Cyber Security: Effects of Penalizing Defenders in Cyber-Security Games via Experimentation and Computational Modeling

被引:8
|
作者
Maqbool, Zahid [1 ]
Aggarwal, Palvi [2 ]
Pammi, V. S. Chandrasekhar [3 ]
Dutt, Varun [1 ]
机构
[1] Indian Inst Technol Mandi, Appl Cognit Sci Lab, Kamand, India
[2] Carnegie Mellon Univ, Dynam Decis Making Lab, Pittsburgh, PA 15213 USA
[3] Univ Allahabad, Ctr Behav & Cognit Sci, Allahabad, Uttar Pradesh, India
来源
FRONTIERS IN PSYCHOLOGY | 2020年 / 11卷
关键词
monetary penalties; defenders; adversaries; cybersecurity; decision-making; instance-based learning theory; recency; frequency; ATTACKS;
D O I
10.3389/fpsyg.2020.00011
中图分类号
B84 [心理学];
学科分类号
04 ; 0402 ;
摘要
Cyber-attacks are deliberate attempts by adversaries to illegally access online information of other individuals or organizations. There are likely to be severe monetary consequences for organizations and its workers who face cyber-attacks. However, currently, little is known on how monetary consequences of cyber-attacks may influence the decision-making of defenders and adversaries. In this research, using a cyber-security game, we evaluate the influence of monetary penalties on decisions made by people performing in the roles of human defenders and adversaries via experimentation and computational modeling. In a laboratory experiment, participants were randomly assigned to the role of "hackers" (adversaries) or "analysts" (defenders) in a laboratory experiment across three between-subject conditions: Equal payoffs (EQP), penalizing defenders for false alarms (PDF) and penalizing defenders for misses (PDM). The PDF and PDM conditions were 10-times costlier for defender participants compared to the EQP condition, which served as a baseline. Results revealed an increase (decrease) and decrease (increase) in attack (defend) actions in the PDF and PDM conditions, respectively. Also, both attack-and-defend decisions deviated from Nash equilibriums. To understand the reasons for our results, we calibrated a model based on Instance-Based Learning Theory (IBLT) theory to the attack-and-defend decisions collected in the experiment. The model's parameters revealed an excessive reliance on recency, frequency, and variability mechanisms by both defenders and adversaries. We discuss the implications of our results to different cyber-attack situations where defenders are penalized for their misses and false-alarms.
引用
收藏
页数:11
相关论文
共 50 条
  • [21] Quantifying the Significance and Relevance of Cyber-Security Text Through Textual Similarity and Cyber-Security Knowledge Graph
    Mendsaikhan, Otgonpurev
    Hasegawa, Hirokazu
    Yamaguchi, Yukiko
    Shimada, Hajime
    IEEE ACCESS, 2020, 8 (08): : 177041 - 177052
  • [22] On SCADA PLC and Fieldbus Cyber-Security
    Davidson, Cordell
    Andel, Todd
    Yampolskiy, Mark
    McDonald, Todd
    Glisson, Brad
    Thomas, Tom
    PROCEEDINGS OF THE 13TH INTERNATIONAL CONFERENCE ON CYBER WARFARE AND SECURITY (ICCWS 2018), 2018, : 140 - 148
  • [23] Cyber-Security of Smart Microgrids: A Survey
    Nejabatkhah, Farzam
    Li, Yun Wei
    Liang, Hao
    Reza Ahrabi, Rouzbeh
    ENERGIES, 2021, 14 (01)
  • [24] Cyber-security: Who will provide protection?
    ViaSat, United Kingdom
    Comput. Fraud Secur., 12 (19-20): : 19 - 20
  • [25] Cyber-security in robotics and autonomous systems
    Matellan, Vicente
    Bonaci, Tamara
    Sabaliauskaite, Giedre
    ROBOTICS AND AUTONOMOUS SYSTEMS, 2018, 100 : 41 - 42
  • [26] THE IMPORTANCE AND ROLE OF NATO IN CYBER-SECURITY
    Cioaca, Catalin
    15TH INTERNATIONAL CONFERENCE THE KNOWLEDGE-BASED ORGANIZATION: MILITARY SCIENCES. SECURITY AND DEFENSE, CONFERENCE PROCEEDINGS 1, 2009, 1 : 158 - 162
  • [27] WHERE NEXT FOR UK CYBER-SECURITY?
    Neville-Jones, Pauline
    Phillips, Mark
    RUSI JOURNAL, 2012, 157 (06): : 32 - 40
  • [28] AI, Connectivity and Cyber-Security in Avionics
    Gatti, Marc
    Damien, Alienor
    2019 24TH IEEE INTERNATIONAL CONFERENCE ON EMERGING TECHNOLOGIES AND FACTORY AUTOMATION (ETFA), 2019, : 35 - 38
  • [29] Cyber-security fortresses built on quicksand
    Flexera Software, United States
    Netw. Secur., 8 (5-8):
  • [30] Cyber-Security Incidents and Audit Quality
    Rosati, Pierangelo
    Gogolin, Fabian
    Lynn, Theo
    EUROPEAN ACCOUNTING REVIEW, 2022, 31 (03) : 701 - 728