15
Agent-based simulation of cognitive styles in a security game Alan Nochenson IST 511 10/14/2012

10-15 research project preview

Embed Size (px)

Citation preview

Page 1: 10-15 research project preview

Agent-based simulation of cognitive styles in a security game

Alan NochensonIST 51110/14/2012

Page 2: 10-15 research project preview

What are security games?

Goal: Model human behavior in a variety of security scenarios

Background: Taken from economic and public goods literature (Varian 2004, Hirshleifer 1983)

Examples: weakest link, total effort, colonel blotto, interdependent network security

Page 3: 10-15 research project preview

State of the art

Mathematically model and analyze the scenarios

Create new models that take into account more factors, different factors, different methods, different contexts, etc.

Page 4: 10-15 research project preview

Limits of current approaches

Arbitrary what factors are included Usually not based on any cognitive

research The very few lab studies have

rejected predicted outcomes

Page 5: 10-15 research project preview

New approach

Use agent-based simulation to model complex scenarios

Create cognitive models for agents Have them interact and see what

behavior occurs

Page 6: 10-15 research project preview

Why will it work and why should anyone care?

Based on cognitive science (engineering)

Preliminary results are promising (Nochenson and Heimann, GameSec 2012)

Can analyze scenarios that are too difficult to mathematically formulate

Can test simulated results against existing models, and against lab studies (ongoing)

Page 7: 10-15 research project preview

What difference will it make? Risks

Too hard to make a generic framework for simulation (already exists) and cognitive behaviors (need to adapt from cog sci engineering)

Too many things to try (need to limit scope) Experimenter bias (need to be careful)

Payoffs Test existing models Integrate cognitive science engineering and

security economics

Page 8: 10-15 research project preview

What difference will it make?

Resources Lab computer to run simulations

Time To investigate and codify various

behaviors To write the code (generic framework

and individual agents) To simulate a reasonable number of

rounds

Page 9: 10-15 research project preview

Metrics for success

Observing interesting behavior and finding psychological theory to explain the behavior

Creating an extendable framework Validate of reject conclusions of

existing models (and inform revisions)

Page 10: 10-15 research project preview

Questions?

Page 11: 10-15 research project preview

Supplementary slides

Page 12: 10-15 research project preview

Weakest link game

players are vulnerable to a security threat

Multiple rounds. Each round some probability of an

attack If attack successful, all agents incur

a loss Losses are not the same for each

agent Agents can by self-protection and

self-insurance

Page 13: 10-15 research project preview

Potential outcomes from a round

1. No attack occurs, and no one loses anything

2. An attack occurs and:a) Is blocked because of self-protection of

everyoneb) Is not blocked

Page 14: 10-15 research project preview

Ideally, what happens? (Nash equilibria)

Everyone protections with some effort and does not insure, or…

Everyone fully insures and does not protect

Page 15: 10-15 research project preview

Observed results

Equilibria are not reached, even in a large number of rounds

Hyp: There are a number of cognitive factors that influence convergence