Abstract
This chapter presents an overview of the use of cognitive models for personalized adaptive signaling for cyber deception. It provides a general introduction to cognitive modeling techniques and concepts, including general goals, capabilities and limitations, cognitive architectures, and instance-based learning. It establishes that cognitive models’ reliance on generative mechanisms has predictive capabilities beyond those of purely data-driven techniques such as machine learning that can be used to evaluate the effectiveness of cyber defense techniques without requiring full implementation and test. Cognitive models can account for the entire range of human performance, including levels of expertise and individual differences. Techniques such as knowledge-tracing and model-tracing can align a specific cognitive model against an individual behavior trace, enabling personalized interventions. Because cognitive models are analytically tractable, they can guide, inform, and optimize the design of cyber deception techniques. We illustrate these concepts using an insider attacking game meant to abstract the dynamics and decision-making characteristics of real-world cyber defense. Finally, we conclude by discussing future research directions in the development and application of cognitive models to cyber deception for defense.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Abbasi, Y.D., Ben-Asher, N., Gonzalez, C., Kar, D., Morrison, D., Sintov, N., Tambe, M.: Know your adversary: insights for a better adversarial behavioral model. In: Proceeding of the 38th Annual Conference of Cognitive Science Society, pp. 1391–1396. Cognitive Science Society, Austin (2016)
Anderson, J.R., Lebiere, C.: The Atomic Components of Thought. Erlbaum, Mahwah (1998). https://doi.org/10.4324/9781315805696
Anderson, J.R., Boyle, C.F., Yost, G.: The geometry tutor. J. Math. Behav. 5, 5–20 (1986)
Anderson, J.R., Corbett, A.T., Koedinger, K., Pelletier, R.: Cognitive tutors: lessons learned. J. Learn. Sci. 4, 167–207 (1995). https://doi.org/10.1207/s15327809jls0402_2
Anderson, J.R., Bothell, D., Byrne, M.D., Douglass, S., Lebiere, C., Qin, Y.: An integrated theory of the mind. Psychol. Rev. 111(4), 1036–1060 (2004). https://doi.org/10.1037/0033-295X.111.4.1036
Battigalli, P.: Rationalization in signaling games: theory and applications. Int. Game Theory Rev. 8(01), 67–93 (2006). https://doi.org/10.2139/ssrn.635244
Bondi, E., Oh, H., Xu, H., Fang, F., Dilkina, B., Tambe, M.: To signal or not to signal: exploiting uncertain real-time information in signaling games for security and sustainability. Proc. AAAI Conf. Artif. Intell. 34(02), 1369–1377 (2020). https://doi.org/10.1609/aaai.v34i02.5493
Cho, I.-K., Kreps, D.M.: Signaling games and stable equilibria. Q. J. Econ. 102(2), 179–221 (1987). https://doi.org/10.2307/1885060
Cooney, S., Vayanos, P., Nguyen, T.H., Gonzalez, C., Lebiere, C., Cranford, E.A., Tambe, M.: Warning time: optimizing strategic signaling for security against boundedly rational adversaries. In: Proceedings of the 18th International Conference on Autonomous Agents and Multiagent Systems (AAMAS), pp. 1892–1894. IFAAMS, Montreal (2019)
Cooney, S., Wang, K., Bondi, E., Nguyen, T., Vayanos, P., Winetrobe, H., Cranford, E. A., Gonzalez, C., Lebiere, C., Tambe, M.: Learning to signal in the goldilocks zone: improving adversary compliance in security games. In: Proceedings of the Joint European Conference on Machine Learning and Knowledge Discovery in Databases. Wurzburg (2019)
Cranford, E. A., Lebiere, C., Gonzalez, C., Cooney, S., Vayanos, P., Tambe, M.: Learning about cyber deception through simulations: Predictions of human decision making with deceptive signals in Stackelberg Security Games. In: Proceedings of the 40th Annual Conference of the Cognitive Science Society, pp. 258–263. Madison (2018)
Cranford, E. A., Gonzalez, C., Aggarwal, P., Cooney, S., Tambe, M., Lebiere, C.: Towards personalized deceptive signaling for cyber defense using cognitive models. In: Proceedings of the 17th Annual Meeting of the International Conference on Cognitive Modeling. Montreal (2019)
Cranford, E.A., Gonzalez, C., Aggarwal, P., Cooney, S., Tambe, M., Lebiere, C.: Toward personalized deceptive signaling for cyber defense using cognitive models. Top. Cogn. Sci. 12, 992–1011. Wiley-Blackwell (2020). https://doi.org/10.1111/tops.12513
Cranford, E.A., Gonzalez, C., Aggarwal, P., Tambe, M., Lebiere, C.: What attackers know and what they have to lose: framing effects on cyber-attacker decision making. Proc. Hum. Factors Ergon. Soc. Annu. Meet. 64(1), 456–460 (2020). https://doi.org/10.1177/1071181320641102
Cranford, E.A., Gonzalez, C., Aggarwal, P., Tambe, M., Cooney, S., Lebiere, C.: Towards a cognitive theory of cyber deception. Cogn. Sci. 45, e13013, 1–28. Wiley-Blackwell (2021). https://doi.org/10.1111/cogs.13013
Gonzalez, C.: The boundaries of instance-based learning theory for explaining decisions from experience. Prog. Brain Res. 202, 73–98 (2013). https://doi.org/10.1016/B978-0-444-62604-2.00005-8
Gonzalez, C., Dutt, V.: Instance-based learning: integrating decisions from experience in sampling and repeated choice paradigms. Psychol. Rev. 118(4), 523–551 (2011). https://doi.org/10.1037/a0024558
Gonzalez, C., Lebiere, C.: Instance-based cognitive models of decision making. In: Zizzo, D., Courakis, A. (eds.) Transfer of Knowledge in Economic Decision-Making, pp. 148–165. Macmillan, New York (2005)
Gonzalez, C., Lerch, J.F., Lebiere, C.: Instance based learning in dynamic decision making. Cogn. Sci. 27(4), 591–635 (2003). https://doi.org/10.1007/978-3-319-11391-3_6
Gonzalez, C., Ben-Asher, N., Martin, J.M., Dutt, V.: A cognitive model of dynamic cooperation with varied inter-dependency information. Cogn. Sci. 39(3), 457–495 (2015). https://doi.org/10.1111/cogs.12170
Juvina, I., Saleem, M., Martin, J.M., Gonzalez, C., Lebiere, C.: Reciprocal trust mediates deep transfer of learning between games of strategic interaction. Organ. Behav. Hum. Decis. Process. 120(2), 206–215 (2013). https://doi.org/10.1016/j.obhdp.2012.09.004
Kiekintveld, C., Lisy, V., Pibil, R.: Game-theoretic foundations for the strategic use of honeypots in network security. In: Jajodia, S., Shakarian, P., Subrahmanian, V., Swarup, V., Wang, C. (eds.) Cyber Warfare, pp. 81–101. Springer, Cham (2015). https://doi.org/10.1007/978-3-319-14039-1_5
Lebiere, C.: A blending process for aggregate retrievals. In: Proceedings of the 6th ACT-R Workshop. George Mason University, Fairfax (1999)
Lebiere, C., Wallach, D., West, R. L.: A memory-based account of the prisoner’s dilemma and other 2 × 2 games. In: Proceedings of the Third International Conference on Cognitive Modeling, pp. 185–193. Groningen (2000)
Lebiere, C., Gonzalez, C., Martin, M.: Instance-based decision making model of repeated binary choice. In: Proceedings of the Eighth International Conference on Cognitive Modeling, pp. 67–72. Ann Harbor (2007). https://doi.org/10.1184/R1/6571190.v1
Lebiere, C., Pirolli, P., Thomson, R., Paik, J., Rutledge-Taylor, M., Staszewski, J., Anderson, J.R.: A functional model of sensemaking in a neurocognitive architecture. Comput. Intell. Neurosci. 2013, 921695 (2013). https://doi.org/10.1155/2013/921695
Mokkonen, M., Lindstedt, C.: The evolutionary ecology of deception. Biol. Rev. 91(4), 1020–1035 (2016). https://doi.org/10.1111/brv.12208
Pita, J., Jain, M., Ordónez, F., Portway, C., Tambe, M., Western, C., Kraus, S.: ARMOR security for Los Angeles International Airport. In: Proceeding of the Twenty-Third AAAI Conference on Artificial Intelligence, pp. 1884–1885. Chicago (2008)
Pita, J., Jain, M., Ordóñez, F., Tambe, M., Kraus, S., Magori, R.: Effective solutions for real-world Stackelberg games: when agents must deal with human uncertainties. In: Proceedings of 8th International Conference on Autonomous Agents and Multiagent Systems (AAMAS) (2009)
Rowe, N.C., Rrushi, J.: Introduction to Cyberdeception. Springer, Cham (2016). https://doi.org/10.1007/978-3-319-41187-3
Sanner, S., Anderson, J.R., Lebiere, C., Lovett, M.C.: Achieving efficient and cognitively plausible learning in backgammon. In: Proceedings of the Seventeenth International Conference on Machine Learning. Morgan Kaufmann, San Francisco (2000). https://doi.org/10.1184/R1/6613298.v1
Schlenker, A., Thakoor, O., Xu, H., Fang, F., Tambe, M., Tran-Thanh, L., Vayanos, P., Vorobeychik, Y.: Deceiving cyber adversaries: a game theoretic approach. In: Proceedings of the 17th AAMAS (IFAAMAS), pp. 892–900. Stockholm (2018)
Shieh, E., An, B., Yang, R., Tambe, M., Baldwin, C., Meyer, G.: PROTECT: a deployed game theoretic system to protect the ports of the United States. In: Proceedings of the 11th International Conference on Autonomous Agents and Multiagent Systems (AAMAS), pp. 13–20. Valencia (2012)
Simon, H.A.: Rational choice and the structure of the environment. Psychol. Rev. 63(2), 129–138 (1956). https://doi.org/10.1037/h0042769
Sinha, A., Fang, F., An, B., Kiekintveld, C., Tambe, M.: Stackelberg security games: looking beyond a decade of success. In: Proceedings of the 27th International Joint Conference on Artificial Intelligence, pp. 5494–5501. Stockholm (2018). https://doi.org/10.24963/ijcai.2018/775
Tambe, M.: Security and Game Theory: Algorithms, Deployed Systems, Lessons Learned. Cambridge University Press, Cambridge (2011). https://doi.org/10.1017/CBO9780511973031
Tesauro, G.: Connectionist learning of expert backgammon evaluations. In: Proceedings of the Fifth International Conference on Machine Learning, pp. 200–206. University of Michigan, Ann Arbor (1988). https://doi.org/10.1016/B978-0-934613-64-4.50026-8
Thomson, R., Lebiere, C., Bennati, S.: Human, model, and machine: a complementary approach to big data. In: Association for Computing Machinery Proceedings of the IARPA Workshop on Human Centered Big Data Research, pp. 27–31. Raleigh (2014). https://doi.org/10.1145/2609876.2609883
Thomson, R., Cranford, E.A., Lebiere, C.: Achieving active cybersecurity through agent-based cognitive models for detection and defense. In: Proceedings of the 1st International Conference on Autonomous Intelligent Cyber-defence Agents (AICA 2021) (2021)
West, R.L., Lebiere, C.: Simple games as dynamic, coupled systems: randomness and other emergent properties. J Cogn Syst Res. 1(4), 221–239 (2001). https://doi.org/10.1016/S1389-0417(00)00014-0
Xu, H., Rabinovich, Z., Dughmi, S., Tambe, M.: Exploring information asymmetry in two-stage security games. In: Proceedings of the National Conference on Artificial Intelligence, pp. 1057–1063. Austin (2015)
Acknowledgments
This research was sponsored by the Army Research Office and accomplished under MURI Grant Number W911NF-17-1-0370.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2023 This is a U.S. government work and not under copyright protection in the U.S.; foreign copyright protection may apply
About this chapter
Cite this chapter
Lebiere, C., Cranford, E.A., Aggarwal, P., Cooney, S., Tambe, M., Gonzalez, C. (2023). Cognitive Modeling for Personalized, Adaptive Signaling for Cyber Deception. In: Bao, T., Tambe, M., Wang, C. (eds) Cyber Deception. Advances in Information Security, vol 89. Springer, Cham. https://doi.org/10.1007/978-3-031-16613-6_4
Download citation
DOI: https://doi.org/10.1007/978-3-031-16613-6_4
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-16612-9
Online ISBN: 978-3-031-16613-6
eBook Packages: Computer ScienceComputer Science (R0)