Skip to main content
Top

2019 | OriginalPaper | Chapter

Adaptive Automation in Cyber Security

Authors : Daniel N. Cassenti, Vladislav D. Veksler, Blaine Hoffman

Published in: Advances in Human Factors in Simulation and Modeling

Publisher: Springer International Publishing

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Cyber analysts must work long hours and under intense pressure all while performing complex mental tasks. Research is needed to improve the execution of their tasks. We describe a research plan that can be used to provide cyber analysts with the assistance they need using adaptive aids. The Multi-Level Cognitive Cybernetics (MLCC) [1] approach provides a methodological approach to studying adaptive automation and advancing its development across multiple levels of analysis. We follow up on a previous paper [1] by focusing on how MLCC can be used to improve cyber analyst tasks. We use the breakdown of cyber situation awareness by D’Amico and Whitley [2] to analyze the different cyber tasks and provide general examples of aids that may assist with each of the three stages. A more in-depth example of a specific type of cyber adaptive aid is then provided. We conclude with a call for action to expand adaptive automaton into the cyber realm.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Cassenti, D.N., Gamble, K.R., Bakdash, J.Z.: Multi-level cognitive cybernetics in human factors. In: Hale, K.S., Stanney, K.M. (eds.) Advances in Neuroergonomics and Cognitive Computing, pp. 315–326. Springer, New York (2016) Cassenti, D.N., Gamble, K.R., Bakdash, J.Z.: Multi-level cognitive cybernetics in human factors. In: Hale, K.S., Stanney, K.M. (eds.) Advances in Neuroergonomics and Cognitive Computing, pp. 315–326. Springer, New York (2016)
2.
go back to reference D’Amico A., Whitley K.: The real work of computer network defense analysts. In: Goodall, J.R., Conti, G., Ma, K.L. (eds.) VizSEC 2007, pp. 19–37. Springer, Berlin (2008) D’Amico A., Whitley K.: The real work of computer network defense analysts. In: Goodall, J.R., Conti, G., Ma, K.L. (eds.) VizSEC 2007, pp. 19–37. Springer, Berlin (2008)
3.
go back to reference Gootman, S.: OPM hack: The most dangerous threat to the federal government today. J. App. Sec. Res. 11, 517–525 (2016)CrossRef Gootman, S.: OPM hack: The most dangerous threat to the federal government today. J. App. Sec. Res. 11, 517–525 (2016)CrossRef
4.
go back to reference Gutzwiller, R.S., Fugate, S., Sawyer, B.D., Hancock, P.A.: The human factors of cyber network defense. In: Proceedings of the Human Factors and Ergonomics Society, pp. 322–326. Sage, Los Angeles, September 2015 Gutzwiller, R.S., Fugate, S., Sawyer, B.D., Hancock, P.A.: The human factors of cyber network defense. In: Proceedings of the Human Factors and Ergonomics Society, pp. 322–326. Sage, Los Angeles, September 2015
5.
go back to reference Maqbool, Z., Makhijani, N., Pammi, C., Dutt, V.: Effects of motivation: rewarding analysts for good cyber-attack detection may not be the best strategy. Hum. Fac. 59, 420–431 (2017)CrossRef Maqbool, Z., Makhijani, N., Pammi, C., Dutt, V.: Effects of motivation: rewarding analysts for good cyber-attack detection may not be the best strategy. Hum. Fac. 59, 420–431 (2017)CrossRef
6.
go back to reference Gonzalez, C., Ben-Asher, N., Oltramari, A., Lebiere, C.: Cognition and technology. In: Kott, A., Wang, A., Erbacher, R. (eds.) Cyber Defense and Situational Awareness, pp. 93–117. Springer, Switzerland (2014) Gonzalez, C., Ben-Asher, N., Oltramari, A., Lebiere, C.: Cognition and technology. In: Kott, A., Wang, A., Erbacher, R. (eds.) Cyber Defense and Situational Awareness, pp. 93–117. Springer, Switzerland (2014)
7.
go back to reference Boyce, M.W., Duma, K.M., Hettinger, L.J., Malone, T.B., Wilson, D.P., Lockett-Reynolds, J.: Human performance in cybersecurity: a research agenda. In: Proceedings of the Human Factors and Ergonomics Society, pp. 1115–1119. Sage, Los Angeles (2011) Boyce, M.W., Duma, K.M., Hettinger, L.J., Malone, T.B., Wilson, D.P., Lockett-Reynolds, J.: Human performance in cybersecurity: a research agenda. In: Proceedings of the Human Factors and Ergonomics Society, pp. 1115–1119. Sage, Los Angeles (2011)
8.
go back to reference Alpcan, T., Başar, T.: Network security: A decision and Game-Theoretic Approach. Cambridge University Press, Cambridge (2010)MATH Alpcan, T., Başar, T.: Network security: A decision and Game-Theoretic Approach. Cambridge University Press, Cambridge (2010)MATH
9.
go back to reference Knott, B.A., Mancuso, V.F., Bennett, K., Finomore, V., McNeese, M., McKneely, J.A., Beecher, M.: Human factors in cyber warfare: alternative perspectives. In: Proceedings of the Human Factors and Ergonomics Society, pp. 399–403. Sage, Los Angeles (2013) Knott, B.A., Mancuso, V.F., Bennett, K., Finomore, V., McNeese, M., McKneely, J.A., Beecher, M.: Human factors in cyber warfare: alternative perspectives. In: Proceedings of the Human Factors and Ergonomics Society, pp. 399–403. Sage, Los Angeles (2013)
10.
go back to reference Wiener, N.: Cybernetics or Control and Communication in the Animal and the Machine. John Wiley & Sons, New York (1948) Wiener, N.: Cybernetics or Control and Communication in the Animal and the Machine. John Wiley & Sons, New York (1948)
11.
go back to reference Kaber, D.B., Endsley, M.R.: The effects of level of automation and adaptive automation on human performance, situation awareness and workload in a dynamic control task. Theo. Iss. Ergon. Sci. 5, 113–153 (2004)CrossRef Kaber, D.B., Endsley, M.R.: The effects of level of automation and adaptive automation on human performance, situation awareness and workload in a dynamic control task. Theo. Iss. Ergon. Sci. 5, 113–153 (2004)CrossRef
12.
go back to reference Dutt, V., Moisan, F., Gonzalez, C.: Role of intrusion-detection systems in cyber-attack detection. In: Nicholson, D. (ed.) Advances in Human Factors in Cybersecurity, pp. 97–110. Springer, Cham (2016) Dutt, V., Moisan, F., Gonzalez, C.: Role of intrusion-detection systems in cyber-attack detection. In: Nicholson, D. (ed.) Advances in Human Factors in Cybersecurity, pp. 97–110. Springer, Cham (2016)
13.
go back to reference Segerstrom, S.C., Nes, L.S.: Heart rate variability reflects self-regulatory strength, effort, and fatigue. Psychol. Sci. 18, 275–281 (2007)CrossRef Segerstrom, S.C., Nes, L.S.: Heart rate variability reflects self-regulatory strength, effort, and fatigue. Psychol. Sci. 18, 275–281 (2007)CrossRef
14.
go back to reference Recarte, M.A., Nunes, L.M.: Effects of verbal and spatial-imagery tasks on eye fixations while driving. J. Exp. Psy. App. 6, 31–43 (2000)CrossRef Recarte, M.A., Nunes, L.M.: Effects of verbal and spatial-imagery tasks on eye fixations while driving. J. Exp. Psy. App. 6, 31–43 (2000)CrossRef
15.
go back to reference Cassenti, D.N., Veksler, V.D.: Using cognitive modeling for adaptive automation triggering. In: Cassenti, D.N. (ed.) Advances in Human Factors in Modeling and Simulation, pp. 378–390). Springer, New York (2017) Cassenti, D.N., Veksler, V.D.: Using cognitive modeling for adaptive automation triggering. In: Cassenti, D.N. (ed.) Advances in Human Factors in Modeling and Simulation, pp. 378–390). Springer, New York (2017)
16.
go back to reference Schraagen, J.M., Chipman, S.F., Shalin, V.L. (eds.): Cognitive Task Analysis. Lawrence Erlbaum, Mahwah (2000) Schraagen, J.M., Chipman, S.F., Shalin, V.L. (eds.): Cognitive Task Analysis. Lawrence Erlbaum, Mahwah (2000)
17.
go back to reference D’Amico, A., Whitley, K., Tesone, D., O’Brien, B., Roth, E.: Achieving cyber defense situational awareness: a cognitive task analysis of information assurance analysts. In: Proceedings of Human Factors and Ergonomics Society, pp. 229–233. Sage, Los Angeles (2005) D’Amico, A., Whitley, K., Tesone, D., O’Brien, B., Roth, E.: Achieving cyber defense situational awareness: a cognitive task analysis of information assurance analysts. In: Proceedings of Human Factors and Ergonomics Society, pp. 229–233. Sage, Los Angeles (2005)
18.
go back to reference Endsley, M.R.: Toward a theory of situation awareness in dynamic systems. Hum. Factors 37, 32–64 (1995)CrossRef Endsley, M.R.: Toward a theory of situation awareness in dynamic systems. Hum. Factors 37, 32–64 (1995)CrossRef
19.
go back to reference Eppler, M.J., Mengis, J.: The concept of information overload: a review of literature from organization science, accounting, marketing, MIS, and related disciplines. Inf. Soc. 20, 325–344 (2004)CrossRef Eppler, M.J., Mengis, J.: The concept of information overload: a review of literature from organization science, accounting, marketing, MIS, and related disciplines. Inf. Soc. 20, 325–344 (2004)CrossRef
20.
go back to reference Arora, A., Dutt, V.: Cyber security: evaluating the effects of attack strategy and base rate through instance based learning. In: Proceedings of International Conference on Cognitive Modeling, pp. 336–341. ICCM, Ottawa (2013) Arora, A., Dutt, V.: Cyber security: evaluating the effects of attack strategy and base rate through instance based learning. In: Proceedings of International Conference on Cognitive Modeling, pp. 336–341. ICCM, Ottawa (2013)
21.
go back to reference Dutt, V., Ahn, Y.S., Gonzalez, C.: Cyber situation awareness modeling detection of Okaycyber-attacks with instance-based learning theory. Hum. Factors 55, 605–618 (2013)CrossRef Dutt, V., Ahn, Y.S., Gonzalez, C.: Cyber situation awareness modeling detection of Okaycyber-attacks with instance-based learning theory. Hum. Factors 55, 605–618 (2013)CrossRef
22.
go back to reference Aggarwal, P., Gonzalez, C., Dutt, V.: Cyber-security: role of deception in cyber-attack detection. In: Nicholson, D. (ed.) Advances in Human Factors in Cybersecurity, pp. 85–96. Springer, New York (2016) Aggarwal, P., Gonzalez, C., Dutt, V.: Cyber-security: role of deception in cyber-attack detection. In: Nicholson, D. (ed.) Advances in Human Factors in Cybersecurity, pp. 85–96. Springer, New York (2016)
Metadata
Title
Adaptive Automation in Cyber Security
Authors
Daniel N. Cassenti
Vladislav D. Veksler
Blaine Hoffman
Copyright Year
2019
DOI
https://doi.org/10.1007/978-3-319-94223-0_27

Premium Partner