cyber-security, in 2011 IEEE International Conference on Technologies for Homeland Security (HST), 230–235.

Bowen T.Poylisher A.Serban C.Chadha R.Chiang C. Y. J.Marvel L. M. (2016). Enabling reproducible cyber research - four labeled datasets, in MILCOM 2016 - 2016 IEEE Military Communications Conference (Baltimore, MD), 539–544.

Camerer C. (2003). Behavioral Game Theory: Experiments in Strategic Interaction. Princeton, NJ: Princeton University Press.

Cassenti D. N.Gamble K. R.Bakdash J. Z. (2017). Multi-level cognitive cybernetics in human factors, in Advances in Neuroergonomics and Cognitive Engineering, ed Carryl B. (Los Angeles, CA: Springer), 315–326.

74 references, page 1 of 5
Abstract
Computational models of cognitive processes may be employed in cyber-security tools, experiments, and simulations to address human agency and effective decision-making in keeping computational networks secure. Cognitive modeling can addresses multi-disciplinary cyber-security challenges requiring cross-cutting approaches over the human and computational sciences such as the following: (a) adversarial reasoning and behavioral game theory to predict attacker subjective utilities and decision likelihood distributions, (b) human factors of cyber tools to address human system integration challenges, estimation of defender cognitive states, and opportunities for autom...
Persistent Identifiers
Subjects
free text keywords: General Psychology, Review, cognitive modeling, behavioral simulations, cyber-security, human factors, model tracing, network simulations, embedded cognition, training effectiveness, Behavioral game theory, User profile, Agency (philosophy), Automation, business.industry, business, Cognitive model, Cognition, Psychology, Computational model, Human–computer interaction, Tracing, lcsh:Psychology, lcsh:BF1-990
Related Organizations
74 references, page 1 of 5

Abbasi Y. D.Short M.Sinha A.Sintov N.Zhang C.Tambe M. (2015). Human adversaries in opportunistic crime security games: evaluating competing bounded rationality models, in Third Annual Confe rence on Advances in Cognitive Systems ACS-2015. Atlanta, GA.

Aggarwal P.Gonzalez C.Dutt V. (2016). Cyber-security: role of deception in cyber-attack detection, in Advances in Intelligent Systems and Computing, vol. 501 (Orlando, FL: Springer), 85–96.

Alpcan T.Başar T. (2010). Network Security: A Decision and Game-Theoretic Approach. Cambridge, UK: Cambridge University Press.

Altmann E. M.Trafton J. G. (2002). Memory for goals: an activation-based model. Cogn. Sci. 26, 39–83. 10.1207/s15516709cog2601_2 [DOI]

Anderson J. R. (2007). How Can the Human Mind Occur in the Physical Universe? Oxford series on cognitive models and architectures. Oxford; New York: Oxford University Press.

Anderson J. R.Corbett A. T.Koedinger K. R.Pelletier R. (1995). Cognitive tutors: lessons learned. J. Learn. Sci. 4, 167–207. 10.1207/s15327809jls0402_2 [DOI]

Anderson J. R.Lebiere C. (1998). The Atomic Components of Thought. Mahwah, NJ: Lawrence Erlbaum Associates Publishers.

Arora A.Dutt V. (2013). cyber-security : evaluating the effects of attack strategy and base rate through instance - based learning, in Proceedings of the 12th International Conference on Cognitive Modeling, ICCM 2013 (Ottawa, ON), 336–341.

Ball J.Myers C.Heiberg A.Cooke N. J.Matessa M.Freiman M. (2010). The synthetic teammate project. Comput. Math. Organ. Theory 16, 271–299.

Barham P.Dragovic B.Fraser K.Hand S.Harris T.Ho A. (2003). Xen and the art of virtualization, in ACM SIGOPS Operating Systems Review, vol. 37 (Bolton Landing, NY: ACM), 164–177. [OpenAIRE]

Boss S. R.Kirsch L. J.Angermeier I.Shingler R. A.Boss R. W. (2009). If someone is watching, i'll do what i'm asked: mandatoriness, control, and information security. Eur. J. Inform. Syst. 18, 151–164. 10.1057/ejis.2009.8 [OpenAIRE] [DOI]

Bowen B. M.Devarajan R.Stolfo S. (2011). Measuring the human factor of cyber-security, in 2011 IEEE International Conference on Technologies for Homeland Security (HST), 230–235.

Bowen T.Poylisher A.Serban C.Chadha R.Chiang C. Y. J.Marvel L. M. (2016). Enabling reproducible cyber research - four labeled datasets, in MILCOM 2016 - 2016 IEEE Military Communications Conference (Baltimore, MD), 539–544.

Camerer C. (2003). Behavioral Game Theory: Experiments in Strategic Interaction. Princeton, NJ: Princeton University Press.

Cassenti D. N.Gamble K. R.Bakdash J. Z. (2017). Multi-level cognitive cybernetics in human factors, in Advances in Neuroergonomics and Cognitive Engineering, ed Carryl B. (Los Angeles, CA: Springer), 315–326.

74 references, page 1 of 5
Any information missing or wrong?Report an Issue