Guarding Against Malicious Biased Threats (GAMBiT): Experimental Design of Cognitive Sensors and Triggers with Behavioral Impact Analysis

📅 2025-11-26
📈 Citations: 0
Influential: 0
📄 PDF
🤖 AI Summary
Traditional cybersecurity defenses assume attackers are fully rational, overlooking their inherent cognitive constraints and biases. This paper proposes GAMBiT—the first proactive defense framework that explicitly models attacker cognitive states within adversarial game-theoretic interactions. GAMBiT embeds cognitive sensors and triggers to detect real-time deviations—including loss aversion, base-rate neglect, and sunk-cost fallacy—and dynamically intervenes in the attacker’s decision-making process. By shifting from passive protection to active cognitive manipulation, GAMBiT establishes the first systematic methodology for modeling and strategically exploiting psychological biases in cyber defense. Three controlled human-subject experiments (n = 61) demonstrate that GAMBiT significantly reduces attack task completion rates, induces substantial path deviation from optimal strategies, and increases behavioral detectability—collectively degrading attacker efficiency. The results validate the feasibility and efficacy of cognition-aware, game-theoretic active defense.

Technology Category

Application Category

📝 Abstract
This paper introduces GAMBiT (Guarding Against Malicious Biased Threats), a cognitive-informed cyber defense framework that leverages deviations from human rationality as a new defensive surface. Conventional cyber defenses assume rational, utility-maximizing attackers, yet real-world adversaries exhibit cognitive constraints and biases that shape their interactions with complex digital systems. GAMBiT embeds insights from cognitive science into cyber environments through cognitive triggers, which activate biases such as loss aversion, base-rate neglect, and sunk-cost fallacy, and through newly developed cognitive sensors that infer attackers' cognitive states from behavioral and network data. Three rounds of human-subject experiments (total n=61) in a simulated small business network demonstrate that these manipulations significantly disrupt attacker performance, reducing mission progress, diverting actions off the true attack path, and increasing detectability. These results demonstrate that cognitive biases can be systematically triggered to degrade the attacker's efficiency and enhance the defender's advantage. GAMBiT establishes a new paradigm in which the attacker's mind becomes part of the battlefield and cognitive manipulation becomes a proactive vector for cyber defense.
Problem

Research questions and friction points this paper is trying to address.

Introduces GAMBiT to exploit attacker cognitive biases for cyber defense
Uses cognitive triggers and sensors to disrupt attacker performance and detectability
Establishes cognitive manipulation as a new proactive cyber defense paradigm
Innovation

Methods, ideas, or system contributions that make the work stand out.

Leverages cognitive biases as a new defensive surface
Uses cognitive triggers to activate attacker biases
Employs cognitive sensors to infer attacker cognitive states
🔎 Similar Papers
No similar papers found.
B
Brandon Beltz
The Bulls Run Group, 9207 Bulls Run Pkwy, Bethesda, 20817 MD, USA.
P
Po-Yu Chen
Grado Department of Industrial and Systems Engineering, Virginia Tech, Blacksburg, 24061, VA, USA.
J
James Doty
The Bulls Run Group, 9207 Bulls Run Pkwy, Bethesda, 20817 MD, USA.
Y
Yvonne Fonken
Raytheon Technologies, 1000 Wilson Blvd., Arlington, 22209, VA, USA.
Nikolos Gurney
Nikolos Gurney
University of Southern California
Behavioral ScienceAIComputer ScienceDecision Making
H
Hsiang-Wen Hsing
Grado Department of Industrial and Systems Engineering, Virginia Tech, Blacksburg, 24061, VA, USA.
S
Sofia Hirschmann
Khoury College of Computer Sciences, Northeastern University, Boston, 02115, MA, USA.
Brett Israelsen
Brett Israelsen
RTX Technology Research Center (RTRC)
Artificial IntelligenceAI Competency AssessmentAI EthicsHuman-AI TrustExplainability
N
Nathan Lau
Grado Department of Industrial and Systems Engineering, Virginia Tech, Blacksburg, 24061, VA, USA.
M
Mengyun Li
The Bulls Run Group, 9207 Bulls Run Pkwy, Bethesda, 20817 MD, USA.
Stacy Marsella
Stacy Marsella
Northeastern University
Michael Murray
Michael Murray
University of Washington
RoboticsComputer VisionNatural Language Processing
J
Jinwoo Oh
Grado Department of Industrial and Systems Engineering, Virginia Tech, Blacksburg, 24061, VA, USA.
A
Amy Sliva
Department of Computer Science, King’s College, Wilkes-Barre, 18711, PA, USA.
K
Kunal Srivastava
Raytheon Technologies, 1000 Wilson Blvd., Arlington, 22209, VA, USA.
S
Stoney Trent
The Bulls Run Group, 9207 Bulls Run Pkwy, Bethesda, 20817 MD, USA.
Peggy Wu
Peggy Wu
Principal Research Scientist, Raytheon
Artificial IntelligenceHuman Computer InteractionComputational EtiquetteVirtual RealityLearning
Ya-Ting Yang
Ya-Ting Yang
Department of Electrical and Computer Engineering, Tandon School of Engineering, New York University
Game theorycyber securityintelligent transportation
Quanyan Zhu
Quanyan Zhu
Department of Electrical and Computer Engineering, New York University
AIGame and Control TheorySecurity and ResilienceAutonomyCyber-Physical Systems