Lillethun, Erik and Sharma, Rishi (2024): Strategic Cyberwarfare.
Preview |
PDF
MPRA_paper_121299.pdf Download (391kB) | Preview |
Abstract
This paper develops a theoretical model of cyberwarfare between nations, focusing on the factors that determine the severity and outcomes of cyber conflicts. We introduce a two-country model where nations invest in offensive or defensive cyber capabilities across networked systems. We show that resource expenditure intensifies when players' effective values are similar, which can help explain the rise of cyberwarfare. We explore the implications of network structures, showing how larger attack surfaces worsen outcomes for defenders. Additionally, we investigate the impact of private cyber defence provision, and find that centralized policies may either improve or exacerbate cyber conflict.
Item Type: | MPRA Paper |
---|---|
Original Title: | Strategic Cyberwarfare |
Language: | English |
Keywords: | cyberwarfare; cyberattacks; networks |
Subjects: | C - Mathematical and Quantitative Methods > C7 - Game Theory and Bargaining Theory > C72 - Noncooperative Games D - Microeconomics > D7 - Analysis of Collective Decision-Making > D74 - Conflict ; Conflict Resolution ; Alliances ; Revolutions D - Microeconomics > D8 - Information, Knowledge, and Uncertainty > D85 - Network Formation and Analysis: Theory F - International Economics > F5 - International Relations, National Security, and International Political Economy |
Item ID: | 121299 |
Depositing User: | Rishi Sharma |
Date Deposited: | 11 Jul 2024 09:14 |
Last Modified: | 11 Jul 2024 09:14 |
References: | @article{acemoglu2012dynamic, title={A dynamic theory of resource wars}, author={Acemoglu, Daron and Golosov, Mikhail and Tsyvinski, Aleh and Yared, Pierre}, journal={The Quarterly Journal of Economics}, volume={127}, number={1}, pages={283--331}, year={2012}, publisher={MIT Press} } @article{acemoglu2014cycles, title={Cycles of conflict: An economic model}, author={Acemoglu, Daron and Wolitzky, Alexander}, journal={American Economic Review}, volume={104}, number={4}, pages={1350--67}, year={2014} } @article{acemoglu2016network, title={Network security and contagion}, author={Acemoglu, Daron and Malekian, Azarakhsh and Ozdaglar, Asu}, journal={Journal of Economic Theory}, volume={166}, pages={536--585}, year={2016}, publisher={Elsevier} } @article{aumann1974subjectivity, title={Subjectivity and correlation in randomized strategies}, author={Aumann, Robert J}, journal={Journal of Mathematical Economics}, volume={1}, number={1}, pages={67--96}, year={1974}, publisher={Elsevier} } @article{baliga2020deterrence, title={Deterrence with imperfect attribution}, author={Baliga, Sandeep and De Mesquita, Ethan Bueno and Wolitzky, Alexander}, journal={American Political Science Review}, volume={114}, number={4}, pages={1155--1178}, year={2020}, publisher={Cambridge University Press} } @article{cerdeiro2017individual, title={Individual security, contagion, and network design}, author={Cerdeiro, Diego A and Dziubi{\'n}ski, Marcin and Goyal, Sanjeev}, journal={Journal of Economic Theory}, volume={170}, pages={182--226}, year={2017}, publisher={Elsevier} } @article{fedele2022dangerous, title={Dangerous games: A literature review on cybersecurity investments}, author={Fedele, Alessandro and Roner, Cristian}, journal={Journal of Economic Surveys}, volume={36}, number={1}, pages={157--187}, year={2022}, publisher={Wiley Online Library} } @article{garfinkel2007economics, title={Economics of conflict: An overview}, author={Garfinkel, Michelle R and Skaperdas, Stergios}, journal={Handbook of defense economics}, volume={2}, pages={649--709}, year={2007}, publisher={Elsevier} } @article{goyal2014attack, title={Attack, defence, and contagion in networks}, author={Goyal, Sanjeev and Vigier, Adrien}, journal={The Review of Economic Studies}, volume={81}, number={4}, pages={1518--1542}, year={2014}, publisher={Oxford University Press} } @book{haavelmo1954study, title={A Study in the Theory of Economic Evolution}, author={Haavelmo, Trygve}, year={1954}, publisher={North-Holland Publishing Company} } @article{kunreuther2003interdependent, title={Interdependent security}, author={Kunreuther, Howard and Heal, Geoffrey}, journal={Journal of risk and uncertainty}, volume={26}, pages={231--249}, year={2003}, publisher={Springer} } @article{merrick2016survey, title={A survey of game theoretic approaches to modelling decision-making in information warfare scenarios}, author={Merrick, Kathryn and Hardhienata, Medria and Shafi, Kamran and Hu, Jiankun}, journal={Future Internet}, volume={8}, number={3}, pages={34}, year={2016}, publisher={Multidisciplinary Digital Publishing Institute} } @article{powell1993guns, title={Guns, butter, and anarchy}, author={Powell, Robert}, journal={American Political Science Review}, volume={87}, number={1}, pages={115--132}, year={1993}, publisher={Cambridge University Press} } @techreport{przetacznik2022, title = {Russia's war on {U}kraine: Timeline of cyber-attacks}, author = {Przetacznik, Jakub}, year = {2022}, institution = {European Parliament}, month = {June}, Date-Added = {2022-06-21} } @inproceedings{roy2010survey, title={A survey of game theory as applied to network security}, author={Roy, Sankardas and Ellis, Charles and Shiva, Sajjan and Dasgupta, Dipankar and Shandilya, Vivek and Wu, Qishi}, booktitle={2010 43rd Hawaii International Conference on System Sciences}, pages={1--10}, year={2010}, organization={IEEE} } @book{sanger2019perfect, title={The perfect weapon: War, sabotage, and fear in the cyber age}, author={Sanger, David E}, year={2019}, publisher={Broadway Books} } @book{schelling1960strategy, title={The Strategy of Conflict.}, author={Schelling, Thomas C}, year={1960}, publisher={Harvard University Press} } @incollection{varian2004system, title={System reliability and free riding}, author={Varian, Hal}, booktitle={Economics of information security}, pages={1--15}, year={2004}, publisher={Springer} } @misc{victims2021, key={``Victims of Microsoft hack'' 2021}, title={Victims of {M}icrosoft hack scramble to plug security holes}, howpublished={CBS News}, month={March}, year={2021}, url={https://www.cbsnews.com/news/microsoft-hack-victims-plug-security-holes/}, } @article{yared2010dynamic, title={A dynamic theory of war and peace}, author={Yared, Pierre}, journal={Journal of Economic Theory}, volume={145}, number={5}, pages={1921--1950}, year={2010}, publisher={Elsevier} } |
URI: | https://mpra.ub.uni-muenchen.de/id/eprint/121299 |