How Governments Can Better Defend Themselves Against Cyberattacks
Skip to content
Policy Aug 3, 2018

How Governments Can Better Defend Themselves Against Cyberattacks

The threat of retaliation can keep the peace. But that assumes you know who is attacking you.

Militaries defend themselves against cyber attacks.

Yevgenia Nayberg

Based on the research of

Sandeep Baliga

Ethan Bueno de Mesquita

Alexander Wolizky

In the early 2000s, hackers successfully infiltrated a series of secure military computer networks across the United States. From that breach, later deemed “Titan Rain,” the hackers would successfully pilfer a wealth of sensitive data including Army helicopter specs, the Air Force’s flight-planning software, and schematics for a NASA Mars orbiter.

Add Insight
to your inbox.

American leaders have typically vowed swift and fierce retaliation for any attack on the United States by a foreign actor. So why was there no retaliation for this provocation?

The answer comes down to attribution. “If North Korea attacks us with nuclear weapons, we observe that it is North Korea, so we retaliate against North Korea,” explains Sandeep Baliga, a professor of managerial economics and decision sciences at Kellogg.

But in cyber warfare, attributing an attack is not so easy. While experts suspected that the Chinese government was behind Titan Rain, it was possible that it had been the work of rogue Chinese civilians, or even another nation that manipulated its digital footprints to make China appear responsible.

This uncertainty presents a dilemma. For decades, the U.S. military has relied on the threat of retaliation to deter would-be aggressors. Most famously, the doctrine of “mutually assured destruction” warded off Soviet nukes during the Cold War. But if the U.S. can no longer pinpoint and retaliate against its aggressors, then that doctrine is hard to apply, Baliga says.

Simply getting better at identifying one’s attacker, it turns out, is not enough.

In a new paper with University of Chicago’s Ethan Bueno de Mesquita and MIT’s Alexander Wolitzky, Baliga formulates a deterrence theory for the Internet age

Using a mathematical model of multiplayer interaction using the tools of game theory, he finds that if any party becomes more aggressive, attacks increase across the board. The reason: When one party appears especially hostile, they tend to take the blame (and receive the retaliation) for any attack that is hard to attribute. That gives the other actors an incentive to launch more attacks, since they can avoid repercussions by letting the victim believe that the most hostile aggressor was responsible—or, more nefariously, by making it look like that aggressor was responsible.

“If somebody wants to trigger a war between us and China, then they have every reason to do a hack that looks like China did it,” Baliga says.

But the same model also offers a new strategy to deter cyberattacks: if nations get better at both detecting attacks and identifying their perpetrators, then cyber peace is more likely to prevail.

Modeling Cyber Warfare

To analyze what happens in a cyberattack, the researchers conceived of a straightforward scenario. “There’s one defender, and multiple possible attackers,” Baliga explains, “and any of the attackers can attack the defender.”

If an attacker chooses to attack the defender, they receive some payoff. “It could be something quite concrete, like if you find the plans for a stealth bomber,” Baliga says. “Or you find a bunch of credit card numbers, and you use those to do illegal trades.”

Next, the defender receives some “signal” suggesting whether they have been attacked and who is to blame. In the real world, this signal typically includes the digital footprints left in the wake of a suspected cyberattack (such as the signs suggesting, but not proving, that China was behind Titan Rain).

However, this signal is rife with ambiguity—it conveys only that the defender may have been attacked, and that a certain party is responsible, leaving plenty of room for error.

Sometimes, defenders will not even realize that they have been attacked (such as when the Iranian government failed to detect malware installed in their nuclear facilities, instead blaming malfunctions on faulty parts). The researchers call this “detection failure.” Other times, defenders believe that they have been attacked even when they have not (as perhaps was the case in 2008, when the Department of Defense suspected Russia of installing a worm that came from a U.S. soldier’s USB drive). The researchers call this a “false alarm.” And sometimes the signal will lead them to blame the wrong party for the attack. The authors call this “mis-identification.”

Based on the imperfect signal, the defender must choose whether, and against whom, to retaliate.

Obviously, every attacker wants to avoid retaliation. “Maybe I’ve hacked and found the stealth bomber plans—but if I get attacked and some secret stuff of mine gets taken away or some cyber infrastructure is destroyed, then I might regret my attack altogether,” Baliga explains. “So the payoff depends on both what I find through my hack, and whether I’m retaliated against or not.”

At the same time, the defender does not want to counterattack willy-nilly. After all, if they retaliate against an innocent party, it can set off a chain reaction of back-and-forth aggression between two formerly peaceful parties.

The researchers translated this scenario into mathematical language. From there, they could deduce the strategies that provide the optimal result for each party, given all of the other parties’ strategies. (This is the concept of Nash equilibrium named for its inventor, John Nash, the subject of the movie “A Beautiful Mind.”)

Under which circumstances would attackers decide to attack? And how would defenders retaliate, given so much uncertainty? “Our first objective was just to provide a structure to think though the various attribution problems that might arise,” Baliga explains. This led to the taxonomy of detection failure, false alarms, and misidentification. “With that in place, we didn’t know how the analysis would go.”

Aggression Breeds More Aggression

The most important result of the model: once one potential attacker becomes more aggressive, all of the other attackers also become more aggressive. This connection between attackers’ strategies stems from the problem of attribution.

Baliga explains the logic behind this odd conclusion. If a defender—the U.S., for example—sees signals indicating that a particular party—say, Russia—has cyberattacked them, they become more likely to blame Russia for any subsequent attack. Other countries observe this and realize that now they can likely hack the U.S. and collect their payoffs with little risk of being retaliated against.

“That then means that China can hack us, or even France can hack us—anybody can hack us and we would think it’s likely Russia,” Baliga says.

“If somebody wants to trigger a war between us and China, then they have every reason to do a hack that looks like China did it.” 

By looking closely at the mechanics of the model, the authors also discovered what it would take to deter cyber warfare in this context. Simply getting better at identifying one’s attacker, it turned out, was not enough.

To explain why, Baliga offers another example. If the U.S. receives a weak signal of a cyberattack, as well as a weak signal that it was committed by Russia, they may choose to retaliate against Russia. But after U.S. identification abilities improve, that same weak evidence of there having been an attack now seems less convincing than it did before—after all, if it was really a Russian attack, the new, more sophisticated intelligence would have picked it up, or so the thinking goes. So, it is now more likely that the weak signal is a false alarm, and the U.S. may choose not to retaliate after a weak signal that previously would have triggered an aggressive response.

“If I’m the defender and I’m retaliating less aggressively after some signals and more aggressively after others, it is not clear how the net effect goes. It could turn out that I retaliate less on average after my identification technology improves,” Baliga says.

That makes everyone more aggressive, since other countries now see an opportunity to attack with fewer consequences, he explains. So a policy of reducing misidentification alone can backfire.

The model suggests a better way to improve deterrence: become more proficient at identifying attackers as well as detecting attacks. By correctly pinpointing the perpetrator without increasing the chance of false alarms, a defender is more likely to retaliate against an attacker—and that increased threat of retaliation leads to peace.

“Cyberwarfare Is Inherently Multilateral”

Baliga believes that his findings have implications for military strategy, suggesting that militaries worldwide should not only invest in better detection and attribution capabilities, but also abandon the simplistic doctrine of mutually assured destruction. While the threat of retaliation is necessary to maintain peace, vowing fiery retribution for any sign of a foreign attack does not work when we have imperfect information about those attacks.

“The policy world wants to be super macho,” he says. “They want to say, ‘If we detect a signal that China attacked, let’s retaliate with overwhelming force.’ We tell that to all our cyber-military commanders. But that’s going to backfire in many ways.”

The paper indicates that such a policy could be exploited, for instance, by someone seeking to foment a conflict between U.S. and Russia at a time when distrust of Russia is high.

Rather than maintaining a blanket policy for how to react to cyberattacks, Baliga implores leaders to first evaluate what they know for certain about an attack. “If the standard of proof is satisfied, yeah, then you should react super aggressively,” he says. “But when there’s a lot of noise, you might actually want to back off because others may exploit your policy by hiding behind misidentification.”

More than anything, Baliga hopes that his research forces policymakers to acknowledge that Cold War–era thinking, in which deterrence involved just one attacker and one defender, no longer holds. As the model demonstrates, small nations and even rogue civilians now have the power to spark global conflict between superpowers.

“It’s not bilateral anymore because of the attribution problem,” he says. “The main new thing everybody has to think through, and which we provide the first step for, is that cyber warfare is inherently multilateral.”

Featured Faculty

John L. and Helen Kellogg Professor of Managerial Economics & Decision Sciences

About the Writer
Jake J. Smith is a freelance writer and radio producer in Chicago.
About the Research
Baliga, Sandeep, Ethan Bueno de Mesquita, and Alexander Wolizky. 2018. "Deterrence with Imperfect Attribution." Working paper.

Read the original

Most Popular This Week
  1. How Much Do Boycotts Affect a Company’s Bottom Line?
    There’s often an opposing camp pushing for a “buycott” to support the company. New research shows which group has more sway.
    grocery store aisle where two groups of people protest. One group is boycotting, while the other is buycotting
  2. 5 Takeaways on the State of ESG Investing
    ESG investing is hot. But what does it actually deliver for society and for shareholders?
    watering can pouring over windmills
  3. Could Bringing Your "Whole Self" to Work Curb Unethical Behavior?
    Organizations would be wise to help employees avoid compartmentalizing their personal and professional identities.
    A star employee brings her whole self to work.
  4. When Do Open Borders Make Economic Sense?
    A new study provides a window into the logic behind various immigration policies.
    How immigration affects the economy depends on taxation and worker skills.
  5. Which Form of Government Is Best?
    Democracies may not outlast dictatorships, but they adapt better.
    Is democracy the best form of government?
  6. How Has Marketing Changed over the Past Half-Century?
    Phil Kotler’s groundbreaking textbook came out 55 years ago. Sixteen editions later, he and coauthor Alexander Chernev discuss how big data, social media, and purpose-driven branding are moving the field forward.
    people in 1967 and 2022 react to advertising
  7. What Happens to Worker Productivity after a Minimum Wage Increase?
    A pay raise boosts productivity for some—but the impact on the bottom line is more complicated.
    employees unload pallets from a truck using hand carts
  8. Why Do Some People Succeed after Failing, While Others Continue to Flounder?
    A new study dispels some of the mystery behind success after failure.
    Scientists build a staircase from paper
  9. What Went Wrong at AIG?
    Unpacking the insurance giant's collapse during the 2008 financial crisis.
    What went wrong during the AIG financial crisis?
  10. Why Well-Meaning NGOs Sometimes Do More Harm than Good
    Studies of aid groups in Ghana and Uganda show why it’s so important to coordinate with local governments and institutions.
    To succeed, foreign aid and health programs need buy-in and coordination with local partners.
  11. 3 Tips for Reinventing Your Career After a Layoff
    It’s crucial to reassess what you want to be doing instead of jumping at the first opportunity.
    woman standing confidently
  12. How Are Black–White Biracial People Perceived in Terms of Race?
    Understanding the answer—and why black and white Americans may percieve biracial people differently—is increasingly important in a multiracial society.
    How are biracial people perceived in terms of race
  13. Podcast: Does Your Life Reflect What You Value?
    On this episode of The Insightful Leader, a former CEO explains how to organize your life around what really matters—instead of trying to do it all.
  14. Immigrants to the U.S. Create More Jobs than They Take
    A new study finds that immigrants are far more likely to found companies—both large and small—than native-born Americans.
    Immigrant CEO welcomes new hires
  15. In a World of Widespread Video Sharing, What’s Real and What’s Not?
    A discussion with a video-authentication expert on what it takes to unearth “deepfakes.”
    A detective pulls back his computer screen to reveal code behind the video image.
  16. College Campuses Are Becoming More Diverse. But How Much Do Students from Different Backgrounds Actually Interact?
    Increasing diversity has been a key goal, “but far less attention is paid to what happens after we get people in the door.”
    College quad with students walking away from the center
More in Policy