This paper models interactions in the cyber environment as a three-way security game between attacker, defender, and user. The paper focuses on understanding and modeling the roles, motivations and conflicting objectives of the players. Unlike most research in cyber security, this paper studies not only technological but also psychosocial aspects of the interactions. The paper develops recommendations for selecting games that have relevant features for representing cyber security interactions and outlines directions for future research.
Keywords
- Nash Equilibrium
- Security Policy
- Intrusion Detection System
- Successful Attack
- Social Reward
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.