Abstract
Deterrence as practiced during the Cold War was largely defined in terms of capabilities to impose punishment in response to an attack; however, with growing concern over the proliferation of cyber technologies, deterrence has evolved to be understood more generally in terms of cost/benefit calculi, viewed from not only a national perspective, but also recognizing the importance of both friendly and adversary perspectives. With this approach, the primary instruments used for deterrence are those which encourage restraint on the part of all affected parties. The use of a multiple lever approach to deterrence offers a path to an integrated strategy that not only addresses the cost/benefit calculus of the primary attacker, but also provides opportunities to influence the calculus of mercenary cyber armies for hire, patriotic hackers, or other groups. For this multiple lever approach to be effective a capability to assess the effects of cyber attacks on operations is needed. Such a capability based on multi-formalism modeling to model, analyze, and evaluate the effect of cyber exploits on the coordination in decision making organizations is presented. The focus is on the effect that cyber exploits, such as availability and integrity attacks, have on information sharing and task synchronization. Colored Petri Nets are used to model the decision makers in the organization and computer network models to represent their interactions. Two new measures of performance are then introduced: information consistency and synchronization. The approach and the computation of the measures of performance are illustrated though a simple example based on a variation of the Pacifica scenario.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Abu Jbara A, Levis AH (2013) Semantically correct representation of multi-model interoperations. Proc. 26th International FLAIRS Conference, St Pete Beach, FL, May
AFSAB (2008) Defending and operating in a contested cyber domain, Air Force Scientific Advisory Board, Sztipanovits J Levis AH (eds) SAB-TR-08–01
Alberts DS, Hayes RE (2005) Campaigns of experimentation: Pathways to innovation and transformation. CCRP Publication Series, Washington, DC
CPN Tools (2014)http://www.cpntools.org
DO-JOC (2006) Deterrence Operation Joint Operating Concept, Version 2.0, Department of Defense, 2006 (Available athttp://www.dtic.mil/futurejointwarfare)
Geer Jr., Daniel E., (2010) Cybersecurity and national policy, Harvard National Security Journal, vol. 1
Grevet JL, Levis AH (1988) Coordination in organizations with decision support systems. Proc. 1988 Symposium on C2 Research, Monterey, CA, June 1988, pp. 387–399
Gribaudo M, Iacono M (2014) An introduction to multiformalism modeling. In: Theory and Application of Multi-Formalism Modeling, Gribaudo M Iacono M (eds), IGI Global, Hershey, PA, pp. 1–16
Hemingway G, Neema H, Sztipanovits J, Karsai G (2011) Rapid synthesis of high-level architecture-based heterogeneous simulation: A model-based integration approach. Simulation, March
INET (2014)http://inet.omnetpp.org
Jensen K, Kristensen LM (2009) Coloured Petri Nets. Springer, Berlin
Levis AH (1992) A Colored Petri Net model of intelligent nodes. In: Robotics and Flexible Manufacturing Systems, Gentina JC Tzafestas SG (eds) Elsevier Science Publishers B. V., The Netherlands
Levis AH, Zaidi AK, Rafi MR (2012) Multi-modeling and meta-modeling of human organizations.Proc. 4th Int’l Conf. on Applied Human Factors and Ergonomics—AHFE2012 San Francisco, CA, July
OMNeT++ (2014)http://www.omnetpp.org
Pflanz M, Levis AH (2014) On measuring resilience in Command and Control architectures. In: Suri N and Cabri G (eds) Engineering Adaptive and Resilient Computing Systems. Taylor & Francis, London
Remy PA, Levis AH, Jin VY (1988) On the design of distributed organizational structures.Automatica, 24(1) 81–86
The Economist (2014) 411(8885):23–26
Welch, Gen. Larry (2008) presentation to Cyber Warfare 2008, London, U.K., 31 March 2008
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2015 Springer International Publishing Switzerland
About this chapter
Cite this chapter
Elder, R., Levis, A., Yousefi, B. (2015). Alternatives to Cyber Warfare: Deterrence and Assurance. In: Jajodia, S., Shakarian, P., Subrahmanian, V., Swarup, V., Wang, C. (eds) Cyber Warfare. Advances in Information Security, vol 56. Springer, Cham. https://doi.org/10.1007/978-3-319-14039-1_2
Download citation
DOI: https://doi.org/10.1007/978-3-319-14039-1_2
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-14038-4
Online ISBN: 978-3-319-14039-1
eBook Packages: Computer ScienceComputer Science (R0)