Know Your Enemy: Applying Cognitive Modeling in Security Domain
نویسندگان
چکیده
Game Theory -based decision aids have been successfully employed in real-world policing, anti-terrorism, and wildlife conservation efforts (Tambe, Jiang, An, & Jain, 2013). Cognitive modeling, in concert with model tracing and dynamic parameter fitting techniques, may be used to improve the performance of such decision aids by predicting individual attacker behavior in repeated security games. We present three simulations, showing that (1) cognitive modeling can aid in greatly improving decision-aid performance in the security domain; and (2) despite the fact that individual attackers will differ in initial preferences and in how they learn, model parameters can be adjusted dynamically to make useful predictions for each attacker.
منابع مشابه
Know Your Enemy: Honeynets
Over the past several years the Honeynet Project has been dedicated to learning the tools, tactics, and motives of the blackhat community and sharing the lessons learned. The primary tool used to gather this information is the Honeynet. The purpose of this paper is to discuss what a Honeynet is, its value, how it works, and the risks/issues involved. It is hoped that the security community can ...
متن کاملKnow Your Enemy: Stealth Configuration-Information Gathering in SDN
Software Defined Networking (SDN) is a network architecture that aims at providing high flexibility through the separation of the network logic from the forwarding functions. The industry has already widely adopted SDN and researchers thoroughly analyzed its vulnerabilities, proposing solutions to improve its security. However, we believe important security aspects of SDN are still left uninves...
متن کاملStrategies in Social Software
Viewing the way society has defined its rules and mechanisms as “social software”, we want to understand how people behave given their understanding of the societal rules and given their wish to further their interest as they conceive it, and how social mechanisms should be designed to suit people furthering their interest as they conceive it. This chapter is written from the perspective of str...
متن کاملThe Domain of the semantics of ‘promise’ in the Holy Quran
Semantics is a part of linguistic by which it can be analyzed the meaning of the words and sentences of a text and identified the part of speech with regard to semantics. This is a descriptive-analytic research and it deals with studying the meaning of ‘promise’ in the Holy Quran based on principles of semantics with a collocation approach by library methodology. Also, by virtue of ...
متن کاملKnow Your Enemy: Malicious Web Servers
INTRODUCTION Today, many attackers are part of organized crime with the intent to defraud their victims. Their goal is to deploy malware on a victim’s machine and to start collecting sensitive data, such as online account credentials and credit card numbers. Since attackers have a tendency to take the path of least resistance and many traditional attack paths are barred by a basic set of securi...
متن کامل