Academia.eduAcademia.edu

Outline

Agent-based modeling of user circumvention of security

2014, Proceedings of the 1st International Workshop on Agents and CyberSecurity

https://doi.org/10.1145/2602945.2602948

Abstract

Security subsystems are often designed with flawed assumptions arising from system designers' faulty mental models. Designers tend to assume that users behave according to some textbook ideal, and to consider each potential exposure/interface in isolation. However, fieldwork continually shows that even well-intentioned users often depart from this ideal and circumvent controls in order to perform daily work tasks, and that "incorrect" user behaviors can create unexpected links between otherwise "independent" interfaces. When it comes to security features and parameters, designers try to find the choices that optimize security utilityexcept these flawed assumptions give rise to an incorrect curve, and lead to choices that actually make security worse, in practice. We propose that improving this situation requires giving designers more accurate models of real user behavior and how it influences aggregate system security. Agentbased modeling can be a fruitful first step here. In this paper, we study a particular instance of this problem, propose user-centric techniques designed to strengthen the security of systems while simultaneously improving the usability of them, and propose further directions of inquiry.

References (22)

  1. REFERENCES
  2. Anne Adams and Martina Angela Sasse. Users are Not the Enemy. Communications of the ACM, 42(12):40-46, 1999.
  3. Adam Beautement, M Angela Sasse, and Mike Wonham. The Compliance Budget: Managing Security Behaviour in Organisations. In Proceedings of the 2008 Workshop on New Security Paradigms, pages 47-58. ACM, 2009.
  4. Jim Blythe. A Dual-Process Cognitive Model for Testing Resilient Control Systems. In Resilient Control Systems (ISRCS), pages 8-12. IEEE, 2012.
  5. Jim Blythe, Ross Koppel, and Sean W Smith. Circumvention of Security: Good Users Do Bad Things. Security & Privacy, IEEE, 11(5):80-83, 2013.
  6. S. Brostoff and M.A. Sasse. Ten Strikes and You're Out: Increasing the Number of Login Attempts Can Improve Password Usability. In Proceedings of CHI 2003 Workshop on HCI and Security Systems, 2003.
  7. R. Dhamija and A. Perrig. Deja Vu: A User Study Using Images for Authentication. In Proceedings of the 9th USENIX Security Symposium, 2000.
  8. Dinei Florencio and Cormac Herley. A Large-Scale Study of Web Password Habits. In International Conference on World Wide Web, pages 657-666. ACM, 2007.
  9. Shirley Gaw and Edward W Felten. Password Management Strategies for Online Accounts. In Symposium on Usable Privacy and Security, pages 44-55. ACM, 2006.
  10. Richard Hazlett. Measurement of user frustration: A biologic approach. In CHI'03 extended abstracts on Human factors in computing systems, pages 734-735. ACM, 2003.
  11. Ashish Kapoor, Winslow Burleson, and Rosalind W Picard. Automatic prediction of frustration. International Journal of Human-Computer Studies, 65(8):724-736, 2007.
  12. Jonathan Klein, Youngme Moon, and Rosalind W. Picard. This computer responds to user frustration:: Theory, design, and results. Interacting with computers, 14(2):119-140, 2002.
  13. Masahiro Mori. The uncanny valley. Energy, 7(4), 1970.
  14. Carson Reynolds. The Sensing and Measurement of Frustration with Computers. PhD thesis, MIT, 2001.
  15. Shannon Riley. Password Security: What Users Know and What They Actually Do. Usability News, 8(1), 2006.
  16. Horst Rittel and Melvin Webber. Dilemmas in a General Theory of Planning. Policy sciences, 4(2):155-169, 1973.
  17. Stuart Schechter, AJ Bernheim Brush, and Serge Egelman. It's No Secret. Measuring the Security and Reliability of Authentication via ?Secret? Questions. In IEEE Symposium on Security and Privacy. IEEE, 2009.
  18. Stuart E Schechter, Rachna Dhamija, Andy Ozment, and Ian Fischer. The Emperor's New Security Indicators. In Security and Privacy, 2007. SP'07. IEEE Symposium on, pages 51-65. IEEE, 2007.
  19. S. Sinclair and S.W. Smith. Preventative Directions for Insider Threat Mitigation via Access Control. In S. Stolfo et al., editors, Insider Attack and Cyber Security: Beyond the Hacker, pages 173-202. Springer-Verlag Advances in Information Security 39, 2008.
  20. S. Sinclair and S.W. Smith. What's Wrong with Access Control in the Real World? IEEE Security and Privacy, 8(4):74-77, July/August 2010.
  21. S. Sinclair, S.W. Smith, S. Trudeau, M.E. Johnson, and A. Portera. Information Risk in Financial Institutions: Field Study and Research Roadmap. In International Workshop on Enterprise Applications and Services in the Finance Industry (FinanceCom), 2008.
  22. Marc Spraragen. Modeling the effects of emotion on cognition. In Proc. AAAI, 2012.