Here are my slides from my SIRAcon talk.
Here's a slide that got a lot of attention. (Humorous, of course)
Showing posts with label simulation. Show all posts
Showing posts with label simulation. Show all posts
Wednesday, May 15, 2019
Monday, February 8, 2016
Work in Progress (Cyber Security Investment Game)
Here is a video demo of the NetLogo "Cyber Security Investment Game", as a work in progress. This run is a 6/3 multiplayer game, meaning 6 cooperative Defenders and 3 adversarial Attackers. Defenders play a 2-player game with everyone else, while Attackers only play 2-player games with Defenders. It's a complicated game, with up to 400 possible "moves" for each agent at each step, and also a dynamic game, meaning the structure of the game can change dynamically during the course of play. (Game Theory Purists will probably hate it for that reason!)
Here's a video of 1,700 time steps, with 20x speed-up.
What you see in this simulation is an ecosystem that provides a positive environment for both Defenders and Attackers. That is, they both have consistently positive payoffs (see bar graph, center left).
While the overall trends of payoffs are pretty clear (bottom graph), there is an "unruly" back and forth between attackers and defenders. Crucially, the time series of payoffs is non-stationary for all agents (see center graphs, third and fourth from the top). Simply, non-stationary means that the probability distribution for each payoff changes over time. You can see a sample distribution of payoffs in the two histograms, center right. You'll notice them changing shape (going from skew to symmetric) and also changes in mean and standard deviation ("SD"). Non-stationarity has implications for risk estimation, as I will detail in the up-coming WEIS paper.
In terms of progress toward the goal, I would say this is not yet a model of cyber security investment. It models competitive relationships rather than not host-parasite relationships which I believe are close to the true nature of cyber security ecosystems. The good news is that I believe I know what extensions and modifications need to be made. I'll save that for a later post.
Here are some key features of this version of the model:
<update>
Here is the same run after 4,000 time steps. No sign of equilibrium or stationary time series.
Here's a video of 1,700 time steps, with 20x speed-up.
What you see in this simulation is an ecosystem that provides a positive environment for both Defenders and Attackers. That is, they both have consistently positive payoffs (see bar graph, center left).
While the overall trends of payoffs are pretty clear (bottom graph), there is an "unruly" back and forth between attackers and defenders. Crucially, the time series of payoffs is non-stationary for all agents (see center graphs, third and fourth from the top). Simply, non-stationary means that the probability distribution for each payoff changes over time. You can see a sample distribution of payoffs in the two histograms, center right. You'll notice them changing shape (going from skew to symmetric) and also changes in mean and standard deviation ("SD"). Non-stationarity has implications for risk estimation, as I will detail in the up-coming WEIS paper.
In terms of progress toward the goal, I would say this is not yet a model of cyber security investment. It models competitive relationships rather than not host-parasite relationships which I believe are close to the true nature of cyber security ecosystems. The good news is that I believe I know what extensions and modifications need to be made. I'll save that for a later post.
Here are some key features of this version of the model:
- Three levels of investment: 1) architecture/infrastructure; 2) capabilities; 3) practices/routines (a.k.a. "moves")
- Asymmetric number and variety of "moves" for Defenders and Attackers
- Parametric control over diversity of "moves" and investments by Defenders and Attackers
<update>
Here is the same run after 4,000 time steps. No sign of equilibrium or stationary time series.
![]() |
| (Click to enlarge) |
Friday, January 22, 2016
Time & Uncertainty (2nd post: "What kind of game is cyber security investment?")
Summary: Time and uncertainty are essential features of any model of the "game of cyber security". Models that do not include them as central features are not fit for purpose. But, yes, they do make life more difficult for modelers and their audiences. While I make the case that both are essential, I leave open the question as to what is the most parsimonious method or treatment.
Tuesday, January 19, 2016
What kind of game is cyber security investment? (post #1 of ?)
This is first in a series of blog posts where I think out loud as I build a paper for WEIS 2016, and also a component for my dissertation.
The focus is on "investment" broadly defined. This means money invested in people, tools, infrastructure, processes, methods, know-how, etc. It also means architectural commitments that shape the business, technical, legal, or social aspects of cyber security for a given person or organization. All these investments provide the foundation for what a person or organization is able to do (i.e. their "capabilities") and the means of executing day-to-day tasks ("routines", "processes", "practices", etc.).
If cyber security investment is a strategic game between attackers and defenders, and among defenders, then what kind of game is it?
The focus is on "investment" broadly defined. This means money invested in people, tools, infrastructure, processes, methods, know-how, etc. It also means architectural commitments that shape the business, technical, legal, or social aspects of cyber security for a given person or organization. All these investments provide the foundation for what a person or organization is able to do (i.e. their "capabilities") and the means of executing day-to-day tasks ("routines", "processes", "practices", etc.).
If cyber security investment is a strategic game between attackers and defenders, and among defenders, then what kind of game is it?
Summary
In simple terms, people tend to think of cyber security investment as being one of (at least) five types of games:- An optimization game, where each player finds the optimal level of spending (or investment) to minimize costs (or losses). This view is favored by Neo-classical Economists and most Game Theorists.
- A collective wisdom game, where the collective searching/testing activities of players leads to the emergence of a "collective wisdom" (a.k.a. "best practices") that everyone can then imitate. This view is favored by many industry consultants and policy makers.
- A maturity game, where all players follow a developmental path from immature to mature, and both individual and collective results are improved along the way. This view is favored by many industry consultants.
- A carrots-and-sticks game, where players chose actions that balance rewards ("carrots") with punishments ("sticks") in the context of their other goals, resources, inclinations, habits, etc. This view is favored by some Institutional Economists, and some researchers in Law and Public Policy. It is also favored by many people involved in regulation/compliance/assurance.
- A co-evolution game, where the "landscape" of player payoffs and possible "moves" is constantly shifting and overall behavior subject to surprises and genuine novelty. This view is favored by some researchers who employ methods or models from Complexity Science or Computational Social Science. This view is also a favorite of hipsters and "thought leaders", though they use it as metaphor rather than as a real foundation for research or innovation.
But what kind of game is cyber security, really? How can we know?
These questions matter because, depending on the game type, the innovation strategies will be very different:
- If cyber security is an optimization game, then we need to focus on methods that will help each player do the optimization, and to remove disincentives for making optimal investments.
- If cyber security is a collective wisdom game, then we need to focus on identifying the "best practices" and to promote their wide-spread adoption.
- If cyber security is a maturity game, then we need to focus on the barriers to increasing maturity, and to methods that help each player map their path from "here" to "there" in terms of maturity.
- If cyber security is a carrots-and-sticks game, then we need to find the right combination of carrots and sticks, and to tune their implementation.
- Finally, if cyber security is a co-evolution game, then we need to focus on agility, rapid learning, and systemic innovation. Also, we should probably NOT do some of the strategies listed in 1) through 4), especially if they create rigidity and fragility in the co-evolutionary process, which is the opposite of what is needed.
Thursday, January 14, 2016
How fast does the space of possibilities expand? (replicating Tria, et al 2014)
How fast does the space of possibilities expand? This question is explored in the following paper (free download):
From the abstract:
The charts on the top and center right show the frequency distribution by ball type (a.k.a. "color"). These are log-log plots, so a straight line (declining) is signature of a power law distribution, while a gradually curving (concave) is signature of lognormal or similar distribution with somewhat thinner tail. Sharply declining curve is signature of a thin tailed distribution such as Gaussian.
This is essential for modeling cyber security because some people claim that quantitative risk management is impossible in principle because of intelligent adversaries who can generate and exploit novel strategies and capabilities.
- Tria, F., Loreto, V., Servedio, V. D. P., & Strogatz, S. H. (2014). The dynamics of correlated novelties. Nature Science Preport, 4. (http://dx.doi.org/10.1038/srep05890)
From the abstract:
Novelties are a familiar part of daily life. They are also fundamental to the evolution of biological systems, human society, and technology. By opening new possibilities, one novelty can pave the way for others in a process that Kauffman has called “expanding the adjacent possible”. The dynamics of correlated novelties, however, have yet to be quantified empirically or modeled mathematically. Here we propose a simple mathematical model that mimics the process of exploring a physical, biological, or conceptual space that enlarges whenever a novelty occurs. The model, a generalization of Polya's urn, predicts statistical laws for the rate at which novelties happen (Heaps' law) and for the probability distribution on the space explored (Zipf's law), as well as signatures of the process by which one novelty sets the stage for another.I've written a NetLogo program to replicate their model, available here. The code for the model is quite simple. A majority of my code is for a "pretty layout", which is a schematic version of a "top-down view" of the urn. Here's a video of a single run
![]() |
| Full screen with controls. (click to enlarge) |
So what?
This model will be useful in my dissertation because I need mechanisms to endogenously add novelty -- i.e. expand the possibility space based on the actions of agents in the simulated world, and not simply as external "shocks".This is essential for modeling cyber security because some people claim that quantitative risk management is impossible in principle because of intelligent adversaries who can generate and exploit novel strategies and capabilities.
Tuesday, January 12, 2016
Institutional Innovation in Contested Territory: Quantified Cyber Security and Risk
Say you are an entrepreneurial sort of person who wants to really change the world of cyber security. Problem: nobody seems to know where the game-changing innovation is going to come from. Is it technology? Is it economics? Is it law and policy? Is it sociology? Maybe combination, but what? And in what sequence?
If you aim for institutional innovation, then at some point you are going to need to take sides in the great "Quant vs. Non-quant" debate:
Whoever makes sufficient progress toward workable solutions will "win", in the sense of getting wide-spread adoption, even if the other is "better" in some objective sense (i.e. "in the long run").
I examine this innovation race in a book chapter (draft). The book will probably come out in 2016.
Abstract:
The computational model used is called "Percolation Models of Innovation". Here is the NetLogo code of the model used in the book chapter. Below are some figures from the book chapter.
If you aim for institutional innovation, then at some point you are going to need to take sides in the great "Quant vs. Non-quant" debate:
- Can cyber security and risk be quantified?
- If "yes", how can quantitative information be used to realize security to significantly improve outcomes?
Whoever makes sufficient progress toward workable solutions will "win", in the sense of getting wide-spread adoption, even if the other is "better" in some objective sense (i.e. "in the long run").
I examine this innovation race in a book chapter (draft). The book will probably come out in 2016.
Abstract:
"The focus of this chapter is on how the thoughts and actions of actors coevolve when they are actively engaged in institutional innovation. Specifically: How do innovators take meaningful action when they are relatively ‘blind’ regarding most feasible or desirable paths of innovation? Our thesis is that innovators use knowledge artifacts – e.g. dictionaries, taxonomies, conceptual frameworks, formal procedures, digital information systems, tools, instruments, etc. – as cognitive and social scaffolding to support iterative refinement and development of partially developed ideas. We will use the case of institutional innovation in cyber security as a way to explore these questions in some detail, including a computational model of innovation."Your feedback, comments, and questions would be most welcome.
The computational model used is called "Percolation Models of Innovation". Here is the NetLogo code of the model used in the book chapter. Below are some figures from the book chapter.
![]() |
| A screen shot of the user interface. Three different models can be selected (upper left). |
Friday, January 8, 2016
Complex dynamics in learning complicated games (replicating Galla & Farmer 2012)
I have written a NetLogo version of the random game model of Galla & Farmer (2012) (free download). It has been uploaded to the NetLogo community library and should appear in a day or so. Read on if you are interested in Game Theory, esp. learning models and computational methods.
.nlogo file
Download NetLogo (Win, Mac, Linux)
.nlogo file
Download NetLogo (Win, Mac, Linux)
Friday, February 21, 2014
Does a model and its data ever speak for themselves? No -- A reply to Turchin
This post is the first of a series to reply to Dr. Peter Turchin regarding his PNAS article (full text PDF -- free, thanks to Turchin & team), my letter to PNAS, and his PNAS letter reply. I wrote a blog post here because I didn't think that Dr. Turchin's reply addressed my questions due to misunderstanding and I invited Dr. Turchin to engage in a colloquy via blog posts. I'm happy to say that Dr. Turchin wrote three blog posts (here, here, and here) in reply to my post, and this is my first reply.
While this post talks about interpreting simulation results, the general topic of data interpretation applies to all empirical research, and even data analysis in industry.
While this post talks about interpreting simulation results, the general topic of data interpretation applies to all empirical research, and even data analysis in industry.
Sunday, January 19, 2014
PNAS letter & reply: You say potāto, I say potəto…
![]() |
| If we have mis-communicated, should we call the whole thing off? Not just yet. I say: once more, with FEELING! |
This post includes an early draft of my letter plus some commentary.
My published letter: "Does diffusion of horse-related military technologies explain spatiotemporal patterns of social complexity 1500 BCE–AD 1500?"
The authors' reply is here.
The authors are Peter Turchin, Thomas Currie, Edward A. L. Turner, and Sergey Gavrilets. In case you don't know him, Dr. Peter Turchin is one of the founders of this field called Cliodynamics, or the mathematical modeling of large scale, long time horizon historical dynamics.
The not-so-good-news is that the authors misunderstood my objections so their answers didn't address them. Thus, we didn't really communicate successfully in the format of PNAS letters. Both my letter and the author's response were restricted to 500 words, and this significantly contributed to the miscommunication.
Message to PNAS editors: Your 500-word restriction on letters is anachronistic, unnecessary, and is an obstacle to productive scholarly debate. Since letters are only published online, there is no justification for the 500-word limit, which is presumably justified to save precious paper in the print version of PNAS journal. With online publication, letters should be edited to express their essential meaning without any fixed word count limit.
For copyright reasons, I can't copy verbatim either my letter or the author's response. Instead, I'll splice them together, along with my commentary on the miscommunication and more details about my objections. My sincere desire is that the authors will respond here in the comments or elsewhere to address these (clarified) objections.
My objections focus on the authors' design and simulation choices, and not their underlying theories of social complexity.
My objections focus on the authors' design and simulation choices, and not their underlying theories of social complexity.
Subscribe to:
Comments (Atom)







