2022
DOI: 10.1016/j.cose.2022.102671
|View full text |Cite
|
Sign up to set email alerts
|

Designing effective masking strategies for cyberdefense through human experimentation and cognitive models

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
3
3
2

Relationship

1
7

Authors

Journals

citations
Cited by 10 publications
(4 citation statements)
references
References 19 publications
0
4
0
Order By: Relevance
“…Cognitive models can help emulate the behavior of defenders, attackers, and users, allowing them to inform gametheoretic, Machine Learning, optimization algorithms, and other advanced technologies with predictions about human dynamic decision-making. This process has been demonstrated in recent work and provides great potential for the future of autonomous cyber defense (Aggarwal et al 2022) Simulation environments such as CybORG will need to be advanced and used in experimentation. We developed a research environment where IBL defense agents can perform a cyber defense task.…”
Section: Discussionmentioning
confidence: 97%
“…Cognitive models can help emulate the behavior of defenders, attackers, and users, allowing them to inform gametheoretic, Machine Learning, optimization algorithms, and other advanced technologies with predictions about human dynamic decision-making. This process has been demonstrated in recent work and provides great potential for the future of autonomous cyber defense (Aggarwal et al 2022) Simulation environments such as CybORG will need to be advanced and used in experimentation. We developed a research environment where IBL defense agents can perform a cyber defense task.…”
Section: Discussionmentioning
confidence: 97%
“…In this research we selected IBLT due to its theoretical connection to the ACT-R cognitive architecture and its wide and general applicability to a multitude of tasks. IBL models have demonstrated fidelity to human decision making processes and have demonstrated their efficacy in various domains, including repeated binary choice tasks (Gonzalez and Dutt, 2011;Lejarraga et al, 2012), sequential decision-making (Bugbee and Gonzalez, 2022), theory of mind applications (Nguyen and Gonzalez, 2022), and practical applications such as identifying phishing emails (Cranford et al, 2019), cyber defense (Cranford et al, 2020), and cyber attack decision-making (Aggarwal et al, 2022).…”
Section: Related Work Cognitive Architectures and Instance-based Lea...mentioning
confidence: 99%
“…Such testbeds are suitable for testing network security solutions and designs. They have also been used to conduct studies with skilled participants to understand how attackers choose nodes in a network to attack (Aggarwal et al, 2022).…”
Section: Introductionmentioning
confidence: 99%
“…Such testbeds are suitable for testing network security solutions and designs. They have also been used to conduct studies with skilled participants to understand how attackers choose nodes in a network to attack (Aggarwal et al, 2022). However, conducting experiments on such testbeds requires a team of engineers to manage the services and scenarios.…”
Section: Introductionmentioning
confidence: 99%