Revisiting Strategic Cyberwar Theory Reaching Decisive Strategic Outcome
- URL: http://arxiv.org/abs/2007.08626v1
- Date: Thu, 16 Jul 2020 20:44:43 GMT
- Title: Revisiting Strategic Cyberwar Theory Reaching Decisive Strategic Outcome
- Authors: Jan Kallberg
- Abstract summary: This article will present a theory, strategic cyberwar theory, that states that the utility of strategic cyberwar is tied to the likelihood of institutional instability in the targeted nation.
In an ideal scenario, the cyber attacks are systematically attacking the targeted adversary institutions triggering the dormant entropy embedded in a nation with weak institutions.
The current alternative to strategic cyberwar theory is to unsystematically attack the adversary with cyber attacks where exploitation opportunities occur, which is likely to degrade parts of the information infrastructure, but it will not reach any strategic goals.
- Score: 0.0
- License: http://creativecommons.org/licenses/by/4.0/
- Abstract: Each strategy has a foundation, an overarching way of explaining why things
are the way we see them and how to successfully reach our goals. Therefore,
strategy is theory based because theory provides an intellectual framework for
predicting outcomes leading to the end goal the strategy pursues. This article
will present a theory, strategic cyberwar theory, that states that the utility
of strategic cyberwar is tied to the likelihood of institutional instability in
the targeted nation. In an ideal scenario, the cyber attacks are systematically
attacking the targeted adversary institutions triggering the dormant entropy
embedded in a nation with weak institutions. This will lead to submission to
foreign policy and intent. The current alternative to strategic cyberwar theory
is to unsystematically attack the adversary with cyber attacks where
exploitation opportunities occur, which is likely to degrade parts of the
information infrastructure, but it will not reach any strategic goals. If an
adversarial society is unaffected by a cyber conflict, the conflict itself has
not reached a decisive outcome, and results only in tit for tat game or
stalemate. In strategic cyberwar theory1, the concept is to cyber attack the
core of the institutional framework of the adversarial nation in pursuit of
destabilization.
Related papers
- Cyberwar Strategy and Tactics: An Analysis of Cyber Goals, Strategies, Tactics, and Techniques [0.0]
A Cyberwar Playbook is an encoding of knowledge on how to effectively handle a variety of cyberwar situations.
It takes a troubleshooting approach and defines the cyber tactics, techniques and procedures one may employ to counter or avert cyber-based attacks.
arXiv Detail & Related papers (2024-06-01T16:52:37Z) - Foundations of Cyber Resilience: The Confluence of Game, Control, and Learning Theories [15.764094200832071]
Cyber resilience focuses on preparation, response, and recovery from cyber threats that are challenging to prevent.
Game theory, control theory, and learning theories are three major pillars for the design of cyber resilience mechanisms.
This chapter presents various theoretical paradigms, including dynamic asymmetric games, moving horizon control, conjectural learning, and meta-learning.
arXiv Detail & Related papers (2024-04-01T16:02:21Z) - Symbiotic Game and Foundation Models for Cyber Deception Operations in Strategic Cyber Warfare [16.378537388284027]
We are currently facing unprecedented cyber warfare with the rapid evolution of tactics, increasing asymmetry of intelligence, and the growing accessibility of hacking tools.
This chapter aims to highlight the pivotal role of game-theoretic models and foundation models (FMs) in analyzing, designing, and implementing cyber deception tactics.
arXiv Detail & Related papers (2024-03-14T20:17:57Z) - K-Level Reasoning: Establishing Higher Order Beliefs in Large Language Models for Strategic Reasoning [76.3114831562989]
It requires Large Language Model (LLM) agents to adapt their strategies dynamically in multi-agent environments.
We propose a novel framework: "K-Level Reasoning with Large Language Models (K-R)"
arXiv Detail & Related papers (2024-02-02T16:07:05Z) - Mutual-modality Adversarial Attack with Semantic Perturbation [81.66172089175346]
We propose a novel approach that generates adversarial attacks in a mutual-modality optimization scheme.
Our approach outperforms state-of-the-art attack methods and can be readily deployed as a plug-and-play solution.
arXiv Detail & Related papers (2023-12-20T05:06:01Z) - Multidimensional Cybersecurity Framework for Strategic Foresight [0.0]
The rise in National cybersecurity laws and regulations is a good indicator of its perceived importance to nations.
The conceptual cybersecurity framework comprises six domains such as Physical, Cultural, Economic, Social, Political and Cyber.
The guiding principles underpinning the framework are outlined, followed by in-depth reflection on the Business, Operational, Technological and Human (BOTH) factors.
arXiv Detail & Related papers (2022-02-05T12:30:31Z) - Staring Down the Digital Fulda Gap Path Dependency as a Cyber Defense
Vulnerability [0.0]
The U.S. reaction to Sept. 11, and any attack on U.S. soil, hint to an adversary that attacking critical infrastructure to create hardship for the population could work contrary to the intended softening of the will to resist foreign influence.
We cannot rule out attacks that affect the general population, but there are not enough adversarial offensive capabilities to attack all 16 critical infrastructure sectors and gain strategic momentum.
arXiv Detail & Related papers (2021-12-06T04:05:48Z) - Fixed Points in Cyber Space: Rethinking Optimal Evasion Attacks in the
Age of AI-NIDS [70.60975663021952]
We study blackbox adversarial attacks on network classifiers.
We argue that attacker-defender fixed points are themselves general-sum games with complex phase transitions.
We show that a continual learning approach is required to study attacker-defender dynamics.
arXiv Detail & Related papers (2021-11-23T23:42:16Z) - The Feasibility and Inevitability of Stealth Attacks [63.14766152741211]
We study new adversarial perturbations that enable an attacker to gain control over decisions in generic Artificial Intelligence systems.
In contrast to adversarial data modification, the attack mechanism we consider here involves alterations to the AI system itself.
arXiv Detail & Related papers (2021-06-26T10:50:07Z) - Adversarial Machine Learning Attacks and Defense Methods in the Cyber
Security Domain [58.30296637276011]
This paper summarizes the latest research on adversarial attacks against security solutions based on machine learning techniques.
It is the first to discuss the unique challenges of implementing end-to-end adversarial attacks in the cyber security domain.
arXiv Detail & Related papers (2020-07-05T18:22:40Z) - Decentralized Reinforcement Learning: Global Decision-Making via Local
Economic Transactions [80.49176924360499]
We establish a framework for directing a society of simple, specialized, self-interested agents to solve sequential decision problems.
We derive a class of decentralized reinforcement learning algorithms.
We demonstrate the potential advantages of a society's inherent modular structure for more efficient transfer learning.
arXiv Detail & Related papers (2020-07-05T16:41:09Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.