Newsletters
News & Information for Technology Purchasers NewsFactor Sites:       NewsFactor.com     Enterprise Security Today     CRM Daily     Business Report     Sci-Tech Today  
   
This ad will display for the next 20 seconds. Click for more information, or
Home Enterprise I.T. Cloud Computing Applications Hardware More Topics...
GET RECOGNIZED.
Let an ISACA® certification
elevate your career.

Register today and save
Network Security
DDoS Protection Powered By Verisign
Average Rating:
Rate this article:  
Researchers Predict 'Best Timing' for Cyberattacks

Researchers Predict 'Best Timing' for Cyberattacks
By Barry Levine

Share
Share on Facebook Share on Twitter Share on Linkedin Share on Google Plus

The question of the timing of a cyberattack is analogous to the question of when to use a double agent to mislead the enemy. Although it may be worth waiting for an important event, waiting too long may mean the double agent has been discovered by the target and becomes useless, said researchers who have developed a model to predict cyberattacks.
 



Can the best time to launch a cyberattacks be predicted? Researchers at the University of Michigan say they have developed a mathematical model that can do just that.

The model analyzes when a potential attacker is most likely to hit. Robert Axelrod, professor of political science and public policy at Michigan’s Ford School, told news media that the model he developed with postdoctoral research fellow Rumen Illiev creates some new concepts for dealing with computer attacks by pinpointing the best time to use specific cyber methods. Axelrod compared their work, which is focused on the strategic dimensions of cyberattacks, to the strategic considerations for the use of nuclear weapons.

The concepts are built around stealth, analyzing the ability of a resource to exploit a vulnerability in a computer system but remain undiscovered if it is used, and persistence, the ability of a vulnerability to remain undiscovered if it is not used. Illiev noted that a successful attack would be built around both stealth and persistence.

Like a Double Agent

“The question of timing is analogous to the question of when to use a double agent to mislead the enemy, where it may be worth waiting for an important event but waiting too long may mean the double agent has been discovered by the target and becomes useless," the researchers noted in their paper, published last month by the Proceedings of the National Academy of Sciences.

Other variables include the weapon’s value, a function in part of its stealth and persistence; the current and future stakes; the threshold of stakes that would cause an attacker to use the weapon; and what the researchers call the “discount rate” -- the fact that using the weapon today could be more valuable to the attacker than doing so later.

The model shows that it is better to use stealthier weapons sooner rather than later, and that the use of more persistent weapons can be postponed. Those observations may seem to be fairly obvious, but the model fits several instances of actual attacks.

‘Rational Timing of Surprise’

These instances included the famed Stuxnet worm, which the model described as having low persistence -- because it employed four zero-day exploits -- but a high level of stealth. The weapon was much more valuable being used sooner rather than later, since the aim was to delay the ability of Iran to develop nuclear-grade uranium.

The researchers said that working from their model, Stuxnet was “expected to have poor persistence and comparatively good stealth,” which is how it was used.

Similarly, a cyberattack by Iran on Saudi Aramco (Saudi Arabian Oil Co.) was not stealthy and the stakes required quick action. By contrast, the researchers said that Chinese cyberattacks are not usually conducted at the most optimal times, but they said it’s hard to understand why a nation-state might choose some less-than-effective occasion.

This, of course, points to the model’s weakness, in that it expects attackers to be rational actors, attacking at the most opportune moment for the greatest leverage, given the stakes and the choice of weapons.

In fact, the researchers describe their model as a way to study “the rational timing of surprise.”
 

Tell Us What You Think
Comment:

Name:



Salesforce.com is the market and technology leader in Software-as-a-Service. Its award-winning CRM solution helps 82,400 customers worldwide manage and share business information over the Internet. Experience CRM success. Click here for a FREE 30-day trial.


 Network Security
1.   Gmail Hackable by Android Apps
2.   UPS Stores Hit by Data Breach
3.   Target Data Breach Cost: $148 Million
4.   Aruba Handles Black Hat with Aplomb
5.   Chinese Hackers Steal Patient Data


advertisement
UPS Stores Hit by Data Breach
Biz must adopt better security measures.
Average Rating:
Target Data Breach Cost: $148 Million
Better customer data protection needed.
Average Rating:
FBI Cybersquad To Add Agents
Rewarded for recent security successes.
Average Rating:
Product Information and Resources for Technology You Can Use To Boost Your Business

Network Security Spotlight
Researchers Find Malicious Android Apps Can Hack Gmail
A new study shows that a weakness in the Android mobile operating system can be used to steal sensitive, personal info from unwitting users. Gmail proved to be the easiest app to attack; Amazon, the hardest.
 
UPS Stores in 24 States Hit by Data Breach
Big Brown has been breached. UPS said that about 105,000 customer transactions at 51 of its UPS Store locations in 24 states could have been compromised between January and August.
 
Cost of Target Data Breach: $148 Million Plus Loss of Trust
The now infamous Target data breach is still costing the company -- and its shareholders -- plenty. In fact, the retailing giant forecast the December 2013 incident cost shareholders $148 million.
 

Enterprise Hardware Spotlight
Acer's New Desktop Box Rides the Chrome OS Wave
Filling out its Chrome OS line, Acer is following the introduction of a larger Chromebook line earlier this month with a new tiny $180 desktop Chromebox and also a smaller Chromebook.
 
Feds OK $2.3 Billion IBM-Lenovo x86 Server Deal
IBM and Lenovo are celebrating U.S. approval of their x86-based server deal, having cleared some major security hurdles. The deal makes Lenovo a major player for enterprise data centers.
 
Three New Lenovo PCs Aimed at Business Users
Businesses everywhere want computing solutions that do more for less money, and Lenovo has unveiled three new desktop PCs that offer solid computing at a budget-minded price.
 

Mobile Technology Spotlight
Screen Shortage Briefly Puts Brakes on iPhone 6
RAM? Check. Antenna switch? Check. Screen? Oops. Parts suppliers for Apple have found themselves facing a shortage of screens for the new iPhone 6 as next month's release date for the new smartphone looms.
 
Google Glass Adds Voice Access to Phone Contacts
The latest update to Google Glass will let users access their top 20 phone contacts with voice commands alone. A user can then choose a phone call, Google hangouts, e-mail or text messaging.
 
Samsung, B&N Target Amazon with Nook Tablet
They've seen the enemy and it is Amazon. So Samsung and Barnes & Noble are teaming up to combat their common foe with a 7-inch tablet that blends Samsung’s tech, Nook’s content and e-reader platform.
 

Navigation
NewsFactor Network
Home/Top News | Enterprise I.T. | Cloud Computing | Applications | Hardware | Mobile Tech | Big Data | Communications
World Wide Web | Network Security | Data Storage | CRM Systems | Microsoft/Windows | Apple/Mac | Linux/Open Source | Personal Tech
Press Releases
NewsFactor Network Enterprise I.T. Sites
NewsFactor Technology News | Enterprise Security Today | CRM Daily

NewsFactor Business and Innovation Sites
Sci-Tech Today | NewsFactor Business Report

NewsFactor Services
FreeNewsFeed | Free Newsletters

About NewsFactor Network | How To Contact Us | Article Reprints | Careers @ NewsFactor | Services for PR Pros | Top Tech Wire | How To Advertise

Privacy Policy | Terms of Service
© Copyright 2000-2014 NewsFactor Network. All rights reserved. Article rating technology by Blogowogo. Member of Accuserve Ad Network.