Big Game Theory Hunting: The Peculiarities of Human Behavior in the InfoSec Game

A presentation at Black Hat USA in in Las Vegas, NV, USA by Kelly Shortridge

We all groan when we hear it’s “time for some game theory,” but traditional game theory – modelling conflict and cooperation between rational decision-makers – still pervades how we think of defensive strategy as an industry. This primitive analysis is a disservice to defenders, who are facing humans (and who are, in fact, humans themselves), but are modelling their own actions and opponent’s actions based on the assumption of machine-like behavior.

In this session, I will examine traditional game theory and propose why behavioral game theory should take its place in the philosophy of defense. Next, I’ll review the first principles of game theory, through the lens of behavioral game theory, which empirically measures how humans actually behave in games, rather than assumes they will behave coldly rational.

I’ll explain the “rules” of the information security game and how traditional game theory is poorly suited to those conditions, along with the various behavioral models and why they are a superior fit. I’ll then explore the two primarily methods that play into how humans make decisions in games – “thinking” and “learning” and what empirical data from behavioral game theory studies suggests on how to improve thinking and learning, extrapolating to applications for infosec defenders.

Finally, I’ll present new insights from my own research, examining how defenders and attackers play the infosec game specifically, and bridging from theory to practice, to see how the lessons from behavioral game theory can be tangibly incorporated into defenders’ strategic decision making processes. I’ll conclude the session by outlining the practical steps for improving threat modelling, countering offensive moves, and deciding which products to use, so that defenders can start gaining the high ground in the infosec game.

Also presented at BSides PDX 2017.




The following resources were mentioned during the presentation or are useful additional information.

Buzz and feedback

Here’s what was said about this presentation on social media.