Modelling Information Warfare as a Game

نویسندگان

  • Jorma Jormakka
  • Jarmo V. E. Mölsä
چکیده

Game theory is one of the possible ways to study information warfare with mathematical models. This paper presents four example games which illustrate the different requirements for an effective playing strategy in information warfare. These games study, how a bold playing strategy can lead to domination, how a mixed playing strategy can reduce domination, how it can be useful to play a dominating strategy only part of the time, and how excessive domination can lead to rebels where all playing parties lose. This paper also describes meta-strategies whose goal is to modify the perceived costs and conditions of a game. This kind of perception management is closely related to the Observe-Orient-DecideAct (OODA) loop.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Survey of Game Theoretic Approaches to Modelling Decision-Making in Information Warfare Scenarios

Our increasing dependence on information technologies and autonomous systems has escalated international concern for informationand cyber-security in the face of politically, socially and religiously motivated cyber-attacks. Information warfare tactics that interfere with the flow of information can challenge the survival of individuals and groups. It is increasingly important that both humans ...

متن کامل

GAME OF COORDINATION FOR BACTERIAL PATTERN FORMATION: A FINITE AUTOMATA MODELLING

In this paper, we use game theory to describe the emergence of self-organization and consequent pattern formation through communicative cooperation in Bacillus subtilis colonies. The emergence of cooperative regime is modelled as an n-player Assurance game, with the bacterial colonies as individual players. The game is played iteratively through cooperative communication, and mediated by exchan...

متن کامل

Application of Stochastic Optimal Control, Game Theory and Information Fusion for Cyber Defense Modelling

The present paper addresses an effective cyber defense model by applying information fusion based game theoretical approaches‎. ‎In the present paper, we are trying to improve previous models by applying stochastic optimal control and robust optimization techniques‎. ‎Jump processes are applied to model different and complex situations in cyber games‎. ‎Applying jump processes we propose some m...

متن کامل

Classical Deception Techniques and Perception Management vs. the Four Strategies of Information Warfare

The use of deception techniques for intelligence operations, strategic and tactical deception in war, politics, business and media manipulation is well established and well documented. This paper analyses established deception techniques in the context of the four canonical strategies of Information Warfare, to establish an information theoretical and game theoretical framework for future model...

متن کامل

Afit/gss/lal/99d-1 towards a Game Theory Model of Information Warfare

The production and exchange of information has become a central activity in today’s global economy. Protecting and securing information as it travels over the vast, mostly public Internet has emerged as perhaps the premiere issue of the Information Age. Thus, the attack and defense of electronic information has formed an entirely new kind of conflict – information warfare. Information warfare i...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2005