A Framework for Estimating the Value of Deterrence.

Richard S John, Robin Dillon, William Burns, Nicholas Scurich
{"title":"A Framework for Estimating the Value of Deterrence.","authors":"Richard S John, Robin Dillon, William Burns, Nicholas Scurich","doi":"","DOIUrl":null,"url":null,"abstract":"<p><p>This paper presents a framework for calculating the value of deterrence related to countermeasures implemented to mitigate an attack by an adaptive adversary. We offer a methodology for adapting Defender-Attacker Decision Trees to partition the utility of countermeasures into three components: (1) threat reduction (deterrence), (2) vulnerability reduction, and (3) consequence mitigation. The Expected Utility of Imperfect Control (EUIC) attributable to a specific implementation of the countermeasure is based on calculations from decision analysis and is defined as the difference in the expected utilities of the no countermeasure branch and the branch representing the countermeasure variant. The EUIC represents the net benefit of implementing the countermeasure, including all costs associated with development, implementation, and operation. Benefits primarily derive from three sources: (1) changes in attack probability (threat reduction), (2) changes in detection probability (vulnerability reduction), and (3) changes in the distribution of attack outcomes (consequence mitigation). We partition the EUIC and estimate the unique portion attributable to threat reduction, vulnerability reduction, and consequence mitigation. Calculations follow a subtraction logic, similar to those used to calculate the Value of Information (VOI). We provide example applications of the Value of Deterrence in an airport security domain. The proposed framework provides a methodology for explicitly accounting for deterrence in benefit-cost analyses.</p>","PeriodicalId":521038,"journal":{"name":"International Topical Meeting on Probabilistic Safety Assessment and Analysis (PSA 2019) Charleston, SC, April 28-May 3, 2019. International Topical Meeting on Probabilistic Safety Assessment and Analysis (2019 : Charleston, S.C.)","volume":"16 ","pages":"1-10"},"PeriodicalIF":0.0000,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.ncbi.nlm.nih.gov/pmc/articles/PMC12409732/pdf/","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Topical Meeting on Probabilistic Safety Assessment and Analysis (PSA 2019) Charleston, SC, April 28-May 3, 2019. International Topical Meeting on Probabilistic Safety Assessment and Analysis (2019 : Charleston, S.C.)","FirstCategoryId":"1085","ListUrlMain":"","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

This paper presents a framework for calculating the value of deterrence related to countermeasures implemented to mitigate an attack by an adaptive adversary. We offer a methodology for adapting Defender-Attacker Decision Trees to partition the utility of countermeasures into three components: (1) threat reduction (deterrence), (2) vulnerability reduction, and (3) consequence mitigation. The Expected Utility of Imperfect Control (EUIC) attributable to a specific implementation of the countermeasure is based on calculations from decision analysis and is defined as the difference in the expected utilities of the no countermeasure branch and the branch representing the countermeasure variant. The EUIC represents the net benefit of implementing the countermeasure, including all costs associated with development, implementation, and operation. Benefits primarily derive from three sources: (1) changes in attack probability (threat reduction), (2) changes in detection probability (vulnerability reduction), and (3) changes in the distribution of attack outcomes (consequence mitigation). We partition the EUIC and estimate the unique portion attributable to threat reduction, vulnerability reduction, and consequence mitigation. Calculations follow a subtraction logic, similar to those used to calculate the Value of Information (VOI). We provide example applications of the Value of Deterrence in an airport security domain. The proposed framework provides a methodology for explicitly accounting for deterrence in benefit-cost analyses.

估算威慑价值的框架。
本文提出了一个框架,用于计算为减轻自适应对手的攻击而实施的与对策相关的威慑价值。我们提供了一种方法来调整防御者-攻击者决策树,将对策的效用划分为三个组成部分:(1)威胁减少(威慑),(2)漏洞减少和(3)后果缓解。不完全控制的预期效用(EUIC)是基于决策分析的计算得出的,它被定义为无对策分支和代表对策变体的分支的预期效用之差。EUIC代表实施对策的净收益,包括与开发、实施和运营相关的所有成本。效益主要来自三个方面:(1)攻击概率的变化(威胁减少),(2)检测概率的变化(漏洞减少),以及(3)攻击结果分布的变化(后果减轻)。我们划分了EUIC,并估计了可归因于威胁减少、脆弱性减少和后果减轻的唯一部分。计算遵循减法逻辑,类似于用于计算信息价值(VOI)的逻辑。我们提供了威慑价值在机场安全领域的应用实例。所提议的框架提供了一种在效益-成本分析中明确考虑威慑的方法。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信