Modelling Cyber-Security Experts' Decision Making Processes using Aggregation Operators

An important role carried out by cyber-security experts is the assessment of proposed computer systems, during their design stage. This task is fraught with difficulties and uncertainty, making the knowledge provided by human experts essential for successful assessment. Today, the increasing number...

Full description

Saved in:
Bibliographic Details
Main Authors Miller, Simon, Wagner, Christian, Aickelin, Uwe, Garibaldi, Jonathan M
Format Journal Article
LanguageEnglish
Published 30.08.2016
Subjects
Online AccessGet full text
DOI10.48550/arxiv.1608.08497

Cover

Abstract An important role carried out by cyber-security experts is the assessment of proposed computer systems, during their design stage. This task is fraught with difficulties and uncertainty, making the knowledge provided by human experts essential for successful assessment. Today, the increasing number of progressively complex systems has led to an urgent need to produce tools that support the expert-led process of system-security assessment. In this research, we use weighted averages (WAs) and ordered weighted averages (OWAs) with evolutionary algorithms (EAs) to create aggregation operators that model parts of the assessment process. We show how individual overall ratings for security components can be produced from ratings of their characteristics, and how these individual overall ratings can be aggregated to produce overall rankings of potential attacks on a system. As well as the identification of salient attacks and weak points in a prospective system, the proposed method also highlights which factors and security components contribute most to a component's difficulty and attack ranking respectively. A real world scenario is used in which experts were asked to rank a set of technical attacks, and to answer a series of questions about the security components that are the subject of the attacks. The work shows how finding good aggregation operators, and identifying important components and factors of a cyber-security problem can be automated. The resulting operators have the potential for use as decision aids for systems designers and cyber-security experts, increasing the amount of assessment that can be achieved with the limited resources available.
AbstractList An important role carried out by cyber-security experts is the assessment of proposed computer systems, during their design stage. This task is fraught with difficulties and uncertainty, making the knowledge provided by human experts essential for successful assessment. Today, the increasing number of progressively complex systems has led to an urgent need to produce tools that support the expert-led process of system-security assessment. In this research, we use weighted averages (WAs) and ordered weighted averages (OWAs) with evolutionary algorithms (EAs) to create aggregation operators that model parts of the assessment process. We show how individual overall ratings for security components can be produced from ratings of their characteristics, and how these individual overall ratings can be aggregated to produce overall rankings of potential attacks on a system. As well as the identification of salient attacks and weak points in a prospective system, the proposed method also highlights which factors and security components contribute most to a component's difficulty and attack ranking respectively. A real world scenario is used in which experts were asked to rank a set of technical attacks, and to answer a series of questions about the security components that are the subject of the attacks. The work shows how finding good aggregation operators, and identifying important components and factors of a cyber-security problem can be automated. The resulting operators have the potential for use as decision aids for systems designers and cyber-security experts, increasing the amount of assessment that can be achieved with the limited resources available.
Author Aickelin, Uwe
Garibaldi, Jonathan M
Wagner, Christian
Miller, Simon
Author_xml – sequence: 1
  givenname: Simon
  surname: Miller
  fullname: Miller, Simon
– sequence: 2
  givenname: Christian
  surname: Wagner
  fullname: Wagner, Christian
– sequence: 3
  givenname: Uwe
  surname: Aickelin
  fullname: Aickelin, Uwe
– sequence: 4
  givenname: Jonathan M
  surname: Garibaldi
  fullname: Garibaldi, Jonathan M
BackLink https://doi.org/10.48550/arXiv.1608.08497$$DView paper in arXiv
BookMark eNrjYmDJy89LZWCQNDTQM7EwNTXQTyyqyCzTMzQzsNAzsDCxNOdkCPfNT0nNycnMS1dwrkxKLdINTk0uLcosqVRwrShILSopVldwSU3OLM7Mz1PwTcwGqQsoyk9OLS5OLVYoLQbxHdPTi1LTE0tASvyBehJL8ouKeRhY0xJzilN5oTQ3g7yba4izhy7YCfEFRZm5iUWV8SCnxIOdYkxYBQBzM0F6
ContentType Journal Article
Copyright http://arxiv.org/licenses/nonexclusive-distrib/1.0
Copyright_xml – notice: http://arxiv.org/licenses/nonexclusive-distrib/1.0
DBID AKY
GOX
DOI 10.48550/arxiv.1608.08497
DatabaseName arXiv Computer Science
arXiv.org
DatabaseTitleList
Database_xml – sequence: 1
  dbid: GOX
  name: arXiv.org
  url: http://arxiv.org/find
  sourceTypes: Open Access Repository
DeliveryMethod fulltext_linktorsrc
ExternalDocumentID 1608_08497
GroupedDBID AKY
GOX
ID FETCH-arxiv_primary_1608_084973
IEDL.DBID GOX
IngestDate Wed Jul 23 00:23:45 EDT 2025
IsDoiOpenAccess true
IsOpenAccess true
IsPeerReviewed false
IsScholarly false
Language English
LinkModel DirectLink
MergedId FETCHMERGED-arxiv_primary_1608_084973
OpenAccessLink https://arxiv.org/abs/1608.08497
ParticipantIDs arxiv_primary_1608_08497
PublicationCentury 2000
PublicationDate 2016-08-30
PublicationDateYYYYMMDD 2016-08-30
PublicationDate_xml – month: 08
  year: 2016
  text: 2016-08-30
  day: 30
PublicationDecade 2010
PublicationYear 2016
Score 3.205043
SecondaryResourceType preprint
Snippet An important role carried out by cyber-security experts is the assessment of proposed computer systems, during their design stage. This task is fraught with...
SourceID arxiv
SourceType Open Access Repository
SubjectTerms Computer Science - Artificial Intelligence
Computer Science - Cryptography and Security
Title Modelling Cyber-Security Experts' Decision Making Processes using Aggregation Operators
URI https://arxiv.org/abs/1608.08497
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwdV09T8MwED21nVgQFaDyfQMSk0Vo_JGMVUupkEoHQGSL7OYSsaAqSRH8e5xLECxd7ZN1Og93z3d-D-CalDGhIS1IZSSksmvhbGaFzTOrIxvmkonnl0968SofE5X0AH__wtjy6_2z5Qd21e2dbkYdIxmbPvTH4wZcPayStjnJVFyd_Z-drzF56V-SmB_Aflfd4aS9jiH06OMQ3hq9Maa-xum3o1I8d5pxyDzDdXWDs07pBpcsDoXd-D5V2MylFzgpPCwuOIi42hC3xqsjuJrfv0wXgl1JNy1vRNp4mbKX4TEMPLqnEWBOzDkfSZVZGbjAEnlUoeN8bbQv5uMTGO065XT31hns-cyu-fEzOIdBXW7pwmfP2l1yCH8A2rF2Gg
linkProvider Cornell University
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Modelling+Cyber-Security+Experts%27+Decision+Making+Processes+using+Aggregation+Operators&rft.au=Miller%2C+Simon&rft.au=Wagner%2C+Christian&rft.au=Aickelin%2C+Uwe&rft.au=Garibaldi%2C+Jonathan+M&rft.date=2016-08-30&rft_id=info:doi/10.48550%2Farxiv.1608.08497&rft.externalDocID=1608_08497