• HOME
  • NEWS
  • EXPLORE
    • CAREER
      • Companies
      • Jobs
    • EVENTS
    • iGEM
      • News
      • Team
    • PHOTOS
    • VIDEO
    • WIKI
  • BLOG
  • COMMUNITY
    • FACEBOOK
    • INSTAGRAM
    • TWITTER
Saturday, February 7, 2026
BIOENGINEER.ORG
No Result
View All Result
  • Login
  • HOME
  • NEWS
  • EXPLORE
    • CAREER
      • Companies
      • Jobs
        • Lecturer
        • PhD Studentship
        • Postdoc
        • Research Assistant
    • EVENTS
    • iGEM
      • News
      • Team
    • PHOTOS
    • VIDEO
    • WIKI
  • BLOG
  • COMMUNITY
    • FACEBOOK
    • INSTAGRAM
    • TWITTER
  • HOME
  • NEWS
  • EXPLORE
    • CAREER
      • Companies
      • Jobs
        • Lecturer
        • PhD Studentship
        • Postdoc
        • Research Assistant
    • EVENTS
    • iGEM
      • News
      • Team
    • PHOTOS
    • VIDEO
    • WIKI
  • BLOG
  • COMMUNITY
    • FACEBOOK
    • INSTAGRAM
    • TWITTER
No Result
View All Result
Bioengineer.org
No Result
View All Result
Home NEWS Science News

Game-theoretic model combines strategic and technical aspects of cyber attribution

Bioengineer by Bioengineer
February 28, 2017
in Science News
Reading Time: 2 mins read
0
Share on FacebookShare on TwitterShare on LinkedinShare on RedditShare on Telegram

A new article in the Proceedings of the National Academy of Sciences explores how cyber attack victims should best respond.

The article presents a game-theoretic model called the Blame Game, which shows when a victim should tolerate an attack and when it should respond publicly. The best strategic choice depends on the vulnerability of the attacker, the victim's knowledge level, the potential payoff for various outcomes and the beliefs each player has about its attacker.

The model applies to a wide range of conflicts and provides guidance to policymakers about which parameters must be estimated to make a sound decision about attribution and blame. Analysis of the model suggests that in many cases it may be rational for nations to tolerate cyber attacks, even in the face of strong public criticism. It also shows how imbalances between adversaries' abilities to trace attacks back to their origin can be destabilizing.

The article is published in the Feb. 27 online edition of PNAS and comes as the United States faces increasing threats in cyberspace, including the recent widely publicized attacks against the Democratic National Committee and the Chinese theft of databases containing the personal information of 21.5 federal employees.

"Conflict is increasingly common and severe on the Internet today, as governments and corporations have recognized its potential as an instrument of power and control," said co-author Stephanie Forrest, a distinguished professor at the University of New Mexico and an external professor at the Santa Fe Institute.

"Unlike nuclear technology, it can be extremely challenging to identify the party responsible for a cyber attack, and this complicates the strategic decision of when to assign blame. Our model elucidates these issues and identifies key parameters that must be considered in formulating a response," Forrest said.

At UNM, Dr. Forrest directs the Adaptive Computation Laboratory, where she leads interdisciplinary research and education programs, including work on computer security, software engineering, and biological modeling. She is also a member of the Center for Evolutionary and Theoretical Immunology (CETI) and a co-principal investigator of the Advance at UNM project, which is dedicated to recruiting, retaining and advancing women and minority STEM faculty.

###

Other authors of the PNAS article include Benjamin Edwards, a recent Ph.D. in Computer Science from UNM, now a postdoctoral researcher at IBM Research; Alexander Furnas, a doctoral student at the University of Michigan's Department of Political Science and Robert Axelrod, Walgreen Professor for the Study of Human Understanding at the University of Michigan Gerald R. Ford School of Public Policy.

Media Contact

Jenna Marshall
[email protected]
505-426-2798
@sfi_news

http://www.santafe.edu

############

Story Source: Materials provided by Scienmag

Share12Tweet8Share2ShareShareShare2

Related Posts

Boosting Remote Healthcare: Stepped-Wedge Trial Insights

February 7, 2026

Barriers and Boosters of Seniors’ Physical Activity in Karachi

February 7, 2026

Evaluating Pediatric Emergency Care Quality in Ethiopia

February 7, 2026

TPMT Expression Predictions Linked to Azathioprine Side Effects

February 7, 2026
Please login to join discussion

POPULAR NEWS

  • Robotic Ureteral Reconstruction: A Novel Approach

    Robotic Ureteral Reconstruction: A Novel Approach

    82 shares
    Share 33 Tweet 21
  • Digital Privacy: Health Data Control in Incarceration

    63 shares
    Share 25 Tweet 16
  • Study Reveals Lipid Accumulation in ME/CFS Cells

    57 shares
    Share 23 Tweet 14
  • Breakthrough in RNA Research Accelerates Medical Innovations Timeline

    53 shares
    Share 21 Tweet 13

About

We bring you the latest biotechnology news from best research centers and universities around the world. Check our website.

Follow us

Recent News

Boosting Remote Healthcare: Stepped-Wedge Trial Insights

Barriers and Boosters of Seniors’ Physical Activity in Karachi

Evaluating Pediatric Emergency Care Quality in Ethiopia

Subscribe to Blog via Email

Enter your email address to subscribe to this blog and receive notifications of new posts by email.

Join 73 other subscribers
  • Contact Us

Bioengineer.org © Copyright 2023 All Rights Reserved.

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In
No Result
View All Result
  • Homepages
    • Home Page 1
    • Home Page 2
  • News
  • National
  • Business
  • Health
  • Lifestyle
  • Science

Bioengineer.org © Copyright 2023 All Rights Reserved.