Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/2808783.2808788acmconferencesArticle/Chapter ViewAbstractPublication PagesccsConference Proceedingsconference-collections
research-article
Public Access

Compliance Control: Managed Vulnerability Surface in Social-Technological Systems via Signaling Games

Published: 16 October 2015 Publication History

Abstract

The agents of an organization, in fulfillment of their tasks, generate a cyber-physical-human trace, which is amenable to formal analysis with modal logic to verify safety and liveness properties. Trusted but non-trustworthy agents within an organization may attempt to conceal their true intentions, develop deceptive strategies, and exploit the organization--a scenario modeled here as a basic compliance signaling game. The challenge for the organization, only partially informed of its own true state, is in measuring and estimating its own safety and liveness properties as accurately as possible--the subject of this paper. To improve measurements, we suggest counter strategies where the organization presents honey objectives on a closely monitored attack surface to elicit exploitive actions and to estimate its own safety properties, an activity required for an adaptive response aiming to manage an organization's vulnerability and safety surfaces. We expand the basic game to a system of social-technological agents and tailor the encounter structure of evolutionary games to one that best fits a typical organization.
Focusing on these double-sided signaling games (compliance and measure) within a system of social-technological agents, we outline a simple gradient ascent-based control mechanism and report on its ability to select and stabilize desirable equilibria despite the typical non-stationarity and chaos within evolutionary game systems. We clarify the design of our feedback-driven control system by using behavioral sensing, estimation and numerical optimization, and actuation with micro-incentives.

References

[1]
Kiam Heong Ang, Gregory Chong, and Yun Li. Pid control system analysis, design, and technology. Control Systems Technology, IEEE Transactions on, 13(4):559--576, 2005.
[2]
Karl Johan Astrom, Chang C Hang, Per Persson, and Weng Kuen Ho. Towards intelligent pid control. Automatica, 28(1):1--9, 1992.
[3]
Ken Binmore and Larry Samuelson. Evolution and mixed strategies. Games and Economic Behavior, 34(2):200--226, 2001.
[4]
William Casey, Jose A. Morales, Thomson Nguyen, Jonathan Spring, Rhiannon Weaver, Evan Wright, Leigh Metcalf, and Bud Mishra. Cyber security via signaling games: Toward a science of cyber security. In ICDCIT, pages 34--42, 2014.
[5]
William Casey, Rhiannon Weaver, Leigh Metcalf, Jose Andre Morales, Evan Wright, and Bud Mishra. Cyber security via minority games with epistatic signaling: Invited paper. In Proceedings of the 8th International Conference on Bioinspired Information and Communications Technologies, BICT '14, pages 133--140, ICST, Brussels, Belgium, Belgium, 2014. ICST (Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering).
[6]
Andrew R Conn, Katya Scheinberg, and Ph L Toint. Recent progress in unconstrained nonlinear optimization without derivatives. Mathematical programming, 79(1-3):397--414, 1997.
[7]
Simon M Huttegger and Brian Skyrms. Emergence of information transfer by inductive learning. Studia Logica, 89(2):237--256, 2008.
[8]
Simon M Huttegger, Brian Skyrms, Rory Smead, and Kevin JS Zollman. Evolutionary dynamics of lewis signaling games: signaling systems vs. partial pooling. Synthese, 172(1):177--191, 2010.
[9]
Lester Ingber. Simulated annealing: Practice versus theory. Mathematical and computer modelling, 18(11):29--57, 1993.
[10]
Tamara G Kolda, Robert Michael Lewis, and Virginia Torczon. Optimization by direct search: New perspectives on some classical and modern methods. SIAM review, 45(3):385--482, 2003.
[11]
David Lewis. Convention: A philosophical study. John Wiley & Sons, 2008.
[12]
Brian Skyrms. Signals: Evolution, learning, and information. Oxford University Press, 2010.
[13]
Michael Spence. Job market signaling. The quarterly journal of Economics, pages 355--374, 1973.
[14]
Peter J Van Laarhoven and Emile H Aarts. Simulated annealing: theory and applications, volume 37. Springer Science & Business Media, 1987.

Cited By

View all
  • (2024)ZETAR: Modeling and Computational Design of Strategic and Adaptive Compliance PoliciesIEEE Transactions on Computational Social Systems10.1109/TCSS.2023.332353911:3(4001-4015)Online publication date: Jun-2024
  • (2024)AI Adoption and Educational Sustainability in Higher Education in the UAEArtificial Intelligence in Education: The Power and Dangers of ChatGPT in the Classroom10.1007/978-3-031-52280-2_14(201-229)Online publication date: 30-Mar-2024
  • (2023)IntroductionCognitive Security10.1007/978-3-031-30709-6_1(1-25)Online publication date: 3-Jun-2023
  • Show More Cited By

Index Terms

  1. Compliance Control: Managed Vulnerability Surface in Social-Technological Systems via Signaling Games

      Recommendations

      Comments

      Information & Contributors

      Information

      Published In

      cover image ACM Conferences
      MIST '15: Proceedings of the 7th ACM CCS International Workshop on Managing Insider Security Threats
      October 2015
      90 pages
      ISBN:9781450338240
      DOI:10.1145/2808783
      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Sponsors

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      Published: 16 October 2015

      Permissions

      Request permissions for this article.

      Check for updates

      Author Tags

      1. control theory
      2. cyber security
      3. insider threat
      4. optimization
      5. security games
      6. signaling games

      Qualifiers

      • Research-article

      Funding Sources

      • Department of Defense

      Conference

      CCS'15
      Sponsor:

      Acceptance Rates

      MIST '15 Paper Acceptance Rate 6 of 14 submissions, 43%;
      Overall Acceptance Rate 21 of 54 submissions, 39%

      Upcoming Conference

      CCS '24
      ACM SIGSAC Conference on Computer and Communications Security
      October 14 - 18, 2024
      Salt Lake City , UT , USA

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)39
      • Downloads (Last 6 weeks)7
      Reflects downloads up to 06 Oct 2024

      Other Metrics

      Citations

      Cited By

      View all
      • (2024)ZETAR: Modeling and Computational Design of Strategic and Adaptive Compliance PoliciesIEEE Transactions on Computational Social Systems10.1109/TCSS.2023.332353911:3(4001-4015)Online publication date: Jun-2024
      • (2024)AI Adoption and Educational Sustainability in Higher Education in the UAEArtificial Intelligence in Education: The Power and Dangers of ChatGPT in the Classroom10.1007/978-3-031-52280-2_14(201-229)Online publication date: 30-Mar-2024
      • (2023)IntroductionCognitive Security10.1007/978-3-031-30709-6_1(1-25)Online publication date: 3-Jun-2023
      • (2022)Reinforcement Learning for feedback-enabled cyber resilienceAnnual Reviews in Control10.1016/j.arcontrol.2022.01.00153(273-295)Online publication date: 2022
      • (2021)SOD2G: A Study on a Social-Engineering Organizational Defensive Deception Game Framework through Optimization of Spatiotemporal MTD and Decoy ConflictElectronics10.3390/electronics1023301210:23(3012)Online publication date: 2-Dec-2021
      • (2021)Duplicity Games for Deception Design with an Application to Insider Threat MitigationIEEE Transactions on Information Forensics and Security10.1109/TIFS.2021.3118886(1-1)Online publication date: 2021
      • (2021)A Survey of Defensive Deception: Approaches Using Game Theory and Machine LearningIEEE Communications Surveys & Tutorials10.1109/COMST.2021.310287423:4(2460-2493)Online publication date: Dec-2022
      • (2020)Strategic Learning for Active, Adaptive, and Autonomous Cyber DefenseAdaptive Autonomous Secure Cyber Systems10.1007/978-3-030-33432-1_10(205-230)Online publication date: 5-Feb-2020
      • (2020)Game‐Theoretic Analysis of Cyber DeceptionModeling and Design of Secure Internet of Things10.1002/9781119593386.ch2(27-58)Online publication date: 12-Jun-2020
      • (2019)Game theory for cyber deceptionProceedings of the 6th Annual Symposium on Hot Topics in the Science of Security10.1145/3314058.3314067(1-3)Online publication date: 1-Apr-2019
      • Show More Cited By

      View Options

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Get Access

      Login options

      Media

      Figures

      Other

      Tables

      Share

      Share

      Share this Publication link

      Share on social media