Newsletters
Customer Relationship Management News NewsFactor Sites:       NewsFactor.com     Enterprise Security Today     CRM Daily     Business Report     Sci-Tech Today  
   
Home CRM Systems Customer Service Contact Centers Business Intelligence More Topics...
UCS Invicta: Integrated Flash
Deploy flash memory technology to
deliver peak workload performance.

Find out more>>
Computing
Real-time info services with Neustar
Average Rating:
Rate this article:  
Researchers Predict
Researchers Predict 'Best Timing' for Cyberattacks

By Barry Levine
January 15, 2014 11:22AM

Bookmark and Share
The question of the timing of a cyberattack is analogous to the question of when to use a double agent to mislead the enemy. Although it may be worth waiting for an important event, waiting too long may mean the double agent has been discovered by the target and becomes useless, said researchers who have developed a model to predict cyberattacks.
 


Can the best time to launch a cyberattacks be predicted? Researchers at the University of Michigan say they have developed a mathematical model that can do just that.

The model analyzes when a potential attacker is most likely to hit. Robert Axelrod, professor of political science and public policy at Michigan’s Ford School, told news media that the model he developed with postdoctoral research fellow Rumen Illiev creates some new concepts for dealing with computer attacks by pinpointing the best time to use specific cyber methods. Axelrod compared their work, which is focused on the strategic dimensions of cyberattacks, to the strategic considerations for the use of nuclear weapons.

The concepts are built around stealth, analyzing the ability of a resource to exploit a vulnerability in a computer system but remain undiscovered if it is used, and persistence, the ability of a vulnerability to remain undiscovered if it is not used. Illiev noted that a successful attack would be built around both stealth and persistence.

Like a Double Agent

“The question of timing is analogous to the question of when to use a double agent to mislead the enemy, where it may be worth waiting for an important event but waiting too long may mean the double agent has been discovered by the target and becomes useless," the researchers noted in their paper, published last month by the Proceedings of the National Academy of Sciences.

Other variables include the weapon’s value, a function in part of its stealth and persistence; the current and future stakes; the threshold of stakes that would cause an attacker to use the weapon; and what the researchers call the “discount rate” -- the fact that using the weapon today could be more valuable to the attacker than doing so later.

The model shows that it is better to use stealthier weapons sooner rather than later, and that the use of more persistent weapons can be postponed. Those observations may seem to be fairly obvious, but the model fits several instances of actual attacks.

‘Rational Timing of Surprise’

These instances included the famed Stuxnet worm, which the model described as having low persistence -- because it employed four zero-day exploits -- but a high level of stealth. The weapon was much more valuable being used sooner rather than later, since the aim was to delay the ability of Iran to develop nuclear-grade uranium.

The researchers said that working from their model, Stuxnet was “expected to have poor persistence and comparatively good stealth,” which is how it was used.

Similarly, a cyberattack by Iran on Saudi Aramco (Saudi Arabian Oil Co.) was not stealthy and the stakes required quick action. By contrast, the researchers said that Chinese cyberattacks are not usually conducted at the most optimal times, but they said it’s hard to understand why a nation-state might choose some less-than-effective occasion.

This, of course, points to the model’s weakness, in that it expects attackers to be rational actors, attacking at the most opportune moment for the greatest leverage, given the stakes and the choice of weapons.

In fact, the researchers describe their model as a way to study “the rational timing of surprise.”
 

Tell Us What You Think
Comment:

Name:



Get Powerful App Acceleration with Cisco. In a world where time is money, you need to accelerate the speed at which data moves through your data center. Cisco UCS Invicta delivers powerful, easy-to-manage application acceleration for data-intensive workloads. So you can make decisions faster and outpace the competition. Learn More.


 Computing
1.   Twitter Buys Password Manager Mitro
2.   Retailers Hacked by New Malware
3.   Oracle To Buy TOA Technologies
4.   IBM Beefs Up Identity Intelligence
5.   USB Security Flaw Uncovered


advertisement
Amazon Intros Zocalo Storage Service
Online storage and sharing for business.
Average Rating:
Twitter Buys Password Manager Mitro
Startup to release code as open source.
Average Rating:
IBM Beefs Up Identity Intelligence
To offer biz better security products.
Average Rating:
Product Information and Resources for Technology You Can Use To Boost Your Business

Network Security Spotlight
Ruling Against Microsoft Raises E-Mail Privacy Concern
Microsoft has been ordered to hand over e-mails to law enforcers in the United States as part of a criminal investigation, even though the e-mail is stored at a data center in Dublin,Ireland.
 
Twitter Buys Password Manager Startup Mitro
Following on the heels of another acquisition earlier this week, Twitter is adding to its fold a password-manager security startup called Mitro, which in turn is releasing its code as open source.
 
Government Requests for Customer Data Skyrocket
Requests for customer data from the government jumped 50 percent in the first half of 2014, according to Twitter, which received more than 2,000 requests for user info from gov't agencies.
 

Navigation
CRM Daily
Home/Top News | CRM Systems | Customer Service | Contact Centers | Business Intelligence | Sales & Marketing | Customer Data | CRM Press Releases
NewsFactor Network Enterprise I.T. Sites
NewsFactor Technology News | Enterprise Security Today | CRM Daily

NewsFactor Business and Innovation Sites
Sci-Tech Today | NewsFactor Business Report

NewsFactor Services
FreeNewsFeed | Free Newsletters

About NewsFactor Network | How To Contact Us | Article Reprints | Careers @ NewsFactor | Services for PR Pros | Top Tech Wire | How To Advertise

Privacy Policy | Terms of Service
© Copyright 2000-2014 NewsFactor Network. All rights reserved. Article rating technology by Blogowogo. Member of Accuserve Ad Network.