Whack-a-mole: Asymmetric Conflict and Guerrilla Warfare in Web Security
نویسندگان
چکیده
Many malicious and fraudulent endeavors on the web exhibit characteristics of asymmetric conflict and guerrilla warfare. Defenders work continuously to detect and take down malicious websites, while attackers respond by resisting takedowns, evading detection, or creating large numbers of new sites. This is reminiscent of the arcade game of whack-a-mole – the faster the moles pop in and out of the holes, the harder it becomes for the player to hit every one of them. In this work, we present the Colonel Blotto Web Security (CBWS) framework to model the asymmetric conflict and guerrilla warfare in web security. We find that even with a resource asymmetry disadvantage, an attacker can still realize significant utilities, provided that it can exploit an information asymmetry in its favor. In some cases, an attacker can realize a high utility with just a minimal number of websites that go undetected. In other cases, an attacker may realize little if any utility even after creating a large number of websites. The CBWS framework also allows us to model the effects of competition among multiple attackers. We find that competition weakens the effects of information asymmetry, and leads to a degradation of attacker utilities, even as more malicious sites are created.
منابع مشابه
Mao Zedong?s On Guerrilla Warfare and Joseph Kabila?s Lost Opportunity
By most metrics, the Democratic Republic of Congo (DRC) is a failed state, with ongoing risk to regional security and stability rooted in the conflicts that wracked the country for decades. However, this needn’t have been the outcome. There were numerous contextual similarities between the guerrilla movement in DRC under Laurent-Désiré Kabila, and China under Mao Tse-Tung during the Japanese oc...
متن کاملColonel Blotto in the Phishing War
Phishing exhibits characteristics of asymmetric conflict and guerrilla warfare. Phishing sites, upon detection, are subject to removal by takedown specialists. In response, phishers create large numbers of new phishing attacks to evade detection and stretch the resources of the defenders. We propose the Colonel Blotto Phishing (CBP) game, a twostage Colonel Blotto game with endogenous dimension...
متن کاملAsymmetric War: A Conceptual Understanding
The term asymmetric war is a product of the revolution in military affairs (RMA). It can be taken as fresh jargon to distinguish the modern variant from traditional partisan and guerrilla war conducted by irregular bands using unconventional methods. In short, it is nothing new; only the cosmopolitan veneer is so. Since the Indian Army has vast experience dating to the preindependence period in...
متن کاملJournal of
Eleven years of financial loss data from the CSI annual Computer Crime and Security surveys have been analysed to discover whether or not they obey some form of power law relationship. Evidence is adduced for the existence of both single and double power laws, and their characteristic exponents are determined, together with various statistical and probabilistic reliability measures. The finding...
متن کاملDetection of Hidden Hostile/Terrorist Groups in Harsh Territories by Using Animals as Mobile Biological Sensors
Terrorism is the greatest threat to national security and cannot be defeated by conventional military force alone. In critical areas such as Iraq, Afghanistan and Turkey, regular forces cannot reach these hostile/terrorist groups, the instigators of terrorism. These groups have a clear understanding of the relative ineffectiveness of counter-guerrilla operations and rely on guerrilla warfare to...
متن کامل