27.06.2013 Views

6th European Conference - Academic Conferences

6th European Conference - Academic Conferences

6th European Conference - Academic Conferences

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

The Uses and Limits of Game Theory in Conceptualizing<br />

Cyberwarfare<br />

Merritt Baer<br />

Harvard Law School, Cambridge, USA<br />

mbaer@post.harvard.edu<br />

Abstract: In cyberwarfare, there are obstacles to reaching minimax stasis: unlike in checkers, game theory<br />

cannot follow each decision path to its conclusion and then trace the right decisions back. However, I contend<br />

that because the rational predictability of game theory will continue to drive decisions and seek out patterns in<br />

them, game theory may identify (and intelligently weight) nodes of a decision tree that are not immediately<br />

recognizable to or favored by human decision-makers. While we can‟t create a network that is maximally<br />

resistant to random faults and maximally resistant to targeted faults, we can take into account the particular<br />

weaknesses and likelihoods of attack so that the weaknesses overlap in resistant ways-- ways that correspond to<br />

risk preferences and security priorities. Moreover, using game theory to make a security strategy that is a<br />

calculated derivative of mapped potential outcomes will help us to avoid human biases and to respond to threats<br />

proportionately/economically. Rather than a process of continual growth, cyber evolution, like biological evolution,<br />

seems more aptly characterized as punctuated equilibrium—periods of relative stasis followed by quick, drastic<br />

periods of breakthrough. Reaching Nash equilibrium is unlikely in the cyberwar context because under unstable<br />

conditions, evolutionarily stable strategies don‟t run a typical course. While there may be no set of moves that is a<br />

“solution” in cyberwar strategy, game theory allows human decisionmakers to intelligently identify and weight<br />

decision paths to transcend cognitive biases. This paper seeks to change the way of thinking about cyberwar--<br />

from one of stockpiling weapons, to one of looking for patterns-- thinking about the problem of cyber insecurity<br />

more holistically. The paper challenges some of the myopia in thinking about cyber in existing "warfare" terms<br />

and proposes that organic models‟ tendency toward game theoretic equilibrium may help us conceive of the<br />

cyberwar decisionmaking landscape more effectively.<br />

Keywords: cyberwarfare, game theory, layered defense, Nash equilibrium<br />

1. Introduction<br />

In this paper I explore the applications and limitations of game theory to cyberwarfare at a conceptual,<br />

not case study, level. My focus is on federal strategy—especially the United States Department of<br />

Defense (DoD)—so I do not focus on addressing cybercrime or cyberattack that has as its purpose<br />

money or a local, ideological message, or even those with cyber -terrorist or -anarchist goals. My<br />

focus is on large-scale acts of war aimed at military, governmental or infrastructural targets that<br />

currently only certain nation-states are likely to be able to execute, thus the other “players” in the<br />

game are nation-state-level actors.<br />

I recognize that cyberwarfare is among the rarer forms of online violence in comparison with other<br />

forms of cybercrime, but its high stakes and opportunities for more contained strategic study attracted<br />

my focus. For the purposes of this paper, I assume we have available all existing sophisticated game<br />

theoreticians, human or computerized.<br />

I find that game theory is useful to the extent that it allows us to transcend some of our systemspecific<br />

biases (based on established or institutional ways of approaching problems) and threatspecific<br />

biases (rooted in evolutionarily-derived disproportionate reactions to certain threats). Game<br />

theory can allow us to weigh the nodes of the decision tree more accurately; it is not a solution as<br />

such, but a tool for holistic cyberwarfare strategy.<br />

2. Background: Nash equilibrium and complications to game-theoretical<br />

stasis in the cyber context<br />

Game theory scholars have written, though not extensively, on the application of game theory to<br />

information warfare. (See, e.g., Hamilton et al, “The Role of Game Theory in Information Warfare” and<br />

“Challenges to Applying Game Theory to Information Warfare”). The US Cyber Consequences Unit<br />

(US-CCU) claims it primarily employs an analytic method called “Value Creation Analysis” that<br />

“draws…broadly on cooperative game theory.” (See US-CCU website, "http://www.usccu.us/"<br />

http://www.usccu.us/).<br />

Two-player stochastic games may be useful in the escalation context (deciding whether to launch a<br />

preemptive attack or responding to an attack could be a two-player interaction). A study by SPIE has<br />

23

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!