Close Menu
    Facebook X (Twitter) Instagram
    SciTechDaily
    • Biology
    • Chemistry
    • Earth
    • Health
    • Physics
    • Science
    • Space
    • Technology
    Facebook X (Twitter) Pinterest YouTube RSS
    SciTechDaily
    Home»Technology»Deterrence With Imperfect Attribution: A Better Kind of Cybersecurity Strategy
    Technology

    Deterrence With Imperfect Attribution: A Better Kind of Cybersecurity Strategy

    By Peter Dizikes, Massachusetts Institute of TechnologyJanuary 31, 2021No Comments5 Mins Read
    Facebook Twitter Pinterest Telegram LinkedIn WhatsApp Email Reddit
    Share
    Facebook Twitter LinkedIn Pinterest Telegram Email Reddit
    Cybersecurity Strategy
    The multilateral nature of cybersecurity today makes it markedly different than conventional security, according to a new study co-authored by an MIT professor.

    New model shows why countries that retaliate too much against online attacks make things worse for themselves.

    During the opening ceremonies of the 2018 Winter Olympics, held in PyeongChang, South Korea, Russian hackers launched a cyberattack that disrupted television and internet systems at the games. The incident was resolved quickly, but because Russia used North Korean IP addresses for the attack, the source of the disruption was unclear in the event’s immediate aftermath.

    There is a lesson in that attack, and others like it, at a time when hostilities between countries increasingly occur online. In contrast to conventional national security thinking, such skirmishes call for a new strategic outlook, according to a new paper co-authored by an MIT professor.

    The core of the matter involves deterrence and retaliation. In conventional warfare, deterrence usually consists of potential retaliatory military strikes against enemies. But in cybersecurity, this is more complicated. If identifying cyberattackers is difficult, then retaliating too quickly or too often, on the basis of limited information such as the location of certain IP addresses, can be counterproductive. Indeed, it can embolden other countries to launch their own attacks, by leading them to think they will not be blamed.

    “If one country becomes more aggressive, then the equilibrium response is that all countries are going to end up becoming more aggressive,” says Alexander Wolitzky, an MIT economist who specializes in game theory. “If after every cyberattack my first instinct is to retaliate against Russia and China, this gives North Korea and Iran impunity to engage in cyberattacks.”

    A Game-Theoretic Model for Cyber Retaliation

    But Wolitzky and his colleagues do think there is a viable new approach, involving a more judicious and well-informed use of selective retaliation.

    “Imperfect attribution makes deterrence multilateral,” Wolitzky says. “You have to think about everybody’s incentives together. Focusing your attention on the most likely culprits could be a big mistake.”

    The paper, “Deterrence with Imperfect Attribution,” appears in the latest issue of the American Political Science Review. In addition to Wolitzky, the authors are Sandeep Baliga, the John L. and Helen Kellogg Professor of Managerial Economics and Decision Sciences at Northwestern University’s Kellogg School of Management; and Ethan Bueno de Mesquita, the Sydney Stein Professor and deputy dean of the Harris School of Public Policy at the University of Chicago.

    The study is a joint project, in which Baliga added to the research team by contacting Wolitzky, whose own work applies game theory to a wide variety of situations, including war, international affairs, network behavior, labor relations, and even technology adoption.

    “In some sense this is a canonical kind of question for game theorists to think about,” Wolitzky says, noting that the development of game theory as an intellectual field stems from the study of nuclear deterrence during the Cold War. “We were interested in what’s different about cyberdeterrence, in contrast to conventional or nuclear deterrence. And of course there are a lot of differences, but one thing that we settled on pretty early is this attribution problem.” In their paper, the authors note that, as former U.S. Deputy Secretary of Defense William Lynn once put it, “Whereas a missile comes with a return address, a computer virus generally does not.”

    In some cases, countries are not even aware of major cyberattacks against them; Iran only belatedly realized it had been attacked by the Stuxnet worm over a period of years, damaging centrifuges being used in the country’s nuclear weapons program.

    In the paper, the scholars largely examined scenarios where countries are aware of cyberattacks against them but have imperfect information about the attacks and attackers. After modeling these events extensively, the researchers determined that the multilateral nature of cybersecurity today makes it markedly different than conventional security. There is a much higher chance in multilateral conditions that retaliation can backfire, generating additional attacks from multiple sources.

    “You don’t necessarily want to commit to be more aggressive after every signal,” Wolitzky says.

    Too Little or Too Much Certainty Can Be Risky

    What does work, however, is simultaneously improving detection of attacks and gathering more information about the identity of the attackers, so that a country can pinpoint the other nations they could meaningfully retaliate against.

    But even gathering more information to inform strategic decisions is a tricky process, as the scholars show. Detecting more attacks while being unable to identify the attackers does not clarify specific decisions, for instance. And gathering more information but having “too much certainty in attribution” can lead a country straight back into the problem of lashing out against some states, even as others are continuing to plan and commit attacks.

    “The optimal doctrine in this case in some sense will commit you to retaliate more after the clearest signals, the most unambiguous signals,” Wolitzky says. “If you blindly commit yourself more to retaliate after every attack, you increase the risk you’re going to be retaliating after false alarms.”

    Wolitzky points out that the paper’s model can apply to issues beyond cybersecurity. The problem of stopping pollution can have the same dynamics. If, for instance, numerous firms are polluting a river, singling just one out for punishment can embolden the others to continue.

    Still, the authors do hope the paper will generate discussion in the foreign-policy community, with cyberattacks continuing to be a significant source of national security concern.

    “People thought the possibility of failing to detect or attribute a cyberattack mattered, but there hadn’t [necessarily] been a recognition of the multilateral implications of this,” Wolitzky says. “I do think there is interest in thinking about the applications of that.”

    Reference: “Deterrence with Imperfect Attribution” by Sandeep Baliga, Ethan Bueno De Mesquita and Alexander Wolitzky, 3 August 2020, American Political Science Review.
    DOI: 10.1017/S0003055420000362

    The research was supported, in part, by the Sloan Foundation and the National Science Foundation.

    Never miss a breakthrough: Join the SciTechDaily newsletter.
    Follow us on Google and Google News.

    Cybersecurity MIT Politics
    Share. Facebook Twitter Pinterest LinkedIn Email Reddit

    Related Articles

    Security Tool – Privid – Guarantees Privacy in Surveillance Footage

    A Security Technique To Fool Would-Be Cyber Attackers – Method Safeguards a Computer Program’s Secret Information

    New Chip Can Prevent Hackers From Extracting Hidden Information From Smart Devices

    r2c: An Open-Source Tool for Software Security

    MIT Lays Out Strategy To Help the U.S. Regain Its Place as a Semiconductor Superpower

    Unlocking the Potential of Blockchain Technology: Decentralized, Secure, and Scalable

    Princeton Has Developed a Technique for Tracking Online Foreign Misinformation Campaigns in Real Time

    MIT Invents Cryptographic “Tag of Everything” – Could Protect Against Counterfeiting

    MIT Finds Hackers Can Change Votes in Voting App Used in U.S. Federal Elections

    Leave A Reply Cancel Reply

    • Facebook
    • Twitter
    • Pinterest
    • YouTube

    Don't Miss a Discovery

    Subscribe for the Latest in Science & Tech!

    Trending News

    First-of-Its-Kind Discovery: Homer’s Iliad Found Embedded in a 1,600-Year-Old Egyptian Mummy

    Beyond Inflammation: Scientists Uncover New Cause of Persistent Rheumatoid Arthritis

    A Simple Molecule Could Unlock Safer, Easier Weight Loss

    Scientists Just Built a Quantum Battery That Charges Almost Instantly

    Researchers Unveil Groundbreaking Sustainable Solution to Vitamin B12 Deficiency

    Millions of People Have Osteopenia Without Realizing It – Here’s What You Need To Know

    Researchers Discover Boosting a Single Protein Helps the Brain Fight Alzheimer’s

    World-First Study Reveals Human Hearts Can Regenerate After a Heart Attack

    Follow SciTechDaily
    • Facebook
    • Twitter
    • YouTube
    • Pinterest
    • Newsletter
    • RSS
    SciTech News
    • Biology News
    • Chemistry News
    • Earth News
    • Health News
    • Physics News
    • Science News
    • Space News
    • Technology News
    Recent Posts
    • Weight-Loss Drugs Like Ozempic May Come With an Unexpected Cost
    • After Decades, MIT Researchers Capture the First 3D Atomic View of a Mysterious Material
    • Your Favorite Fishing Spot Is Turning Brown – and the Fish Are Changing
    • 380-Million-Year-Old Fish Fossil Reveals Secrets of Life’s First Steps Onto Land
    • Mezcal “Worm” in a Bottle Mystery: DNA Testing Reveals a Surprise
    Copyright © 1998 - 2026 SciTechDaily. All Rights Reserved.
    • Science News
    • About
    • Contact
    • Editorial Board
    • Privacy Policy
    • Terms of Use

    Type above and press Enter to search. Press Esc to cancel.