TY - GEN
T1 - Modeling humans
T2 - 15th International Conference on Quantitative Evaluation of Systems, QEST 2018
AU - Rausch, Michael
AU - Fawaz, Ahmed
AU - Keefe, Ken
AU - Sanders, William H.
PY - 2018
Y1 - 2018
N2 - Careful planning is needed to design cyber infrastructures that can achieve mission objectives in the presence of deliberate attacks, including availability and reliability of service and confidentiality of data. Planning should be done with the aid of rigorous and sound security models. A security modeling formalism should be easy to learn and use, flexible enough to be used in different contexts, and should explicitly model the most significant parts of the system of interest. In particular, the research community is increasingly realizing the importance of human behavior in cyber security. However, security modeling formalisms often explicitly model only the adversary, or simplistic interactions between adversaries and defenders, or are tailored to specific use cases, or are difficult to use. We propose and define a novel security modeling formalism that explicitly models adversary, defender, and user behavior in an easy and general way, and illustrate its use with an example.
AB - Careful planning is needed to design cyber infrastructures that can achieve mission objectives in the presence of deliberate attacks, including availability and reliability of service and confidentiality of data. Planning should be done with the aid of rigorous and sound security models. A security modeling formalism should be easy to learn and use, flexible enough to be used in different contexts, and should explicitly model the most significant parts of the system of interest. In particular, the research community is increasingly realizing the importance of human behavior in cyber security. However, security modeling formalisms often explicitly model only the adversary, or simplistic interactions between adversaries and defenders, or are tailored to specific use cases, or are difficult to use. We propose and define a novel security modeling formalism that explicitly models adversary, defender, and user behavior in an easy and general way, and illustrate its use with an example.
KW - Cost benefit analysis
KW - GAMES formalism
KW - Human modeling
KW - Quantitative cyber security modeling
KW - Risk analysis
UR - http://www.scopus.com/inward/record.url?scp=85053119443&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=85053119443&partnerID=8YFLogxK
U2 - 10.1007/978-3-319-99154-2_23
DO - 10.1007/978-3-319-99154-2_23
M3 - Conference contribution
AN - SCOPUS:85053119443
SN - 9783319991535
T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
SP - 373
EP - 388
BT - Quantitative Evaluation of Systems - 15th International Conference, QEST 2018, Proceedings
A2 - Horvath, Andras
A2 - McIver, Annabelle
PB - Springer
Y2 - 4 September 2018 through 7 September 2018
ER -