Scientists at the University of Michigan created the model to help develop a basis for understanding the strategic implications of cyber technology.
Focusing on the timing of cyber conflict, the model analyses when an attacker is most motivated to exploit vulnerabilities in a target's computer system for espionage or disruption.
"One of our major contributions is to develop some concepts to deal with this new realm of cyber conflict," said Robert Axelrod, professor of political science and public policy at U-M's Ford School.
The researchers developed two concepts. One is stealth, which is the ability of a resource to exploit a vulnerability in a target's computer system to stay undiscovered if it is used.
The other is persistence, which is to keep the vulnerability undiscovered if it isn't used.
"A good resource should have both stealth and persistence," said Rumen Iliev, a postdoctoral research fellow.
"The less persistent a resource is, the sooner (it should be used) lest the vulnerability is fixed before (there's) a chance to exploit it," Iliev said.
"We also hope this will encourage other efforts to study these things in a rigorous way," Axelrod said.
"There's a lot of discussion about cyber problems, but it's so new that the language isn't established. People use the word attack to mean anything from stealing a credit card number to sabotage of an industrial system," Axelrod said.
The research appears in the Proceedings of the National Academy of Sciences.
You’ve reached your limit of {{free_limit}} free articles this month.
Subscribe now for unlimited access.
Already subscribed? Log in
Subscribe to read the full story →
Smart Quarterly
₹900
3 Months
₹300/Month
Smart Essential
₹2,700
1 Year
₹225/Month
Super Saver
₹3,900
2 Years
₹162/Month
Renews automatically, cancel anytime
Here’s what’s included in our digital subscription plans
Exclusive premium stories online
Over 30 premium stories daily, handpicked by our editors


Complimentary Access to The New York Times
News, Games, Cooking, Audio, Wirecutter & The Athletic
Business Standard Epaper
Digital replica of our daily newspaper — with options to read, save, and share


Curated Newsletters
Insights on markets, finance, politics, tech, and more delivered to your inbox
Market Analysis & Investment Insights
In-depth market analysis & insights with access to The Smart Investor


Archives
Repository of articles and publications dating back to 1997
Ad-free Reading
Uninterrupted reading experience with no advertisements


Seamless Access Across All Devices
Access Business Standard across devices — mobile, tablet, or PC, via web or app
