Representing Strategic Cyber and Information Warfare in Matrix Games

被引:0
|
作者
Lee, Hyong [1 ]
DeMuth, James [1 ]
机构
[1] Natl Def Univ, Ctr Appl Strateg Learning, Washington, DC 20319 USA
关键词
Wargames; cyber exercises; matrix; gaming; strategy;
D O I
10.34190/ICCWS.20.009
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Wargames that examine cyber and information warfare at the strategic level have different design challenges from those of tactical level cyber exercises. It is easier to map computer networks, determine success or failure of specific offensive or defensive actions and maintain some level of anonymity during a tactical level computerized exercise. Our design challenge was to create a game format that allowed participants to conduct open strategic policy options paired with covert cyber and information operations. These covert actions had probabilities of success and attribution by the target. We were constrained by a small control staff, limited time to adjudicate player decisions and a dynamic game format that did not allow for pre-planning and development of scenario injects and outcomes. This paper elaborates on game design challenges, a framework to allow anonymity and attribution into game play and an examination of what worked and what didn't. The views expressed in this article are those of the authors and do not reflect the official policy or position of the National Defense University, the Department of Defense, or the U.S. Government.
引用
收藏
页码:306 / 315
页数:10
相关论文
共 50 条
  • [1] Strategic studies and cyber warfare
    Zilincik, Samuel
    Duyvesteyn, Isabelle
    [J]. JOURNAL OF STRATEGIC STUDIES, 2023, 46 (04) : 836 - 857
  • [2] Strategic information warfare
    不详
    [J]. FUTURIST, 1997, 31 (05) : 15 - 15
  • [3] Cyber Camouflage Games for Strategic Deception
    Thakoor, Omkar
    Tambe, Milind
    Vayanos, Phebe
    Xu, Haifeng
    Kiekintveld, Christopher
    Fang, Fei
    [J]. DECISION AND GAME THEORY FOR SECURITY, 2019, 11836 : 525 - 541
  • [4] Information Warfare and Strategic Terrorism
    Cilluffo, Frank J.
    Gergely, Curt H.
    [J]. TERRORISM AND POLITICAL VIOLENCE, 1997, 9 (01) : 84 - 94
  • [5] Russia's Cyber and Information Warfare
    Akimenko, Valeriy
    Giles, Keir
    [J]. ASIA POLICY, 2020, 15 (02): : 67 - 75
  • [6] A Methodology for the Comparative Analysis of Strategic Culture and Cyber Warfare
    Williams, Andrew
    [J]. PROCEEDINGS OF THE 18TH EUROPEAN CONFERENCE ON CYBER WARFARE AND SECURITY (ECCWS 2019), 2019, : 568 - 576
  • [7] Simulating Cyber Warfare And Cyber Defenses: Information Value Considerations
    Stytz, Martin R.
    Banks, Sheila B.
    [J]. MODELING AND SIMULATION FOR DEFENSE SYSTEMS AND APPLICATIONS VI, 2011, 8060
  • [8] Cyber warfare: Rethinking strategy in the information age
    Fahrenkrug, David
    [J]. 3RD INTERNATIONAL CONFERENCE ON INFORMATION WARFARE AND SECURITY, PROCEEDINGS, 2008, : 135 - 142
  • [9] China's Cyber Warfare. The Evolution of Strategic Doctrine
    Main, Steven J.
    [J]. EUROPE-ASIA STUDIES, 2018, 70 (09) : 1519 - 1521
  • [10] Cyber Dragon: Inside China's Information Warfare and Cyber Operations
    Nathan, Andrew J.
    [J]. FOREIGN AFFAIRS, 2017, 96 (05) : 193 - 193