Challenges in managing uncertainty during cyber events: Lessons from the staged-world study of a large-scale adversarial cyber security exercise

نویسندگان

  • Matthieu Branlat
  • Alexander Morison
  • David Woods
چکیده

In spite of the recognized challenge and importance of developing knowledge of the domain of cyber security, human-centered research to uncover and address the difficulties experienced by network defenders is to a large extent lacking. Such research is needed to influence the design of the joint systems facing cyber attacks. Network defense depends on the capacity to successfully identify, investigate and respond to suspicious events on the network. Such events correspond to fragmented micro phenomena that occur in a background of overwhelming amounts of very similar network activity. One key question in order to understand and better support cyber defense is: how can cyber defense systems manage the high level of uncertainty they face? Human operators are essential in network analysis. Network analysts operate within teams, and within larger organizations. These are essential dimensions of cyber security that remain under-researched. They are also at the heart of challenges typical of joint activity in complex work systems: tasks conducted by distinct teams put them at risk of working at cross-purposes and security goals conflict with the organization‟s production goals. In addition, cyber events are fundamentally adversarial events, a dimension of cyber security also under-researched. This paper presents findings from a stagedworld study of a large-scale adversarial cyber security exercise. It describes the challenges and management of uncertainty in this context and discusses their implications for the design and development of better defense systems. INTRODUCTION The continuously growing connectivity of systems creates increasingly complex digital infrastructures that enable critical and valued services. This source of performance also constitutes a source of vulnerability to cyber threats, a growing concern expressed in military, financial and industrial domains. In particular, the potential impact of cyber attacks on critical infrastructures and services societies depend on daily is worrying. Industrial control systems, seldom designed with cyber security in mind, also exist in a competitive economical context in which proprietary information becomes decisive. These characteristics make industries high-value targets for cyber terrorism (Finco, Lee, Miller, Tebbe and Wells, 2007). Importantly, cyber security experts observe that, at the same time, the knowledge cost for hackers is getting considerably lower (Goodall, Lutters and Komlodi, 2004), especially because of the large availability of information, documentation and even ready-to-use software. On the other hand, cyber defense remains a highly demanding task. Numerous efforts exist to improve cyber defense, typically focused on the search for technological solutions. But in spite of the recognized challenge and importance of developing knowledge of this critical domain, human-centered research to uncover and address the difficulties experienced by network defenders is recent and still limited. Moreover, understanding cyber security, a fundamentally adversarial domain, requires investigations of the interrelated defense and attack processes, but such studies are rare. While research has produced models of cyber attack or defense processes, simultaneous investigations of both processes do not appear to exist (studies usually rely more or less explicitly on hypothesized attacker or defender behavior). Such research is needed to influence the design of the joint systems facing cyber attacks. Common publications about cyber defense are how-to resources that focus on technological dimensions of the domain and associated knowledge and skills (e.g., firewalls and their management). In this type of literature, network analysts are expected to follow good practices in order to ensure network security. However, other authors recognize that, in spite of significant technological progress, human analysts continue to be key elements of network security. Based in part on cognitive task analysis methods, detailed accounts of network defense analysts’ work do exist, but are largely focused on this single perspective within the larger context of cybersecurity (Goodall et al., 2004; D’amico and Whitley, 2008). More recently, publications from a group of researchers at the University of British Columbia has described the collaborative nature of cyber defense and its processes within the larger organizational framework (Werlinger, Muldner, Hawkey and Beznosov, 2010; Hawkey, Muldner and Beznosov, 2008). Cyber attacks have been described based on after-the-fact investigations or expert interviews. These accounts are informed interpretations at best, since available data often are scarce and highly ambiguous. Most studies have focused on defense relying more or less explicitly on hypothesized attacker behavior. A notable exception is Jonsson and Olovsson’s study (1997) of cyber attack dynamics (but this study made assumptions that limited its realism). The focus of this paper will be primarily on cyber defense. However, understanding cyber defense requires considering the dynamics of cyber attack and of the interplay between attack and defense. These dynamics will, therefore, be presented here; they are described in greater detail elsewhere (Branlat et al., 2011; Branlat, 2011). Insights from these processes of cyber security result in directions for the improvement of cyber defense.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Analysis of Cybercrime and Cyber Attacks during the COVID-19 Pandemic

The COVID-19 pandemic was a remarkable and unprecedented event that changed the lives of billions of citizens around the world and resulted in what is known as a new term in terms of social norms and lifestyles. In addition to the tremendous impact on society and business in general, the epidemic created a unique set of cybercrime circumstances that also affected society and business. Increased...

متن کامل

A Review on Cyberspace Security: Lessons for Islamic Republic of Iran

Today governments face a threat by cyber attacks capable of disrupting communicative, economic and vital services that cause severe damages and losses. It has been years that Islamic republic of Iran benefits from cyberspace in different military and civilian sectors. Sensitive national centers such as nuclear facilities and Ministry of Oil have been targeted by individuals, groups and governme...

متن کامل

Cyber Safety: A Systems Theory Approach to Managing Cyber Security Risks – Applied to TJX Cyber Attack

To manage security risks more effectively in today’s complex and dynamic cyber environment, a new way of thinking is needed to complement traditional approaches. In this paper we propose a new approach for managing cyber security risks, based on a model for accident analysis used in the Systems Safety field, called System-Theoretic Accident Model and Processes (STAMP). We have adapted and appli...

متن کامل

Psychological Factors Affecting on the Culture and Awareness of Cyber Security in During of Covid-19 Outbreak

The aim of this study was to investigate the psychological factors affecting the culture and awareness of cyber security in the period of Covid-19 outbreak by qualitative method and theme analysis. Research data from upstream documents that include all valid articles published in 2020 to 2022 inside and outside the country, with 4 keywords (culture, awareness, cyber security, psychological fact...

متن کامل

An Effective Attack-Resilient Kalman Filter-Based Approach for Dynamic State Estimation of Synchronous Machine

Kalman filtering has been widely considered for dynamic state estimation in smart grids. Despite its unique merits, the Kalman Filter (KF)-based dynamic state estimation can be undesirably influenced by cyber adversarial attacks that can potentially be launched against the communication links in the Cyber-Physical System (CPS). To enhance the security of KF-based state estimation, in this paper...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2011