nspw2010

ID:32494

大小:0.70 MB

页数:30页

时间:2023-01-29

金币:5

上传者:战必胜
Would a ‘Cyber Warrior’ Protect Us? Exploring Trade-offs
Between Attack and Defense of Information Systems
[Position Paper]
Tyler Moore, Allan Friedman and Ariel D. Procaccia
Center for Research on Computation & Society, Harvard University
{tmoore,allan,arielpro}@seas.harvard.edu
ABSTRACT
As information security shifts from the realm of computer
science to national security, the priority for safe and secure
systems will be balanced against the appeal of using infor-
mation insecurity as a strategic asset. In “cyber war”, those
tasked with defending friendly computer networks are also
expected to exploit enemy networks. This paper presents
two game-theoretic models of vulnerability discovery and
exploitation, where nations must choose between protecting
themselves by sharing vulnerability information with ven-
dors or pursuing an offensive advantage while remaining at
risk. One game describes a cold war of stockpiling, the other
allows for actual attack. In both models, we predict that at
least one state will have an incentive to pursue an aggres-
sive cyber war posture, rather than secure its own systems.
This finding that a mutually defensive approach to secu-
rity is not a stable equilibrium holds up under a range of
assumptions about social risk of cybercrime, technical so-
phistication, military aggressiveness and the likelihood of
vulnerability rediscovery. We conclude with a discussion of
the security policy implications of a militarized cyberspace.
Categories and Subject Descriptors
J.4 [Computer Applications]: Social and Behavioral Sci-
ences—Economics; K.4.1 [Computing Milieux]: Comput-
ers and Society—Public Policy Issues
General Terms
Economics, Security
1. INTRODUCTION
Computer scientists used to study information security by
stating assumptions about the capabilities of an adversary
and then building systems to protect against these assump-
tions. This approach worked well for the design of encryp-
tion algorithms and cryptographic protocols. However, it
Permission to make digital or hard copies of all or part of this work for
personal or classroom use is granted without fee provided that copies are
not made or distributed for profit or commercial advantage and that copies
bear this notice and the full citation on the first page. To copy otherwise, to
republish, to post on servers or to redistribute to lists, requires prior specific
permission and/or a fee.
NSPW’10, September 21–23, 2010, Concord, Massachusetts, USA.
Copyright 2010 ACM 978-1-4503-0415-3/10/09 ...$5.00.
has not coped as well with the Internet’s rise, and the emer-
gence of a strategic adversary capable of adapting to the cho-
sen defenses. Instead, a new perspective was required, which
has been met primarily by applying an economic perspective
to information security [1]. Attackers and defenders are now
understood as being locked in a strategic battle, where the
incentives to disrupt and protect systems matter most. An
economic approach has been especially helpful for dealing
with the rise of the profit-motivated online criminal [6, 15].
In this paper, we argue that the paradigm is shifting once
more. The existing literature has treated attack and defense
as activities carried out by two mutually exclusive groups,
the ‘good’ guys and ‘bad’ guys. In fact, the distinction
between attacker and defender is becoming blurred in the
context of cyber warfare. As the United States collects re-
sponsibility for cybersecurity at a national level under the
unified Cyber Command, a single organization assumes re-
sponsibility for defending domestic Internet infrastructure
and cyber resources, or attacking enemies through offensive
operations. In this paper, we present a game-theoretic model
that reflects this new paradigm and explores the strategic
interactions of actors capable of both attack and defense.
1.1 Cyber Command
The strategic use of information technology in the national
security context has traditionally been the domain of the
National Security Agency (NSA), with an almost legendary
capacity for offensive signals intelligence. The establishment
of US Cyber Command reflects a compromise between in-
ternal forces inside the US national security community, in-
cluding the desire to avoid duplication of the NSA’s techni-
cal capacities, the desire to accommodate new cyber-focused
efforts inside the military, particularly the Air Force, and a
need to balance legally defined boundaries between the civil-
ian intelligence community and the offensive-focused defense
community [4]. The newly created Cyber Command will be
placed under the charge of the NSA director, and will co-
ordinate cyber war units inside the armed forces. The goal
is to cluster and coordinate US strategic cybersecurity ca-
pacity to concentrate efforts in prosecuting national security
policy with a united purpose.
Cyber Command, as a single organization, will have to
navigate a number of challenging technical and policy hur-
dles, many of which have been discussed elsewhere [5, 11].
Of particular importance to this paper is the challenge of de-
fending information security systems while still maintaining
an offensive readiness. The National Military Strategy for
Cyberspace Operations places a strategic priority on “main-
taining a robust defense of cyberspace while exploiting ad-
85
资源描述:

当前文档最多预览五页,下载文档查看全文

此文档下载收益归作者所有

当前文档最多预览五页,下载文档查看全文
温馨提示:
1. 部分包含数学公式或PPT动画的文件,查看预览时可能会显示错乱或异常,文件下载后无此问题,请放心下载。
2. 本文档由用户上传,版权归属用户,天天文库负责整理代发布。如果您对本文档版权有争议请及时联系客服。
3. 下载前请仔细阅读文档内容,确认文档内容符合您的需求后进行下载,若出现内容与标题不符可向本站投诉处理。
4. 下载文档时可能由于网络波动等原因无法下载或下载错误,付费完成后未能成功下载的用户请联系客服处理。
关闭