US researchers have developed a mathematical model that can predict when a cyber attack may be launched.
Scientists at the University of Michigan created the model to help develop a basis for understanding the strategic implications of cyber technology.
Focusing on the timing of cyber conflict, the model analyses when an attacker is most motivated to exploit vulnerabilities in a target’s computer system for espionage or disruption.
“One of our major contributions is to develop some concepts to deal with this new realm of cyber conflict,” said Robert Axelrod, professor of political science and public policy at U-M’s Ford School.
“It took 15 years in the nuclear world for people to understand the implications of nuclear technology. It is our hope that it won’t take that long to understand the strategic capabilities of cyber technology,” Axelrod said.
- Soon You Could Get Plastic Currency Notes: Find Out More
- Ranveer Singh and Vaani Kapoor Starrer Befikre Gets A Thumbs Up
- Supreme Court Seeks Centre’s Response Over Various Issues Regarding Demonetisation
- Defence Minister Manohar Parrikar Writes To West Bengal CM Mamata Banerjee
- Bigg Boss 10 December 8 Review: Swami Om Feels Cheated, lashes Out At Gaurav For Jail Punishment
- South Korean President Park Geun-Hye Impeached Over Corruption Scandal
- Former Air Chief SP Tyagi Arrested In VVIP Chopper Scam
- After Congress Vice President Rahul Gandhi, Liquor Baron Vijay Mallya’s Twitter Account Hacked
- Find Out What PM Narendra Modi Told Cabinet Over Demonetisation Decision
- Home Minister Rajnath Singh Assures Safety Of All Tourists Stranded On Havelock Island
- Government To Waive Service Tax On Debit, Credit Card Transactions Of Up To Rs 2,000
- President Pranab Mukherjee Criticises Parliament Disruptions Over Demonetisation
- Pakistan International Airlines Flight Carrying Over 40 Passenger On Board Crashes
- Shah Rukh Khan On Raees Clash With Kaabil: It’s Impossible To Have A Solo Release In India
- US-President Elect Donald Trump Named TIME’s Person Of The Year 2016
The researchers developed two concepts. One is stealth, which is the ability of a resource to exploit a vulnerability in a target’s computer system to stay undiscovered if it is used.
The other is persistence, which is to keep the vulnerability undiscovered if it isn’t used.
“A good resource should have both stealth and persistence,” said Rumen Iliev, a postdoctoral research fellow.
“The less persistent a resource is, the sooner (it should be used) lest the vulnerability is fixed before (there’s) a chance to exploit it,” Iliev said.
They illustrate their model using four case studies, including the Stuxnet attack on Iran’s nuclear programme and the Iranian cyber attack on the energy firm Saudi Aramco.
“We also hope this will encourage other efforts to study these things in a rigorous way,” Axelrod said.
“There’s a lot of discussion about cyber problems, but it’s so new that the language isn’t established. People use the word attack to mean anything from stealing a credit card number to sabotage of an industrial system,” Axelrod said.
The research appears in the Proceedings of the National Academy of Sciences.