Deterrence with Imperfect Attribution

Motivated by recent developments in cyberwarfare, we study deterrence in a world where at-tacks cannot be perfectly attributed to attackers. In the model, each ofnattackers may attackthe defender. The defender observes a noisy signal that probabilistically attributes the attack.The defender may re...

Full description

Bibliographic Details
Main Author: Wolitzky, Alexander Greenberg
Other Authors: Massachusetts Institute of Technology. Department of Economics
Format: Article
Language:English
Published: Cambridge University Press (CUP) 2021
Online Access:https://hdl.handle.net/1721.1/130440
_version_ 1811081855649185792
author Wolitzky, Alexander Greenberg
author2 Massachusetts Institute of Technology. Department of Economics
author_facet Massachusetts Institute of Technology. Department of Economics
Wolitzky, Alexander Greenberg
author_sort Wolitzky, Alexander Greenberg
collection MIT
description Motivated by recent developments in cyberwarfare, we study deterrence in a world where at-tacks cannot be perfectly attributed to attackers. In the model, each ofnattackers may attackthe defender. The defender observes a noisy signal that probabilistically attributes the attack.The defender may retaliate against one or more attackers, and wants to retaliate against theguilty attacker only. We note an endogenous strategic complementarity among the attackers: ifone attacker becomes more aggressive, that attacker becomes more “suspect” and the other at-tackers become less suspect, which leads the other attackers to become more aggressive as well.Despite this complementarity, there is a unique equilibrium. We identify types of improvementsin attribution that strengthen deterrence—namely, improving attack detection independently ofany effect on the identifiability of the attacker, reducing false alarms, or replacing misidentifica-tion with non-detection. However, we show that other improvements in attribution can backfire,weakening deterrence—these include detecting more attacks where the attacker is difficult toidentify or pursuing too much certainty in attribution. Deterrence is improved if the defendercan commit to a retaliatory strategy in advance, but the defender should not always commit toretaliate more after every signal.
first_indexed 2024-09-23T11:53:33Z
format Article
id mit-1721.1/130440
institution Massachusetts Institute of Technology
language English
last_indexed 2024-09-23T11:53:33Z
publishDate 2021
publisher Cambridge University Press (CUP)
record_format dspace
spelling mit-1721.1/1304402022-09-27T22:38:38Z Deterrence with Imperfect Attribution Wolitzky, Alexander Greenberg Massachusetts Institute of Technology. Department of Economics Motivated by recent developments in cyberwarfare, we study deterrence in a world where at-tacks cannot be perfectly attributed to attackers. In the model, each ofnattackers may attackthe defender. The defender observes a noisy signal that probabilistically attributes the attack.The defender may retaliate against one or more attackers, and wants to retaliate against theguilty attacker only. We note an endogenous strategic complementarity among the attackers: ifone attacker becomes more aggressive, that attacker becomes more “suspect” and the other at-tackers become less suspect, which leads the other attackers to become more aggressive as well.Despite this complementarity, there is a unique equilibrium. We identify types of improvementsin attribution that strengthen deterrence—namely, improving attack detection independently ofany effect on the identifiability of the attacker, reducing false alarms, or replacing misidentifica-tion with non-detection. However, we show that other improvements in attribution can backfire,weakening deterrence—these include detecting more attacks where the attacker is difficult toidentify or pursuing too much certainty in attribution. Deterrence is improved if the defendercan commit to a retaliatory strategy in advance, but the defender should not always commit toretaliate more after every signal. 2021-04-12T11:18:59Z 2021-04-12T11:18:59Z 2020-11 2021-04-06T14:17:23Z Article http://purl.org/eprint/type/JournalArticle 0003-0554 https://hdl.handle.net/1721.1/130440 Baliga, Sandeep et al. “Deterrence with Imperfect Attribution.” American Political Science Review, 114, 4 (November 2020): 1155 - 1178 © 2020 The Author(s) en 10.1017/S0003055420000362 American Political Science Review Creative Commons Attribution-Noncommercial-Share Alike http://creativecommons.org/licenses/by-nc-sa/4.0/ application/pdf Cambridge University Press (CUP) MIT web domain
spellingShingle Wolitzky, Alexander Greenberg
Deterrence with Imperfect Attribution
title Deterrence with Imperfect Attribution
title_full Deterrence with Imperfect Attribution
title_fullStr Deterrence with Imperfect Attribution
title_full_unstemmed Deterrence with Imperfect Attribution
title_short Deterrence with Imperfect Attribution
title_sort deterrence with imperfect attribution
url https://hdl.handle.net/1721.1/130440
work_keys_str_mv AT wolitzkyalexandergreenberg deterrencewithimperfectattribution