Skip to main content

Alternatives to Cyber Warfare: Deterrence and Assurance

  • Chapter
  • First Online:

Part of the book series: Advances in Information Security ((ADIS,volume 56))

Abstract

Deterrence as practiced during the Cold War was largely defined in terms of capabilities to impose punishment in response to an attack; however, with growing concern over the proliferation of cyber technologies, deterrence has evolved to be understood more generally in terms of cost/benefit calculi, viewed from not only a national perspective, but also recognizing the importance of both friendly and adversary perspectives. With this approach, the primary instruments used for deterrence are those which encourage restraint on the part of all affected parties. The use of a multiple lever approach to deterrence offers a path to an integrated strategy that not only addresses the cost/benefit calculus of the primary attacker, but also provides opportunities to influence the calculus of mercenary cyber armies for hire, patriotic hackers, or other groups. For this multiple lever approach to be effective a capability to assess the effects of cyber attacks on operations is needed. Such a capability based on multi-formalism modeling to model, analyze, and evaluate the effect of cyber exploits on the coordination in decision making organizations is presented. The focus is on the effect that cyber exploits, such as availability and integrity attacks, have on information sharing and task synchronization. Colored Petri Nets are used to model the decision makers in the organization and computer network models to represent their interactions. Two new measures of performance are then introduced: information consistency and synchronization. The approach and the computation of the measures of performance are illustrated though a simple example based on a variation of the Pacifica scenario.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   109.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD   139.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  • Abu Jbara A, Levis AH (2013) Semantically correct representation of multi-model interoperations. Proc. 26th International FLAIRS Conference, St Pete Beach, FL, May

    Google Scholar 

  • AFSAB (2008) Defending and operating in a contested cyber domain, Air Force Scientific Advisory Board, Sztipanovits J Levis AH (eds) SAB-TR-08–01

    Google Scholar 

  • Alberts DS, Hayes RE (2005) Campaigns of experimentation: Pathways to innovation and transformation. CCRP Publication Series, Washington, DC

    Google Scholar 

  • CPN Tools (2014)http://www.cpntools.org

  • DO-JOC (2006) Deterrence Operation Joint Operating Concept, Version 2.0, Department of Defense, 2006 (Available athttp://www.dtic.mil/futurejointwarfare)

  • Geer Jr., Daniel E., (2010) Cybersecurity and national policy, Harvard National Security Journal, vol. 1

    Google Scholar 

  • Grevet JL, Levis AH (1988) Coordination in organizations with decision support systems. Proc. 1988 Symposium on C2 Research, Monterey, CA, June 1988, pp. 387–399

    Google Scholar 

  • Gribaudo M, Iacono M (2014) An introduction to multiformalism modeling. In: Theory and Application of Multi-Formalism Modeling, Gribaudo M Iacono M (eds), IGI Global, Hershey, PA, pp. 1–16

    Google Scholar 

  • Hemingway G, Neema H, Sztipanovits J, Karsai G (2011) Rapid synthesis of high-level architecture-based heterogeneous simulation: A model-based integration approach. Simulation, March

    Google Scholar 

  • INET (2014)http://inet.omnetpp.org

  • Jensen K, Kristensen LM (2009) Coloured Petri Nets. Springer, Berlin

    Book  MATH  Google Scholar 

  • Levis AH (1992) A Colored Petri Net model of intelligent nodes. In: Robotics and Flexible Manufacturing Systems, Gentina JC Tzafestas SG (eds) Elsevier Science Publishers B. V., The Netherlands

    Google Scholar 

  • Levis AH, Zaidi AK, Rafi MR (2012) Multi-modeling and meta-modeling of human organizations.Proc. 4th Int’l Conf. on Applied Human Factors and Ergonomics—AHFE2012 San Francisco, CA, July

    Google Scholar 

  • OMNeT++ (2014)http://www.omnetpp.org

  • Pflanz M, Levis AH (2014) On measuring resilience in Command and Control architectures. In: Suri N and Cabri G (eds) Engineering Adaptive and Resilient Computing Systems. Taylor & Francis, London

    Google Scholar 

  • Remy PA, Levis AH, Jin VY (1988) On the design of distributed organizational structures.Automatica, 24(1) 81–86

    Article  Google Scholar 

  • The Economist (2014) 411(8885):23–26

    Google Scholar 

  • Welch, Gen. Larry (2008) presentation to Cyber Warfare 2008, London, U.K., 31 March 2008

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Robert J. Elder .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer International Publishing Switzerland

About this chapter

Cite this chapter

Elder, R., Levis, A., Yousefi, B. (2015). Alternatives to Cyber Warfare: Deterrence and Assurance. In: Jajodia, S., Shakarian, P., Subrahmanian, V., Swarup, V., Wang, C. (eds) Cyber Warfare. Advances in Information Security, vol 56. Springer, Cham. https://doi.org/10.1007/978-3-319-14039-1_2

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-14039-1_2

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-14038-4

  • Online ISBN: 978-3-319-14039-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics