• HOME
  • NEWS
  • EXPLORE
    • CAREER
      • Companies
      • Jobs
    • EVENTS
    • iGEM
      • News
      • Team
    • PHOTOS
    • VIDEO
    • WIKI
  • BLOG
  • COMMUNITY
    • FACEBOOK
    • INSTAGRAM
    • TWITTER
Friday, December 19, 2025
BIOENGINEER.ORG
No Result
View All Result
  • Login
  • HOME
  • NEWS
  • EXPLORE
    • CAREER
      • Companies
      • Jobs
        • Lecturer
        • PhD Studentship
        • Postdoc
        • Research Assistant
    • EVENTS
    • iGEM
      • News
      • Team
    • PHOTOS
    • VIDEO
    • WIKI
  • BLOG
  • COMMUNITY
    • FACEBOOK
    • INSTAGRAM
    • TWITTER
  • HOME
  • NEWS
  • EXPLORE
    • CAREER
      • Companies
      • Jobs
        • Lecturer
        • PhD Studentship
        • Postdoc
        • Research Assistant
    • EVENTS
    • iGEM
      • News
      • Team
    • PHOTOS
    • VIDEO
    • WIKI
  • BLOG
  • COMMUNITY
    • FACEBOOK
    • INSTAGRAM
    • TWITTER
No Result
View All Result
Bioengineer.org
No Result
View All Result
Home NEWS Science News

Game-theoretic model combines strategic and technical aspects of cyber attribution

Bioengineer by Bioengineer
February 28, 2017
in Science News
Reading Time: 2 mins read
0
Share on FacebookShare on TwitterShare on LinkedinShare on RedditShare on Telegram

A new article in the Proceedings of the National Academy of Sciences explores how cyber attack victims should best respond.

The article presents a game-theoretic model called the Blame Game, which shows when a victim should tolerate an attack and when it should respond publicly. The best strategic choice depends on the vulnerability of the attacker, the victim's knowledge level, the potential payoff for various outcomes and the beliefs each player has about its attacker.

The model applies to a wide range of conflicts and provides guidance to policymakers about which parameters must be estimated to make a sound decision about attribution and blame. Analysis of the model suggests that in many cases it may be rational for nations to tolerate cyber attacks, even in the face of strong public criticism. It also shows how imbalances between adversaries' abilities to trace attacks back to their origin can be destabilizing.

The article is published in the Feb. 27 online edition of PNAS and comes as the United States faces increasing threats in cyberspace, including the recent widely publicized attacks against the Democratic National Committee and the Chinese theft of databases containing the personal information of 21.5 federal employees.

"Conflict is increasingly common and severe on the Internet today, as governments and corporations have recognized its potential as an instrument of power and control," said co-author Stephanie Forrest, a distinguished professor at the University of New Mexico and an external professor at the Santa Fe Institute.

"Unlike nuclear technology, it can be extremely challenging to identify the party responsible for a cyber attack, and this complicates the strategic decision of when to assign blame. Our model elucidates these issues and identifies key parameters that must be considered in formulating a response," Forrest said.

At UNM, Dr. Forrest directs the Adaptive Computation Laboratory, where she leads interdisciplinary research and education programs, including work on computer security, software engineering, and biological modeling. She is also a member of the Center for Evolutionary and Theoretical Immunology (CETI) and a co-principal investigator of the Advance at UNM project, which is dedicated to recruiting, retaining and advancing women and minority STEM faculty.

###

Other authors of the PNAS article include Benjamin Edwards, a recent Ph.D. in Computer Science from UNM, now a postdoctoral researcher at IBM Research; Alexander Furnas, a doctoral student at the University of Michigan's Department of Political Science and Robert Axelrod, Walgreen Professor for the Study of Human Understanding at the University of Michigan Gerald R. Ford School of Public Policy.

Media Contact

Jenna Marshall
[email protected]
505-426-2798
@sfi_news

http://www.santafe.edu

############

Story Source: Materials provided by Scienmag

Share12Tweet7Share2ShareShareShare1

Related Posts

Impact of Context and Experience on Nurses’ Medications

December 19, 2025

Measles Vaccine Uptake in Young Children in Ethiopia

December 19, 2025

Exploring Digitalization in German Palliative Care

December 19, 2025

Embracing Death: Geriatric Patients’ Perspectives Explored

December 19, 2025
Please login to join discussion

POPULAR NEWS

  • Nurses’ Views on Online Learning: Effects on Performance

    Nurses’ Views on Online Learning: Effects on Performance

    70 shares
    Share 28 Tweet 18
  • NSF funds machine-learning research at UNO and UNL to study energy requirements of walking in older adults

    70 shares
    Share 28 Tweet 18
  • Unraveling Levofloxacin’s Impact on Brain Function

    53 shares
    Share 21 Tweet 13
  • MoCK2 Kinase Shapes Mitochondrial Dynamics in Rice Fungal Pathogen

    72 shares
    Share 29 Tweet 18

About

We bring you the latest biotechnology news from best research centers and universities around the world. Check our website.

Follow us

Recent News

Impact of Context and Experience on Nurses’ Medications

Measles Vaccine Uptake in Young Children in Ethiopia

Exploring Digitalization in German Palliative Care

Subscribe to Blog via Email

Enter your email address to subscribe to this blog and receive notifications of new posts by email.

Join 70 other subscribers
  • Contact Us

Bioengineer.org © Copyright 2023 All Rights Reserved.

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In
No Result
View All Result
  • Homepages
    • Home Page 1
    • Home Page 2
  • News
  • National
  • Business
  • Health
  • Lifestyle
  • Science

Bioengineer.org © Copyright 2023 All Rights Reserved.