Skip to main content

Cognitive Modeling for Personalized, Adaptive Signaling for Cyber Deception

  • Chapter
  • First Online:
Cyber Deception

Part of the book series: Advances in Information Security ((ADIS,volume 89))

Abstract

This chapter presents an overview of the use of cognitive models for personalized adaptive signaling for cyber deception. It provides a general introduction to cognitive modeling techniques and concepts, including general goals, capabilities and limitations, cognitive architectures, and instance-based learning. It establishes that cognitive models’ reliance on generative mechanisms has predictive capabilities beyond those of purely data-driven techniques such as machine learning that can be used to evaluate the effectiveness of cyber defense techniques without requiring full implementation and test. Cognitive models can account for the entire range of human performance, including levels of expertise and individual differences. Techniques such as knowledge-tracing and model-tracing can align a specific cognitive model against an individual behavior trace, enabling personalized interventions. Because cognitive models are analytically tractable, they can guide, inform, and optimize the design of cyber deception techniques. We illustrate these concepts using an insider attacking game meant to abstract the dynamics and decision-making characteristics of real-world cyber defense. Finally, we conclude by discussing future research directions in the development and application of cognitive models to cyber deception for defense.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 169.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Abbasi, Y.D., Ben-Asher, N., Gonzalez, C., Kar, D., Morrison, D., Sintov, N., Tambe, M.: Know your adversary: insights for a better adversarial behavioral model. In: Proceeding of the 38th Annual Conference of Cognitive Science Society, pp. 1391–1396. Cognitive Science Society, Austin (2016)

    Google Scholar 

  2. Anderson, J.R., Lebiere, C.: The Atomic Components of Thought. Erlbaum, Mahwah (1998). https://doi.org/10.4324/9781315805696

    Book  Google Scholar 

  3. Anderson, J.R., Boyle, C.F., Yost, G.: The geometry tutor. J. Math. Behav. 5, 5–20 (1986)

    Google Scholar 

  4. Anderson, J.R., Corbett, A.T., Koedinger, K., Pelletier, R.: Cognitive tutors: lessons learned. J. Learn. Sci. 4, 167–207 (1995). https://doi.org/10.1207/s15327809jls0402_2

    Article  Google Scholar 

  5. Anderson, J.R., Bothell, D., Byrne, M.D., Douglass, S., Lebiere, C., Qin, Y.: An integrated theory of the mind. Psychol. Rev. 111(4), 1036–1060 (2004). https://doi.org/10.1037/0033-295X.111.4.1036

    Article  Google Scholar 

  6. Battigalli, P.: Rationalization in signaling games: theory and applications. Int. Game Theory Rev. 8(01), 67–93 (2006). https://doi.org/10.2139/ssrn.635244

    Article  MathSciNet  MATH  Google Scholar 

  7. Bondi, E., Oh, H., Xu, H., Fang, F., Dilkina, B., Tambe, M.: To signal or not to signal: exploiting uncertain real-time information in signaling games for security and sustainability. Proc. AAAI Conf. Artif. Intell. 34(02), 1369–1377 (2020). https://doi.org/10.1609/aaai.v34i02.5493

    Article  Google Scholar 

  8. Cho, I.-K., Kreps, D.M.: Signaling games and stable equilibria. Q. J. Econ. 102(2), 179–221 (1987). https://doi.org/10.2307/1885060

    Article  MathSciNet  MATH  Google Scholar 

  9. Cooney, S., Vayanos, P., Nguyen, T.H., Gonzalez, C., Lebiere, C., Cranford, E.A., Tambe, M.: Warning time: optimizing strategic signaling for security against boundedly rational adversaries. In: Proceedings of the 18th International Conference on Autonomous Agents and Multiagent Systems (AAMAS), pp. 1892–1894. IFAAMS, Montreal (2019)

    Google Scholar 

  10. Cooney, S., Wang, K., Bondi, E., Nguyen, T., Vayanos, P., Winetrobe, H., Cranford, E. A., Gonzalez, C., Lebiere, C., Tambe, M.: Learning to signal in the goldilocks zone: improving adversary compliance in security games. In: Proceedings of the Joint European Conference on Machine Learning and Knowledge Discovery in Databases. Wurzburg (2019)

    Google Scholar 

  11. Cranford, E. A., Lebiere, C., Gonzalez, C., Cooney, S., Vayanos, P., Tambe, M.: Learning about cyber deception through simulations: Predictions of human decision making with deceptive signals in Stackelberg Security Games. In: Proceedings of the 40th Annual Conference of the Cognitive Science Society, pp. 258–263. Madison (2018)

    Google Scholar 

  12. Cranford, E. A., Gonzalez, C., Aggarwal, P., Cooney, S., Tambe, M., Lebiere, C.: Towards personalized deceptive signaling for cyber defense using cognitive models. In: Proceedings of the 17th Annual Meeting of the International Conference on Cognitive Modeling. Montreal (2019)

    Google Scholar 

  13. Cranford, E.A., Gonzalez, C., Aggarwal, P., Cooney, S., Tambe, M., Lebiere, C.: Toward personalized deceptive signaling for cyber defense using cognitive models. Top. Cogn. Sci. 12, 992–1011. Wiley-Blackwell (2020). https://doi.org/10.1111/tops.12513

    Article  Google Scholar 

  14. Cranford, E.A., Gonzalez, C., Aggarwal, P., Tambe, M., Lebiere, C.: What attackers know and what they have to lose: framing effects on cyber-attacker decision making. Proc. Hum. Factors Ergon. Soc. Annu. Meet. 64(1), 456–460 (2020). https://doi.org/10.1177/1071181320641102

    Article  Google Scholar 

  15. Cranford, E.A., Gonzalez, C., Aggarwal, P., Tambe, M., Cooney, S., Lebiere, C.: Towards a cognitive theory of cyber deception. Cogn. Sci. 45, e13013, 1–28. Wiley-Blackwell (2021). https://doi.org/10.1111/cogs.13013

    Article  Google Scholar 

  16. Gonzalez, C.: The boundaries of instance-based learning theory for explaining decisions from experience. Prog. Brain Res. 202, 73–98 (2013). https://doi.org/10.1016/B978-0-444-62604-2.00005-8

    Article  Google Scholar 

  17. Gonzalez, C., Dutt, V.: Instance-based learning: integrating decisions from experience in sampling and repeated choice paradigms. Psychol. Rev. 118(4), 523–551 (2011). https://doi.org/10.1037/a0024558

    Article  Google Scholar 

  18. Gonzalez, C., Lebiere, C.: Instance-based cognitive models of decision making. In: Zizzo, D., Courakis, A. (eds.) Transfer of Knowledge in Economic Decision-Making, pp. 148–165. Macmillan, New York (2005)

    Google Scholar 

  19. Gonzalez, C., Lerch, J.F., Lebiere, C.: Instance based learning in dynamic decision making. Cogn. Sci. 27(4), 591–635 (2003). https://doi.org/10.1007/978-3-319-11391-3_6

    Article  Google Scholar 

  20. Gonzalez, C., Ben-Asher, N., Martin, J.M., Dutt, V.: A cognitive model of dynamic cooperation with varied inter-dependency information. Cogn. Sci. 39(3), 457–495 (2015). https://doi.org/10.1111/cogs.12170

    Article  Google Scholar 

  21. Juvina, I., Saleem, M., Martin, J.M., Gonzalez, C., Lebiere, C.: Reciprocal trust mediates deep transfer of learning between games of strategic interaction. Organ. Behav. Hum. Decis. Process. 120(2), 206–215 (2013). https://doi.org/10.1016/j.obhdp.2012.09.004

    Article  Google Scholar 

  22. Kiekintveld, C., Lisy, V., Pibil, R.: Game-theoretic foundations for the strategic use of honeypots in network security. In: Jajodia, S., Shakarian, P., Subrahmanian, V., Swarup, V., Wang, C. (eds.) Cyber Warfare, pp. 81–101. Springer, Cham (2015). https://doi.org/10.1007/978-3-319-14039-1_5

    Chapter  Google Scholar 

  23. Lebiere, C.: A blending process for aggregate retrievals. In: Proceedings of the 6th ACT-R Workshop. George Mason University, Fairfax (1999)

    Google Scholar 

  24. Lebiere, C., Wallach, D., West, R. L.: A memory-based account of the prisoner’s dilemma and other 2 × 2 games. In: Proceedings of the Third International Conference on Cognitive Modeling, pp. 185–193. Groningen (2000)

    Google Scholar 

  25. Lebiere, C., Gonzalez, C., Martin, M.: Instance-based decision making model of repeated binary choice. In: Proceedings of the Eighth International Conference on Cognitive Modeling, pp. 67–72. Ann Harbor (2007). https://doi.org/10.1184/R1/6571190.v1

  26. Lebiere, C., Pirolli, P., Thomson, R., Paik, J., Rutledge-Taylor, M., Staszewski, J., Anderson, J.R.: A functional model of sensemaking in a neurocognitive architecture. Comput. Intell. Neurosci. 2013, 921695 (2013). https://doi.org/10.1155/2013/921695

    Article  Google Scholar 

  27. Mokkonen, M., Lindstedt, C.: The evolutionary ecology of deception. Biol. Rev. 91(4), 1020–1035 (2016). https://doi.org/10.1111/brv.12208

    Article  Google Scholar 

  28. Pita, J., Jain, M., Ordónez, F., Portway, C., Tambe, M., Western, C., Kraus, S.: ARMOR security for Los Angeles International Airport. In: Proceeding of the Twenty-Third AAAI Conference on Artificial Intelligence, pp. 1884–1885. Chicago (2008)

    Google Scholar 

  29. Pita, J., Jain, M., Ordóñez, F., Tambe, M., Kraus, S., Magori, R.: Effective solutions for real-world Stackelberg games: when agents must deal with human uncertainties. In: Proceedings of 8th International Conference on Autonomous Agents and Multiagent Systems (AAMAS) (2009)

    Google Scholar 

  30. Rowe, N.C., Rrushi, J.: Introduction to Cyberdeception. Springer, Cham (2016). https://doi.org/10.1007/978-3-319-41187-3

    Book  Google Scholar 

  31. Sanner, S., Anderson, J.R., Lebiere, C., Lovett, M.C.: Achieving efficient and cognitively plausible learning in backgammon. In: Proceedings of the Seventeenth International Conference on Machine Learning. Morgan Kaufmann, San Francisco (2000). https://doi.org/10.1184/R1/6613298.v1

    Chapter  Google Scholar 

  32. Schlenker, A., Thakoor, O., Xu, H., Fang, F., Tambe, M., Tran-Thanh, L., Vayanos, P., Vorobeychik, Y.: Deceiving cyber adversaries: a game theoretic approach. In: Proceedings of the 17th AAMAS (IFAAMAS), pp. 892–900. Stockholm (2018)

    Google Scholar 

  33. Shieh, E., An, B., Yang, R., Tambe, M., Baldwin, C., Meyer, G.: PROTECT: a deployed game theoretic system to protect the ports of the United States. In: Proceedings of the 11th International Conference on Autonomous Agents and Multiagent Systems (AAMAS), pp. 13–20. Valencia (2012)

    Google Scholar 

  34. Simon, H.A.: Rational choice and the structure of the environment. Psychol. Rev. 63(2), 129–138 (1956). https://doi.org/10.1037/h0042769

    Article  Google Scholar 

  35. Sinha, A., Fang, F., An, B., Kiekintveld, C., Tambe, M.: Stackelberg security games: looking beyond a decade of success. In: Proceedings of the 27th International Joint Conference on Artificial Intelligence, pp. 5494–5501. Stockholm (2018). https://doi.org/10.24963/ijcai.2018/775

  36. Tambe, M.: Security and Game Theory: Algorithms, Deployed Systems, Lessons Learned. Cambridge University Press, Cambridge (2011). https://doi.org/10.1017/CBO9780511973031

    Book  MATH  Google Scholar 

  37. Tesauro, G.: Connectionist learning of expert backgammon evaluations. In: Proceedings of the Fifth International Conference on Machine Learning, pp. 200–206. University of Michigan, Ann Arbor (1988). https://doi.org/10.1016/B978-0-934613-64-4.50026-8

    Chapter  Google Scholar 

  38. Thomson, R., Lebiere, C., Bennati, S.: Human, model, and machine: a complementary approach to big data. In: Association for Computing Machinery Proceedings of the IARPA Workshop on Human Centered Big Data Research, pp. 27–31. Raleigh (2014). https://doi.org/10.1145/2609876.2609883

  39. Thomson, R., Cranford, E.A., Lebiere, C.: Achieving active cybersecurity through agent-based cognitive models for detection and defense. In: Proceedings of the 1st International Conference on Autonomous Intelligent Cyber-defence Agents (AICA 2021) (2021)

    Google Scholar 

  40. West, R.L., Lebiere, C.: Simple games as dynamic, coupled systems: randomness and other emergent properties. J Cogn Syst Res. 1(4), 221–239 (2001). https://doi.org/10.1016/S1389-0417(00)00014-0

    Article  Google Scholar 

  41. Xu, H., Rabinovich, Z., Dughmi, S., Tambe, M.: Exploring information asymmetry in two-stage security games. In: Proceedings of the National Conference on Artificial Intelligence, pp. 1057–1063. Austin (2015)

    Google Scholar 

Download references

Acknowledgments

This research was sponsored by the Army Research Office and accomplished under MURI Grant Number W911NF-17-1-0370.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Christian Lebiere .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2023 This is a U.S. government work and not under copyright protection in the U.S.; foreign copyright protection may apply

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Lebiere, C., Cranford, E.A., Aggarwal, P., Cooney, S., Tambe, M., Gonzalez, C. (2023). Cognitive Modeling for Personalized, Adaptive Signaling for Cyber Deception. In: Bao, T., Tambe, M., Wang, C. (eds) Cyber Deception. Advances in Information Security, vol 89. Springer, Cham. https://doi.org/10.1007/978-3-031-16613-6_4

Download citation

  • DOI: https://doi.org/10.1007/978-3-031-16613-6_4

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-031-16612-9

  • Online ISBN: 978-3-031-16613-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics