Hacking back: Optimal use of self-defense in cyberspace

Should the law permit hackback? How should the law on self-defense in cyberspace be designed? In this paper, we use game-theoretic analysis to develop criteria that determine whether police enforcement, litigation, or hackback is best, and under what circumstances. Our model suggests that the law sh...

Full description

Saved in:
Bibliographic Details
Main Authors: Majuca, Ruperto P., Kesan, Jay P.
Format: text
Published: Animo Repository 2009
Subjects:
Online Access:https://animorepository.dlsu.edu.ph/faculty_research/7981
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: De La Salle University
id oai:animorepository.dlsu.edu.ph:faculty_research-8742
record_format eprints
spelling oai:animorepository.dlsu.edu.ph:faculty_research-87422023-01-10T00:23:50Z Hacking back: Optimal use of self-defense in cyberspace Majuca, Ruperto P. Kesan, Jay P. Should the law permit hackback? How should the law on self-defense in cyberspace be designed? In this paper, we use game-theoretic analysis to develop criteria that determine whether police enforcement, litigation, or hackback is best, and under what circumstances. Our model suggests that the law should permit hackback only if: (1) other alternatives, such as police enforcement and resort to courts, would be ineffective; (2) there is a serious prospect of hitting the hacker instead of innocent third parties; and (3) the damages that can be potentially mitigated to the defender's systems outweigh the potential damages to third parties. The law should require that counterstrikers use only force that is necessary to avoid damage to their own systems. Also, proper liability rules will induce counterstrikers to internalize the damages of third parties in their decision-making. Finally, better intrusion detection systems (IDS) and traceback technology improve the deterrent effect and efficacy of hackback. 2009-03-18T07:00:00Z text https://animorepository.dlsu.edu.ph/faculty_research/7981 info:doi/10.2139/ssrn.1363932 Faculty Research Work Animo Repository Hacking Computer security—Law and legislation Computer Law
institution De La Salle University
building De La Salle University Library
continent Asia
country Philippines
Philippines
content_provider De La Salle University Library
collection DLSU Institutional Repository
topic Hacking
Computer security—Law and legislation
Computer Law
spellingShingle Hacking
Computer security—Law and legislation
Computer Law
Majuca, Ruperto P.
Kesan, Jay P.
Hacking back: Optimal use of self-defense in cyberspace
description Should the law permit hackback? How should the law on self-defense in cyberspace be designed? In this paper, we use game-theoretic analysis to develop criteria that determine whether police enforcement, litigation, or hackback is best, and under what circumstances. Our model suggests that the law should permit hackback only if: (1) other alternatives, such as police enforcement and resort to courts, would be ineffective; (2) there is a serious prospect of hitting the hacker instead of innocent third parties; and (3) the damages that can be potentially mitigated to the defender's systems outweigh the potential damages to third parties. The law should require that counterstrikers use only force that is necessary to avoid damage to their own systems. Also, proper liability rules will induce counterstrikers to internalize the damages of third parties in their decision-making. Finally, better intrusion detection systems (IDS) and traceback technology improve the deterrent effect and efficacy of hackback.
format text
author Majuca, Ruperto P.
Kesan, Jay P.
author_facet Majuca, Ruperto P.
Kesan, Jay P.
author_sort Majuca, Ruperto P.
title Hacking back: Optimal use of self-defense in cyberspace
title_short Hacking back: Optimal use of self-defense in cyberspace
title_full Hacking back: Optimal use of self-defense in cyberspace
title_fullStr Hacking back: Optimal use of self-defense in cyberspace
title_full_unstemmed Hacking back: Optimal use of self-defense in cyberspace
title_sort hacking back: optimal use of self-defense in cyberspace
publisher Animo Repository
publishDate 2009
url https://animorepository.dlsu.edu.ph/faculty_research/7981
_version_ 1767196821635989504