Cyber Warfare

Cyber warfare has been simmering for a long time and has gradually morphed into a key strategic weapon in international conflicts. Doctrines of several countries consider cyber warfare capability as essential to gain strategic superiority or as a counterbalance to military inferiority. Countries are attempting to reach consensus on confidence building measures in cyber space while racing with each other to acquire cyber weaponry. These attempts are strongly influenced by the problem of clear attribution of cyber incidents as well as political imperatives. Game theory has been used in the past for such problems in international relations where players compete with each other and the actions of the players are interdependent. Problems in cyber warfare can benefit from similar game theoretic concepts. We discuss in this book chapter the state of cyber warfare, the key imperatives for the countries, and articulate how countries are jostling with each other in the cyber domain especially in the context of poor attribution and verification in the cyber domain. We present game theoretic models for a few representative problems in the cyber warfare domain.

[1]  George Kingsley Zipf,et al.  Human behavior and the principle of least effort , 1949 .

[2]  Paul E. Johnson,et al.  Detecting deception: adversarial problem solving in a low base-rate world , 2001, Cogn. Sci..

[3]  Rafal Rohozinski,et al.  Stuxnet and the Future of Cyber War , 2011 .

[4]  J. G. Hollands,et al.  Engineering Psychology and Human Performance , 1984 .

[5]  Jeffrey K. Bassett,et al.  An Agent-Based Model of Conflict in East Africa And the Effect of Watering Holes , 2010 .

[6]  Nancy J. Cooke,et al.  Effects of Teamwork versus Group Work on Signal Detection in Cyber Defense Teams , 2013, HCI.

[7]  E. Adelson Lightness Perception and Lightness Illusions , 1999 .

[8]  Uffe Kock Wiil,et al.  Notice of Violation of IEEE Publication PrinciplesDetecting New Trends in Terrorist Networks , 2010, 2010 International Conference on Advances in Social Networks Analysis and Mining.

[9]  Richard Rothenberg,et al.  From Whole Cloth : Making up the terrorist network , 2002 .

[10]  Hamid M Salim,et al.  Cyber safety : a systems thinking and systems theory approach to managing cyber security risks , 2014 .

[11]  Barton Whaley Toward a general theory of deception , 1982 .

[12]  Phillip Gowlett,et al.  Moving Forward with Computational Red Teaming , 2011 .

[13]  Ralph Langner To Kill a Centrifuge A Technical Analysis of What Stuxnet ’ s Creators Tried to Achieve , 2013 .

[14]  John Wylie Lloyd,et al.  Foundations of Logic Programming , 1987, Symbolic Computation.

[15]  Wei Xu,et al.  Toward worm detection in online social networks , 2010, ACSAC '10.

[16]  Igor Kotenko AGENT-BASED MODELING AND SIMULATION OF CYBERWARFARE BETWEEN MALEFACTORS AND SECURITY AGENTS IN INTERNET , 2005 .

[17]  Cleotilde Gonzalez,et al.  Instance‐based Learning: A General Model of Repeated Binary Choice , 2012 .

[18]  Allan R. Millett,et al.  Military Innovation in the Interwar Period , 1999 .

[19]  Joseph T. Coyne,et al.  Robust Intelligence (RI) under uncertainty: Mathematical and conceptual foundations of autonomous hybrid (human-machine-robot) teams, organizations and systems , 2013 .

[20]  I. Kotenko,et al.  Multi-agent Modelling and Simulation of Cyber-Attacks and Cyber-Defense for Homeland Security , 2007, 2007 4th IEEE Workshop on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications.

[21]  Varvara Mitliaga,et al.  Networks and Netwars - The Future of Terror, Crime, and Militancy , 2002, Int. J. Law Inf. Technol..

[22]  Samuel B. Griffith The Chinese People's Liberation Army , 1968 .

[23]  Neil C. Rowe Counterplanning deceptions to foil cyber-attack plans , 2003, IEEE Systems, Man and Cybernetics SocietyInformation Assurance Workshop, 2003..

[24]  Michael K. Martin,et al.  Instance-Based Decision Making Model of Repeated Binary Choice , 2007 .

[25]  Eduardo B. Andrade,et al.  The Curious Case of Behavioral Backlash: Why Brands Produce Priming Effects and Slogans Produce Reverse Priming Effects , 2011 .

[26]  David Liben-Nowell,et al.  The link-prediction problem for social networks , 2007 .

[27]  Richard W. Bloom,et al.  Foundations of Psychological Profiling: Terrorism, Espionage, and Deception , 2013 .

[28]  Marc Sageman,et al.  Understanding terror networks. , 2004, International journal of emergency mental health.

[29]  Sushil Jajodia,et al.  Cyber Situational Awareness - Issues and Research , 2009, Cyber Situational Awareness.

[30]  Robyn M. Dawes,et al.  Everyday Irrationality: How Pseudo- Scientists, Lunatics, And The Rest Of Us Systematically Fail To Think Rationally , 2001 .

[31]  Ion Juvina,et al.  The Effects of Individual and Context on Aggression in Repeated Social Interaction , 2011, HCI.

[32]  C. Lebiere,et al.  Instance-Based Cognitive Models of Decision-Making , 2005 .

[33]  Lucas Kello The Meaning of the Cyber Revolution: Perils to Theory and Statecraft , 2013, International Security.

[34]  N.C. Rowe,et al.  A model of deception during cyber-attacks on information systems , 2004, IEEE First Symposium onMulti-Agent Security and Survivability, 2004.

[35]  Cleotilde Gonzalez,et al.  Balancing Fairness and Efficiency in Repeated Societal Interaction , 2013, CogSci.

[36]  D McMorrow,et al.  Science of Cyber-Security , 2010 .

[37]  Eric Michael Hutchins,et al.  Intelligence-Driven Computer Network Defense Informed by Analysis of Adversary Campaigns and Intrusion Kill Chains , 2010 .

[38]  Jure Leskovec,et al.  The Network Completion Problem: Inferring Missing Nodes and Edges in Networks , 2011, SDM.

[39]  Hossein Saidi,et al.  Malware propagation in Online Social Networks , 2009, 2009 4th International Conference on Malicious and Unwanted Software (MALWARE).

[40]  David T. Lykken,et al.  Detecting deception , 1997, Behavioral and Brain Sciences.

[41]  R. Hertwig,et al.  The role of information sampling in risky choice , 2006 .

[42]  E. J. Epstein,et al.  Deception: The Invisible War Between the KGB and the CIA , 1989 .

[43]  Harold H. Kelley,et al.  Lewin, Situations, and Interdependence , 1991 .

[44]  Jon R. Lindsay,et al.  Stuxnet and the Limits of Cyber Warfare , 2013 .

[45]  W. Hamilton,et al.  The evolution of cooperation. , 1984, Science.

[46]  Abu Bakr Naji,et al.  The Management of Savagery: The Most Critical Stage Through Which the Umma Will Pass , 2004 .

[47]  Marc Dacier,et al.  Assessing Cybercrime Through the Eyes of the WOMBAT , 2010, Cyber Situational Awareness.

[48]  S. Kaplan,et al.  On The Quantitative Definition of Risk , 1981 .

[49]  Jacob Goldberger,et al.  Unifying Unknown Nodes in the Internet Graph Using Semisupervised Spectral Clustering , 2008, 2008 IEEE International Conference on Data Mining Workshops.

[50]  Barton Whaley Detecting Deception: A Bibliography of Counterdeception across Time, Cultures, and Disciplines; Second Edition , 2006 .

[51]  Stephen J. Ressler Social Network Analysis as an Approach to Combat Terrorism: Past, Present, and Future Research , 2006 .

[52]  Kristan J. Wheaton Teaching Strategic Intelligence Through Games , 2011 .

[53]  Kim Hartmann,et al.  The vulnerability of UAVs to cyber attacks - An approach to the risk assessment , 2013, 2013 5th International Conference on Cyber Conflict (CYCON 2013).

[54]  Charles V. Wright,et al.  Generating Client Workloads and High-Fidelity Network Traffic for Controllable, Repeatable Experiments in Computer Security , 2010, RAID.

[55]  Frank J. Stech,et al.  Active cyber defense with denial and deception: A cyber-wargame experiment , 2013, Comput. Secur..

[56]  D. Alberts,et al.  DoD Command and Control Research Program , 1998 .

[57]  Evan Mawdsley,et al.  A war to be won: fighting the Second World War , 2004 .

[58]  U. Netlogo Wilensky,et al.  Center for Connected Learning and Computer-Based Modeling , 1999 .

[59]  S. Borgatti,et al.  The centrality of groups and classes , 1999 .

[60]  S. Macdonald Propaganda and Information Warfare in the Twenty-First Century: Altered Images and Deception Operations , 2006 .

[61]  Jeffrey M. Bradshaw,et al.  Human Dimension in Cyber Operations Research and Development Priorities , 2013, HCI.

[62]  Fred S. Feer,et al.  Thinking-Red-in-Wargaming Workshop: Opportunities for Deception and Counterdeception in the Red Planning Process , 1989 .

[63]  Myriam Abramson Learning Temporal User Profiles of Web Browsing Behavior , 2014 .

[64]  Cleotilde Gonzalez,et al.  Modeling Strategic Dynamics Under Alternative Information Conditions , 2013 .

[65]  D. Kahneman Thinking, Fast and Slow , 2011 .

[66]  H. Kelley,et al.  The social psychology of groups , 1960 .

[67]  W. Lowrance,et al.  Of Acceptable Risk: Science and the Determination of Safety , 1976 .

[68]  Scott Gerwehr,et al.  Unweaving the Web: Deception and Adaptation in Future Urban Operations , 2003 .

[69]  Rami Puzis,et al.  TONIC: Target Oriented Network Intelligence Collection for the Social Web , 2013, AAAI.

[70]  Guillermo Ricardo Simari,et al.  Computing Generalized Specificity , 2003, J. Appl. Non Class. Logics.

[71]  Robert F. Minehart Information Warfare: The Organizational Dimension. , 1996 .

[72]  Stephen J. Heuser Operational Deception and Counter Deception. , 1996 .

[73]  Barton Whaley,et al.  Detecting deception: Practice, practitioners, and theory , 2000 .

[74]  Bradford S. Bell,et al.  Team Learning: A Theoretical Integration and Review , 2012 .

[75]  Robert W. Proctor,et al.  An Instance-Based Learning Model of Stimulus-Response Compatibility Effects in Mixed Location-Relevant and Location-Irrelevant Tasks , 2009 .

[76]  Paulo Shakarian,et al.  Annotated probabilistic temporal logic , 2011, TOCL.

[77]  J. Haines,et al.  Achieving Cyber Survivability in a Contested Environment Using a Cyber Moving Target , 2011 .

[78]  M. Lewis Flash Boys: A Wall Street Revolt , 2014 .

[79]  Alice F. Healy,et al.  A cognitive modeling account of simultaneous learning and fatigue effects , 2011, Cognitive Systems Research.

[80]  D. M. Clarke The human contribution: unsafe acts, accidents and heroic recoveries , 2011 .

[81]  Jeffrey Pfeffer,et al.  Special Issue: Frontiers of Organization Science, Part 1 of 2: Building Organization Theory from First Principles: The Self-Enhancement Motive and Understanding Power and Influence , 2005, Organ. Sci..

[82]  J. March Learning to be risk averse. , 1996 .

[83]  Alexander Kott,et al.  Estimating Impact: A Handbook of Computational Methods and Models for Anticipating Economic, Social, Political and Security Effects in International Interventions , 2010 .

[84]  Valdis E. Krebs,et al.  Mapping Networks of Terrorist Cells , 2001 .

[85]  Philip A. McNair,et al.  Counterdeception and the Operational Commander. , 1997 .

[86]  Ralph Hertwig,et al.  What impacts the impact of rare events , 2008 .

[87]  Huan Liu,et al.  Near real time assessment of social media using geo-temporal network analytics , 2013, 2013 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM 2013).

[88]  V. S. Subrahmanian,et al.  Focused most probable world computations in probabilistic logic programs , 2012, Annals of Mathematics and Artificial Intelligence.

[89]  R. V. Jones Enduring principles Some Lessons in Intelligence , .

[90]  Anita Williams Woolley,et al.  Playing Offense vs. Defense: The Effects of Team Strategic Orientation on Team Process in Competitive Environments , 2011, Organ. Sci..

[91]  Cristian Molinaro,et al.  Using Generalized Annotated Programs to Solve Social Network Diffusion Optimization Problems , 2013, TOCL.

[92]  D. A. Kenny,et al.  Data analysis in social psychology. , 1998 .

[93]  A. Roth,et al.  Predicting How People Play Games: Reinforcement Learning in Experimental Games with Unique, Mixed Strategy Equilibria , 1998 .

[94]  Cleotilde Gonzalez,et al.  Accounting for the integration of descriptive and experiential information in a repeated prisoner's dilemma using an instance-based learning model , 2013 .

[95]  Robert H. Scales,et al.  Future Warfare: Anthology - Revised Edition , 2014 .

[96]  Paulo Shakarian,et al.  Belief revision in structured probabilistic argumentation , 2015, Annals of Mathematics and Artificial Intelligence.

[97]  Joshua Glasser,et al.  Bridging the Gap: A Pragmatic Approach to Generating Insider Threat Data , 2013, 2013 IEEE Security and Privacy Workshops.

[98]  Guillermo Ricardo Simari,et al.  Defeasible logic programming: an argumentative approach , 2003, Theory and Practice of Logic Programming.

[99]  J. Graves The descent of man , 2004, Nature.

[100]  Cleotilde Gonzalez,et al.  Instance-based learning in dynamic decision making , 2003, Cogn. Sci..

[101]  David Patrick Duggan,et al.  Categorizing threat : building and using a generic threat matrix. , 2007 .

[102]  W. Earl Boebert A Survey of Challenges in Attribution , 2011 .

[103]  Wei Wang,et al.  Detecting Targeted Attacks By Multilayer Deception , 2013, J. Cyber Secur. Mobil..

[104]  Bryan Krekel,et al.  Capability of the People's Republic of China to Conduct Cyber Warfare and Computer Network Exploitation , 2009 .

[105]  Tansu Alpcan,et al.  Network Security , 2010 .

[106]  R. Hertwig,et al.  Decisions from Experience and the Effect of Rare Events in Risky Choice , 2004, Psychological science.

[107]  E. Xing,et al.  Mixed Membership Stochastic Block Models for Relational Data with Application to Protein-Protein Interactions , 2006 .

[108]  Frederick Mosteller,et al.  Stochastic Models for Learning , 1956 .

[109]  Samuel N. Hamilton,et al.  Adversary Modeling and Simulation in Cyber Warfare , 2008, SEC.

[110]  T. Başar,et al.  An Intrusion Detection Game with Limited Observations , 2005 .

[111]  Robert B. Ahdieh,et al.  Beyond Individualism in Law and Economics , 2009 .

[112]  Barton Whaley,et al.  The one percent solution: Costs and benefits of military deception , 2007 .

[113]  L. Demause,et al.  Confront and Conceal: Obama's Secret Wars and Surprising Use of American Power , 2013 .

[114]  Chase Qishi Wu,et al.  A Survey of Game Theory as Applied to Network Security , 2010, 2010 43rd Hawaii International Conference on System Sciences.

[115]  N. Rowe A Taxonomy of Deception in Cyberspace , 2006 .

[116]  S. Yetiv,et al.  National Security through a Cockeyed Lens: How Cognitive Bias Impacts U.S. Foreign Policy , 2013 .

[117]  A. Roth,et al.  Learning in Extensive-Form Games: Experimental Data and Simple Dynamic Models in the Intermediate Term* , 1995 .

[118]  Mark S. Boddy,et al.  Course of Action Generation for Cyber Security Using Classical Planning , 2005, ICAPS.

[119]  J. Glowniak,et al.  History, structure, and function of the Internet. , 1998, Seminars in nuclear medicine.

[120]  Cleotilde Gonzalez,et al.  Cyber Situation Awareness: Modeling the Security Analyst in a Cyber-Attack Scenario through Instance-Based Learning , 2011, DBSec.

[121]  Guillermo Ricardo Simari,et al.  A Mathematical Treatment of Defeasible Reasoning and its Implementation , 1992, Artif. Intell..

[122]  Katia P. Sycara,et al.  Game Theoretic Modeling and Computational Analysis of N-Player Conflicts over Resources , 2011, 2011 IEEE Third Int'l Conference on Privacy, Security, Risk and Trust and 2011 IEEE Third Int'l Conference on Social Computing.

[123]  S. Stephenson,et al.  The Dynamics of Military Revolution, 1300-2050 , 2003 .

[124]  Ron Sun,et al.  The CLARION Cognitive Architecture , 2017 .

[125]  Cleotilde Gonzalez Learning to Make Decisions in Dynamic Environments: ACT-R Plays the Beer Game , 2004, ICCM.

[126]  Wendy K. Smith,et al.  Managing Strategic Contradictions: A Top Management Model for Managing Innovation Streams , 2005 .

[127]  Mohammad Al Hasan,et al.  Link prediction using supervised learning , 2006 .

[128]  Paul S. Fischbeck,et al.  Estimating the Shape of Covert Networks , 2003 .

[129]  Marc Dacier,et al.  On a multicriteria clustering approach for attack attribution , 2010, SKDD.

[130]  Koyel Ghosh,et al.  Dynamical entropy via entropy of non-random matrices: application to stability and complexity in modelling ecosystems. , 2013, Mathematical biosciences.

[131]  Denver E McPherson,et al.  Deception Recognition: Rethinking the Operational Commander's Approach , 2010 .

[132]  Richards J. Heuer,et al.  Strategic Deception and Counterdeception , 1981 .

[133]  Charu C. Aggarwal,et al.  Social Network Data Analytics , 2011 .

[134]  Marie Faerber,et al.  Winning The Next War Innovation And The Modern Military , 2016 .

[135]  Frank J. Stech,et al.  Midway Revisited: Detecting Deception by Analysis of Competing Hypothesis , 2007 .

[136]  Cleotilde Gonzalez,et al.  Instance-based Learning Models of Training , 2010 .

[137]  Sarit Kraus,et al.  Diffusion Centrality in Social Networks , 2012, 2012 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining.

[138]  Jack M. Feldman,et al.  Self-generated validity and other effects of measurement on belief, attitude, intention, and behavior. , 1988 .

[139]  Paulo Shakarian,et al.  Introduction to Cyber-Warfare: A Multidisciplinary Approach , 2013 .

[140]  Richards J. Heuer,et al.  Psychology of Intelligence Analysis , 1999 .

[141]  Sarit Kraus,et al.  Identifying Missing Node Information in Social Networks , 2011, AAAI.

[142]  Paulo Shakarian,et al.  Annotated Probabilistic Temporal Logic: Approximate Fixpoint Implementation , 2012, TOCL.

[143]  Barton Whaley,et al.  Stratagem: Deception and Surprise in War , 2007 .

[144]  Dipankar Dasgupta,et al.  Game theory for cyber security , 2010, CSIIRW '10.

[145]  K. Dill,et al.  Principles of maximum entropy and maximum caliber in statistical physics , 2013 .

[146]  A. Woolley Which Side Are You On? How Offensive and Defensive Strategic Orientation Impact Task Focus and Information Search in Teams , 2009 .

[147]  George Backus,et al.  Modeling the Interaction Between Leaders and Society During Conflict Situations , 2009 .