
Research Article
Cybersecurity Methodology for Specialized Behavior Analysis
@INPROCEEDINGS{10.1007/978-3-030-68734-2_14, author={Edgar Padilla and Jaime C. Acosta and Christopher D. Kiekintveld}, title={Cybersecurity Methodology for Specialized Behavior Analysis}, proceedings={Digital Forensics and Cyber Crime. 11th EAI International Conference, ICDF2C 2020, Boston, MA, USA, October 15-16, 2020, Proceedings}, proceedings_a={ICDF2C}, year={2021}, month={2}, keywords={Cybersecurity Attacker profiling Methodology}, doi={10.1007/978-3-030-68734-2_14} }
- Edgar Padilla
Jaime C. Acosta
Christopher D. Kiekintveld
Year: 2021
Cybersecurity Methodology for Specialized Behavior Analysis
ICDF2C
Springer
DOI: 10.1007/978-3-030-68734-2_14
Abstract
Analyzing attacker behavior and generating realistic models to accurately capture the realities of cybersecurity threats is a very challenging task for researchers. Psychological personality and profiling studies provide a broad understanding of personality traits, but lack a level of interactive immersion that enables observers to collect concrete cybersecurity-relevant behavioral data. Participant’s intricate actions and interactions with real computer systems are seldom captured in any cybersecurity studies. Our work focuses on capturing human actions and decisions to provide an empirical basis for these types of models. We provide a practical methodology that helps bridge the gap between theory and practice by facilitating construction, experimentation, and data collection for repeatable and scalable human experimentation with realistic cybersecurity scenarios. While our methodology is platform agnostic, we describe state of the art technologies that may be used to satisfy the objectives of each of the stages of the methodology.