Whack-a-mole: Asymmetric Conflict and Guerrilla Warfare in Web Security

نویسندگان

  • Pern Hui Chia
  • John Chuang
  • Yanling Chen
چکیده

Many malicious and fraudulent endeavors on the web exhibit characteristics of asymmetric conflict and guerrilla warfare. Defenders work continuously to detect and take down malicious websites, while attackers respond by resisting takedowns, evading detection, or creating large numbers of new sites. This is reminiscent of the arcade game of whack-a-mole – the faster the moles pop in and out of the holes, the harder it becomes for the player to hit every one of them. In this work, we present the Colonel Blotto Web Security (CBWS) framework to model the asymmetric conflict and guerrilla warfare in web security. We find that even with a resource asymmetry disadvantage, an attacker can still realize significant utilities, provided that it can exploit an information asymmetry in its favor. In some cases, an attacker can realize a high utility with just a minimal number of websites that go undetected. In other cases, an attacker may realize little if any utility even after creating a large number of websites. The CBWS framework also allows us to model the effects of competition among multiple attackers. We find that competition weakens the effects of information asymmetry, and leads to a degradation of attacker utilities, even as more malicious sites are created.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Mao Zedong?s On Guerrilla Warfare and Joseph Kabila?s Lost Opportunity

By most metrics, the Democratic Republic of Congo (DRC) is a failed state, with ongoing risk to regional security and stability rooted in the conflicts that wracked the country for decades. However, this needn’t have been the outcome. There were numerous contextual similarities between the guerrilla movement in DRC under Laurent-Désiré Kabila, and China under Mao Tse-Tung during the Japanese oc...

متن کامل

Colonel Blotto in the Phishing War

Phishing exhibits characteristics of asymmetric conflict and guerrilla warfare. Phishing sites, upon detection, are subject to removal by takedown specialists. In response, phishers create large numbers of new phishing attacks to evade detection and stretch the resources of the defenders. We propose the Colonel Blotto Phishing (CBP) game, a twostage Colonel Blotto game with endogenous dimension...

متن کامل

Asymmetric War: A Conceptual Understanding

The term asymmetric war is a product of the revolution in military affairs (RMA). It can be taken as fresh jargon to distinguish the modern variant from traditional partisan and guerrilla war conducted by irregular bands using unconventional methods. In short, it is nothing new; only the cosmopolitan veneer is so. Since the Indian Army has vast experience dating to the preindependence period in...

متن کامل

Journal of

Eleven years of financial loss data from the CSI annual Computer Crime and Security surveys have been analysed to discover whether or not they obey some form of power law relationship. Evidence is adduced for the existence of both single and double power laws, and their characteristic exponents are determined, together with various statistical and probabilistic reliability measures. The finding...

متن کامل

Detection of Hidden Hostile/Terrorist Groups in Harsh Territories by Using Animals as Mobile Biological Sensors

Terrorism is the greatest threat to national security and cannot be defeated by conventional military force alone. In critical areas such as Iraq, Afghanistan and Turkey, regular forces cannot reach these hostile/terrorist groups, the instigators of terrorism. These groups have a clear understanding of the relative ineffectiveness of counter-guerrilla operations and rely on guerrilla warfare to...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2016