Timing of cyber conflict

被引:34
作者
Axelrod, Robert [1 ]
Iliev, Rumen [1 ]
机构
[1] Univ Michigan, Ford Sch Publ Policy, Ann Arbor, MI 48109 USA
关键词
computer security; international; conflict; stealth; persistence;
D O I
10.1073/pnas.1322638111
中图分类号
O [数理科学和化学]; P [天文学、地球科学]; Q [生物科学]; N [自然科学总论];
学科分类号
07 ; 0710 ; 09 ;
摘要
Nations are accumulating cyber resources in the form of stockpiles of zero-day exploits as well as other novel methods of engaging in future cyber conflict against selected targets. This paper analyzes the optimal timing for the use of such cyber resources. A simple mathematical model is offered to clarify how the timing of such a choice can depend on the stakes involved in the present situation, as well as the characteristics of the resource for exploitation. The model deals with the question of when the resource should be used given that its use today may well prevent it from being available for use later. The analysis provides concepts, theory, applications, and distinctions to promote the understanding strategy aspects of cyber conflict. Case studies include the Stuxnet attack on Iran's nuclear program, the Iranian cyber attack on the energy firm Saudi Aramco, the persistent cyber espionage carried out by the Chinese military, and an analogous case of economic coercion by China in a dispute with Japan. The effects of the rapidly expanding market for zero-day exploits are also analyzed. The goal of the paper is to promote the understanding of this domain of cyber conflict to mitigate the harm it can do, and harness the capabilities it can provide.
引用
收藏
页码:1298 / 1303
页数:6
相关论文
共 25 条
[1]  
[Anonymous], 2013, To kill a centrifuge a technical analysis of what Stuxnet's creators tried to achieve
[2]  
[Anonymous], 2013, XINHUA 0219
[3]   RATIONAL TIMING OF SURPRISE [J].
AXELROD, R .
WORLD POLITICS, 1979, 31 (02) :228-246
[4]   THE SOVIET PRESS ON SOVIET-FOREIGN-POLICY - A USUALLY RELIABLE SOURCE [J].
AXELROD, R ;
ZIMMERMAN, W .
BRITISH JOURNAL OF POLITICAL SCIENCE, 1981, 11 (APR) :183-200
[5]  
Baldor LC, 2012, YAHOO NEWS 1012
[6]  
Bilge L., 2012, P 2012 ACM C COMP CO, P833, DOI [10.1145/2382196.2382284, DOI 10.1145/2382196.2382284]
[7]  
Bradsher K, 2010, NY TIMES, P10
[8]  
Clapper J., 2013, Statement for the Record: Worldwide Threat Assessment of the US Intelligence Community
[9]  
Clarke R.A., 2010, Cyber War The Next Threat To National Security and What To Do About It
[10]  
Council on Foreign Relations, 2013, 70 COUNC FOR REL IND, V70