Skip to main content
Top

2015 | OriginalPaper | Chapter

10. CyberWar Game: A Paradigm for Understanding New Challenges of Cyber War

Authors : Noam Ben-Asher, Cleotilde Gonzalez

Published in: Cyber Warfare

Publisher: Springer International Publishing

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Cyber-war is a growing form of threat to our society that involves multiple players executing simultaneously offensive and defensive operations. Given that cyber space is hyper dimensional and dynamic, human decision making must also incorporate numerous attributes and must be agile and adaptive. In this chapter, we review how computational models of human cognition can be scaled up from an individual model of a defender operating in a hostile environment, through a pair of models representing a defender and an attacker to multi-agents in a cyber-war. Following, we propose to study the decision making processes that drive the dynamics of cyber-war using a multi-agent model comprising of cognitive agents that learn to make decisions according to Instance-Based Learning Theory (IBLT). In this paradigm, the CyberWar game, assets and power are two key attributes that influence the decisions of agents. Assets represent the key resource that an agent is protecting from attacks while power represents technical prowess of an agent’s cyber security. All the agents share the same goal of maximizing their assets and they learn from experience to attack other agents and defend themselves in order to meet this goal. Importantly, they don’t learn by using predefined strategies, as many multi-agent models do, but instead they learn from experience according to the situation and actions of others, as suggested by the IBLT’s process. This chapter contributes to current research by: proposing a novel paradigm to study behavior in cyber-war, using a well-known cognitive model of decisions from experience to predict what possible human behavior would be in a simulated cyber-war, and demonstrating novel predictions regarding the effects of power and assets, two main contributors to cyber-war.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
go back to reference Alpcan T, Baar T (2010) Network security: A decision and game-theoretic approach. Cambridge University Press, CambridgeCrossRef Alpcan T, Baar T (2010) Network security: A decision and game-theoretic approach. Cambridge University Press, CambridgeCrossRef
go back to reference Ben-Asher N, Dutt V, Gonzalez C (2013a) Accounting for integration of descriptive and experiential information in a repeated prisoner’s dilemma using an instance-based learning model. In: Kennedy B, Reitter D, Amant RS (eds) Proceedings of the 22nd Annual Conference on Behavior Representation in Modeling and Simulation, Ottawa, Canada, BRIMS Society Ben-Asher N, Dutt V, Gonzalez C (2013a) Accounting for integration of descriptive and experiential information in a repeated prisoner’s dilemma using an instance-based learning model. In: Kennedy B, Reitter D, Amant RS (eds) Proceedings of the 22nd Annual Conference on Behavior Representation in Modeling and Simulation, Ottawa, Canada, BRIMS Society
go back to reference Ben-Asher N, Lebiere C, Oltramari A, Gonzalez C (2013b) Balancing fairness and efficiency in repeated societal interaction. In: Proceedings of the 35th Annual Meeting of the Cognitive Science Society, Humboldt Universität, Berlin, 31 July-3 August 2013 Ben-Asher N, Lebiere C, Oltramari A, Gonzalez C (2013b) Balancing fairness and efficiency in repeated societal interaction. In: Proceedings of the 35th Annual Meeting of the Cognitive Science Society, Humboldt Universität, Berlin, 31 July-3 August 2013
go back to reference Dutt V, Yamaguchi M, Gonzalez C, Proctor RW (2009) An instance-based learning model of stimulus-response compatibility effects in mixed location-relevant and location-irrelevant tasks. In: Howes A, Peebles D, Cooper R (eds) Proceedings of the 9th International Conference on Cognitive Modeling, Manchester, 24–26 July 2009 Dutt V, Yamaguchi M, Gonzalez C, Proctor RW (2009) An instance-based learning model of stimulus-response compatibility effects in mixed location-relevant and location-irrelevant tasks. In: Howes A, Peebles D, Cooper R (eds) Proceedings of the 9th International Conference on Cognitive Modeling, Manchester, 24–26 July 2009
go back to reference Dutt V, Ahn Y-S, Gonzalez C (2011). Cyber situation awareness: Modeling the security analyst in a cyber-attack scenario through instance-based learning. In: Li Y (ed) Lecture notes in computer science, vol 6818. Springer, Heidelberg, p 281–293 Dutt V, Ahn Y-S, Gonzalez C (2011). Cyber situation awareness: Modeling the security analyst in a cyber-attack scenario through instance-based learning. In: Li Y (ed) Lecture notes in computer science, vol 6818. Springer, Heidelberg, p 281–293
go back to reference Dutt V, Ahn Y-S, Ben-Asher N, Gonzalez C (2012) Modeling the effects of base-rate on cyber threat detection performance. In: Rußwinkel N, Drewitz U, van Rijn H (eds) Proceedings of the 11th International Conference on Cognitive Modeling (ICCM 2012). Universitaetsverlag der TU, Berlin, p 88–93 Dutt V, Ahn Y-S, Ben-Asher N, Gonzalez C (2012) Modeling the effects of base-rate on cyber threat detection performance. In: Rußwinkel N, Drewitz U, van Rijn H (eds) Proceedings of the 11th International Conference on Cognitive Modeling (ICCM 2012). Universitaetsverlag der TU, Berlin, p 88–93
go back to reference Erev I, Roth AE (1998) Predicting how people play games: Reinforcement learning in experimental games with unique, mixed strategy equilibria. Am Econ Rev 88(4):848–881 Erev I, Roth AE (1998) Predicting how people play games: Reinforcement learning in experimental games with unique, mixed strategy equilibria. Am Econ Rev 88(4):848–881
go back to reference Erev I, Glozman I, Hertwig R (2008) What impacts the impact of rare events. J Risk Uncertainty 36(2):153–177. doi:10.1007/s11166–008-9035-zCrossRefMATH Erev I, Glozman I, Hertwig R (2008) What impacts the impact of rare events. J Risk Uncertainty 36(2):153–177. doi:10.1007/s11166–008-9035-zCrossRefMATH
go back to reference Erev I, Haruvy E (in press) Learning and the economics of small decisions. In: Kagel JH, Roth AE (eds) The handbook of experimental economics, vol 2. Princeton University Press, Princeton Erev I, Haruvy E (in press) Learning and the economics of small decisions. In: Kagel JH, Roth AE (eds) The handbook of experimental economics, vol 2. Princeton University Press, Princeton
go back to reference Farwell JP, Rohozinski R (2011) Stuxnet and the future of cyber war. Survival 53(1):23–40. doi:10.1080/00396338.2011.555586CrossRef Farwell JP, Rohozinski R (2011) Stuxnet and the future of cyber war. Survival 53(1):23–40. doi:10.1080/00396338.2011.555586CrossRef
go back to reference Gonzalez C, Dutt V (2010) Instance-based learning models of training. Proc Hum Fact Erg Soc An 54(27):2319–2323. doi:10.1177/154193121005402721CrossRef Gonzalez C, Dutt V (2010) Instance-based learning models of training. Proc Hum Fact Erg Soc An 54(27):2319–2323. doi:10.1177/154193121005402721CrossRef
go back to reference Gonzalez C, Lebiere C (2005) Instance-based cognitive models of decision making. In: Zizzo D, Courakis A (eds) Transfer of knowledge in economic decision-making. Macmillan, New York, p 148–165 Gonzalez C, Lebiere C (2005) Instance-based cognitive models of decision making. In: Zizzo D, Courakis A (eds) Transfer of knowledge in economic decision-making. Macmillan, New York, p 148–165
go back to reference Gonzalez C, Lerch JF, Lebiere C (2003). Instance-based learning in dynamic decision making. Cognitive Sci 27(4):591–635. doi:10.1016/S0364-0213(03)00031-4CrossRef Gonzalez C, Lerch JF, Lebiere C (2003). Instance-based learning in dynamic decision making. Cognitive Sci 27(4):591–635. doi:10.1016/S0364-0213(03)00031-4CrossRef
go back to reference Gonzalez C, Best BJ, Healy AF, Bourne LE Jr, Kole JA (2010) A cognitive modeling account of simultaneous learning and fatigue effects. J Cogn Sys Res 12(1):19–32. doi:10.1016/j.cogsys.2010.06.004CrossRef Gonzalez C, Best BJ, Healy AF, Bourne LE Jr, Kole JA (2010) A cognitive modeling account of simultaneous learning and fatigue effects. J Cogn Sys Res 12(1):19–32. doi:10.1016/j.cogsys.2010.06.004CrossRef
go back to reference Gonzalez C, Ben-Asher N, Martin JM, Dutt V (2014a) Emergence of cooperation with increased information: Explaining the process with an instance-based learning model. Cognitive Sci (in press) Gonzalez C, Ben-Asher N, Martin JM, Dutt V (2014a) Emergence of cooperation with increased information: Explaining the process with an instance-based learning model. Cognitive Sci (in press)
go back to reference Gonzalez C, Ben-Asher N, Oltramari A, Lebiere C (2014b) Cognitive Models of Cyber Situation Awareness and Decision Making. In: Wang C, Kott A, Erbacher R (eds) Cyber defense and situational awareness. Springer, (in press Gonzalez C, Ben-Asher N, Oltramari A, Lebiere C (2014b) Cognitive Models of Cyber Situation Awareness and Decision Making. In: Wang C, Kott A, Erbacher R (eds) Cyber defense and situational awareness. Springer, (in press
go back to reference Hazon N, Chakraborty N, Sycara K (2011) Game theoretic modeling and computational analysis of n-player conflicts over resources. In:Proceedings of the 2011 IEEE International Conference on Privacy, Security, Risk and Trust and IEEE International Conference on Social Computing. IEEE, Los Alamitos, p 380–387. doi:10.1109/PASSAT/SocialCom.2011.178 Hazon N, Chakraborty N, Sycara K (2011) Game theoretic modeling and computational analysis of n-player conflicts over resources. In:Proceedings of the 2011 IEEE International Conference on Privacy, Security, Risk and Trust and IEEE International Conference on Social Computing. IEEE, Los Alamitos, p 380–387. doi:10.1109/PASSAT/SocialCom.2011.178
go back to reference Hertwig R, Barron G, Weber EU, Erev I (2004) Decisions from experience and the effect of rare events in risky choice. Psychol Sci 15(8):534–539. doi:10.1111/j.0956–7976.2004.00715.xCrossRef Hertwig R, Barron G, Weber EU, Erev I (2004) Decisions from experience and the effect of rare events in risky choice. Psychol Sci 15(8):534–539. doi:10.1111/j.0956–7976.2004.00715.xCrossRef
go back to reference Hertwig, R, Barron G, Weber EU, Erev I (2006) The role of information sampling in risky choice. In: Fiedler K, Juslin P (eds) Information sampling and adaptive cognition. Cambridge University Press, New York, p 72–91 Hertwig, R, Barron G, Weber EU, Erev I (2006) The role of information sampling in risky choice. In: Fiedler K, Juslin P (eds) Information sampling and adaptive cognition. Cambridge University Press, New York, p 72–91
go back to reference Kennedy WG, Hailegiorgis AB, Rouleau M, Bassett JK, Coletti M, Balan GC, Gulden T (2010) An agent-based model of conflict in East Africa and the effect of watering holes. In: Proceedings of the 19th Conference on Behavior Representation in Modeling and Simulation (BRiMS), p 112–119 Kennedy WG, Hailegiorgis AB, Rouleau M, Bassett JK, Coletti M, Balan GC, Gulden T (2010) An agent-based model of conflict in East Africa and the effect of watering holes. In: Proceedings of the 19th Conference on Behavior Representation in Modeling and Simulation (BRiMS), p 112–119
go back to reference Kotenko I (2005) Agent-based modeling and simulation of cyber-warfare between malefactors and security agents in internet. In: Merkuryev Y, Zobel R, Kerckhoffs E (eds) Proceedings of 19th European conference on modeling and simulation, Riga Technical University, Riga, 1–4 June 2005 Kotenko I (2005) Agent-based modeling and simulation of cyber-warfare between malefactors and security agents in internet. In: Merkuryev Y, Zobel R, Kerckhoffs E (eds) Proceedings of 19th European conference on modeling and simulation, Riga Technical University, Riga, 1–4 June 2005
go back to reference Kotenko I (2007) Multi-agent modelling and simulation of cyber-attacks and cyber-defense for homeland security. In: Proceedings of the 4th IEEE workshop on intelligent data acquisition and advanced computing systems: technology and applications. IEEE, Los Alamitos, p 614–619 Kotenko I (2007) Multi-agent modelling and simulation of cyber-attacks and cyber-defense for homeland security. In: Proceedings of the 4th IEEE workshop on intelligent data acquisition and advanced computing systems: technology and applications. IEEE, Los Alamitos, p 614–619
go back to reference Lebiere C, Gonzalez C, Martin M (2007) Instance-based decision making model of repeated binary choice. In: Lewis RL, Polk TA, Laird JE (eds) Proceedings of the 8th International Conference on Cognitive Modeling. Ann Arbor, p 67–72 Lebiere C, Gonzalez C, Martin M (2007) Instance-based decision making model of repeated binary choice. In: Lewis RL, Polk TA, Laird JE (eds) Proceedings of the 8th International Conference on Cognitive Modeling. Ann Arbor, p 67–72
go back to reference Lejarraga T, Dutt V, Gonzalez C (2010) Instance-based learning in repeated binary choice. Paper presented at the 31st Annual Conference of the Society for Judgement and Decision Making, St. Louis, 19–22 November 2010 Lejarraga T, Dutt V, Gonzalez C (2010) Instance-based learning in repeated binary choice. Paper presented at the 31st Annual Conference of the Society for Judgement and Decision Making, St. Louis, 19–22 November 2010
go back to reference Lejarraga T, Dutt V, Gonzalez C (2012) Instance-based learning: A general model of repeated binary choice. J Behav Decis Making 25(2):143–153CrossRef Lejarraga T, Dutt V, Gonzalez C (2012) Instance-based learning: A general model of repeated binary choice. J Behav Decis Making 25(2):143–153CrossRef
go back to reference March JG (1996) Learning to be risk averse. Psychol Rev 103(2):309–319. doi:10.1037/0033-295X.103.2.309CrossRef March JG (1996) Learning to be risk averse. Psychol Rev 103(2):309–319. doi:10.1037/0033-295X.103.2.309CrossRef
go back to reference Martin MK, Gonzalez C, Lebiere C (2004) Learning to make decisions in dynamic environments: ACT-R plays the beer game. In: Lovett MC, Schunn CD, Lebiere C, Munro P (eds) Proceedings of the Sixth International Conference on Cognitive Modeling, vol 420. Lawrence Erlbaum Associates Publishers, p 178–183 Martin MK, Gonzalez C, Lebiere C (2004) Learning to make decisions in dynamic environments: ACT-R plays the beer game. In: Lovett MC, Schunn CD, Lebiere C, Munro P (eds) Proceedings of the Sixth International Conference on Cognitive Modeling, vol 420. Lawrence Erlbaum Associates Publishers, p 178–183
go back to reference Martin JM, Juvina I, Lebiere C, Gonzalez C (2011) The effects of individual and context on aggression in repeated social interaction. In: Harris D (ed) Engineering psychology and cognitive ergonomics, HCII 2011, LNAI, vol 6781. Springer-Verlag, Berlin, p 442–451CrossRef Martin JM, Juvina I, Lebiere C, Gonzalez C (2011) The effects of individual and context on aggression in repeated social interaction. In: Harris D (ed) Engineering psychology and cognitive ergonomics, HCII 2011, LNAI, vol 6781. Springer-Verlag, Berlin, p 442–451CrossRef
go back to reference Oltramari A, Lebiere C, Ben-Asher N, Juvina I, Gonzalez C (2013) Modeling strategic dynamics under alternative information conditions. In: West RL, Stewart TC (eds) Proceedings of the 12th international conference on cognitive modeling. ICCM, p 390–395 Oltramari A, Lebiere C, Ben-Asher N, Juvina I, Gonzalez C (2013) Modeling strategic dynamics under alternative information conditions. In: West RL, Stewart TC (eds) Proceedings of the 12th international conference on cognitive modeling. ICCM, p 390–395
go back to reference Roth AE, Erev I (1995) Learning in extensive-form games: Experimental data and simple dynamic models in the intermediate term. Game Econ Behav 8(1):164–212. doi:10.1016/S0899-8256(05)80020-XCrossRefMATHMathSciNet Roth AE, Erev I (1995) Learning in extensive-form games: Experimental data and simple dynamic models in the intermediate term. Game Econ Behav 8(1):164–212. doi:10.1016/S0899-8256(05)80020-XCrossRefMATHMathSciNet
go back to reference Roy S, Ellis C, Shiva S, Dasgupta D, Shandilya V, Wu Q (2010) A survey of game theory as applied to network security. In: Sprague RH Jr. (ed) Proceedings of the 43rd Hawaii international conference on system sciences. IEEE: Los Alamitos Roy S, Ellis C, Shiva S, Dasgupta D, Shandilya V, Wu Q (2010) A survey of game theory as applied to network security. In: Sprague RH Jr. (ed) Proceedings of the 43rd Hawaii international conference on system sciences. IEEE: Los Alamitos
go back to reference Shiva S, Roy S, Dasgupta D (2010). Game theory for cyber security. In: Sheldon FT, Prowell S, Abercrombie RK, Krings A (eds) Proceedings of the Sixth Annual Workshop on Cyber Security and Information Intelligence Research. ACM, New York, p 34 Shiva S, Roy S, Dasgupta D (2010). Game theory for cyber security. In: Sheldon FT, Prowell S, Abercrombie RK, Krings A (eds) Proceedings of the Sixth Annual Workshop on Cyber Security and Information Intelligence Research. ACM, New York, p 34
go back to reference Sun R (2006) The CLARION cognitive architecture: Extending cognitive modeling to social simulation. In: Sun R (ed) Cognition and multi-agent interaction: From cognitive modeling to social simulation. Cambridge University Press, New York, p 79–99 Sun R (2006) The CLARION cognitive architecture: Extending cognitive modeling to social simulation. In: Sun R (ed) Cognition and multi-agent interaction: From cognitive modeling to social simulation. Cambridge University Press, New York, p 79–99
go back to reference Vigna G (2003) Teaching hands-on network security: Testbeds and live exercises. J Inf Warfare 3(2):8–25.MathSciNet Vigna G (2003) Teaching hands-on network security: Testbeds and live exercises. J Inf Warfare 3(2):8–25.MathSciNet
Metadata
Title
CyberWar Game: A Paradigm for Understanding New Challenges of Cyber War
Authors
Noam Ben-Asher
Cleotilde Gonzalez
Copyright Year
2015
DOI
https://doi.org/10.1007/978-3-319-14039-1_10

Premium Partner