This paper improves upon recent game-theoretic deceptive signaling schemes for cyber defense using the insights emerging from a cognitive model of human cognition. One particular defense allocation algorithm that uses a deceptive signaling scheme is the peSSE (Xu et al., 2015). However, this static signaling scheme optimizes the rate of deception for perfectly rational adversaries and is not personalized to individuals. Here we advance this research by developing a dynamic and personalized signaling scheme using cognitive modeling. A cognitive model based on a theory of experiential-choice (Instance-Based Learning Theory; IBLT), implemented in a cognitive architecture (Adaptive Control of Thought – Rational; ACT-R), and validated using huma...
Honeypots are fundamentally means to detect adversary probing and to observe their tactics, techniqu...
The role and significance of deception systems such as honeypots for slowing down attacks and collec...
This chapter discusses a central challenge arising from the success of modeling human behavior in ma...
This paper improves upon recent game-theoretic deceptive signaling schemes for cyber defense using t...
Deceptive signaling has proven an effective method that can aid security analysists and deter attack...
Deceptive defense techniques (e.g., intrusion detection, firewalls, honeypots, honeynets) are common...
Computer network attackers currently benefit from an asymmetric advantage, leveraging both features ...
Traditional cyber security techniques have led to an asymmetric disadvantage for defenders. The defe...
The threat of cyber attacks is a growing concern across the world, leading to an increasing need for...
Cyber deception is a strategy that defenders can leverage to gain an advantage over cyber attackers....
Recently, researchers and practitioners have started to investigate the use of deception for designi...
Cybersecurity is traditionally seen as an asymmetrical relationship between adversaries and defender...
Adversary emulation is commonly used to test cyber defense performance against known threats to orga...
With information systems worldwide being attacked daily, analogies from traditional warfare are apt,...
International audienceObjective We aim to learn about the cognitive mechanisms governing the decisio...
Honeypots are fundamentally means to detect adversary probing and to observe their tactics, techniqu...
The role and significance of deception systems such as honeypots for slowing down attacks and collec...
This chapter discusses a central challenge arising from the success of modeling human behavior in ma...
This paper improves upon recent game-theoretic deceptive signaling schemes for cyber defense using t...
Deceptive signaling has proven an effective method that can aid security analysists and deter attack...
Deceptive defense techniques (e.g., intrusion detection, firewalls, honeypots, honeynets) are common...
Computer network attackers currently benefit from an asymmetric advantage, leveraging both features ...
Traditional cyber security techniques have led to an asymmetric disadvantage for defenders. The defe...
The threat of cyber attacks is a growing concern across the world, leading to an increasing need for...
Cyber deception is a strategy that defenders can leverage to gain an advantage over cyber attackers....
Recently, researchers and practitioners have started to investigate the use of deception for designi...
Cybersecurity is traditionally seen as an asymmetrical relationship between adversaries and defender...
Adversary emulation is commonly used to test cyber defense performance against known threats to orga...
With information systems worldwide being attacked daily, analogies from traditional warfare are apt,...
International audienceObjective We aim to learn about the cognitive mechanisms governing the decisio...
Honeypots are fundamentally means to detect adversary probing and to observe their tactics, techniqu...
The role and significance of deception systems such as honeypots for slowing down attacks and collec...
This chapter discusses a central challenge arising from the success of modeling human behavior in ma...