A Cyber-War Between Bots: Human-Like Attackers are More Challenging for Defenders than Deterministic Attackers

dc.contributor.author Du, Yinuo
dc.contributor.author Prebot, Baptiste
dc.contributor.author Xi, Xiaoli
dc.contributor.author Gonzalez, Cleotilde
dc.date.accessioned 2022-12-27T18:55:38Z
dc.date.available 2022-12-27T18:55:38Z
dc.date.issued 2023-01-03
dc.description.abstract Adversary emulation is commonly used to test cyber defense performance against known threats to organizations. However, designing attack strategies is an expensive and unreliable manual process, based on subjective evaluation of the state of a network. In this paper, we propose the design of adversarial human-like cognitive models that are dynamic, adaptable, and have the ability to learn from experience. A cognitive model is built according to the theoretical principles of Instance-Based Learning Theory (IBLT) of experiential choice in dynamic tasks. In a simulation experiment, we compared the predictions of an IBL attacker with a carefully designed efficient but deterministic attacker attempting to access an operational server in a network. The results suggest that an IBL cognitive model that emulates human behavior can be a more challenging adversary for defenders than the carefully crafted optimal attack strategies. These insights can be used to inform future adversary emulation efforts and cyber defender training.
dc.format.extent 10
dc.identifier.doi 10.24251/HICSS.2023.107
dc.identifier.isbn 978-0-9981331-6-4
dc.identifier.uri https://hdl.handle.net/10125/102736
dc.language.iso eng
dc.relation.ispartof Proceedings of the 56th Hawaii International Conference on System Sciences
dc.rights Attribution-NonCommercial-NoDerivatives 4.0 International
dc.rights.uri https://creativecommons.org/licenses/by-nc-nd/4.0/
dc.subject Cyber Deception and Cyberpsychology for Defense
dc.subject adversary emulation
dc.subject cognitive models
dc.subject cybersecurity
dc.subject instance-based learning theory
dc.title A Cyber-War Between Bots: Human-Like Attackers are More Challenging for Defenders than Deterministic Attackers
dc.type.dcmi text
prism.startingpage 856
Files
Original bundle
Now showing 1 - 1 of 1
No Thumbnail Available
Name:
0083.pdf
Size:
1.71 MB
Format:
Adobe Portable Document Format
Description: