Location

Hilton Hawaiian Village, Honolulu, Hawaii

Event Website

https://hicss.hawaii.edu/

Start Date

3-1-2024 12:00 AM

End Date

6-1-2024 12:00 AM

Description

In this study, the authors aimed to identify cognitive biases exhibited by cyber attackers in the study by Aggarwal et al. (2021). Specifically, this paper investigated whether attackers displayed a preference for targeting systems located in specific areas of the network, as well as investigated any discernible behavioral patterns such as consistently attacking the same system in every round (Default Setting Bias) or persistently targeting a particular system despite previous failures (Sunk Cost Fallacy). The results show evidence for the default effect and sunk cost fallacy in the decision-making processes of human attackers and suggest that they can have significant implications for the effectiveness of cyber defense. This study provides valuable insights for the development of targeted interventions and countermeasures in cyber defense.

Share

COinS
 
Jan 3rd, 12:00 AM Jan 6th, 12:00 AM

Evidence of Cognitive Biases in Cyber Attackers from An Empirical Study

Hilton Hawaiian Village, Honolulu, Hawaii

In this study, the authors aimed to identify cognitive biases exhibited by cyber attackers in the study by Aggarwal et al. (2021). Specifically, this paper investigated whether attackers displayed a preference for targeting systems located in specific areas of the network, as well as investigated any discernible behavioral patterns such as consistently attacking the same system in every round (Default Setting Bias) or persistently targeting a particular system despite previous failures (Sunk Cost Fallacy). The results show evidence for the default effect and sunk cost fallacy in the decision-making processes of human attackers and suggest that they can have significant implications for the effectiveness of cyber defense. This study provides valuable insights for the development of targeted interventions and countermeasures in cyber defense.

https://aisel.aisnet.org/hicss-57/da/cyber_deception/2