Shambhu Upadhyaya’s research while affiliated with SUNY Ulster and other places

What is this page?


This page lists works of an author who doesn't have a ResearchGate profile or hasn't added the works to their profile yet. It is automatically generated from public (personal) data to further our legitimate goal of comprehensive and accurate scientific recordkeeping. If you are this author and want this page removed, please let us know.

Publications (301)


View of Primary and Secondary Control as Antecedents to the Dark Traits in Predicting Attraction to Hacking Behavior
  • Article
  • Full-text available

July 2024

·

51 Reads

Journal of Organizational Psychology

·

·

David Murray

·

[...]

·

The current study examines the relationship between the need for control, the Dark Triad personality traits, and hacking intent. We surveyed 523 individuals using a scenario design and investigated the role of both primary and secondary control as antecedents to Machiavellianism, psychopathy, and narcissism leading to both white- (i.e., ethical) and black-hat hacking interest. Our findings suggest that primary control is a significant antecedent to all three dark personality traits such that a higher intrinsic need for control is positively associated with Machiavellianism, narcissism, and psychopathy. Secondary control, however, has comparatively different effects on dark personality traits, demonstrating a negative effect only on psychopathy. Both Machiavellianism and psychopathy predicted both white- and black-hat hacking interests along with the perceived probability of apprehension. Overall, our findings suggest that primary control drives all three dark personality traits, yet only two of the three dark personality traits – Machiavellianism and psychopathy – are related to hacking interest.

Download



A Game Theoretic Approach to the Design of Mitigation Strategies for Generic Ransomware

July 2023

·

17 Reads

·

1 Citation

Communications in Computer and Information Science

Recently, ransomware attacks have become widespread and are causing unprecedented damage to cyber-physical systems. Although there are various types of ransomware, this paper focuses on a generic version and analyzes it using game theory. When attacked, victims are often faced with the dilemma of deciding whether or not to pay a ransom. To assist victims in making this decision, we develop a game-theoretic model that examines the attack environment and determines the conditions under which the defender has an advantage in neutralizing the attack. We introduce two new parameters to the game model to aid in decision-making when confronted with a ransomware attack. Additionally, we present game models that depict both rational and irrational attacker behavior. We perform a sensitivity analysis on the game model in cases where the attacker behaves rationally, and demonstrate the impact of the parameters on the decision-making process and equilibrium strategies. Ultimately, we explore how the model’s outcomes can assist defenders in designing an effective defense system to prevent and mitigate future attacks of a similar nature. This also, prepares the ground for analysis of more advanced form of malware. KeywordsCryptographyComputer securityCybersecurityGame theoryRansomware



Figure 1. Becker crime Utility model
Latent Variable Statistics
The interaction of dark traits with the perceptions of apprehension

January 2022

·

154 Reads

·

1 Citation


Decepticon: a Theoretical Framework to Counter Advanced Persistent Threats

August 2021

·

88 Reads

·

15 Citations

Deception has been proposed in the literature as an effective defense mechanism to address Advanced Persistent Threats (APT). However, administering deception in a cost-effective manner requires a good understanding of the attack landscape. The attacks mounted by APT groups are highly diverse and sophisticated in nature and can render traditional signature based intrusion detection systems useless. This necessitates the development of behavior oriented defense mechanisms. In this paper, we develop Decepticon (Deception-based countermeasure), a Hidden Markov Model based framework where the indicators of compromise (IoC) are used as the observable features to aid in detection. This theoretical framework also includes several models to represent the spread of APTs in a computer system. The presented framework can be used to select an appropriate deception script when faced with APTs or other similar malware and trigger an appropriate defensive response. The effectiveness of the models in a networked system is illustrated by considering a real APT type ransomware.



An Activity Theory Approach to Leak Detection and Mitigation in Patient Health Information (PHI)

January 2021

·

14 Reads

·

10 Citations

Journal of the Association for Information Systems

The migration to electronic health records (EHR) in the healthcare industry has raised issues with respect to security and privacy. One issue that has become a concern for healthcare providers, insurance companies, and pharmacies is patient health information (PHI) leaks because PHI leaks can lead to violation of privacy laws, which protect the privacy of individuals’ identifiable health information, potentially resulting in a healthcare crisis. This study explores the issue of PHI leaks from an access control viewpoint. We utilize access control policies and PHI leak scenarios derived from semi structured interviews with four healthcare practitioners and use the lens of activity theory to articulate the design of an access control model for detecting and mitigating PHI leaks. Subsequently, we follow up with a prototype as a proof of concept.


An Analysis of Complexity of Insider Attacks to Databases

May 2020

·

21 Reads

·

1 Citation

ACM Transactions on Management Information Systems

Insider attacks are one of the most dangerous threats to an organization. Unfortunately, they are very difficult to foresee, detect, and defend against due to the trust and responsibilities placed on the employees. In this article, we first define the notion of user intent and construct a model for a common scenario that poses a very high risk for sensitive data stored in the organization’s database. We show that the complexity of identifying pseudo-intents of a user in this scenario is coNP-Complete, and launching a harvester insider attack within the boundaries of the defined threat model takes linear time while a targeted threat model is an NP-Complete problem. We also discuss the general defense mechanisms against the modeled threats and show that countering the harvester insider attack takes quadratic time while countering the targeted insider attack can take linear to quadratic time, depending on the strategy chosen. We analyze the adversarial behavior and show that launching an attack with minimum risk is also an NP-Complete problem. Finally, we perform timing experiments with the defense mechanisms on SQL query workloads collected from a national bank to test the feasibility of using these systems in real time.


Citations (75)


... Extensive simulations are provided to evaluate the resulting equilibrium payoffs, depending on their decision input parameters. The papers [2][3][4] embed ransom attacks in the wider network security framework of Advanced Persistent Threats (APTs). While the scope of the developed models is broader, with the vision of a global framework, aiding the response to largescale ransom attacks orchestrated by entire hostile organisations or nations, the essentials of the model remained the same, centred around the decision-making involved between paying the ransom or not, and the attacker releasing the data after payment, or to deceive by failing to do so. ...

Reference:

Ransom Roulette: Learning the Games Behind Cyber Extortion
A Game Theoretic Approach to the Design of Mitigation Strategies for Generic Ransomware
  • Citing Chapter
  • July 2023

Communications in Computer and Information Science

... To bridge the gap, this work conducts a systematic analysis of how clinicians and NLP researchers communicate and collaborate as an interdisciplinary team in two clinical NLP projects, leveraging Activity Theory (AT) as a generalizable analytical framework. AT [18,26,27] provides a holistic view of human activities and has been widely adopted in the context of healthcare [5,29,30,32,75]. Prior studies have used AT as an analytical framework to explore boundary objects in similar team collaboration scenarios, such as disaster management and system development [5,30,32,75], illustrating that AT could be applicable to our analysis to examine how clinicians and NLP researchers collaborate in clinical NLP projects. ...

An Activity Theory Approach to Leak Detection and Mitigation in Patient Health Information (PHI)
  • Citing Article
  • January 2021

Journal of the Association for Information Systems

... Extensive simulations are provided to evaluate the resulting equilibrium payoffs, depending on their decision input parameters. The papers [2][3][4] embed ransom attacks in the wider network security framework of Advanced Persistent Threats (APTs). While the scope of the developed models is broader, with the vision of a global framework, aiding the response to largescale ransom attacks orchestrated by entire hostile organisations or nations, the essentials of the model remained the same, centred around the decision-making involved between paying the ransom or not, and the attacker releasing the data after payment, or to deceive by failing to do so. ...

Game Theoretic Analysis of Ransomware: A Preliminary Study
  • Citing Conference Paper
  • January 2022

... Moreover, some studies have linked Machiavellianism and psychopathy with a higher tolerance for deviant online behaviors (e.g., hate speech, posting nudity; [126]). Psychopathy has also been connected to a lessened apprehension about being detected when violating privacy laws at work [127]. Finally, our SMEs (see Table 1) identified both Machiavellianism and psychopathy as likely to be positively associated with malicious insider threats but only psychopathy to be strongly related to non-malicious or accidental insider threats, given the association between psychopathy and reckless behaviors. ...

The interaction of dark traits with the perceptions of apprehension

... This DSS is utilized for securely converging IoT devices with artificial intelligence technology [4]. Creating an effectual security system is a key requirement for improving a system when combining IoT with artificial intelligence technology [5]. ...

Advances in Secure Knowledge Management in the Artificial Intelligence Era
  • Citing Article
  • July 2021

... For example, the rapid evolution of cyber threats often outpaces existing security measures. As technology advances, so do the methods employed by cybercriminals, creating a constant need for updated defenses and strategies (Baksi and Upadhyaya 2021;Zhu et al. 2022). Integrating cybersecurity into corporate culture and business processes is not always straightforward (Krishna, Krishnan, and Sebastian 2023). ...

Decepticon: a Theoretical Framework to Counter Advanced Persistent Threats

... Baksi et al. [2] proposed a deception-based hidden Markov model to counter the APT attacks especially ransomware. The authors used deception methodology combined Kidemonas framework to detect and counter ransomware attacks by traffic analysis with HMM models in automated way in large corporate networks. ...

Decepticon: A Hidden Markov Model Approach to Counter Advanced Persistent Threats
  • Citing Chapter
  • March 2020

Communications in Computer and Information Science

... The personality traits of 83 cybercriminals held in South Korean prisons were evaluated. Consequently, in the research [51], [53], [55], [58], they measure the potential profile of cyber attackers in students of some technical careers and individuals in general. ...

Psychological Profiling of Hacking Potential

... Likewise, Nan & Lu (2014, p.1136 illustrate the importance of "organising dynamics for a large number of organisation members to self-organise online toward an orderly and rational crisis management process", while Mejia et al (2019) discuss how consumers use applications (e.g., Yelp) to create an information database about the quality of restaurants, improve restaurants' hygiene practices, and reduce the amount of restaurant-related food-borne illness which can lead to crises in the form of various 'hazards'. Another example is a study by Valecha et al (2019) which explores how emergency response involves multiple local, state, and federal communities of responders in the USA. These communities are supported by emergency dispatch agencies that share digital trace resources for task-critical information. ...

An Activity Theory Approach to Modeling Dispatch-Mediated Emergency Response

Journal of the Association for Information Systems