Abstract
Today, the responsibility for U.S. cyber defense is divided asymmetrically between a large population of cyber-naïve end-users and a small cadre of cyber-savvy security experts in government and the private sector. We foresee the rise of “Cyber Civil Defense” driven by the perception of vulnerabilities in our present over-reliance on professionals and propelled by two additional factors: crowdsourced cyber offense and crowdsourced innovation. To explore crowdsourcing cyber defense, we developed an online game called Flux Hunter and deployed the game on a large-scale live network at APL, attracting over 700 players. In this paper, we discuss the concept of crowdsourced cyber defense, describe our online game, present our results, and analyze the performance and behaviors of players individually and collectively, looking for the “wisdom of crowds”.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Owens, W.A., Dam, K.W., Lin, H.S. (eds.): Technology, Policy, Law, and Ethics Regarding U.S. Acquisition and Use of Cyberattack Capabilities. The National Academies Press, Washington, D.C (2009)
Clayton, M.: How pro-WikiLeaks hackers wage cyberwar without hijacking your computer, http://www.csmonitor.com/USA/2010/1209/How-pro-WikiLeaks-hackers-wage-cyberwar-without-hijacking-your-computer
Military and security developments involving the People’s Republic of China, Office of the Secretary of Defense Annual Report to Congress (2010)
Carpenter, J.: May the best analyst win. Science 331, 698–699 (2011)
Surowiecki, J.: The Wisdom of Crowds: Why the Many Are Smarter than the Few and How Collective Wisdom Shapes Business, Economies, Societies, and Nations. Doubleday Books, New York (2004)
Honeynet Project, Know Your Enemy: Fast-Flux Service Networks, http://www.honeynet.org/papers/ff/
von Ahn, L.: Games with a purpose. Computer 39, 92–94 (2006)
Khatib, F., Cooper, S., Tyka, M.D., Xu, K., Makedon, I., Popovic, Z., Baker, D., Players, F.: Algorithm discovery by protein folding game players. PNAS (2011), http://www.pnas.org/content/early/2011/11/02/1115898108
Fink, E., Sharifi, M., Carbonell, J.G.: Application of machine learning and crowdsourcing to detection of cybersecurity threats, white paper. Carnegie-Mellon University (2011), http://www.cs.cmu.edu/afs/.cs.cmu.edu/Web/People/eugene/research/full/ml-detection.pdf
Hollis, D., Hollis, K.: Cyber defense: U.S. cybersecurity must-do’s. Armed Forces J. 148, 16–19 (2011)
Chen, K.Y., Fine, L.R., Huberman, B.A.: Predicting the future. Inform. Sys. Frontiers 5, 47–61 (2003)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Paulhamus, B., Ebaugh, A., Boylls, C.C., Bos, N., Hider, S., Giguere, S. (2012). Crowdsourced Cyber Defense: Lessons from a Large-Scale, Game-Based Approach to Threat Identification on a Live Network. In: Yang, S.J., Greenberg, A.M., Endsley, M. (eds) Social Computing, Behavioral - Cultural Modeling and Prediction. SBP 2012. Lecture Notes in Computer Science, vol 7227. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-29047-3_5
Download citation
DOI: https://doi.org/10.1007/978-3-642-29047-3_5
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-29046-6
Online ISBN: 978-3-642-29047-3
eBook Packages: Computer ScienceComputer Science (R0)