Agent-Based Modeling of User Circumvention of Security Position Paper

نویسندگان

  • Vijay Kothari
  • Jim Blythe
  • Sean Smith
  • Ross Koppel
چکیده

Security subsystems are often designed with flawed assumptions arising from system designers’ faulty mental models. Designers tend to assume that users behave according to some textbook ideal, and to consider each potential exposure/interface in isolation. However, fieldwork continually shows that even well-intentioned users often depart from this ideal and circumvent controls in order to perform daily work tasks, and that “incorrect” user behaviors can create unexpected links between otherwise “independent” interfaces. When it comes to security features and parameters, designers try to find the choices that optimize security utility— except these flawed assumptions give rise to an incorrect curve, and lead to choices that actually make security worse, in practice. We propose that improving this situation requires giving designers more accurate models of real user behavior and how it influences aggregate system security. Agentbased modeling can be a fruitful first step here. In this paper, we study a particular instance of this problem, propose user-centric techniques designed to strengthen the security of systems while simultaneously improving the usability of them, and propose further directions of inquiry.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

RRLUFF: Ranking function based on Reinforcement Learning using User Feedback and Web Document Features

Principal aim of a search engine is to provide the sorted results according to user’s requirements. To achieve this aim, it employs ranking methods to rank the web documents based on their significance and relevance to user query. The novelty of this paper is to provide user feedback-based ranking algorithm using reinforcement learning. The proposed algorithm is called RRLUFF, in which the rank...

متن کامل

vpwns: Virtual Pwned Networks

User-accessed Virtual Private Network systems allow authorized users remote access to protected or otherwise privileged networks while avoiding dependence on ISPs along the route for data confidentiality and integrity. This direct expression of the internet’s end-to-end principle of security is generally accepted as a highly successful design. VPN services and technology advertising censorship ...

متن کامل

The colossal circumvention of the lung lesion during lung stereotaxy

This is a case report on stereotaxic (Stereotactic Body Radiotherapy-SBRT) for lung cancer located in the left lower lobe (Segment 6, S6). There have been no reports on marked displacement of the peripheral lung cancer during radiotherapy. A pulmonary nodule was discovered on computed tomography (CT) conducted for a persistent cough in an 87-year-old male. According to diagnostic imaging, this ...

متن کامل

Agent-Based Modeling of Power Systems Infrastructure Cyber Security

We present a new approach to evaluation of Cyber Security in Power Systems using the method of modeling the power systems Infrastructure using software agents. Interfaces between module and the home smart meter are recognized as the primary points of intrusion. Keywords—Power Systems, Modeling and Simulation, Agent systems.

متن کامل

Process algebraic modeling of authentication protocols for analysis of parallel multi-session executions

Many security protocols have the aim of authenticating one agent acting as initiator to another agent acting as responder and vice versa. Sometimes, the authentication fails because of executing several parallel sessions of a protocol, and because an agent may play both the initiator and responder role in parallel sessions. We take advantage of the notion of transition systems to specify authen...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2014