<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta>
      <journal-title-group>
        <journal-title>Corfu, Greece
$ a.papanikolaou@innosec.gr (A. Papanikolaou); iliou@ihu.gr (C. Ilioudis); vkatos@bournemouth.ac.uk (V. Katos)</journal-title>
      </journal-title-group>
    </journal-meta>
    <article-meta>
      <title-group>
        <article-title>Cyber-pi: Intelligent cyberthreat detection and supervised response</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Alexandros Papanikolaou</string-name>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Christos Ilioudis</string-name>
          <xref ref-type="aff" rid="aff2">2</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Vasilis Katos</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Bournemouth University</institution>
          ,
          <addr-line>Fern Barrow, Poole</addr-line>
          ,
          <country country="UK">UK</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>Innovative Secure Technologies P.</institution>
          <addr-line>C., Thessaloniki</addr-line>
          ,
          <country country="GR">Greece</country>
        </aff>
        <aff id="aff2">
          <label>2</label>
          <institution>International Hellenic University</institution>
          ,
          <addr-line>Thessaloniki</addr-line>
          ,
          <country country="GR">Greece</country>
        </aff>
      </contrib-group>
      <pub-date>
        <year>2023</year>
      </pub-date>
      <volume>000</volume>
      <fpage>0</fpage>
      <lpage>0002</lpage>
      <abstract>
        <p>Integration of cyber incident management systems comes with a series of challenges on the organisational, technical and human dimension. In this paper we introduce Cyber-pi, a reference architecture for integrated cyber threat detection and response. This architecture is used to facilitate the study of the human aspects and showcases the interplay between the human and automated operator; these two dimensions are represented by the SIEM interface and the self-healing component of Cyber-pi respectively.</p>
      </abstract>
      <kwd-group>
        <kwd>eol&gt;integrated incident management</kwd>
        <kwd>self-healing</kwd>
        <kwd>human in the loop</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction and motivation</title>
      <p>
        Cyber threats, following the trajectory of technological advances, become increasingly
sophisticated. This trend highlights the need to revisit threat detection and response [
        <xref ref-type="bibr" rid="ref1 ref2">1, 2</xref>
        ]. According to
the current state of the art and the heterogeneity and complexity of modern ICT infrastructures,
a holistic and integrated approach in handling security incidents seems to be among the solutions
that are of adequate efectiveness [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ]. An integrated incident management system, in particular,
can provide situational awareness across its constituency, including the organisation’s devices
and assets, applications, and business operations.
      </p>
      <p>
        When considering integrated incident response systems, their efectiveness is limited by a
number of factors that that may impair the operation and limit the added value of the incident
response solution. The recent explosion and adoption of AI in various application domains
provides a first glimpse of the benefits of AI facilitated workflows. It has also showed the
dangers and risks when the integration of AI is performed in haste and not thoughtfully planned
[
        <xref ref-type="bibr" rid="ref4">4</xref>
        ]. In the past few months there have been a number of online articles published describing
how AI chatbots such as ChatGPT can be used in cybersecurity, with the majority relating
to practical penetration testing activities, see for example [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ]. Although the added value of
AI-facilitated pentesting for both red and blue teams can be easily recognised, other areas such
as cyber incident detection and response are not yet adequately researched and explored. In
fact, at the current state of play, we raise concerns that AI-enabled incident handling may cause
more problems than remedies and could have potentially catastrophic consequences for the
SOC team and the organisation as a whole.
      </p>
      <p>This paper leverages a proposed cyberthreat detection and response architecture to pinpoint
the components which will merit from further research on the interplay between AI-enabled
incident handling and critical human factors. We propose an approach that considers factors of
an attack (complexity, uncertainty, phase) and show how this can be combined with a human
operator assessment framework (NASA TLX).</p>
    </sec>
    <sec id="sec-2">
      <title>2. The CTI and response architecture</title>
    </sec>
    <sec id="sec-3">
      <title>3. Evaluation framework</title>
      <p>When handling cyber security incidents, a Security Operations Centre (SOC) operator can be
faced with the following challenges and problems [6, 7, 8, 9, 10]:
• Complexity: Cyber incident response systems can be complex and require a high level of
technical expertise. This can be challenging for human operators who may not have the
required knowledge and skills to navigate the system efectively.
• Time pressure: Incident response requires quick action to prevent further damage, which
can create time pressure for human operators. This can lead to mistakes or oversights,
especially if they are not trained to work efectively under such pressure.
• Alert fatigue: Cyber incident response systems generate numerous alerts, which can
be overwhelming for human operators. This can lead to alert fatigue, where operators
become desensitised to alerts and may miss critical information.
1https://opensearch.org/
2https://oval.mitre.org/
3https://cve.mitre.org/</p>
      <p>• Lack of integration: Cyber incident response systems often work in silos, which can make
it dificult for human operators to integrate information from diferent systems. This can
result in incomplete or inaccurate incident response.
• Lack of automation: Some incident response processes can be automated, but many require
human intervention (e.g. scanning network trafic for malicious activity, analysing logs
for suspicious behaviour, quarantining infected systems). This can be challenging for
human operators who may need to handle multiple incidents at once, leading to delays
or errors.
• Lack of training: Human operators may not be adequately trained on the cyber incident
response system, leading to inefective use of the system and potentially leaving the
organisation vulnerable to attacks.</p>
      <p>The proposed integrated incident detection and response system can be evaluated on two
fronts:
• User Experience (UX) based. This refers to the approaches dealing with the assessment
of users’ needs, behaviours, attitudes, and preferences when interacting with a product,
service, or a system. When considering SOC analysts and their additional mental and
cognitive load when dealing with security incidents, assessment frameworks such as
NASA’s Task Load Index (NASA TLX) [11] can be employed to evaluate the perceived
workload of an individual or a team during a task.</p>
      <p>NASA TLX is a subjective measure and consists of 6 sub-scales [11] which can be used
to evaluate a SOC participant when engaging with an incident detection and response
system as follows:
– Mental demand. This refers to the mental efort required to identify and
analyse threats. For example, analysing network trafic patterns to detect anomalous
behaviour, or researching new attack vectors and techniques used by threat actors.
– Physical demand. The physical efort required to implement and maintain security
controls. For example, deploying and configuring firewalls, updating and deploying
rules, and performing regular maintenance and updates.
– Temporal demand. The time pressure or urgency involved in detecting and
responding to cyber attacks. For example, rapidly detecting and responding to malware
infections – such as ransomware – or data breaches to minimise the impact on the
organisation.
– Performance. The perceived quality of security performance. For example,
measuring the efectiveness of security controls in preventing or mitigating cyber attacks,
or assessing the accuracy and reliability of cyber threat intelligence data feeds.
– Efort. The overall level of efort required to implement and maintain efective
cybersecurity measures. For example, investing in robust security tools and technologies,
developing and implementing security policies and procedures, and providing
ongoing training and education for security personnel.
– Frustration. The level of frustration or stress experienced by security personnel
during the detection and response phases. For example, dealing with false positives
or false negatives from security tools, or managing the workload and stress of
responding to multiple security incidents at the same time.
• Human in the Loop driven. When deploying any system with a substantial machine
learning or AI component, the Human in the Loop (HITL) aspects should be considered.
In the context of SOC analyst or operator, we argue that HITL can vary depending on the
degree of uncertainty surrounding an attack. By taking uncertainty into consideration,
the CTI information will serve a better purpose and be more actionable. In this work
we consider the Cynefin framework [ 12] that can be used to guide decision-making and
problem-solving during cybersecurity incidents. Cynefin has five so-called dimensions
or contextual definitions that can help SOCs to develop a more nuanced and flexible
approach to cybersecurity, taking into account the specific characteristics of diferent
types of threats and attacks. The dimensions and an example of how they could be applied
to incident handling are as follows:
– Simple (known knowns). In the simple dimension, problems are well-defined,
and there is a clear cause-and-efect relationship between the problem and the
solution. In the context of cyber attacks, the simple domain could be applied to
routine security tasks such as patch management, security configuration, and access
control. Indicators of Compromise (IoCs) are unambiguous and can attribute the
threat.
– Complicated (known unknowns). In the complicated dimension, problems reach
a state where there may be multiple potential solutions that require expert knowledge
and analysis. In the context of cyber attacks, the complicated domain could be applied
to tasks such as incident response, malware analysis, and vulnerability assessments.
IoCs are somewhat unambiguous and can could attribute the threat with a bit of
efort.
– Complex (unknown unknowns). In the complex dimension, problems are
unpredictable and emergent, and there may be no clear cause-and-efect relationship
between the problem and the solution. In the context of cyber attacks, the complex
domain could be applied to threat hunting, threat intelligence, and adaptive security
measures. IoCs are ambiguous and not as trustworthy.
– Chaotic (unknowables). In the chaotic dimension, problems are unpredictable
and rapidly changing, and immediate action is required to stabilise the situation. In
the context of cyber attacks and the kill chain, the chaotic domain could be applied
to the initial response to a major cyber incident, where there is a need for rapid
triage, containment, and recovery. IoCs cannot be defined, or if they do so, they
have almost no value as they will be too generic or not trustworthy.</p>
      <p>Having established a structured framework of sense making when analysing and responding
to cyber security incidents, the SOC analyst will be in a position to navigate through diferent
response options while managing their expectations of the participation of the AI/self-healing
layer as well as their intervention. In Figure 2 an example mapping of the mix between
automated response and human participation across the cyber kill chain is presented. Assuming
that advanced threats deliver campaigns comprised of a number of carefully sequenced attacks,
the risk and impact of the attack in principle increases as the adversary progresses within the
kill chain. For each progression it is assumed that at least one asset has been compromised,
which in turn suggests that the security controls were not efective. As such, the need for
human intervention and participation is expected to increase.</p>
      <p>Moreover, considering the level of uncertainty (and complexity) as expressed by the Cynefin
framework, we expect that the higher the degree of uncertainty, the more demand of human
intervention, at an earlier stage of the kill chain. This is required as in high uncertainty situations
it may not even be possible to distinguish on which phase of the kill chain a (detected) attack
will be at.</p>
    </sec>
    <sec id="sec-4">
      <title>4. Concluding remarks and ongoing work</title>
      <p>In this paper we sketched an approach for assessing and studying the challenges that arise
from introducing AI-facilitated operations – that is, self-healing – in the cyber incident
handling lifecycle. This approach fuses subjective measurable features and dimensions that are
of significance to the interplay of the AI and human operator interaction. Using the proposed
architecture developed for the Cyber-pi project, the future research will develop and deploy
cyberthreat scenarios and use cases that will be deployed on a cyber range. This will enable the
empirical assessment and evaluation of the approach.</p>
    </sec>
    <sec id="sec-5">
      <title>Acknowledgments</title>
      <p>Co-financed by the European Regional Development Fund of the European Union and Greek
national funds through the Operational Program Competitiveness, Entrepreneurship and
Innovation, under the call RESEARCH - CREATE - INNOVATE (project code: T2EDK-01469).
[6] E. Agyepong, Y. Cherdantseva, P. Reinecke, P. Burnap, Challenges and performance
metrics for security operations center analysts: a systematic review, Journal of Cyber
Security Technology 4 (2020) 125–152.
[7] C. Zhong, T. Lin, P. Liu, J. Yen, K. Chen, A cyber security data triage operation retrieval
system, Computers &amp; Security 76 (2018) 12–31.
[8] P. Lif, T. Sommestad, Human factors related to the performance of intrusion detection
operators., in: HAISA, 2015, pp. 265–275.
[9] L. Aijaz, B. Aslam, U. Khalid, Security operations center—a need for an academic
environment, in: 2015 World Symposium on Computer Networks and Information Security
(WSCNIS), IEEE, 2015, pp. 1–7.
[10] S. C. Sundaramurthy, M. Wesch, X. Ou, J. McHugh, S. R. Rajagopalan, A. G. Bardas, Humans
are dynamic-our tools should be too, IEEE Internet Computing 21 (2017) 40–46.
[11] S. G. Hart, NASA task load index (TLX), Technical Report 20000021488, Human
Performance Research Group, NASA Ames Research Center, Mofett Field, California, 1986.
[12] D. J. Snowden, M. E. Boone, A leader’s framework for decision making, Harvard business
review 85 (2007) 68.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <given-names>M.</given-names>
            <surname>Spremić</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Šimunic</surname>
          </string-name>
          ,
          <article-title>Cyber security challenges in digital economy</article-title>
          ,
          <source>in: Proceedings of the World Congress on Engineering</source>
          , volume
          <volume>1</volume>
          , International Association of Engineers Hong Kong, China,
          <year>2018</year>
          , pp.
          <fpage>341</fpage>
          -
          <lpage>346</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <given-names>B.</given-names>
            <surname>Al Sabbagh</surname>
          </string-name>
          ,
          <article-title>Cybersecurity incident response: a socio-technical approach</article-title>
          ,
          <source>Ph.D. thesis</source>
          , Department of Computer and Systems Sciences, Stockholm University,
          <year>2019</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>K.</given-names>
            <surname>Kandasamy</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Srinivas</surname>
          </string-name>
          ,
          <string-name>
            <given-names>K.</given-names>
            <surname>Achuthan</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V. P.</given-names>
            <surname>Rangan</surname>
          </string-name>
          ,
          <article-title>Iot cyber risk: A holistic analysis of cyber risk assessment frameworks, risk vectors, and risk ranking process</article-title>
          ,
          <source>EURASIP Journal on Information Security</source>
          <year>2020</year>
          (
          <year>2020</year>
          )
          <fpage>1</fpage>
          -
          <lpage>18</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>A.</given-names>
            <surname>Malik</surname>
          </string-name>
          ,
          <article-title>Microsoft says Bing can be provoked to respond outside of its 'designed tone'</article-title>
          , https://techcrunch.com/
          <year>2023</year>
          /02/16/ microsoft-bing
          <article-title>-provoked-respond-outside-of-designed-</article-title>
          <string-name>
            <surname>tone</surname>
            <given-names>/</given-names>
          </string-name>
          ,
          <year>2023</year>
          . [Online; accessed 22-February-2023].
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>S.</given-names>
            <surname>Halangoda</surname>
          </string-name>
          , OpenAI ChatGPT for Cyber Security, https://infosecwriteups.com
          <article-title>/ openai-chatgpt-for-cyber-security-</article-title>
          <string-name>
            <surname>4bc602069f9c</surname>
          </string-name>
          ,
          <year>2022</year>
          . [Online; accessed 22-
          <fpage>February2023</fpage>
          ].
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>