Skip to main content

Crowdsourced Cyber Defense: Lessons from a Large-Scale, Game-Based Approach to Threat Identification on a Live Network

  • Conference paper
Social Computing, Behavioral - Cultural Modeling and Prediction (SBP 2012)

Abstract

Today, the responsibility for U.S. cyber defense is divided asymmetrically between a large population of cyber-naïve end-users and a small cadre of cyber-savvy security experts in government and the private sector. We foresee the rise of “Cyber Civil Defense” driven by the perception of vulnerabilities in our present over-reliance on professionals and propelled by two additional factors: crowdsourced cyber offense and crowdsourced innovation. To explore crowdsourcing cyber defense, we developed an online game called Flux Hunter and deployed the game on a large-scale live network at APL, attracting over 700 players. In this paper, we discuss the concept of crowdsourced cyber defense, describe our online game, present our results, and analyze the performance and behaviors of players individually and collectively, looking for the “wisdom of crowds”.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Owens, W.A., Dam, K.W., Lin, H.S. (eds.): Technology, Policy, Law, and Ethics Regarding U.S. Acquisition and Use of Cyberattack Capabilities. The National Academies Press, Washington, D.C (2009)

    Google Scholar 

  2. Clayton, M.: How pro-WikiLeaks hackers wage cyberwar without hijacking your computer, http://www.csmonitor.com/USA/2010/1209/How-pro-WikiLeaks-hackers-wage-cyberwar-without-hijacking-your-computer

  3. Military and security developments involving the People’s Republic of China, Office of the Secretary of Defense Annual Report to Congress (2010)

    Google Scholar 

  4. Carpenter, J.: May the best analyst win. Science 331, 698–699 (2011)

    Article  Google Scholar 

  5. Surowiecki, J.: The Wisdom of Crowds: Why the Many Are Smarter than the Few and How Collective Wisdom Shapes Business, Economies, Societies, and Nations. Doubleday Books, New York (2004)

    Google Scholar 

  6. Honeynet Project, Know Your Enemy: Fast-Flux Service Networks, http://www.honeynet.org/papers/ff/

  7. von Ahn, L.: Games with a purpose. Computer 39, 92–94 (2006)

    Article  Google Scholar 

  8. Khatib, F., Cooper, S., Tyka, M.D., Xu, K., Makedon, I., Popovic, Z., Baker, D., Players, F.: Algorithm discovery by protein folding game players. PNAS (2011), http://www.pnas.org/content/early/2011/11/02/1115898108

  9. Fink, E., Sharifi, M., Carbonell, J.G.: Application of machine learning and crowdsourcing to detection of cybersecurity threats, white paper. Carnegie-Mellon University (2011), http://www.cs.cmu.edu/afs/.cs.cmu.edu/Web/People/eugene/research/full/ml-detection.pdf

  10. Hollis, D., Hollis, K.: Cyber defense: U.S. cybersecurity must-do’s. Armed Forces J. 148, 16–19 (2011)

    Google Scholar 

  11. Chen, K.Y., Fine, L.R., Huberman, B.A.: Predicting the future. Inform. Sys. Frontiers 5, 47–61 (2003)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Paulhamus, B., Ebaugh, A., Boylls, C.C., Bos, N., Hider, S., Giguere, S. (2012). Crowdsourced Cyber Defense: Lessons from a Large-Scale, Game-Based Approach to Threat Identification on a Live Network. In: Yang, S.J., Greenberg, A.M., Endsley, M. (eds) Social Computing, Behavioral - Cultural Modeling and Prediction. SBP 2012. Lecture Notes in Computer Science, vol 7227. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-29047-3_5

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-29047-3_5

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-29046-6

  • Online ISBN: 978-3-642-29047-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics