1,855 research outputs found

    Game of Travesty: Decoy-based Psychological Cyber Deception for Proactive Human Agents

    Full text link
    The concept of cyber deception has been receiving emerging attention. The development of cyber defensive deception techniques requires interdisciplinary work, among which cognitive science plays an important role. In this work, we adopt a signaling game framework between a defender and a human agent to develop a cyber defensive deception protocol that takes advantage of the cognitive biases of human decision-making using quantum decision theory to combat insider attacks (IA). The defender deceives an inside human attacker by luring him to access decoy sensors via generators producing perceptions of classical signals to manipulate the human attacker's psychological state of mind. Our results reveal that even without changing the classical traffic data, strategically designed generators can result in a worse performance for defending against insider attackers in identifying decoys than the ones in the deceptive scheme without generators, which generate random information based on input signals. The proposed framework leads to fundamental theories in designing more effective signaling schemes

    Partial adversarial behavior deception in security games

    Get PDF

    Improving the Cybersecurity of Cyber-Physical Systems Through Behavioral Game Theory and Model Checking in Practice and in Education

    Get PDF
    This dissertation presents automated methods based on behavioral game theory and model checking to improve the cybersecurity of cyber-physical systems (CPSs) and advocates teaching certain foundational principles of these methods to cybersecurity students. First, it encodes behavioral game theory\u27s concept of level-k reasoning into an integer linear program that models a newly defined security Colonel Blotto game. This approach is designed to achieve an efficient allocation of scarce protection resources by anticipating attack allocations. A human subjects experiment based on a CPS infrastructure demonstrates its effectiveness. Next, it rigorously defines the term adversarial thinking, one of cybersecurity educations most important and elusive learning objectives, but for which no proper definition exists. It spells out what it means to think like a hacker by examining the characteristic thought processes of hackers through the lens of Sternberg\u27s triarchic theory of intelligence. Next, a classroom experiment demonstrates that teaching basic game theory concepts to cybersecurity students significantly improves their strategic reasoning abilities. Finally, this dissertation applies the SPIN model checker to an electric power protection system and demonstrates a straightforward and effective technique for rigorously characterizing the degree of fault tolerance of complex CPSs, a key step in improving their defensive posture

    Great Surges of development and alternative forms of globalization

    Get PDF
    The present understanding of globalization is inextricably tied to the free market ideology for both proponents and opponents. This paper will argue that globalization has many potential forms of which the neo-liberal recipe, applied up to now, is only one. Globalization need not be neo-liberal. A pro-development version of globalization has not yet been designed or defended as such. It will be argued that, without it, not only would it be very difficult to relaunch development in the South but also to overcome the present instabilities, imbalances and recessionary trends in the economies of the North.

    Immoral Programming: What can be done if malicious actors use language AI to launch ā€˜deepfake science attacksā€™?

    Get PDF
    The problem-solving and imitation capabilities of AI are increasing. In parallel, research addressing ethical AI design has gained momentum internationally. However, from a cybersecurity-oriented perspective in AI safety, it is vital to also analyse and counteract the risks posed by intentional malice. Malicious actors could for instance exploit the attack surface of already deployed AI, poison AI training data, sabotage AI systems at the pre-deployment stage or deliberately design hazardous AI. At a time when topics such as fake news, disinformation, deepfakes and, recently, fake science are affecting online debates in the population at large but also specifically in scientific circles, we thematise the following elephant in the room now and not in hindsight: what can be done if malicious actors use AI for not yet prevalent but technically feasible ā€˜deepfake science attacksā€™, i.e. on (applied) science itself? Deepfakes are not restricted to audio and visual phenomena, and deepfake text whose impact could be potentiated with regard to speed, scope, and scale may represent an underestimated avenue for malicious actors. Not only has the imitation capacity of AI improved dramatically, e.g. with the advent of advanced language AI such as GPT-3 (Brown et al., 2020), but generally, present-day AI can already be abused for goals such as (cyber)crime (Kaloudi and Li, 2020) and information warfare (Hartmann and Giles, 2020). Deepfake science attacks on (applied) science and engineering ā€“ which belong to the class of what we technically denote as scientific and empirical adversarial (SEA) AI attacks (Aliman and Kester, 2021) ā€“ could be instrumental in achieving such aims due to socio-psycho-technological intricacies against which science might not be immune. But if not immunity, could one achieve resilience? This chapter familiarises the reader with a complementary solution to this complex issue: a generic ā€˜cyborgneticā€™ defence (GCD) against SEA AI attacks. As briefly introduced in Chapter 4, the term cyborgnet (which is much more general than and not to be confused with the term ā€˜cyborgā€™) stands for a generic, substrate-independent and hybrid functional unit which is instantiated e.g. in couplings of present-day AIs and humans. Amongst many others, GCD uses epistemology, cybersecurity, cybernetics, and creativity research to tailor 10 generic strategies to the concrete exemplary use case of a large language model such as GPT-3. GCD can act as a cognitively diverse transdisciplinary scaffold to defend against SEA AI attacks ā€“ albeit with specific caveats

    Virtual work and leadership: the role of the Internet, complexity, creativity, and knowledge workers

    Get PDF
    This chapter presents the case for strong leadership to develop an internationally distributed virtual workforce. It is a speculative approach to how work and workers may behave in a future where most of their work and interactions will be virtual and disconnected from their physical location. The lessons that can be learned from the natural world are explored especially from complexity theories. Examples are provided of natural systems in action and the insights others have drawn from these theories and how this may inform decision-making, risk-taking and the management of virtual workers. The impact of the Internet on knowledge creation and discovery is explored. These theories and trends have important implications for leaders and managers and for stimulating creativity and innovation. One can speculate that in future digital workers will live in two realities; the @-Home-culture and the @-Large-culture. Knowledge workers of the future will be able to create a healthy balance between these two realities by working digitally in a global system and benefiting financially, but also living and participating fully in their local or national culture. Ultimately this may lead to more tolerance and opportunities to distribute work and wealth in ways that equalize rather than divide people
    • ā€¦
    corecore