首页> 外文会议>International conference on decision and game theory for security >A Bayesian Multi-armed Bandit Approach for Identifying Human Vulnerabilities
【24h】

A Bayesian Multi-armed Bandit Approach for Identifying Human Vulnerabilities

机译:贝叶斯多武装强盗方法识别人的脆弱性

获取原文

摘要

We consider the problem of identifying the set of users in an organization's network that are most susceptible to falling victim to social engineering attacks. To achieve this goal, we propose a testing strategy, based on the theory of multi-armed bandits, that involves a system administrator sending fake malicious messages to users in a sequence of unannounced tests and recording their responses. To accurately model the administrator's testing problem, we propose a new bandit setting, termed the structured combinatorial multi-bandit model, that allows one to impose combinatorial constraints on the space of allowable queries. The model captures the diversity in attack types and user responses by considering multiple multi-armed bandits, where each bandit problem represents an attack (message) type and each arm represents a user. Users respond to test messages according to a response model with unknown statistics. The response model associates a Bernoulli distribution with an unknown mean with each message-user pair, dictating the likelihood that a user will respond to a given message. The administrator's problem of identifying the most susceptible users can then be expressed as identifying the set of message-user pairs with means that exceed a given threshold. We adopt a Bayesian approach to solving the problem, associating a (beta) prior distribution with each unknown mean. In a given trial, the system administrator queries a selection of users with test messages, generating query responses which are then used to update posterior distributions on the means. By defining a state as the parameters of the posteriors, we show that the optimal testing strategy can be characterized as the solution of a Markov decision process (MDP). Unfortunately, solving the MDP is computationally intractable. As a result, we propose a heuristic testing strategy, based on Thompson sampling, that focuses queries on message-user pairs that are estimated to have means close to the threshold. The heuristic testing strategy is shown to yield accurate identifications.
机译:我们考虑了确定组织网络中最容易成为社会工程攻击受害者的用户的问题。为了实现此目标,我们提出了一种基于多臂匪徒理论的测试策略,该策略涉及系统管理员以一系列未经通知的测试向用户发送伪造的恶意消息并记录其响应。为了准确地对管理员的测试问题进行建模,我们提出了一种新的强盗设置,称为结构化组合多强盗模型,该模型允许人们在允许的查询空间上施加组合约束。该模型通过考虑多个多臂土匪来捕获攻击类型和用户响应的多样性,其中每个土匪问题代表一种攻击(消息)类型,而每个臂代表一个用户。用户根据具有未知统计信息的响应模型来响应测试消息。响应模型将每个消息-用户对的伯努利分布与未知均值相关联,从而确定用户将响应给定消息的可能性。管理员识别最易受攻击的用户的问题可以表示为使用超过给定阈值的方式识别消息-用户对的集合。我们采用贝叶斯方法来解决该问题,将(beta)先验分布与每个未知均值相关联。在给定的试验中,系统管理员用测试消息查询用户的选择,生成查询响应,然后将其用于更新均值上的后验分布。通过将状态定义为后验参数,我们表明最佳测试策略可以描述为马尔可夫决策过程(MDP)的解决方案。不幸的是,解决MDP在计算上是棘手的。结果,我们提出了一种基于Thompson采样的启发式测试策略,该策略将查询集中在消息-用户对上,这些消息-用户对的估计均值接近阈值。启发式测试策略显示可以产生准确的标识。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号