Hacking Back: Optimal Use of Self-Defense in Cyberspace

Ruperto P. Majuca, J. Kesan
{"title":"Hacking Back: Optimal Use of Self-Defense in Cyberspace","authors":"Ruperto P. Majuca, J. Kesan","doi":"10.2139/ssrn.1363932","DOIUrl":null,"url":null,"abstract":"Should the law permit hackback? How should the law on self-defense in cyberspace be designed? In this paper, we use game-theoretic analysis to develop criteria that determine whether police enforcement, litigation, or hackback is best, and under what circumstances. Our model suggests that the law should permit hackback only if: (1) other alternatives, such as police enforcement and resort to courts, would be ineffective; (2) there is a serious prospect of hitting the hacker instead of innocent third parties; and (3) the damages that can be potentially mitigated to the defender's systems outweigh the potential damages to third parties. The law should require that counterstrikers use only force that is necessary to avoid damage to their own systems. Also, proper liability rules will induce counterstrikers to internalize the damages of third parties in their decision-making. Finally, better intrusion detection systems (IDS) and traceback technology improve the deterrent effect and efficacy of hackback.","PeriodicalId":365193,"journal":{"name":"University of Illinois College of Law","volume":null,"pages":null},"PeriodicalIF":0.0000,"publicationDate":"2009-03-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"University of Illinois College of Law","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.2139/ssrn.1363932","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 2

Abstract

Should the law permit hackback? How should the law on self-defense in cyberspace be designed? In this paper, we use game-theoretic analysis to develop criteria that determine whether police enforcement, litigation, or hackback is best, and under what circumstances. Our model suggests that the law should permit hackback only if: (1) other alternatives, such as police enforcement and resort to courts, would be ineffective; (2) there is a serious prospect of hitting the hacker instead of innocent third parties; and (3) the damages that can be potentially mitigated to the defender's systems outweigh the potential damages to third parties. The law should require that counterstrikers use only force that is necessary to avoid damage to their own systems. Also, proper liability rules will induce counterstrikers to internalize the damages of third parties in their decision-making. Finally, better intrusion detection systems (IDS) and traceback technology improve the deterrent effect and efficacy of hackback.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
黑客反击:网络空间自卫的最佳使用
法律应该允许黑客入侵吗?网络空间自卫权的法律应如何设计?在本文中,我们使用博弈论分析来制定标准,以确定警察执法、诉讼或黑客攻击是最好的,以及在什么情况下是最好的。我们的模型表明,只有在以下情况下,法律才应该允许黑客入侵:(1)其他选择,如警察执法和诉诸法院,将是无效的;(2)很有可能击中黑客而不是无辜的第三方;(3)对辩护人系统可能减轻的损害大于对第三方的潜在损害。法律应该要求反击者只使用必要的武力,以避免损害他们自己的系统。此外,适当的责任规则将诱导反击者在决策中内化第三方的损害。最后,更好的入侵检测系统和回溯技术提高了对黑客攻击的威慑效果和有效性。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Top Ten Myths of Medicare More Music in Movies: What Box Office Data Reveals About the Availability of Public Domain Songs in Movies from 1968-2008 Corporate Ownership in Latin American Firms: A Comparative Analysis of Dual-Class Shares Taking Stock and Looking Ahead: The Future of U.S. Patent Law A Study of the Role and Impact of Special Masters in Patent Cases
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1