Skip to main content

Drawing with Limited Resources: Statistical Modeling of Computer Network Exploitation and Prevention

  • Chapter
  • First Online:
Cyberdefense

Abstract

When attackers attempt to exfiltrate information from a computer network, they are faced with a selection problem: They must identify valuable units of information among many irrelevant ones. We model such attacks as repeated urn draws under different distributional patterns, depending on how attackers pursue their operation. Further, we use prospect theory to model risk aversion and overconfidence among attackers. We illustrate the applicability of this model, and we discuss how defenders can use our insights to raise the transaction cost of exfiltration.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD 169.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    Formal proof is available on request from the corresponding author.

References

  1. Akerlof, G. (1970). The market for lemons: Quality uncertainty and the market mechanism. Quarterly Journal of Economics, 84, 488–500.

    Article  Google Scholar 

  2. Barnes, J. E. (2020). US accuses hackers of trying to steal coronavirus vaccine data for China. The New York Times, July 21, 2020.

    Google Scholar 

  3. Cunliffe, K. S. (2021). Hard target espionage in the information era: New challenges for the second oldest profession. Intelligence and National Security, 36(7), 1018–1034.

    Article  Google Scholar 

  4. Davies, D. W. (1995). The Lorenz cipher machine SZ42. Cryptologia, 19(1), 39–61.

    Article  Google Scholar 

  5. Denning, P. J., & Lewis, T. G. (2016). Exponential laws of computing growth. Communications of the ACM, 60(1), 54–65.

    Article  Google Scholar 

  6. Eastwood, J. (2019). Enabling militarism? The inclusion of soldiers with disabilities in the Israeli military. International Political Sociology, 13(4), 430–446.

    Article  Google Scholar 

  7. Hurley-Hanson, A. E., Giannantonio, C. M., & Griffiths, A. J. (2020). Organizations with autism initiatives. In A. Hurley-Hanson, C. Giannantonio, & A. J. Griffiths (Eds.), Autism in the Workplace (pp. 179–214). Cham: Palgrave Macmillan.

    Chapter  Google Scholar 

  8. Iasiello, E. J. (2017). Russia’s improved information operations: From Georgia to Crimea. The US Army War College Quarterly: Parameters, 47(2), 51–63.

    Google Scholar 

  9. Kahneman, D., & Tversky, A. (1992). Advances in prospect theory: Cumulative representation of uncertainty. Journal of Risk and Uncertainty, 5, 297–323.

    Article  Google Scholar 

  10. Kahneman, D., & Tversky, A. (1979). Prospect Theory: An analysis of decision under risk. Econometrica, 47(2), 263–291.

    Article  Google Scholar 

  11. Koomey, J., Berard, S., Sanchez, M., & Wong, H. (2010). Implications of historical trends in the electrical efficiency of computing. IEEE Annals of the History of Computing, 33(3), 46–54.

    Article  Google Scholar 

  12. Lin, H. S. (2010). Offensive cyber operations and the use of force. Journal of National Security Law & Policy, 4(1), 63–86.

    Google Scholar 

  13. Lindsay, J. R. (2017). Cyber espionage. In P. Cornish (Ed.), Handbook of cyber security (pp. 223–238). Oxford: Oxford University Press.

    Google Scholar 

  14. Mickolus, E. (2015). The Counterintelligence chronology: Spying by and against the United States from the 1700s through 2014. McFarland.

    Google Scholar 

  15. Moore, D. (2018). Targeting technology: Mapping military offensive network operations. In IEEE 2018 10th international conference on cyber conflict (CyCon) (pp. 89–108).

    Google Scholar 

  16. Nowrasteh, A. (2021). Espionage, espionage-related crimes, and immigration: A risk analysis, 1990–2019. Cato Institute Policy Analysis No. 909.

    Google Scholar 

  17. Rieger, M. O., & Wang, M. (2008). Prospect theory for continuous distributions. Journal of Risk and Uncertainty, 36(1), 83–102.

    Article  Google Scholar 

  18. Short, M. (2021). On binomial quantile and proportion bounds: With applications in engineering and informatics. Communication in Statistics - Theory and Methods, forthcoming.

    Google Scholar 

  19. Smeets, M. (2018). The strategic promise of offensive cyber operations. Strategic Studies Quarterly, 12(3), 90–113.

    Google Scholar 

  20. Takemura, K., & Murakami, H. (2016). Probability weighting functions derived from hyperbolic time discounting: Psychophysical models and their individual level testing. Frontiers in Psychology, 7, 778.

    Article  Google Scholar 

  21. Weissbrodt, D. (2013). Cyber-conflict, cyber-crime, and cyber-espionage. Minnesota Journal of International Law, 22, 347.

    Google Scholar 

  22. Wettering, F. L. (2001). The internet and the spy business. International Journal of Intelligence and Counterintelligence, 14(3), 342–365.

    Article  Google Scholar 

  23. Wilson, R., & Campbell-Kelly, M. (2020). Computing: The 1940s and 1950s. Math Intelligencer, 42, 92.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Philipp Fischer .

Editor information

Editors and Affiliations

1 Electronic supplementary material

Below is the link to the electronic supplementary material.

Supplementary material 1 (zip 6895 KB)

Rights and permissions

Reprints and permissions

Copyright information

© 2023 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Fischer, P., Muhly, F., Keupp, M.M. (2023). Drawing with Limited Resources: Statistical Modeling of Computer Network Exploitation and Prevention. In: Keupp, M.M. (eds) Cyberdefense. International Series in Operations Research & Management Science, vol 342. Springer, Cham. https://doi.org/10.1007/978-3-031-30191-9_10

Download citation

Publish with us

Policies and ethics