Social Computational Trust Model (SCTM): a Framework to Facilitate the Selection of Partners
Total Page:16
File Type:pdf, Size:1020Kb
Social Computational Trust Model (SCTM): A Framework to Facilitate the Selection of Partners 1st Ameneh Deljoo 2nd Tom van Engers 3th Leon Gommans Informatics Institute, Faculty of Science Leibniz Center for Law AirFrance-KLM University of Amsterdam University of Amsterdam Amsterdam, the Netherlands Amsterdam, the Netherlands Amsterdam, the Netherlands [email protected] [email protected] [email protected] 4th Cees de Laat Informatics Institute, Faculty of Science University of Amsterdam Amsterdam, the Netherlands [email protected] Abstract—Creating a cyber security alliance among network and private organizations is required to arrange technical domain owners, as a means to minimize security incidents, counter measures. Sharing cyber intelligence among dif- has gained the interest of practitioners and academics in the ferent parties, such as internet & cloud service providers last few years. A cyber security alliance, like any membership and enterprise networks, becomes increasingly important. organization, requires the creation and maintenance of trust Additionally, networks have evolved over the time and among its members, in this case the network domain owners. became more complex and less connected, therefore the To promote the disclosure and sharing of cyber security infor- protection of such a complex network can often only be mation among the network domain owners, a trust framework guaranteed and financed as a shared effort. One of the is needed. benefits of information sharing among the members in an This paper discusses a social computational trust model alliance is improving the decision and policy making in the (SCTM), that helps alliance members to select the right different levels of organization and facilitating the selection partner to collaborate with and perform collective tasks, and of optimal cyber defense tactics during the attack period. encourages the sharing of incident data and intelligence. The Another benefit is the reduction of uncertainties regarding social computational trust model combines benevolence and the performance, competence and availability of each mem- competence to estimate the risk of interaction. Benevolence ber in the alliance [1]. Because of the limitation of each is computed from personal experiences gained through direct organization such as resources and expertise, no organization can resilience on its own, therefore needs to join the alliance interactions and competence is assessed on the base of the to address the cyber attacks. received feedback from the other members. An agent based As cyber attackers also have found ways to share their model case study is presented to demonstrate our approach. practices, their victims (e.g. organizations) are required to The practicability of the proposed risk estimation is validated collaborate with other parties across multi-domain networks with a detailed experiment. to avoid the negative impact on the organization and its Index Terms—Computational trust, alliances, cyber security, services. information sharing, risk assessment The RSA [2] report mentiones that victims of the cyber attacks are the largest company. Currently, more than 60 I. Introduction million different malware variants are indexed; one third of the indexed malware came up in the last year. Based on the Cyber attacks are a serious threat to our networked evidence from the cyber security reports, the attackers be- society as organizations are depending on the well func- come highly organized, customized and coordinated. There- tioning of the IT-infrastructure, which is essential for the fore, there is need for cyber security alliances where the IT-systems supporting their processes. As attacks are becom- organizations collaborate with the other members to reduce ing more and more organized, collaboration across public the impact of attacks by employing counter measures [1], [3]. In order to support such collaboration, we need to This work is funded by the Dutch Science Foundation project SARNET (grant no: CYBSEC.14.003/618.001.016) and the Dutch project COMMIT organize and manage trust among the members, enabling (WP20.11). Special thanks go to our research partner KLM. The authors the organizations to share the cyber information with their would also like to thank anonymous reviewers for their comments. trusted partners. Despite the significant amount of research on the technical frameworks in section VIII. Finally, section IX concludes solutions to improve the effectiveness of counter measure- the paper. ments [4], little research in this domain has addressed the trust among peers. II. Challenges in Creating Alliances In this paper, we explain how cyber security alliances can be supported in the establishment of partnerships within cyber In reality, there are several concerns, seen as risks for security alliances by providing an ability to computation- the organization, which result in the unwillingness of shar- ally evaluate potential partnerships among a community of ing information about the cyber incidents that they have alliance members. We focus on the social aspect of trust experienced [6]. These factors include: and select the right partner in the network to collaborate in • Competition. Due to the conflict of interest among joint tasks. As we stated in our previous publication [5], to different organizations, they are often hesitant to share create a cyber security alliance we need to define: information with their competitors. • a common benefit as a strong incentive for members to • Competence. Organizations may not want to rely on join the alliance, and subsequently encourage partners their partners’ performance and become vulnerable to to create agreements arranging sharing of information partners’ choices and actions. and cyber defense resources, whilst being ensured that • Reputation. The reputation of organizations are often benefits and cost are shared in a fair and economical damaged by sharing the security information publicly. way. • Privacy. Some shared data contains sensitive informa- • a trust framework to create and organize trust among tion about the victim or customer. the members, • Legal requirements, Rules and Policy. Alliances consist • a common governance model to create common poli- of different companies with different policies and sub- cies, standards and admission criteria for alliance’s jected to different legal frameworks, which may operate members. in different countries or jurisdictions. Considering the above requirement is important it comes Our goal is to design a trust framework to facilitate the to the potentially sensitive and company-internal data. A information sharing among the organizations, while taking trust model helps in expressing member concerns, which into account the above-mentioned requirements . then can act as a means to reduce risk during the creation and maintenance of relationships. To organize and maintain III. Trust trust among the members we employ a social model of trust, explained in this paper. Traditionally, information sharing on Trust is seen as a key for any interactions in the a peer-to-peer basis is mostly established based on personal social system. Trust has been studied in different areas trust. But, the social network of organizations changes with from sociology to psychology [7]1. Most trust definitions time; therefore, it demands to define a more sophisticated focus on exposing the given member to vulnerability. method to select a right partner for sharing intelligence. We Luhmann [9] defined trust as having confidence that the aim to define a model of cyber security alliance that transfer expectation about the given member will be considered by the mentioned issues to the cyber space on a large scale. the trustor [9], entails positive expectations regarding the In our previous publication [5], we used the service provider other party’s action in risky situations [10] and includes group (SPG) framework as a governance framework to adopting a belief without having all information about define a set of common rules for the SPG members, which the other party ’s belief [11]. Trust among the alliances are subsequently administered and monitored. In this work, members has been empirically demonstrated to be important we discuss the following contributions: for alliance formation [12]. Trust has some benefits for 1) the Social Computational Trust Model (SCTM) rep- the alliance such as can be seen as a substitute for formal resenting social trust and its components, which are control mechanisms, reduce transactions costs, facilitate important for evaluating the partners. dispute resolution, and allow more flexibility. When trust 2) risk assessment through the SCTM model. The SCTM among partners is high enough, partners have enough facilitates risk-based partner selection by combining the confidence in each other and result in less opportunistic benevolence and competence factors. We identified two behavior [9]. common risks for the alliances’ members. In this work, we consider the following description The remainder of the paper is organized as follows. Sec- given by Mayer: “Trust is the willingness of trustor to be tion II shows challenges and the problem statement. Sec- vulnerable to the actions of trustee based on the expectation tion III highlights the importance of trust model, and the that the trustee will perform a particular action important to control and risk mechanism as a way to establish trust in the trustor, irrespective of the ability to monitor or control section IV. We present the social computational