About | Contact Us | Register | Login
ProceedingsSeriesJournalsSearchEAI
Digital Forensics and Cyber Crime. 11th EAI International Conference, ICDF2C 2020, Boston, MA, USA, October 15-16, 2020, Proceedings

Research Article

Cybersecurity Methodology for Specialized Behavior Analysis

Download(Requires a free EAI acccount)
Cite
BibTeX Plain Text
  • @INPROCEEDINGS{10.1007/978-3-030-68734-2_14,
        author={Edgar Padilla and Jaime C. Acosta and Christopher D. Kiekintveld},
        title={Cybersecurity Methodology for Specialized Behavior Analysis},
        proceedings={Digital Forensics and Cyber Crime. 11th EAI International Conference, ICDF2C 2020, Boston, MA, USA, October 15-16, 2020, Proceedings},
        proceedings_a={ICDF2C},
        year={2021},
        month={2},
        keywords={Cybersecurity Attacker profiling Methodology},
        doi={10.1007/978-3-030-68734-2_14}
    }
    
  • Edgar Padilla
    Jaime C. Acosta
    Christopher D. Kiekintveld
    Year: 2021
    Cybersecurity Methodology for Specialized Behavior Analysis
    ICDF2C
    Springer
    DOI: 10.1007/978-3-030-68734-2_14
Edgar Padilla1,*, Jaime C. Acosta2, Christopher D. Kiekintveld1
  • 1: The University of Texas at El Paso, El Paso
  • 2: CCDC Army Research Laboratory, Adelphi
*Contact email: e-padilla@live.com

Abstract

Analyzing attacker behavior and generating realistic models to accurately capture the realities of cybersecurity threats is a very challenging task for researchers. Psychological personality and profiling studies provide a broad understanding of personality traits, but lack a level of interactive immersion that enables observers to collect concrete cybersecurity-relevant behavioral data. Participant’s intricate actions and interactions with real computer systems are seldom captured in any cybersecurity studies. Our work focuses on capturing human actions and decisions to provide an empirical basis for these types of models. We provide a practical methodology that helps bridge the gap between theory and practice by facilitating construction, experimentation, and data collection for repeatable and scalable human experimentation with realistic cybersecurity scenarios. While our methodology is platform agnostic, we describe state of the art technologies that may be used to satisfy the objectives of each of the stages of the methodology.

Keywords
Cybersecurity Attacker profiling Methodology
Published
2021-02-07
Appears in
SpringerLink
http://dx.doi.org/10.1007/978-3-030-68734-2_14
Copyright © 2020–2025 ICST
EBSCOProQuestDBLPDOAJPortico
EAI Logo

About EAI

  • Who We Are
  • Leadership
  • Research Areas
  • Partners
  • Media Center

Community

  • Membership
  • Conference
  • Recognition
  • Sponsor Us

Publish with EAI

  • Publishing
  • Journals
  • Proceedings
  • Books
  • EUDL