[go: up one dir, main page]
More Web Proxy on the site http://driver.im/
Skip to main content

Cybersecurity Methodology for Specialized Behavior Analysis

  • Conference paper
  • First Online:
Digital Forensics and Cyber Crime (ICDF2C 2020)

Abstract

Analyzing attacker behavior and generating realistic models to accurately capture the realities of cybersecurity threats is a very challenging task for researchers. Psychological personality and profiling studies provide a broad understanding of personality traits, but lack a level of interactive immersion that enables observers to collect concrete cybersecurity-relevant behavioral data. Participant’s intricate actions and interactions with real computer systems are seldom captured in any cybersecurity studies. Our work focuses on capturing human actions and decisions to provide an empirical basis for these types of models. We provide a practical methodology that helps bridge the gap between theory and practice by facilitating construction, experimentation, and data collection for repeatable and scalable human experimentation with realistic cybersecurity scenarios. While our methodology is platform agnostic, we describe state of the art technologies that may be used to satisfy the objectives of each of the stages of the methodology.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
£29.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
GBP 19.95
Price includes VAT (United Kingdom)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
GBP 63.99
Price includes VAT (United Kingdom)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
GBP 79.99
Price includes VAT (United Kingdom)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Gaia, J., et al.: Psychological profiling of hacking potential. In: Proceedings of the 53rd Hawaii International Conference on System Sciences (2020)

    Google Scholar 

  2. Basak, A., et al.: An initial study of targeted personality models in the FlipIt game. In: Bushnell, L., Poovendran, R., Başar, T. (eds.) GameSec 2018. LNCS, vol. 11199, pp. 623–636. Springer, Cham (2018). https://doi.org/10.1007/978-3-030-01554-1_36

    Chapter  Google Scholar 

  3. Gutierrez, M., et al.: Evaluating Models of Human Behavior in an Adversarial Multi-Armed Bandit Problem (2019)

    Google Scholar 

  4. Abbott, R.G., et al.: Log analysis of cyber security training exercises. Proc. Manufact. 3, 5088–5094 (2015)

    Article  Google Scholar 

  5. Crossler, R.E., et al.: Future directions for behavioral information security research. Comput. Secur. 32, 90–101 (2013)

    Article  Google Scholar 

  6. Shiravi, A., et al.: Toward developing a systematic approach to generate benchmark datasets for intrusion detection. Comput. Secur. 31(3), 357–374 (2012)

    Article  Google Scholar 

  7. Seebruck, R.: A typology of hackers: classifying cyber malfeasance using a weighted arc circumplex model. Digit. Invest. 14, 36–45 (2015)

    Article  Google Scholar 

  8. McClain, J., et al.: Human performance factors in cyber security forensic analysis. Proc. Manufact. 3, 5301–5307 (2015)

    Article  Google Scholar 

  9. Acosta, J.C., et al.: A platform for evaluator-centric cybersecurity training and data acquisition. In: MILCOM 2017–2017 IEEE Military Communications Conference (MILCOM). IEEE (2017)

    Google Scholar 

  10. Abrahams, I., Millar, R.: Does practical work really work? a study of the effectiveness of practical work as a teaching and learning method in school science. Int. J. Sci. Educ. 30(14), 1945–1969 (2008)

    Article  Google Scholar 

  11. Karat, J., Dayton, T.: Practical education for improving software usability. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (1995)

    Google Scholar 

  12. Wang, H., et al.: Construction of practical education system for innovative applied talents cultivation under the industry-education integration. In: Proceedings of the 5th International Conference on Frontiers of Educational Technologies (2019)

    Google Scholar 

  13. Millar, R., Abrahams, I.: Practical work: making it more effective. School Sci. Rev. 91(334), 59–64 (2009)

    Google Scholar 

  14. Hahn, A., et al.: Cyber-physical security testbeds: architecture, application, and evaluation for smart grid. IEEE Trans. Smart Grid 4(2), 847–855 (2013)

    Article  Google Scholar 

  15. Networks and Communication Systems Branch. Common Open Research Emulator (CORE) | Networks and Communication Systems Branch. https://www.nrl.navy.mil/itd/ncs/products/core. Accessed 15 April 2020

  16. Law, A.M.: How to build valid and credible simulation models. In: 2008 Winter Simulation Conference. IEEE (2008)

    Google Scholar 

  17. Sargent, R.G.: Verification and validation of simulation models. In: Proceedings of the 2010 Winter Simulation Conference. IEEE (2010)

    Google Scholar 

Download references

Acknowledgement

This research was sponsored by the U.S. Army Combat Capabilities Development Command Army Research Laboratory and was accomplished under Cooperative Agreement Number W911NF-13-2-0045 (ARL Cyber Security CRA). The views and conclusions contained in this document are those of the authors and should not be interpreted as representing the official policies, either expressed or implied, of the Combat Capabilities Development Command Army Research Laboratory or the U.S. Government. The U.S. Government is authorized to reproduce and distribute reprints for Government purposes notwithstanding any copyright notation here on.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Edgar Padilla .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Padilla, E., Acosta, J.C., Kiekintveld, C.D. (2021). Cybersecurity Methodology for Specialized Behavior Analysis. In: Goel, S., Gladyshev, P., Johnson, D., Pourzandi, M., Majumdar, S. (eds) Digital Forensics and Cyber Crime. ICDF2C 2020. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 351. Springer, Cham. https://doi.org/10.1007/978-3-030-68734-2_14

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-68734-2_14

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-68733-5

  • Online ISBN: 978-3-030-68734-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics