2019
DOI: 10.1007/978-3-030-20488-4_11
|View full text |Cite
|
Sign up to set email alerts
|

HackIT: A Human-in-the-Loop Simulation Tool for Realistic Cyber Deception Experiments

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
17
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
4
2
1

Relationship

1
6

Authors

Journals

citations
Cited by 11 publications
(17 citation statements)
references
References 10 publications
0
17
0
Order By: Relevance
“…This shows that deception made them slower to move and attack. Aggarwal et al [4] developed a simulation tool, called HackIt, to study attacks in a network reconnaissance stage where participants studied the effect of introducing deception at different timing intervals. Their results showed that the attacker performed attacks on the honeypots more often than real machines.…”
Section: Empirical Game Experiments Using Human Subjectsmentioning
confidence: 99%
See 3 more Smart Citations
“…This shows that deception made them slower to move and attack. Aggarwal et al [4] developed a simulation tool, called HackIt, to study attacks in a network reconnaissance stage where participants studied the effect of introducing deception at different timing intervals. Their results showed that the attacker performed attacks on the honeypots more often than real machines.…”
Section: Empirical Game Experiments Using Human Subjectsmentioning
confidence: 99%
“…• Round trip-time [4,16,24,31,35,42,122]: The key role of DD is to delay the adversary processes [16]. A common example can be found that DD techniques can easily increase an attacker's reconnaissance or scanning time to identify vulnerable targets by increasing the attacker's confusion [122].…”
Section: A Metricsmentioning
confidence: 99%
See 2 more Smart Citations
“…Some researchers have proposed games to study the role of deception in cybersecurity mathematically ( Garg and Grosu, 2007 ; Kiekintveld et al, 2015 ; Aggarwal et al, 2017 ). However, more recently, researchers have investigated human decisions in the presence of deception in abstract Stackelberg security games ( Cranford et al, 2018 ) as well as applied games like HackIT ( Aggarwal et al, 2019 , 2020 ). Here, researchers have relied upon behavioral game theory ( Camerer, 2003 ) and cognitive theories like instance-based learning theory (IBLT) ( Gonzalez et al, 2003 ; Gonzalez and Dutt, 2011 , 2012 ; Dutt and Gonzalez, 2012 ; Dutt et al, 2013 ) to understand human decisions in different cyberattack scenarios ( Aggarwal et al, 2020 ).…”
Section: Introductionmentioning
confidence: 99%