TY - GEN
T1 - Quantitative security metrics with human in the loop
AU - Noureddine, Mohammad
AU - Keefe, Ken
AU - Sanders, William H.
AU - Bashir, Masooda
PY - 2015/4/21
Y1 - 2015/4/21
N2 - The human factor is often regarded as the weakest link in cybersecurity systems. The investigation of several security breaches reveals an important impact of human errors in exhibiting security vulnerabilities. Although security researchers have long observed the impact of human behavior, few improvements have been made in designing secure systems that are resilient to the uncertainties of the human element. In this work, we summarize the state of the art work in human cybersecurity research, and present the Human-Influenced Task-Oriented (HITOP) formalism for modeling human decisions in security systems. We also provide a roadmap for future research. We aim at developing a simulation tool that allows modeling and analysis of security systems in light of the uncertainties of human behavior.
AB - The human factor is often regarded as the weakest link in cybersecurity systems. The investigation of several security breaches reveals an important impact of human errors in exhibiting security vulnerabilities. Although security researchers have long observed the impact of human behavior, few improvements have been made in designing secure systems that are resilient to the uncertainties of the human element. In this work, we summarize the state of the art work in human cybersecurity research, and present the Human-Influenced Task-Oriented (HITOP) formalism for modeling human decisions in security systems. We also provide a roadmap for future research. We aim at developing a simulation tool that allows modeling and analysis of security systems in light of the uncertainties of human behavior.
KW - Human models
KW - Quantitative security metrics
KW - Security modeling
UR - http://www.scopus.com/inward/record.url?scp=84986625370&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=84986625370&partnerID=8YFLogxK
U2 - 10.1145/2746194.2746215
DO - 10.1145/2746194.2746215
M3 - Conference contribution
AN - SCOPUS:84986625370
T3 - ACM International Conference Proceeding Series
BT - Proceedings of the 2015 Symposium and Bootcamp on the Science of Security, HotSoS 2015
PB - Association for Computing Machinery
T2 - Symposium and Bootcamp on the Science of Security, HotSoS 2015
Y2 - 21 April 2015 through 22 April 2015
ER -