Information assurance plays a critical role in modern countries around the globe and IT systems are key elements in this environment. Enabling or disabling such capabilities are strategic goals which dramatically influence a nation capacity to perform thus drawing considerate attention of stakeholders. This research defines a method to deal with cyber threats focused on attacker by using the game theory approach and canonic strategies specific to informational war. The cyber threats corresponding risks are treated through the bimatrix game theory and the strategies for Defender and Challenger game players are adapted from the informational war theory. The authors consider cyber-attacks to be a subcomponent of the informational war and thus they can be handled, with minimal alterations, with instruments from the same wide informational war framework.
This paper treats the new phenomenon of cyber-war as a new form of human violence between states. The concept of cyber-attack is a particular form of cybernetic war and it is one expensive in terms of cost. We tried to achieve a uniform approach of technological and sociological type using BDI agents and thus making the step to addressing computational sociology of cyberspace. We present two patterns of massive type attacks applicable in cyber space using BDI agents. The approach using BDI agents turned to be flexible and capable to model complex forms of cyber bullying that can occur between two countries in future.
This work aims to assess how the infrastructure of production & transport of the electric energy can be annihilated in a nation-state through a cyber attack, as a particular form of manifestation of cybernetic warfare. In this study we consider that the purpose of the cyber attack is only to remove servers from service, logically or physically. There are several standards that integrate the business side of a company with the level of supervision of industrial infrastructure and with the level of control engineering. These levels are integrated and are using different protocols. To simulate cyber-attacks between the countries with flexible potential escalation there are used BDI (Belief-Desire-Intention) agents which allow to separate treatment of different types of attacks. Inspired by the study of nuclear attacks implemented using the game theory, the flexibility of the BDI paradigm increases research potential of decision trees using this type of agent in other areas of human existence, like modeling human behavior at policy states makers or cyberspace executive users.
This research paper presents a merging way for study the cyberwarfare based on two theoretical approaches. The first one poliheuristic approach proposed by Alex Mintz in study of foreign policy, and the second way is the concept of cyber power index created by Intelligence Unit division of the british journal "The Economist". The cyberwarfare poliheuristic study approach uses the EUI's cyber-power index questionnaire for a qualitative approach based on the evaluation of the decision matrix rates and weights. The presented method aims to become a standard in the field of cyberwarfare and an alternative to the purely rationalist approaches that are currently being invoked in this research field.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.