A game theoretic model of strategic conflict in cyberspace
Schramm, Harrison C.
Alderson, David L.
Carlyle, W. Matthew
Dimitrov, Nedialko B.
MetadataShow full item record
We study cyber conflict as a strictly competitive, two-person game in discrete time, where each player discovers new exploits according to an independent random process. Upon discovery, the player must decide if and when to exercise a munition based on that exploit. The payoff from using the munition is a function of time that is (generally) increasing. These factors create a basic tension: the longer a player waits to exercise a munition, the greater his payoff because the munition is more mature, but also the greater the chance that the opponent will also discover the exploit and nullify the munition. Assuming perfect knowledge and under mild restrictions on the time-dependent payoff function for a munition, we derive optimal exercise strategies and quantify the value of engaging in cyber conflict. Our analysis also leads to high level insights on cyber conflict strategy.
Showing items related by title, author, creator and subject.
Page, John Mann (Monterey, California. Naval Postgraduate School, 1991-09);The new Army warfighting doctrine, AirLand Operations, is designed for the army of the 90's, a smaller army, but one which will be faced with global responsibilities. These responsibilities will range from fighting wars ...
Ikomi, Emmanuel Oritsejolomi (Monterey, California. Naval Postgraduate School, 2007-06);In this thesis, I show that ECOWAS and the international community, in a bid to secure an end to Liberia's intractable civil war, acceded to a power sharing arrangement among the warlords. This arrangement, which granted ...
Kondev, Roumen I (Monterey, California. Naval Postgraduate School, 1997-12);Yugoslavia's rapid disintegration amid violence and war in 1991 came as a shock to the outside world. The war was a result of an organized program of domestic conflict waged along ethno-cultural lines by a threaten powerful ...