A Cyber-War Between Bots: Human-Like Attackers are More Challenging for Defenders than Deterministic Attackers

dc.contributor.authorDu, Yinuo
dc.contributor.authorPrebot, Baptiste
dc.contributor.authorXi, Xiaoli
dc.contributor.authorGonzalez, Cleotilde
dc.date.accessioned2022-12-27T18:55:38Z
dc.date.available2022-12-27T18:55:38Z
dc.date.issued2023-01-03
dc.description.abstractAdversary emulation is commonly used to test cyber defense performance against known threats to organizations. However, designing attack strategies is an expensive and unreliable manual process, based on subjective evaluation of the state of a network. In this paper, we propose the design of adversarial human-like cognitive models that are dynamic, adaptable, and have the ability to learn from experience. A cognitive model is built according to the theoretical principles of Instance-Based Learning Theory (IBLT) of experiential choice in dynamic tasks. In a simulation experiment, we compared the predictions of an IBL attacker with a carefully designed efficient but deterministic attacker attempting to access an operational server in a network. The results suggest that an IBL cognitive model that emulates human behavior can be a more challenging adversary for defenders than the carefully crafted optimal attack strategies. These insights can be used to inform future adversary emulation efforts and cyber defender training.
dc.format.extent10
dc.identifier.doi10.24251/HICSS.2023.107
dc.identifier.isbn978-0-9981331-6-4
dc.identifier.urihttps://hdl.handle.net/10125/102736
dc.language.isoeng
dc.relation.ispartofProceedings of the 56th Hawaii International Conference on System Sciences
dc.rightsAttribution-NonCommercial-NoDerivatives 4.0 International
dc.rights.urihttps://creativecommons.org/licenses/by-nc-nd/4.0/
dc.subjectCyber Deception and Cyberpsychology for Defense
dc.subjectadversary emulation
dc.subjectcognitive models
dc.subjectcybersecurity
dc.subjectinstance-based learning theory
dc.titleA Cyber-War Between Bots: Human-Like Attackers are More Challenging for Defenders than Deterministic Attackers
dc.type.dcmitext
prism.startingpage856

Files

Original bundle
Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
0083.pdf
Size:
1.71 MB
Format:
Adobe Portable Document Format