Network responses to network threats: The evolution into private cybersecurity associations

Research output: Chapter in Book/Report/Conference proceedingChapter

Abstract

Imagine a data storage and retrieval system that stores millions of discrete files in such a way that they can be accessed, searched, and retrieved by millions of users who can access the system wherever they are connected to the Internet. Imagine that this system is under a multipronged attack. Its enemies have used a variety of techniques, ranging from shutting down the main search server under the threat of armed seizure, to inserting malicious files to corrupt the system, to capturing and threatening the operators of storage devices. Imagine that even through all these assaults, the system continues to operate and to provide high-quality storage, search, and retrieval functionality to millions of users worldwide. That would be a system worth studying as a model for cybersecurity, would it not? That system has in fact been in existence for five years. It has indeed been under the kinds of attacks described over this entire period. It is the peer-to-peer music file-sharing system. It is the epitome of a survivable system. Its primary design characteristic is radically distributed redundant capacity. The primary economic puzzles in understanding whether it is a model that can be harnessed to design survivable systems more generally are these: Why there is so much excess capacity for its core components - storage, processing, and communications capacity, in the hands of many widely distributed users? And how one might replicate it for uses that are somewhat less controversial than sharing music files.

Original languageEnglish (US)
Title of host publicationThe Law and Economics of Cybersecurity
PublisherCambridge University Press
Pages143-192
Number of pages50
ISBN (Electronic)9780511511523
ISBN (Print)0521855276, 9780521855273
DOIs
StatePublished - Jan 1 2005
Externally publishedYes

Fingerprint

threat
music
data storage
seizure
assault
functionality
communications
Internet
economics

ASJC Scopus subject areas

  • Social Sciences(all)

Cite this

Network responses to network threats : The evolution into private cybersecurity associations. / Aviram, Amitai.

The Law and Economics of Cybersecurity. Cambridge University Press, 2005. p. 143-192.

Research output: Chapter in Book/Report/Conference proceedingChapter

Aviram, Amitai. / Network responses to network threats : The evolution into private cybersecurity associations. The Law and Economics of Cybersecurity. Cambridge University Press, 2005. pp. 143-192
@inbook{4e25ad51cf884b3ba3280f512fd6e2d9,
title = "Network responses to network threats: The evolution into private cybersecurity associations",
abstract = "Imagine a data storage and retrieval system that stores millions of discrete files in such a way that they can be accessed, searched, and retrieved by millions of users who can access the system wherever they are connected to the Internet. Imagine that this system is under a multipronged attack. Its enemies have used a variety of techniques, ranging from shutting down the main search server under the threat of armed seizure, to inserting malicious files to corrupt the system, to capturing and threatening the operators of storage devices. Imagine that even through all these assaults, the system continues to operate and to provide high-quality storage, search, and retrieval functionality to millions of users worldwide. That would be a system worth studying as a model for cybersecurity, would it not? That system has in fact been in existence for five years. It has indeed been under the kinds of attacks described over this entire period. It is the peer-to-peer music file-sharing system. It is the epitome of a survivable system. Its primary design characteristic is radically distributed redundant capacity. The primary economic puzzles in understanding whether it is a model that can be harnessed to design survivable systems more generally are these: Why there is so much excess capacity for its core components - storage, processing, and communications capacity, in the hands of many widely distributed users? And how one might replicate it for uses that are somewhat less controversial than sharing music files.",
author = "Amitai Aviram",
year = "2005",
month = "1",
day = "1",
doi = "10.1017/CBO9780511511523.006",
language = "English (US)",
isbn = "0521855276",
pages = "143--192",
booktitle = "The Law and Economics of Cybersecurity",
publisher = "Cambridge University Press",
address = "United States",

}

TY - CHAP

T1 - Network responses to network threats

T2 - The evolution into private cybersecurity associations

AU - Aviram, Amitai

PY - 2005/1/1

Y1 - 2005/1/1

N2 - Imagine a data storage and retrieval system that stores millions of discrete files in such a way that they can be accessed, searched, and retrieved by millions of users who can access the system wherever they are connected to the Internet. Imagine that this system is under a multipronged attack. Its enemies have used a variety of techniques, ranging from shutting down the main search server under the threat of armed seizure, to inserting malicious files to corrupt the system, to capturing and threatening the operators of storage devices. Imagine that even through all these assaults, the system continues to operate and to provide high-quality storage, search, and retrieval functionality to millions of users worldwide. That would be a system worth studying as a model for cybersecurity, would it not? That system has in fact been in existence for five years. It has indeed been under the kinds of attacks described over this entire period. It is the peer-to-peer music file-sharing system. It is the epitome of a survivable system. Its primary design characteristic is radically distributed redundant capacity. The primary economic puzzles in understanding whether it is a model that can be harnessed to design survivable systems more generally are these: Why there is so much excess capacity for its core components - storage, processing, and communications capacity, in the hands of many widely distributed users? And how one might replicate it for uses that are somewhat less controversial than sharing music files.

AB - Imagine a data storage and retrieval system that stores millions of discrete files in such a way that they can be accessed, searched, and retrieved by millions of users who can access the system wherever they are connected to the Internet. Imagine that this system is under a multipronged attack. Its enemies have used a variety of techniques, ranging from shutting down the main search server under the threat of armed seizure, to inserting malicious files to corrupt the system, to capturing and threatening the operators of storage devices. Imagine that even through all these assaults, the system continues to operate and to provide high-quality storage, search, and retrieval functionality to millions of users worldwide. That would be a system worth studying as a model for cybersecurity, would it not? That system has in fact been in existence for five years. It has indeed been under the kinds of attacks described over this entire period. It is the peer-to-peer music file-sharing system. It is the epitome of a survivable system. Its primary design characteristic is radically distributed redundant capacity. The primary economic puzzles in understanding whether it is a model that can be harnessed to design survivable systems more generally are these: Why there is so much excess capacity for its core components - storage, processing, and communications capacity, in the hands of many widely distributed users? And how one might replicate it for uses that are somewhat less controversial than sharing music files.

UR - http://www.scopus.com/inward/record.url?scp=71649084524&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=71649084524&partnerID=8YFLogxK

U2 - 10.1017/CBO9780511511523.006

DO - 10.1017/CBO9780511511523.006

M3 - Chapter

AN - SCOPUS:71649084524

SN - 0521855276

SN - 9780521855273

SP - 143

EP - 192

BT - The Law and Economics of Cybersecurity

PB - Cambridge University Press

ER -