Towards a Cognitive Theory of Cyber Deception

نویسندگان

چکیده

This work is an initial step toward developing a cognitive theory of cyber deception. While widely studied, the psychology deception has largely focused on physical cues Given that present-day communication among humans electronic, we focus domain where are unavailable and for which there less psychological research. To improve defense, researchers have used signaling to extended algorithms developed optimal allocation limited defense resources by using deceptive signals trick human mind. However, designed protect against adversaries make perfectly rational decisions. In behavioral experiments abstract cybersecurity game (i.e., Insider Attack Game), examined decision-making when paired algorithm. We instance-based learning (IBL) model attacker Adaptive Control Thought-Rational (ACT-R) architecture investigate how decisions under in cyber-attack scenarios. Our results show algorithm more effective at reducing probability attack protecting assets signaling, compared no but than predicted adversary. Also, IBL replicates accurately. The shows arise from experience, memory retrieval dynamics can give rise biases, such as confirmation bias. implications these findings discussed perspective informing theories designing schemes consider bounded rationality.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Towards a Theory of Deception

Deceiving your opponent about your cognitive abilities cannot be captured by standard approaches in which players understand the strategy of their opponent perfectly well. We introduce a framework with boundedly rational players to explain deception. Following Jehiel (2003) we assume that players’ types are characterized by how players partition the decision nodes of their opponents into analog...

متن کامل

Towards a Cognitive System for Decision Support in Cyber Operations

This paper presents the general requirements to build a “cognitive system for decision support”, capable of simulating defensive and offensive cyber operations. We aim to identify the key processes that mediate interactions between defenders, adversaries and the public, focusing on cognitive and ontological factors. We describe a controlled experimental phase where the system performance is ass...

متن کامل

Scientometrics of Deception, Counter-deception, and Deception Detection in Cyber-space

The concepts of deception, counter-deception, and deception detection in the cyber-space domain have been the subject of little systematic analysis. Our objective was to conduct scientometric analyses of these concepts in the cyber-space domain. We observed the following: Although various deceptive tactics are addressed in the cyber-security literature, it appears they are characterized more fr...

متن کامل

Towards a unified theory of cognitive mapping

An integrated representation of large-scale space, or cognitive map, called PLAN is presented that attempts to address a broader spectrum of issues than has previously been attempted in a single model. Rather than examining wayfinding as a process separate from the rest of cognition, one of the fundamental goals of this work is to examine how the wayfinding process is integrated into general co...

متن کامل

Protection and Deception: Discovering Game Theory and Cyber Literacy through a Novel Board Game Experience

Cyber literacy merits serious research attention because it addresses a confluence of specialization and generalization; cybersecurity is often conceived of as approachable only by a technological intelligentsia, yet its interdependent nature demands education for a broad population. Therefore, educational tools should lead participants to discover technical knowledge in an accessible and attra...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Cognitive Science

سال: 2021

ISSN: ['0364-0213', '1551-6709']

DOI: https://doi.org/10.1111/cogs.13013