Log In Sign Up

Toward Explainable Users: Using NLP to Enable AI to Understand Users' Perceptions of Cyber Attacks

by   Faranak Abri, et al.

To understand how end-users conceptualize consequences of cyber security attacks, we performed a card sorting study, a well-known technique in Cognitive Sciences, where participants were free to group the given consequences of chosen cyber attacks into as many categories as they wished using rationales they see fit. The results of the open card sorting study showed a large amount of inter-participant variation making the research team wonder how the consequences of security attacks were comprehended by the participants. As an exploration of whether it is possible to explain user's mental model and behavior through Artificial Intelligence (AI) techniques, the research team compared the card sorting data with the outputs of a number of Natural Language Processing (NLP) techniques with the goal of understanding how participants perceived and interpreted the consequences of cyber attacks written in natural languages. The results of the NLP-based exploration methods revealed an interesting observation implying that participants had mostly employed checking individual keywords in each sentence to group cyber attack consequences together and less considered the semantics behind the description of consequences of cyber attacks. The results reported in this paper are seemingly useful and important for cyber attacks comprehension from user's perspectives. To the best of our knowledge, this paper is the first introducing the use of AI techniques in explaining and modeling users' behavior and their perceptions about a context. The novel idea introduced here is about explaining users using AI.


page 1

page 2

page 3

page 4


Cyber-Attack Consequence Prediction

Cyber-physical systems posit a complex number of security challenges due...

Proceedings of the Artificial Intelligence for Cyber Security (AICS) Workshop at AAAI 2022

The workshop will focus on the application of AI to problems in cyber se...

Less is More: Exploiting Social Trust to Increase the Effectiveness of a Deception Attack

Cyber attacks such as phishing, IRS scams, etc., still are successful in...

Cross-study Reliability of the Open Card Sorting Method

Information architecture forms the foundation of users' navigation exper...

Prospective Artificial Intelligence Approaches for Active Cyber Defence

Cybercriminals are rapidly developing new malicious tools that leverage ...

A Model-Based, Decision-Theoretic Perspective on Automated Cyber Response

Cyber-attacks can occur at machine speeds that are far too fast for huma...

Proactive Intervention to Downtrend Employee Attrition using Artificial Intelligence Techniques

To predict the employee attrition beforehand and to enable management to...