The Role of Human Operators' Suspicion in the Detection of Cyber Attacks

Author:

Hirshfield Leanne1,Bobko Philip2,Barelka Alex J.3,Costa Mark R.1,Funke Gregory J.4,Mancuso Vincent F.5,Finomore Victor4,Knott Benjamin A.6

Affiliation:

1. Syracuse University, Syracuse, NY, USA

2. Gettysburg College, Gettysburg, PA, USA

3. Illinois State University, Normal, IL, USA

4. Air Force Research Laboratory, Wright-Patterson Air Force Base, OH, USA

5. MIT Lincoln Laboratory, Lexington, MA, USA

6. Air Force Office of Scientific Research, Arlington, VA, USA

Abstract

Despite the importance that human error in the cyber domain has had in recent reports, cyber warfare research to date has largely focused on the effects of cyber attacks on the target computer system. In contrast, there is little empirical work on the role of human operators during cyber breaches. More specifically, there is a need to understand the human-level factors at play when attacks occur. This paper views cyber attacks through the lens of suspicion, a construct that has been used in other contexts, but inadequately defined, in prior research. After defining the construct of suspicion, the authors demonstrate the role that suspicion plays as the conduit between computer operators' normal working behaviors and their ability to alter that behavior to detect and react to cyber attacks. With a focus on the user, rather than the target computer, the authors empirically develop a latent structure for a variety of types of cyber attacks, link that structure to levels of operator suspicion, link suspicion to users' cognitive and emotional states, and develop initial implications for cyber training.

Publisher

IGI Global

Subject

Information Systems and Management,Computer Networks and Communications,Hardware and Architecture,Safety Research,Safety, Risk, Reliability and Quality,Software

Cited by 7 articles. 订阅此论文施引文献 订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献

1. Understanding the Last Line of Defense: Human Response to Cybersecurity Events;HCI for Cybersecurity, Privacy and Trust;2021

2. Cyber attacks on hospitality sector: stock market reaction;Journal of Hospitality and Tourism Technology;2020-06-25

3. Toward Interfaces that Help Users Identify Misinformation Online: Using fNIRS to Measure Suspicion;Augmented Human Research;2019-02-08

4. How E-Learning Can Facilitate Information Security Awareness;Learning and Collaboration Technologies. Designing Learning Experiences;2019

5. When actions speak louder than words: Using changes in operator behavior and system efficiency measures to detect the presence of a cyber attack;Proceedings of the Human Factors and Ergonomics Society Annual Meeting;2018-09

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3