Visible to the public Agent-based Modeling of User Circumvention of Security

TitleAgent-based Modeling of User Circumvention of Security
Publication TypeConference Paper
Year of Publication2014
AuthorsKothari, Vijay, Blythe, Jim, Smith, Sean, Koppel, Ross
Conference Name1st International Workshop on Agents and CyberSecurity
PublisherACM
Conference LocationParis, France
ISBN Number978-1-4503-2728-2
KeywordsHuman and Societal Aspects of Security and Privacy, Human Behavior, NSA SoS Lablets Materials, Science of Human Circumvention of Security, science of security, SoS Lablet, UIUC
Abstract

Security subsystems are often designed with flawed assumptions arising from system designers' faulty mental models. Designers tend to assume that users behave according to some textbook ideal, and to consider each potential exposure/interface in isolation. However, fieldwork continually shows that even well-intentioned users often depart from this ideal and circumvent controls in order to perform daily work tasks, and that "incorrect" user behaviors can create unexpected links between otherwise "independent" interfaces. When it comes to security features and parameters, designers try to find the choices that optimize security utility--except these flawed assumptions give rise to an incorrect curve, and lead to choices that actually make security worse, in practice. We propose that improving this situation requires giving designers more accurate models of real user behavior and how it influences aggregate system security. Agent-based modeling can be a fruitful first step here. In this paper, we study a particular instance of this problem, propose user-centric techniques designed to strengthen the security of systems while simultaneously improving the usability of them, and propose further directions of inquiry.

URLhttp://doi.acm.org/10.1145/2602945.2602948
DOI10.1145/2602945.2602948
Citation KeyKothari:2014:AMU:2602945.2602948

Other available formats:

Agent-Based Modeling of User Circumvention of Security
AttachmentSize
bytes