A game theoretic model of strategic conflict in cyberspace
Schramm, Harrison C.
Alderson, David L.
Carlyle, W. Matthew
Dimitrov, Nedialko B.
MetadataShow full item record
We study cyber conflict as a strictly competitive, two-person game in discrete time, where each player discovers new exploits according to an independent random process. Upon discovery, the player must decide if and when to exercise a munition based on that exploit. The payoff from using the munition is a function of time that is (generally) increasing. These factors create a basic tension: the longer a player waits to exercise a munition, the greater his payoff because the munition is more mature, but also the greater the chance that the opponent will also discover the exploit and nullify the munition. Assuming perfect knowledge and under mild restrictions on the time-dependent payoff function for a munition, we derive optimal exercise strategies and quantify the value of engaging in cyber conflict. Our analysis also leads to high level insights on cyber conflict strategy.
Showing items related by title, author, creator and subject.
Schramm, Harrison C.; Alderson, David L.; Carlyle, W. Matthew; Dimitrov, Nedialko B. (JSTOR, 2014);We study cyber conflict as a strictly competitive, two-person game in discrete time, where each player discovers new exploits according to an independent random process. Upon discovery, the player must decide if and when ...
Page, John Mann (Monterey, California. Naval Postgraduate School, 1991-09);The new Army warfighting doctrine, AirLand Operations, is designed for the army of the 90's, a smaller army, but one which will be faced with global responsibilities. These responsibilities will range from fighting wars ...
Lagana, John P. (Monterey, California. Naval Postgraduate School, 2004-09);Since the country has moved into the Information Age, the military forces have been moving towards network based operations. The rapid expansion of the internet and information technology (IT) has led to the emerging theory ...