Agent-Based Modelling of O ensive Actors in Cyberspace

dc.contributor.advisorHodges, D
dc.contributor.advisorBuckley, O
dc.contributor.authorSidorenko, Tatjana
dc.date.accessioned2023-05-31T09:16:48Z
dc.date.available2023-05-31T09:16:48Z
dc.date.issued2021-12
dc.description© Cran eld University 2021. All rights reserved. No part of this publication may be reproduced without the written permission of the copyright owner.en_UK
dc.description.abstractWith the rise of the Information Age, there has also been a growing rate of attacks targeting information. In order to better defend against these attacks being able to understand attackers and simulate their behaviour is of utmost importance. A recent approach of using serious games provides an avenue to explore o ensive cyber attacks in a safe and fun environment. There exists a wide range of cyber attackers, with varying levels of expertise whose motivations are di erent. This project provides a novel contribution in using games to allow people to role play as malicious attackers and then using these games as inputs into the simulation. A board game has been designed that emulates a cyber environment, where players represent o ensive actors, with seven roles - Cyber Mercenary (low and high capability), State-backed (low and high capability), Script Kiddy, Hacktivist and Counter-culture (not motivated by nances or ideology). The facilitator or the Games Master (GM) represents the organisation under attack, and players use the Technique cards to perform attacks on the organisation, all cards are sourced from existing Tools, Techniques and Procedures (TTPs). Along with the game, players also provided responses to a questionnaire, that encapsulated three individual dif ferences: Sneider's self-report, DOSPERT and Barratt's Impulsiveness scale. There was a total of 15 players participating in 13 games, and three key groups of individual di erences players. No correlation was identi ed with the individual Technique card pick rate and role. However, the complexity of the attack patterns (Technique card chains) was modulated by roles, and the players' individual di erences. A proof-of-concept simulation has been made using an Agent-Based Modelling framework that re-plays the actions of a player. One of the aspects of future work is the exploitation of the game data to be used as a learning model to create intelligent standalone agents.en_UK
dc.description.coursenamePHDen_UK
dc.identifier.urihttps://dspace.lib.cranfield.ac.uk/handle/1826/19748
dc.language.isoenen_UK
dc.relation.ispartofseriesPHD;PHD-21- SIDORENKO
dc.rights© Cranfield University, 2015. All rights reserved. No part of this publication may be reproduced without the written permission of the copyright holder.
dc.subjectInformation securityen_UK
dc.subjectCyber attacksen_UK
dc.subjectGamingen_UK
dc.subjectGame dataen_UK
dc.titleAgent-Based Modelling of O ensive Actors in Cyberspaceen_UK
dc.typeThesisen_UK

Files

Original bundle
Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
PHD-21-Sidorenko_Tatjana_.pdf
Size:
35.12 MB
Format:
Adobe Portable Document Format
Description:
License bundle
Now showing 1 - 1 of 1
No Thumbnail Available
Name:
license.txt
Size:
1.63 KB
Format:
Item-specific license agreed upon to submission
Description: