Learning About Simulated Adversaries from Human Defenders using Interactive Cyber-Defense Games

04/03/2023
by   Baptiste Prebot, et al.
0

Given the increase in cybercrime, cybersecurity analysts (i.e. Defenders) are in high demand. Defenders must monitor an organization's network to evaluate threats and potential breaches into the network. Adversary simulation is commonly used to test defenders' performance against known threats to organizations. However, it is unclear how effective this training process is in preparing defenders for this highly demanding job. In this paper, we demonstrate how to use adversarial algorithms to investigate defenders' learning of defense strategies, using interactive cyber defense games. Our Interactive Defense Game (IDG) represents a cyber defense scenario that requires constant monitoring of incoming network alerts and allows a defender to analyze, remove, and restore services based on the events observed in a network. The participants in our study faced one of two types of simulated adversaries. A Beeline adversary is a fast, targeted, and informed attacker; and a Meander adversary is a slow attacker that wanders the network until it finds the right target to exploit. Our results suggest that although human defenders have more difficulty to stop the Beeline adversary initially, they were able to learn to stop this adversary by taking advantage of their attack strategy. Participants who played against the Beeline adversary learned to anticipate the adversary and take more proactive actions, while decreasing their reactive actions. These findings have implications for understanding how to help cybersecurity analysts speed up their training.

READ FULL TEXT

page 3

page 9

page 11

research
07/20/2020

Multi-agent Reinforcement Learning in Bayesian Stackelberg Markov Games for Adaptive Moving Target Defense

The field of cybersecurity has mostly been a cat-and-mouse game with the...
research
04/21/2021

Towards Causal Models for Adversary Distractions

Automated adversary emulation is becoming an indispensable tool of netwo...
research
08/01/2021

Cybonto: Towards Human Cognitive Digital Twins for Cybersecurity

Cyber defense is reactive and slow. On average, the time-to-remedy is hu...
research
11/11/2022

Investigating co-occurrences of MITRE ATT&CK Techniques

Cyberattacks use adversarial techniques to bypass system defenses, persi...
research
04/23/2021

Predicting Adversary Lateral Movement Patterns with Deep Learning

This paper develops a predictive model for which host, in an enterprise ...
research
07/18/2020

Active Deception using Factored Interactive POMDPs to Recognize Cyber Attacker's Intent

This paper presents an intelligent and adaptive agent that employs decep...
research
03/06/2019

Attack Graph Obfuscation

Before executing an attack, adversaries usually explore the victim's net...

Please sign up or login with your details

Forgot password? Click here to reset