Agent-Based Modeling of User Circumvention of Security Position Paper
نویسندگان
چکیده
Security subsystems are often designed with flawed assumptions arising from system designers’ faulty mental models. Designers tend to assume that users behave according to some textbook ideal, and to consider each potential exposure/interface in isolation. However, fieldwork continually shows that even well-intentioned users often depart from this ideal and circumvent controls in order to perform daily work tasks, and that “incorrect” user behaviors can create unexpected links between otherwise “independent” interfaces. When it comes to security features and parameters, designers try to find the choices that optimize security utility— except these flawed assumptions give rise to an incorrect curve, and lead to choices that actually make security worse, in practice. We propose that improving this situation requires giving designers more accurate models of real user behavior and how it influences aggregate system security. Agentbased modeling can be a fruitful first step here. In this paper, we study a particular instance of this problem, propose user-centric techniques designed to strengthen the security of systems while simultaneously improving the usability of them, and propose further directions of inquiry.
منابع مشابه
RRLUFF: Ranking function based on Reinforcement Learning using User Feedback and Web Document Features
Principal aim of a search engine is to provide the sorted results according to user’s requirements. To achieve this aim, it employs ranking methods to rank the web documents based on their significance and relevance to user query. The novelty of this paper is to provide user feedback-based ranking algorithm using reinforcement learning. The proposed algorithm is called RRLUFF, in which the rank...
متن کاملvpwns: Virtual Pwned Networks
User-accessed Virtual Private Network systems allow authorized users remote access to protected or otherwise privileged networks while avoiding dependence on ISPs along the route for data confidentiality and integrity. This direct expression of the internet’s end-to-end principle of security is generally accepted as a highly successful design. VPN services and technology advertising censorship ...
متن کاملThe colossal circumvention of the lung lesion during lung stereotaxy
This is a case report on stereotaxic (Stereotactic Body Radiotherapy-SBRT) for lung cancer located in the left lower lobe (Segment 6, S6). There have been no reports on marked displacement of the peripheral lung cancer during radiotherapy. A pulmonary nodule was discovered on computed tomography (CT) conducted for a persistent cough in an 87-year-old male. According to diagnostic imaging, this ...
متن کاملAgent-Based Modeling of Power Systems Infrastructure Cyber Security
We present a new approach to evaluation of Cyber Security in Power Systems using the method of modeling the power systems Infrastructure using software agents. Interfaces between module and the home smart meter are recognized as the primary points of intrusion. Keywords—Power Systems, Modeling and Simulation, Agent systems.
متن کاملProcess algebraic modeling of authentication protocols for analysis of parallel multi-session executions
Many security protocols have the aim of authenticating one agent acting as initiator to another agent acting as responder and vice versa. Sometimes, the authentication fails because of executing several parallel sessions of a protocol, and because an agent may play both the initiator and responder role in parallel sessions. We take advantage of the notion of transition systems to specify authen...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2014