General Requirements of a Hybrid-Modeling Framework for Cyber Security

Alessandro Oltramari, Noam Ben-Asher, Lorrie Cranor, Lujo Bauer, Nicolas Christin

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

8 Scopus citations

Abstract

Understanding human dynamics of cyber security is a critical step for enhancing situation awareness of analysts. To this end, in this paper we focus on the requirements for building a comprehensive model of cyber analyst's decision making processes: we embrace an approach that leverages on cognitive aspects and knowledge representation to define the core elements of such model. In particular, we make the case for investigating the interplay between ontological underpinnings of cyber security and cognitive mechanisms of decision making in cyber operations. We claim that, by integrating ontologies and cognitive architectures in a hybrid-modeling framework, it's possible to rigorously characterize and simulate the core structures that govern the decisions of defenders and attackers and mediate interactions among them in the cyberspace.

Original languageEnglish
Title of host publicationProceedings - 2014 IEEE Military Communications Conference
Subtitle of host publicationAffordable Mission Success: Meeting the Challenge, MILCOM 2014
PublisherInstitute of Electrical and Electronics Engineers
Pages129-135
Number of pages7
ISBN (Electronic)9781479967704
DOIs
StatePublished - 13 Nov 2014
Externally publishedYes
Event33rd Annual IEEE Military Communications Conference, MILCOM 2014 - Baltimore, United States
Duration: 6 Oct 20148 Oct 2014

Publication series

NameProceedings - IEEE Military Communications Conference MILCOM

Conference

Conference33rd Annual IEEE Military Communications Conference, MILCOM 2014
Country/TerritoryUnited States
CityBaltimore
Period6/10/148/10/14

Keywords

  • cognitive architecture
  • cyber security
  • ontology
  • situation awareness

ASJC Scopus subject areas

  • Electrical and Electronic Engineering

Fingerprint

Dive into the research topics of 'General Requirements of a Hybrid-Modeling Framework for Cyber Security'. Together they form a unique fingerprint.

Cite this