首页 | 本学科首页   官方微博 | 高级检索  
     


Towards a Cognitive Theory of Cyber Deception
Authors:Edward A. Cranford  Cleotilde Gonzalez  Palvi Aggarwal  Milind Tambe  Sarah Cooney  Christian Lebiere
Affiliation:1. Department of Psychology, Carnegie Mellon University;2. Social and Decision Sciences Department, Carnegie Mellon University;3. USC Center for AI in Society, University of Southern California
Abstract:This work is an initial step toward developing a cognitive theory of cyber deception. While widely studied, the psychology of deception has largely focused on physical cues of deception. Given that present-day communication among humans is largely electronic, we focus on the cyber domain where physical cues are unavailable and for which there is less psychological research. To improve cyber defense, researchers have used signaling theory to extended algorithms developed for the optimal allocation of limited defense resources by using deceptive signals to trick the human mind. However, the algorithms are designed to protect against adversaries that make perfectly rational decisions. In behavioral experiments using an abstract cybersecurity game (i.e., Insider Attack Game), we examined human decision-making when paired against the defense algorithm. We developed an instance-based learning (IBL) model of an attacker using the Adaptive Control of Thought-Rational (ACT-R) cognitive architecture to investigate how humans make decisions under deception in cyber-attack scenarios. Our results show that the defense algorithm is more effective at reducing the probability of attack and protecting assets when using deceptive signaling, compared to no signaling, but is less effective than predicted against a perfectly rational adversary. Also, the IBL model replicates human attack decisions accurately. The IBL model shows how human decisions arise from experience, and how memory retrieval dynamics can give rise to cognitive biases, such as confirmation bias. The implications of these findings are discussed in the perspective of informing theories of deception and designing more effective signaling schemes that consider human bounded rationality.
Keywords:Decision making  Cognitive model  Deception  Cybersecurity  Signaling  Instance-based learning theory  ACT-R  Stackelberg security game
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号