2018
DOI: 10.3389/fpsyg.2018.00691
|View full text |Cite
|
Sign up to set email alerts
|

Simulations in Cyber-Security: A Review of Cognitive Modeling of Network Attackers, Defenders, and Users

Abstract: Computational models of cognitive processes may be employed in cyber-security tools, experiments, and simulations to address human agency and effective decision-making in keeping computational networks secure. Cognitive modeling can addresses multi-disciplinary cyber-security challenges requiring cross-cutting approaches over the human and computational sciences such as the following: (a) adversarial reasoning and behavioral game theory to predict attacker subjective utilities and decision likelihood distribut… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
16
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
5
4

Relationship

1
8

Authors

Journals

citations
Cited by 36 publications
(16 citation statements)
references
References 56 publications
0
16
0
Order By: Relevance
“…This requires cybersecurity decision makers to gain more knowledge about adversarial thinking, system thinking, and risk quantification. Modeling and simulation of real-world cyber-attacks is a useful training tool for the purpose of fulfilling these requirements [15].…”
Section: Discussionmentioning
confidence: 99%
“…This requires cybersecurity decision makers to gain more knowledge about adversarial thinking, system thinking, and risk quantification. Modeling and simulation of real-world cyber-attacks is a useful training tool for the purpose of fulfilling these requirements [15].…”
Section: Discussionmentioning
confidence: 99%
“…The closest form of truly comprehensive aggregate risk factor analysis can be seen in research on cognitive modelling of "dynamic simulations involving attacker, defender, and user models to enhance studies of cyber epidemiology and cyber hygiene" [30]. The researchers contend the importance of "wargaming" and simulation in both health care and cybersecurity, highlighting that "just as simulations in healthcare predict how an epidemic can spread and how it can be contained, such simulations may be used in the field of cyber-security as a means of progress in the study of cyber-epidemiology" [30]. The authors argue that epidemiology can be applied for the simulation of pandemic or disease outbreak, though prediction models based on existing behavioural data of threats.…”
Section: Contemporary Vulnerability and Intrusion Detection Technologiesmentioning
confidence: 99%
“…The authors argue that epidemiology can be applied for the simulation of pandemic or disease outbreak, though prediction models based on existing behavioural data of threats. These simulations provide "realistic synthetic users for full-scale training/wargame scenarios", which will "enable much-needed research in cybersecurity and cyber-epidemiology" [30]. Such simulations need to include methods to inject non-deterministic behaviours [31].…”
Section: Contemporary Vulnerability and Intrusion Detection Technologiesmentioning
confidence: 99%
“…Modeling the behavior of users and defenders can be used to assess their cognitive states in real time. Models of learning and adapting the behavior of cyber conflict participants can be used in combination with the theory of behavioral games to predict possible attack scenarios and select the best defenses [3,4]. Modeling user network activity allows testing various network policies without real consequences.…”
Section: Literature Review and Problem Statementmentioning
confidence: 99%