the effect of decentralized behavioral decision making on system-level risk

Post on 23-Mar-2016

43 Views

Category:

Documents

0 Downloads

Preview:

Click to see full reader

DESCRIPTION

The Effect of Decentralized Behavioral Decision Making on System-Level Risk. Kim Kaivanto Department of Economics Lancaster University . TexPoint fonts used in EMF. Read the TexPoint manual before you delete this box.: A A A A A A. In computer networks, system-level risk depends on - PowerPoint PPT Presentation

TRANSCRIPT

The Effect of Decentralized Behavioral Decision Making on System-Level Risk

Kim KaivantoDepartment of EconomicsLancaster University

In computer networks, system-level risk depends on the actions and choices of a collection of ‘lay’ users.

How should we model the decision making of theselay users ?

Does it matter whether our modeling assumptionsreflect normative rationality or heuristics & biases?

Outline

Classical SDT under normative rationalityBehavioral factors

• From the decision-making literature: CPT• From the phishing & deception literatures

Re-derivation of optimal cutoff threshold under CPT-SDT• Using T&K92 probability weighting function• Using neo-additive probability weighting function• Incorporating the psychology of deception

Beyond comparative statics: comparative simulation resultsImplications

• Spam filtering• Education & training

End

Classical SDT

Elements: - a ‘score’ variable , - known distributions of the score under and - as the cutoff threshold is varied, traces out the Receiver Operating Characteristics (ROC) curve

D : Dµ0

FP% + TN% = 100%

FN% + TP% = 100%

‘rate’; ‘frequency’; ‘likelihood’

β + (1–β) = 1

α + (1–α) = 1

For the ‘healthy’:

For the ‘diseased’:

ROC curve:

Classical SDT

Binormal ROC curves

d' = 1.7-1 = 0.7

Low-AUC ROC curve:

d' = 2.7-1 = 1.7

High-AUC ROC curve:

Classical SDT

Elements: - a ‘score’ variable , - known distributions of the score under and - as the cutoff threshold is varied, traces out the Receiver Operating Characteristics (ROC) curve

Task: identify optimal cutoff threshold such that the observed scoreis either in the acceptance intervalor in the rejection intervalwhere the null hypothesisand the alt. hypothesis

Problem: choose the optimal cutoff threshold by solving

D : Dµ0

µ¤

Classical SDT

The expected cost of using the SDT mechanism is:

Setting the total differential of expected cost to zero

it follows that the slope of each iso-E(C) line is the probabilityweighted ratio of the incremental cost of misclassifying a non-malicious email to the incremental cost of misclassifyinga malicious email

Classical SDT

The optimal cutoff threshold is a function of - a misclassification cost matrix- the baserate odds of (email) being non-malicious- risk preferences

n.b. There is no reason for the misclassification costs to bethe same for the user as for the organization

n.b. Classical SDT admits that costs can be replaced by their utilities, but in fact proceeds (exclusively) with mini-mizing expected cost, i.e. assuming risk neutrality.

n.b. In the literature, the ‘optimal classifier’ is computedunder risk neutrality (!)

µ¤

Classical SDT

Only the difference between the misclassification and the correct classification matters for optimal cutoff placement

Behavioral factors

Descriptively, behavioral decision makers display-reference dependence, framing effects-non-linear probability weighting-loss aversion-ambiguity aversion-four-fold pattern of risk aversion

All incorporated in Cumulative Prospect Theory (CPT)

Deception deploys employ -peripheral-route persuasion

-authority, scarcity, similarity & identification, reciprocation, consistency, social proof

-visceral emotions-urgency-contextual cues

CPT extension of SDT

Using a conventional CPT specification

CPT extension of SDT

(1-p) p

(1-α) (1-β)α β

CTN CFP CFNCTP

CPT extension of SDT

Assume

Further, wlog

- this becomes the CPT reference point

Then the CPT value function, in terms of and :® ¯

CPT extension of SDT

We form the total differential of , set it to zero, and solve for the slope of the iso- contours in ROC space.

V ¡ (C)V ¡ (C)

CPT extension of SDT

Where the baserate probability term

CPT extension of SDT

Iso- contours in ROC spaceV ¡ (C)

CPT extension of SDT

Implication of non-linearity of iso- contours:

Optimal operating point possibly non-unique.

Uniqueness cannot be ensured with the T&K92 pwf.

V ¡ (C)

CPT extension of SDT

Let there be a set of constants

so

Whereby

CPT extension of SDT

The implication of

Is that the CPT extension of SDT also creates a ‘bias’ relative to the benchmark calculated under risk neutrality, which is consistent (in directionality) with the experimental psychology sense of conservative cutoff placement.

CPT extension of SDT with neo-additive pwf

Consider the piece-wise linear neo-additive pwf

“among the most promising candidates regarding the optimaltradeoff of parsimony and fit” (Wakker, 2010).

Captures the possibility effect, the certainty effect, the overweighting of small probabilities, and the underweightingof large probabililties.

CPT extension of SDT with neo-additive pwf

CPT extension of SDT with neo-additive pwf

Solving for the slope of the iso- contours in ROC space

The iso- contours are staight lines, just as in classicalSDT.

This ensures uniqueness of the optimal cutoff threshold.

CPT-SDT with psychology of deception

Successful deception deploys:-peripheral-route persuasion-visceral emotions-urgency-contextual cues

The deception-perpetrator’s skill and effort .

Mark i’s ploy-specific discriminability at time t:

CPT-SDT comparative statics

The difference between classical SDT and CPT-SDT optimaltrade-offs entails that the bias of incorrectly assuming normative rationality is larger for agents with a lower d’, i.e.a lower ROC curvature and AUC.

CPT-SDT shifts the optimal cutoff and the optimal operatingpoint more for agents with a lower ROC curvature and AUC.

The psychology of deception magnifies the effect of be-havioral decision making under risk and uncertainty.

Comparative simulation results

Are the individual-level behavioral effects quantitatively consequential at the level of the whole network?

M1 Classical SDT modelM2 CPT-SDT modelM3 CPT-SDT with psych of deception,

We simulate (ABM, NetLogo) a 3-week spear-phishing attack on an organization with 100 users.

Each user receives 250 emails per working week.

1/250=0.004 of emails are malicious.

During an attack, a user may be fooled at most once. The users learn from their mistakes.

Comparative simulation results

Are the individual-level behavioral effects quantitatively consequential at the level of the whole network?

M1 Classical SDT model

M2 CPT-SDT model

M3 CPT-SDT with psych of deception with probability

Á¡ =0:88

d0=3:0(AUC = 0:983)

d0= 0:5(AUC = 0:638) ¼=0:05

Comparative simulation results

Distribution of security breaches in 10,000 repetitions

Comparative simulation results

Distribution of security breaches in 10,000 repetitions

Comparative simulation results

Distribution of security breaches in 10,000 repetitions

Comparative simulation results

Distribution of security breaches in 10,000 repetitions

Comparative simulation results

Distribution of security breaches in 10,000 repetitions

Comparative simulation results

Comparative simulation results

Comparative simulation results

Implications for education and training

Target:

discriminabilityprior probability susceptibility to deception

Note: good spam filtering lowers p !

Conclusion

Individual-level behavioral effects matter for system-level risk!

top related