AI and Cybersecurity: Offense-Defense Balance
VerifiedAdded on 2020/04/21
|20
|4185
|257
AI Summary
This assignment delves into the intersection of artificial intelligence (AI) and cybersecurity, specifically focusing on the shifting offense-defense balance in the digital realm. It examines how AI is being utilized for both offensive and defensive purposes in cyber warfare, considering its potential to revolutionize attack strategies and security measures. The assignment encourages critical analysis of the implications of AI on the nature of cyber conflict, drawing upon academic research and real-world examples.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
Running head: THE OFFENSE/DEFENSE BALANCE IN CYBERSPACE
The Offense/Defence Balance in Cyberspace
Name of the Student
Name of the University
Author Note
The Offense/Defence Balance in Cyberspace
Name of the Student
Name of the University
Author Note
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
1
THE OFFENSE/DEFENSE BALANCE IN CYBERSPACE
Table of Contents
Introduction......................................................................................................................................2
Role of Artificial Intelligence in Cyberspace..................................................................................3
Artificial Intelligence...................................................................................................................3
Cyberspace...................................................................................................................................3
Offense-Defense Strategy............................................................................................................4
Cyberspace is currentlyaDefense Dominant Domain......................................................................5
Examples of Artificial Intelligence..................................................................................................7
Offense-Defense Theory for International Stability........................................................................8
Conclusion.....................................................................................................................................10
References......................................................................................................................................11
THE OFFENSE/DEFENSE BALANCE IN CYBERSPACE
Table of Contents
Introduction......................................................................................................................................2
Role of Artificial Intelligence in Cyberspace..................................................................................3
Artificial Intelligence...................................................................................................................3
Cyberspace...................................................................................................................................3
Offense-Defense Strategy............................................................................................................4
Cyberspace is currentlyaDefense Dominant Domain......................................................................5
Examples of Artificial Intelligence..................................................................................................7
Offense-Defense Theory for International Stability........................................................................8
Conclusion.....................................................................................................................................10
References......................................................................................................................................11
2
THE OFFENSE/DEFENSE BALANCE IN CYBERSPACE
Introduction
Technology is continuously evolving, cyber-attacks and cyber security also being
advanced and evolving at the same pace as technology. Cybersecurity threat’s graphs are
continuously increasing and most of the threats generally become undetectable unless it harms in
the real world. For a general human, it is a very complex matter to analyse all the data saved in
the system1. This report focuses on the role of Artificial Intelligence in balancing the Offense
and Defense in cyberspace. AI is not a very new technology as robots have been around since
1950's of which, many practical applications are available in our daily life. This report presents
the objectives related to the cybersecurity and emphasizes on cyberattacks those are becoming a
common factor for the data and information saved in the system either offline or online. The
Internet has become an integral part of the life living for almost every human being and saving
data or information on the internet makes them vulnerable to cyberattacks. This report presents
an idea of how AI could change the face of the cybersecurity and contribute to the Defense
through a debate. Watson, GoogleDeepmind, and Showan are some of the examples of AI those
are contributing to enhancing the cybersecurity. The Offense-Defence Balance (ODB) theory has
been discussed in this report with regard to the international stability and how AI could be
implemented and used for the good cause.
1 Kasprick, Robert, Jordan Hoffman, Jeremy Straub, and Eunjin Kim. "Cyber Security Artificial Intelligence Expert
System." (2016).
THE OFFENSE/DEFENSE BALANCE IN CYBERSPACE
Introduction
Technology is continuously evolving, cyber-attacks and cyber security also being
advanced and evolving at the same pace as technology. Cybersecurity threat’s graphs are
continuously increasing and most of the threats generally become undetectable unless it harms in
the real world. For a general human, it is a very complex matter to analyse all the data saved in
the system1. This report focuses on the role of Artificial Intelligence in balancing the Offense
and Defense in cyberspace. AI is not a very new technology as robots have been around since
1950's of which, many practical applications are available in our daily life. This report presents
the objectives related to the cybersecurity and emphasizes on cyberattacks those are becoming a
common factor for the data and information saved in the system either offline or online. The
Internet has become an integral part of the life living for almost every human being and saving
data or information on the internet makes them vulnerable to cyberattacks. This report presents
an idea of how AI could change the face of the cybersecurity and contribute to the Defense
through a debate. Watson, GoogleDeepmind, and Showan are some of the examples of AI those
are contributing to enhancing the cybersecurity. The Offense-Defence Balance (ODB) theory has
been discussed in this report with regard to the international stability and how AI could be
implemented and used for the good cause.
1 Kasprick, Robert, Jordan Hoffman, Jeremy Straub, and Eunjin Kim. "Cyber Security Artificial Intelligence Expert
System." (2016).
3
THE OFFENSE/DEFENSE BALANCE IN CYBERSPACE
Role of Artificial Intelligence in Cyberspace
Artificial Intelligence
John McCarthy defined this as, “The science and engineering of making intelligent
machines, especially intelligent computer programs.” It can be described as a way of making the
software, computer, and computer-controlled robot much smarter, similar to the human
intelligence. Various researchers are trying to implement such thinking for decades and success
is leading to various attempts2. It can be described as the mixture of Philosophy, computer
science, neuron science, biology, psychology, math, and sociology. There are various
applications of AI in the current world including games, expert systems, speech recognition,
natural language processing, intelligent robots, handwriting recognition and much more3.
Artificial Intelligence (AI) could act as a boon for such issues and could help in analysing a very
wide range of data in very less time as compared to the data processed by humans.Offense-
Defense in cyberspace is another concerning topic related to the virtual computer world that
2 Miller, Steven E., and Stephen Van Evera, eds. The Star Wars Controversy: An" International
Security" Reader. Princeton University Press, 2014.
3 Krittanawong, Chayakrit, HongJu Zhang, Zhen Wang, Mehmet Aydar, and Takeshi Kitai.
"Artificial Intelligence in Precision Cardiovascular Medicine." Journal of the American College
of Cardiology 69, no. 21 (2017): 2657-2664.
THE OFFENSE/DEFENSE BALANCE IN CYBERSPACE
Role of Artificial Intelligence in Cyberspace
Artificial Intelligence
John McCarthy defined this as, “The science and engineering of making intelligent
machines, especially intelligent computer programs.” It can be described as a way of making the
software, computer, and computer-controlled robot much smarter, similar to the human
intelligence. Various researchers are trying to implement such thinking for decades and success
is leading to various attempts2. It can be described as the mixture of Philosophy, computer
science, neuron science, biology, psychology, math, and sociology. There are various
applications of AI in the current world including games, expert systems, speech recognition,
natural language processing, intelligent robots, handwriting recognition and much more3.
Artificial Intelligence (AI) could act as a boon for such issues and could help in analysing a very
wide range of data in very less time as compared to the data processed by humans.Offense-
Defense in cyberspace is another concerning topic related to the virtual computer world that
2 Miller, Steven E., and Stephen Van Evera, eds. The Star Wars Controversy: An" International
Security" Reader. Princeton University Press, 2014.
3 Krittanawong, Chayakrit, HongJu Zhang, Zhen Wang, Mehmet Aydar, and Takeshi Kitai.
"Artificial Intelligence in Precision Cardiovascular Medicine." Journal of the American College
of Cardiology 69, no. 21 (2017): 2657-2664.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
4
THE OFFENSE/DEFENSE BALANCE IN CYBERSPACE
could be overcome by Artificial intelligence4. Following graph shows the growth in the
investment in AI technology for the cybersecurity in future:
Figure 1: Rate of growing investment in AI for Cybersecurity
(Source: Kishor, 2017)
Cyberspace
Cyberspace can be defined as the virtual world for the computers or an electronic
medium that could be used from a global computer network in a manner to accomplish online
communication. The world computes operating TCP/IP protocol, which contributes to the large
virtual computer network in a manner to aid the data exchange and communication between the
computers5. It can also be described as a platform for the virtual and interactive environment for
a wide range of participants.
4 Yampolskiy, Roman V., and M. S. Spellchecker. "Artificial Intelligence Safety and Cybersecurity: a Timeline of
AI Failures." arXiv preprint arXiv:1610.07997 (2016).
5 Betz, David J. Cyberspace and the State: Towards a Strategy for Cyber-power. Routledge, 2017.
THE OFFENSE/DEFENSE BALANCE IN CYBERSPACE
could be overcome by Artificial intelligence4. Following graph shows the growth in the
investment in AI technology for the cybersecurity in future:
Figure 1: Rate of growing investment in AI for Cybersecurity
(Source: Kishor, 2017)
Cyberspace
Cyberspace can be defined as the virtual world for the computers or an electronic
medium that could be used from a global computer network in a manner to accomplish online
communication. The world computes operating TCP/IP protocol, which contributes to the large
virtual computer network in a manner to aid the data exchange and communication between the
computers5. It can also be described as a platform for the virtual and interactive environment for
a wide range of participants.
4 Yampolskiy, Roman V., and M. S. Spellchecker. "Artificial Intelligence Safety and Cybersecurity: a Timeline of
AI Failures." arXiv preprint arXiv:1610.07997 (2016).
5 Betz, David J. Cyberspace and the State: Towards a Strategy for Cyber-power. Routledge, 2017.
5
THE OFFENSE/DEFENSE BALANCE IN CYBERSPACE
Offense Defence Strategy
The most common application of AI could be seen in Google search engine other than
virtual gaming, Big Data, Data Mining, military weapons, etc. AI is advancing every technology
anyone could think of. Various features of the cyberspace suggest that AI has been used for
offense more, over the Defense and following are some the considerations on which these
objectives depends:
Key Vulnerabilities: Vulnerabilities in the systems are the main cause behind every
cyberattack as malicious coding, malware, viruses and other similar threats can only be executed
if there is any vulnerability in the system. Other general factors can be related to the flaws in the
software or if the intruder gets access to the network6. Technically, it can be said that it is
impossible for any programmer or IT specialist to rule out flaws in the design of the software and
in practical life, it is unfeasible to detach the computer from the network. One of the major
characteristics of cyber defense can be stated as it changes much rapidly, which could lead to
unanticipated and catastrophic consequences7.
Offense progress is more rapid than Defense: Cyberspace is not a natural objective or
phenomenon rather it has resulted from the technological revolution8. Technology is being
continuously evolved and so the features of the cyberspace, offense-defense balance also being
6 Lieber, K., 2014. The Offense-Defence Balance and Cyber Warfare. Cyber Analogies, pp.96-107.
7 Gartzke, Erik. "The myth of cyberwar: bringing war in cyberspace back down to earth." International Security 38,
no. 2 (2013): 41-73.
8 Saltzman, Ilai. "Cyber posturing and the offense-defense balance." Contemporary Security Policy 34, no. 1 (2013):
40-63.
THE OFFENSE/DEFENSE BALANCE IN CYBERSPACE
Offense Defence Strategy
The most common application of AI could be seen in Google search engine other than
virtual gaming, Big Data, Data Mining, military weapons, etc. AI is advancing every technology
anyone could think of. Various features of the cyberspace suggest that AI has been used for
offense more, over the Defense and following are some the considerations on which these
objectives depends:
Key Vulnerabilities: Vulnerabilities in the systems are the main cause behind every
cyberattack as malicious coding, malware, viruses and other similar threats can only be executed
if there is any vulnerability in the system. Other general factors can be related to the flaws in the
software or if the intruder gets access to the network6. Technically, it can be said that it is
impossible for any programmer or IT specialist to rule out flaws in the design of the software and
in practical life, it is unfeasible to detach the computer from the network. One of the major
characteristics of cyber defense can be stated as it changes much rapidly, which could lead to
unanticipated and catastrophic consequences7.
Offense progress is more rapid than Defense: Cyberspace is not a natural objective or
phenomenon rather it has resulted from the technological revolution8. Technology is being
continuously evolved and so the features of the cyberspace, offense-defense balance also being
6 Lieber, K., 2014. The Offense-Defence Balance and Cyber Warfare. Cyber Analogies, pp.96-107.
7 Gartzke, Erik. "The myth of cyberwar: bringing war in cyberspace back down to earth." International Security 38,
no. 2 (2013): 41-73.
8 Saltzman, Ilai. "Cyber posturing and the offense-defense balance." Contemporary Security Policy 34, no. 1 (2013):
40-63.
6
THE OFFENSE/DEFENSE BALANCE IN CYBERSPACE
evolved. It can be seen that offense and defense both are developing and improving, and the
constant upgrades in hardware and software is one of the major causes for this. However, the rate
of the growth in defense is lagging the development of the offense. Slayyton (2017) stated,
“Offense-Defense curves at levels which characterize that today’s cyberspace favours the
offense. That is, another dollar’s worth of offense requires far more than another dollar’s worth
of defence to restore prior levels of security9.” Following graph can depicts the role of AI in
offense defense strategy:
Figure 2: Role of AI in Offense-Defense strategy
(Source: Riley, 2017)
9 Slayton, Rebecca. "What Is the Cyber Offense-Defense Balance? Conceptions, Causes, and
Assessment." International Security 41, no. 3 (2017): 72-109.
THE OFFENSE/DEFENSE BALANCE IN CYBERSPACE
evolved. It can be seen that offense and defense both are developing and improving, and the
constant upgrades in hardware and software is one of the major causes for this. However, the rate
of the growth in defense is lagging the development of the offense. Slayyton (2017) stated,
“Offense-Defense curves at levels which characterize that today’s cyberspace favours the
offense. That is, another dollar’s worth of offense requires far more than another dollar’s worth
of defence to restore prior levels of security9.” Following graph can depicts the role of AI in
offense defense strategy:
Figure 2: Role of AI in Offense-Defense strategy
(Source: Riley, 2017)
9 Slayton, Rebecca. "What Is the Cyber Offense-Defense Balance? Conceptions, Causes, and
Assessment." International Security 41, no. 3 (2017): 72-109.
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
7
THE OFFENSE/DEFENSE BALANCE IN CYBERSPACE
Attribution is Difficult: The cyberattacks could be executed from a very far distance via
the internet, which makes it difficult to identify the main culprit behind the offense penetration.
Considering the fact that, a handful of people are needed to plan and execute such attacks, and
the government might clearly deny from such responsibilities10. For instance, the attack which
was executed on Estonian websites in 2007, in which botnets were used to deliver DoS attack, in
which various requests showed the involvement of Kremlin in the attack. However, there was no
concrete evidence that they carried out the attack and arguments became plausible11. Offense-
defense system is not directly affected by the difficulty in attribution but indirectly it supports the
offense as it nourished, that the attack could be carried out without any punishment.
Cyberspace is currently a Defence Dominant Domain
Cyberspace has become the favorite platform for the intrusion and breaches because a
good programmer could use the same machine learning and manipulate the system for their own
purpose easily, and could target a bigger prey. Technology is evolving with rapid speed than any
other innovation and cyberattacks are the threats that are not going towards an end any soon.
Artificial Intelligence could play a major role in guarding the systems and preventing such
intrusions. Artificial intelligence could be helpful in detecting the advancing threat, shortening
the response times for the defense and refining the techniques that might be helpful in
differentiating between the actions that must be ignored, and dreadful efforts for compromising
10 Shaheen, Salma. "Offense–defense balance in cyber warfare." In Cyberspace and International Relations, pp. 77-
93. Springer Berlin Heidelberg, 2014.
11 Gartzke, Erik, and Jon R. Lindsay. "Weaving tangled webs: offense, defense, and deception in
cyberspace." Security Studies 24, no. 2 (2015): 316-348.
THE OFFENSE/DEFENSE BALANCE IN CYBERSPACE
Attribution is Difficult: The cyberattacks could be executed from a very far distance via
the internet, which makes it difficult to identify the main culprit behind the offense penetration.
Considering the fact that, a handful of people are needed to plan and execute such attacks, and
the government might clearly deny from such responsibilities10. For instance, the attack which
was executed on Estonian websites in 2007, in which botnets were used to deliver DoS attack, in
which various requests showed the involvement of Kremlin in the attack. However, there was no
concrete evidence that they carried out the attack and arguments became plausible11. Offense-
defense system is not directly affected by the difficulty in attribution but indirectly it supports the
offense as it nourished, that the attack could be carried out without any punishment.
Cyberspace is currently a Defence Dominant Domain
Cyberspace has become the favorite platform for the intrusion and breaches because a
good programmer could use the same machine learning and manipulate the system for their own
purpose easily, and could target a bigger prey. Technology is evolving with rapid speed than any
other innovation and cyberattacks are the threats that are not going towards an end any soon.
Artificial Intelligence could play a major role in guarding the systems and preventing such
intrusions. Artificial intelligence could be helpful in detecting the advancing threat, shortening
the response times for the defense and refining the techniques that might be helpful in
differentiating between the actions that must be ignored, and dreadful efforts for compromising
10 Shaheen, Salma. "Offense–defense balance in cyber warfare." In Cyberspace and International Relations, pp. 77-
93. Springer Berlin Heidelberg, 2014.
11 Gartzke, Erik, and Jon R. Lindsay. "Weaving tangled webs: offense, defense, and deception in
cyberspace." Security Studies 24, no. 2 (2015): 316-348.
8
THE OFFENSE/DEFENSE BALANCE IN CYBERSPACE
the security12. Some examples of offense that could affect the individuals in the globe could be
stated, as firstly, one the most devastating cyberattacks was Ransomware, using WannaCry as
a malware, which affected most of the multinational companies, hospitals, federals and many
other places. This attack had been expected to be started on May 12, 2017. Secondly, national
cyber incident response centre reported that hospital clinics in the UK were affected by a
malware called Bad Rabbit. Many other federals systems were shut down and most of the
organizations were not able to function well13. There are many other threats including the
hacking of IoT devices those should be considered while talking about cybersecurity and
Artificial Intelligence14. IoT devices are the general application of machine learning. Certain
unwanted activities have shown that these are very easy subjects to be manipulated.
Artificial intelligence will take no time in responding to such situations those might be
detected as a threat element for the system. Harknett and Nyre in 2017, stated that before AI, “it
was being assumed that ninety percent of the data is fine as there was bandwidth to analyse only
ten percent of the data. Many human labours could be saved using artificial intelligence, as AI
mimics what a proper analyst would do15.”
12 Lemaire, Vincent, Christophe Salperwyck, and Alexis Bondu. "A survey on supervised classification on data
streams." In Business Intelligence, pp. 88-125. Springer International Publishing, 2015.
13 Cummins, Shannon C. The Garrison Domain: Civil Military Relations in the Cyberspace Domain. AIR
COMMAND AND STAFF COLL MAXWELL AFB AL MAXWELL AFB United States, 2015.
14 Pan, Yunhe. "Heading toward artificial intelligence 2.0." Engineering 2, no. 4 (2016): 409-413.
15 Harknett, Richard J., and Joseph S. Nye Jr. "Is Deterrence Possible in Cyberspace?." International
Security (2017).
THE OFFENSE/DEFENSE BALANCE IN CYBERSPACE
the security12. Some examples of offense that could affect the individuals in the globe could be
stated, as firstly, one the most devastating cyberattacks was Ransomware, using WannaCry as
a malware, which affected most of the multinational companies, hospitals, federals and many
other places. This attack had been expected to be started on May 12, 2017. Secondly, national
cyber incident response centre reported that hospital clinics in the UK were affected by a
malware called Bad Rabbit. Many other federals systems were shut down and most of the
organizations were not able to function well13. There are many other threats including the
hacking of IoT devices those should be considered while talking about cybersecurity and
Artificial Intelligence14. IoT devices are the general application of machine learning. Certain
unwanted activities have shown that these are very easy subjects to be manipulated.
Artificial intelligence will take no time in responding to such situations those might be
detected as a threat element for the system. Harknett and Nyre in 2017, stated that before AI, “it
was being assumed that ninety percent of the data is fine as there was bandwidth to analyse only
ten percent of the data. Many human labours could be saved using artificial intelligence, as AI
mimics what a proper analyst would do15.”
12 Lemaire, Vincent, Christophe Salperwyck, and Alexis Bondu. "A survey on supervised classification on data
streams." In Business Intelligence, pp. 88-125. Springer International Publishing, 2015.
13 Cummins, Shannon C. The Garrison Domain: Civil Military Relations in the Cyberspace Domain. AIR
COMMAND AND STAFF COLL MAXWELL AFB AL MAXWELL AFB United States, 2015.
14 Pan, Yunhe. "Heading toward artificial intelligence 2.0." Engineering 2, no. 4 (2016): 409-413.
15 Harknett, Richard J., and Joseph S. Nye Jr. "Is Deterrence Possible in Cyberspace?." International
Security (2017).
9
THE OFFENSE/DEFENSE BALANCE IN CYBERSPACE
In the current situation, IBM is also investing into Artificial Intelligence for the security
using the cognitive computing platform. The company is contributing by making Watson much
advanced and well-read through a wide range of security research. Currently, about fifty
customers are using Watson in a manner to gain more information about the analytic platforms
and security intelligence16. Watson is an example how AI could play a vital role in contributing
to defense in an efficient and effective manner, with minimum time consumption. It was reported
by IBM that AI used in Watson, could be helpful in performing investigation process for the
bugs and glitches, sixty times faster than any human investigator17. This could lead to the
solution from a complex analysis of any incident that could take a minute or an hour, which is
way less time than what a programmer would take.
AI with machine learning, could be the futuristic technology, whose evolvement is at a
high pace and leading to the rapidness in the laborious process of data sorting, and comparing it
based on the calculations and other circumstances18. Aiming at the quantum computing is another
important aspect that will be helpful in ensuring that no stone is left unturned, and every data is
16 Schmidt, Charlie. "MD Anderson Breaks With IBM Watson, Raising Questions About Artificial Intelligence in
Oncology." JNCI: Journal of the National Cancer Institute 109, no. 5 (2017).
17 Somashekhar, S. P., R. Kumarc, A. Rauthan, K. R. Arun, P. Patil, and Y. E. Ramya. "Abstract S6-07: Double
blinded validation study to assess performance of IBM artificial intelligence platform, Watson for oncology in
comparison with Manipal multidisciplinary tumour board–First study of 638 breast cancer cases." (2017): S6-07.
18 Dilsizian, Steven E., and Eliot L. Siegel. "Artificial intelligence in medicine and cardiac imaging: harnessing big
data and advanced computing to provide personalized medical diagnosis and treatment." Current cardiology
reports 16, no. 1 (2014): 441.
THE OFFENSE/DEFENSE BALANCE IN CYBERSPACE
In the current situation, IBM is also investing into Artificial Intelligence for the security
using the cognitive computing platform. The company is contributing by making Watson much
advanced and well-read through a wide range of security research. Currently, about fifty
customers are using Watson in a manner to gain more information about the analytic platforms
and security intelligence16. Watson is an example how AI could play a vital role in contributing
to defense in an efficient and effective manner, with minimum time consumption. It was reported
by IBM that AI used in Watson, could be helpful in performing investigation process for the
bugs and glitches, sixty times faster than any human investigator17. This could lead to the
solution from a complex analysis of any incident that could take a minute or an hour, which is
way less time than what a programmer would take.
AI with machine learning, could be the futuristic technology, whose evolvement is at a
high pace and leading to the rapidness in the laborious process of data sorting, and comparing it
based on the calculations and other circumstances18. Aiming at the quantum computing is another
important aspect that will be helpful in ensuring that no stone is left unturned, and every data is
16 Schmidt, Charlie. "MD Anderson Breaks With IBM Watson, Raising Questions About Artificial Intelligence in
Oncology." JNCI: Journal of the National Cancer Institute 109, no. 5 (2017).
17 Somashekhar, S. P., R. Kumarc, A. Rauthan, K. R. Arun, P. Patil, and Y. E. Ramya. "Abstract S6-07: Double
blinded validation study to assess performance of IBM artificial intelligence platform, Watson for oncology in
comparison with Manipal multidisciplinary tumour board–First study of 638 breast cancer cases." (2017): S6-07.
18 Dilsizian, Steven E., and Eliot L. Siegel. "Artificial intelligence in medicine and cardiac imaging: harnessing big
data and advanced computing to provide personalized medical diagnosis and treatment." Current cardiology
reports 16, no. 1 (2014): 441.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
10
THE OFFENSE/DEFENSE BALANCE IN CYBERSPACE
well processed and evaluated. Computers are generally represented in zeroes and ones, AI could
make it much easy through quantum computing by executing both, but neither at the same time.
Quantum computing enables the users to look into every piece of the haystack through machine
knowledge and explore the threat or bugs that might affect the security of the system.
Examples of Artificial Intelligence
Several experiments are still going on, if AI is used in, many advances then it might
cause damage. An example could be taken from the ‘Transformers' movie that states how high
level of AI (Skynet) could cause damage. However, there are the many examples of AI
technology that could contribute to balancing the cyber offense defense as cybersecurity is the
most concerning objective related to the technology innovation nowadays. IBM, MIT, Google
and many other big companies are continuously introducing the technologies implemented with
AI and allowing more applications for this technology19. Showan, IBM’s Watson, and Google’s
Deepmind are some of the examples that are contributing in securing the virtual world. Artificial
intelligence collects the information related to the actions and activities of the commands
through using Intelligent Automation (IA)20. Classic automation is another process, which is the
technology that contributes to the machine learning and allows the machine to understand the
best probability of the actions. However, intelligent automation is a different objective related to
the classic automation that could be helpful for machines in eliminating the unscaleable and
expensive human intelligence without eliminating the factors related to the reliability or quality
19 Levine, Brian A. "AI has brains--but it's no MD: artificial intelligence has uses in medicine, but will never replace
doctors' intuition." Contemporary OB/GYN 62, no. 4 (2017): 30-32.
20 Ripsman, Norrin M., Jeffrey W. Taliaferro, and Steven E. Lobell. Neoclassical realist theory of international
politics. Oxford University Press, 2016.
THE OFFENSE/DEFENSE BALANCE IN CYBERSPACE
well processed and evaluated. Computers are generally represented in zeroes and ones, AI could
make it much easy through quantum computing by executing both, but neither at the same time.
Quantum computing enables the users to look into every piece of the haystack through machine
knowledge and explore the threat or bugs that might affect the security of the system.
Examples of Artificial Intelligence
Several experiments are still going on, if AI is used in, many advances then it might
cause damage. An example could be taken from the ‘Transformers' movie that states how high
level of AI (Skynet) could cause damage. However, there are the many examples of AI
technology that could contribute to balancing the cyber offense defense as cybersecurity is the
most concerning objective related to the technology innovation nowadays. IBM, MIT, Google
and many other big companies are continuously introducing the technologies implemented with
AI and allowing more applications for this technology19. Showan, IBM’s Watson, and Google’s
Deepmind are some of the examples that are contributing in securing the virtual world. Artificial
intelligence collects the information related to the actions and activities of the commands
through using Intelligent Automation (IA)20. Classic automation is another process, which is the
technology that contributes to the machine learning and allows the machine to understand the
best probability of the actions. However, intelligent automation is a different objective related to
the classic automation that could be helpful for machines in eliminating the unscaleable and
expensive human intelligence without eliminating the factors related to the reliability or quality
19 Levine, Brian A. "AI has brains--but it's no MD: artificial intelligence has uses in medicine, but will never replace
doctors' intuition." Contemporary OB/GYN 62, no. 4 (2017): 30-32.
20 Ripsman, Norrin M., Jeffrey W. Taliaferro, and Steven E. Lobell. Neoclassical realist theory of international
politics. Oxford University Press, 2016.
11
THE OFFENSE/DEFENSE BALANCE IN CYBERSPACE
of the process. Merat and Amuhdati (2015) presented a paper emphasizing on Showan, as the
artificial intelligence application in a manner to improve the cyber security in the virtual
computer field21. They have introduced that machine learning can be understood as different
types of computing processes and it can be mapped within a multitasking environment. Showan
is software modelling and mapping paradigm that has been developed in a manner to
characterize and learn the behaviour of the systems concerning the cyber security awareness
against several concurrent threats22. Like other AI applications at its earlier stage, it was not
much efficient, later on as the data storage was improved, the machine learning goes on
enhancing and the calculations and upgrades resulted in an efficient technology. The aim was to
develop a process that could be contended with more than one concurrent thread during the task
performance23. This enables large data being transferred with a minimum time delay with the
help of the machine learning and without compromising the security of the systems.
Offense Defence Theory for International Stability
Critics and Proponents of the Offense Defence Balance (ODB) hypothesis are generally
concerned with international stability remarking as topical issues including the war inception,
escalation, and security dilemma. The relative or assumed strength of defense over offense or
21 Merat, Soorena, and Wahab Almuhtadi. "Artificial intelligence application for improving cyber-security
acquirement." In Electrical and Computer Engineering (CCECE), 2015 IEEE 28th Canadian Conference on, pp.
1445-1450. IEEE, 2015.
22 Krittanawong, C. "The rise of artificial intelligence and the uncertain future for physicians." (2017)..
23 Riley, S. (2017). [online] Available at: https://www.houseofbots.com/pulse/introducing-darklight-gaming-
changing-artificial-cyber-shawn-riley/ [Accessed 13 Nov. 2017].
THE OFFENSE/DEFENSE BALANCE IN CYBERSPACE
of the process. Merat and Amuhdati (2015) presented a paper emphasizing on Showan, as the
artificial intelligence application in a manner to improve the cyber security in the virtual
computer field21. They have introduced that machine learning can be understood as different
types of computing processes and it can be mapped within a multitasking environment. Showan
is software modelling and mapping paradigm that has been developed in a manner to
characterize and learn the behaviour of the systems concerning the cyber security awareness
against several concurrent threats22. Like other AI applications at its earlier stage, it was not
much efficient, later on as the data storage was improved, the machine learning goes on
enhancing and the calculations and upgrades resulted in an efficient technology. The aim was to
develop a process that could be contended with more than one concurrent thread during the task
performance23. This enables large data being transferred with a minimum time delay with the
help of the machine learning and without compromising the security of the systems.
Offense Defence Theory for International Stability
Critics and Proponents of the Offense Defence Balance (ODB) hypothesis are generally
concerned with international stability remarking as topical issues including the war inception,
escalation, and security dilemma. The relative or assumed strength of defense over offense or
21 Merat, Soorena, and Wahab Almuhtadi. "Artificial intelligence application for improving cyber-security
acquirement." In Electrical and Computer Engineering (CCECE), 2015 IEEE 28th Canadian Conference on, pp.
1445-1450. IEEE, 2015.
22 Krittanawong, C. "The rise of artificial intelligence and the uncertain future for physicians." (2017)..
23 Riley, S. (2017). [online] Available at: https://www.houseofbots.com/pulse/introducing-darklight-gaming-
changing-artificial-cyber-shawn-riley/ [Accessed 13 Nov. 2017].
12
THE OFFENSE/DEFENSE BALANCE IN CYBERSPACE
offense over the defense of a country can lead towards opposite outcomes for the arguments
related to these phenomena24. Considering the facts when conquests and the attack are held to be
far easy than protection of the subjected target, theory of ODB can be helpful in predicting the
common systematic outcomes that could be a security dilemma, possibilities of war to be
happened, and tendency to increase the aims of the war25. Regarding the policies and strategies of
the ODB implementation, there are various ways and they could be convinced that the offense
has more advantage over the defense; the attackers might tend to perpetrate pre-emptive attacks.
However, considering the facts related to the defense is easier than offense, "states have
more incentives in a manner to compromise, embark on binding strategies and even engage in
disarmament policies.” Regarding the international stability, it is important to concern on the
defense regardless of the offense, as the offense will only lead towards the destruction and loss
of different countries properties (Kremmer and Muller 2013). The defense will always focus on
eliminating the factors related to the threat to the system's data and information and this will be
helpful in creating international peace. Most of the offense system targets on the subjects related
to different countries in a manner to affect the stability and economic of that country and some of
the governments support the attackers and try to protect them. This could also happen to the
same country and the attackers might be protected by the affected country, however, there is not
any profit in such intrusions and will only destroy the properties of those countries26. The defense
24 Betts, Richard K., ed. Conflict after the Cold War: arguments on causes of war and peace. Taylor & Francis,
2017.
25 Medvedev, Sergei A. "Offense-defense theory analysis of Russian cyber capability." PhD diss., Monterey,
California: Naval Postgraduate School, 2015.
THE OFFENSE/DEFENSE BALANCE IN CYBERSPACE
offense over the defense of a country can lead towards opposite outcomes for the arguments
related to these phenomena24. Considering the facts when conquests and the attack are held to be
far easy than protection of the subjected target, theory of ODB can be helpful in predicting the
common systematic outcomes that could be a security dilemma, possibilities of war to be
happened, and tendency to increase the aims of the war25. Regarding the policies and strategies of
the ODB implementation, there are various ways and they could be convinced that the offense
has more advantage over the defense; the attackers might tend to perpetrate pre-emptive attacks.
However, considering the facts related to the defense is easier than offense, "states have
more incentives in a manner to compromise, embark on binding strategies and even engage in
disarmament policies.” Regarding the international stability, it is important to concern on the
defense regardless of the offense, as the offense will only lead towards the destruction and loss
of different countries properties (Kremmer and Muller 2013). The defense will always focus on
eliminating the factors related to the threat to the system's data and information and this will be
helpful in creating international peace. Most of the offense system targets on the subjects related
to different countries in a manner to affect the stability and economic of that country and some of
the governments support the attackers and try to protect them. This could also happen to the
same country and the attackers might be protected by the affected country, however, there is not
any profit in such intrusions and will only destroy the properties of those countries26. The defense
24 Betts, Richard K., ed. Conflict after the Cold War: arguments on causes of war and peace. Taylor & Francis,
2017.
25 Medvedev, Sergei A. "Offense-defense theory analysis of Russian cyber capability." PhD diss., Monterey,
California: Naval Postgraduate School, 2015.
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
13
THE OFFENSE/DEFENSE BALANCE IN CYBERSPACE
strategy will not help the different countries in protecting their internal properties; rather it will
also help in protecting the threats from outside the country and will ensure peace among them.
Most of the countries' military is spending a lot of money in implementing AI into the
weapons in a manner to make them much advanced and for a mass destruction. However, as
stated above spending on offense will only lead to the wastage of money and stability will
always be unbalanced. Cyberspace has a dual nature such as soft and hard, or virtual and real that
is results in a peculiar battleground for the cyber programmers and target highly paying preys.
Here different attackers attempt for the different purposes including disruptive processes such as
destroying physical infrastructure. Another aspect related to the ODB can be stated as equally
peculiar, is the centrality for the internet for the non-military and the military actors. Regardless
of the difference between the non-military and military actors, they use either same software or
hardware for the networks. (Abraham and Biddle 2016) stated, "the result is two-fold: on the one
hand, cyber-threats can take the form of either criminal activities or acts of war just depending
on the target of the attack27." The source of the threats related to the ODB varies conspicuously
that range from the hackers, intelligent services, or to terrorists. Cyberattacks include
unauthorized access to data and information through advance coding that makes the cyber
espionage and other unauthorized tracking or monitoring system a cyberattacks too. No matter
26 Kishor, N. (2017). Artificial Intelligence in Cyber Security Market to Reach $18.2 Billion by 2023: P&S Market
Research. [online] Houseofbots.com. Available at: http://houseofbots.com/news-detail/1419-1-artificial-intelligence-
in-cyber-security-market-to-reach-dollar18.2-billion-by-2023-ps-market-research [Accessed 13 Nov. 2017].
27 Abrahms, Max, and Stephen Biddle. "Free Access Why Terrorism Does Not Work (8800 times)." International
Security21, no. 1 (1996): 186-191.
THE OFFENSE/DEFENSE BALANCE IN CYBERSPACE
strategy will not help the different countries in protecting their internal properties; rather it will
also help in protecting the threats from outside the country and will ensure peace among them.
Most of the countries' military is spending a lot of money in implementing AI into the
weapons in a manner to make them much advanced and for a mass destruction. However, as
stated above spending on offense will only lead to the wastage of money and stability will
always be unbalanced. Cyberspace has a dual nature such as soft and hard, or virtual and real that
is results in a peculiar battleground for the cyber programmers and target highly paying preys.
Here different attackers attempt for the different purposes including disruptive processes such as
destroying physical infrastructure. Another aspect related to the ODB can be stated as equally
peculiar, is the centrality for the internet for the non-military and the military actors. Regardless
of the difference between the non-military and military actors, they use either same software or
hardware for the networks. (Abraham and Biddle 2016) stated, "the result is two-fold: on the one
hand, cyber-threats can take the form of either criminal activities or acts of war just depending
on the target of the attack27." The source of the threats related to the ODB varies conspicuously
that range from the hackers, intelligent services, or to terrorists. Cyberattacks include
unauthorized access to data and information through advance coding that makes the cyber
espionage and other unauthorized tracking or monitoring system a cyberattacks too. No matter
26 Kishor, N. (2017). Artificial Intelligence in Cyber Security Market to Reach $18.2 Billion by 2023: P&S Market
Research. [online] Houseofbots.com. Available at: http://houseofbots.com/news-detail/1419-1-artificial-intelligence-
in-cyber-security-market-to-reach-dollar18.2-billion-by-2023-ps-market-research [Accessed 13 Nov. 2017].
27 Abrahms, Max, and Stephen Biddle. "Free Access Why Terrorism Does Not Work (8800 times)." International
Security21, no. 1 (1996): 186-191.
14
THE OFFENSE/DEFENSE BALANCE IN CYBERSPACE
what the purpose is but, accessing the data or information related to the individual without
having properly authorized access can be put in the category of cyber attacks. Companies facing
cyberattacks can be represented in following graph:
Figure 3: Share of companies facing cyberattacks
(Source: Riley, 2017)
The complexity of comparison between the offense and defense theory could be
minimized if the attention has been drawn on both objectives separately while discussing the
terms related to the ODB theory. “Equally important, it is easier to assess their relative costs, as
the main purpose of the action is not to control a territory but to compromise/ensure the
THE OFFENSE/DEFENSE BALANCE IN CYBERSPACE
what the purpose is but, accessing the data or information related to the individual without
having properly authorized access can be put in the category of cyber attacks. Companies facing
cyberattacks can be represented in following graph:
Figure 3: Share of companies facing cyberattacks
(Source: Riley, 2017)
The complexity of comparison between the offense and defense theory could be
minimized if the attention has been drawn on both objectives separately while discussing the
terms related to the ODB theory. “Equally important, it is easier to assess their relative costs, as
the main purpose of the action is not to control a territory but to compromise/ensure the
15
THE OFFENSE/DEFENSE BALANCE IN CYBERSPACE
effectiveness of a system or network28.”Considering the traditional war domains, it could be
stated that it is probably impossible for measuring the ODB as if it were an equation.
Conclusion
Based on the above report it can be concluded that AI could be used as either an offense
or a defense system that depends on how the application will be carried out. This report mainly
focused on defense dominant domain of the AI in cybersecurity. Cybersecurity and national
security are the two very vast and sensitive chapters for a human being and combining the
thinking capability of a human being with the quantum computing strength of the computer
could result in overcoming such shortcomings. AI could evaluate every haystack of data and
information saved in the database in much easy and with very less time consumption that makes
it a reliable technology. Despite so many advantages, there are certain issues with the AI as
nothing is perfect in this world and AI could be used as an offensive system. Using AI for the
offense could result in mass destruction and the intruder could easily operate such unwanted
actions from the very far distance and easily get away with any law allegations. AI is not only
being used for the defense purpose however, even the government is using it in the offense in a
manner to make the missiles more efficient and accurate. This report presents the bright side of
the AI including how AI could be used against the cyberattacks. However, it is necessary to
increase the boundary of the experiments considering the dark side of such advanced technology.
28 Kitano, Hiroaki. "Biological Complexity and the Need for Computational Approaches." In Philosophy of Systems
Biology, pp. 169-180. Springer International Publishing, 2017.
THE OFFENSE/DEFENSE BALANCE IN CYBERSPACE
effectiveness of a system or network28.”Considering the traditional war domains, it could be
stated that it is probably impossible for measuring the ODB as if it were an equation.
Conclusion
Based on the above report it can be concluded that AI could be used as either an offense
or a defense system that depends on how the application will be carried out. This report mainly
focused on defense dominant domain of the AI in cybersecurity. Cybersecurity and national
security are the two very vast and sensitive chapters for a human being and combining the
thinking capability of a human being with the quantum computing strength of the computer
could result in overcoming such shortcomings. AI could evaluate every haystack of data and
information saved in the database in much easy and with very less time consumption that makes
it a reliable technology. Despite so many advantages, there are certain issues with the AI as
nothing is perfect in this world and AI could be used as an offensive system. Using AI for the
offense could result in mass destruction and the intruder could easily operate such unwanted
actions from the very far distance and easily get away with any law allegations. AI is not only
being used for the defense purpose however, even the government is using it in the offense in a
manner to make the missiles more efficient and accurate. This report presents the bright side of
the AI including how AI could be used against the cyberattacks. However, it is necessary to
increase the boundary of the experiments considering the dark side of such advanced technology.
28 Kitano, Hiroaki. "Biological Complexity and the Need for Computational Approaches." In Philosophy of Systems
Biology, pp. 169-180. Springer International Publishing, 2017.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
16
THE OFFENSE/DEFENSE BALANCE IN CYBERSPACE
Bibliography:
Abrahms, Max, and Stephen Biddle. "Free Access Why Terrorism Does Not Work (8800
times)." International Security21, no. 1 (1996): 186-191.
Betts, Richard K., ed. Conflict after the Cold War: arguments on causes of war and peace.
Taylor & Francis, 2017.
Betz, David J. Cyberspace and the State: Towards a Strategy for Cyber-power. Routledge, 2017.
Cummins, Shannon C. The Garrison Domain: Civil Military Relations in the Cyberspace
Domain. AIR COMMAND AND STAFF COLL MAXWELL AFB AL MAXWELL AFB
United States, 2015.
Dilsizian, Steven E., and Eliot L. Siegel. "Artificial intelligence in medicine and cardiac
imaging: harnessing big data and advanced computing to provide personalized medical diagnosis
and treatment." Current cardiology reports 16, no. 1 (2014): 441.
Gartzke, Erik, and Jon R. Lindsay. "Weaving tangled webs: offense, defense, and deception in
cyberspace." Security Studies 24, no. 2 (2015): 316-348.
Gartzke, Erik. "The myth of cyberwar: bringing war in cyberspace back down to
earth." International Security 38, no. 2 (2013): 41-73.
Harknett, Richard J., and Joseph S. Nye Jr. "Is Deterrence Possible in
Cyberspace?." International Security (2017).
Kasprick, Robert, Jordan Hoffman, Jeremy Straub, and Eunjin Kim. "Cyber Security Artificial
Intelligence Expert System." (2016).
THE OFFENSE/DEFENSE BALANCE IN CYBERSPACE
Bibliography:
Abrahms, Max, and Stephen Biddle. "Free Access Why Terrorism Does Not Work (8800
times)." International Security21, no. 1 (1996): 186-191.
Betts, Richard K., ed. Conflict after the Cold War: arguments on causes of war and peace.
Taylor & Francis, 2017.
Betz, David J. Cyberspace and the State: Towards a Strategy for Cyber-power. Routledge, 2017.
Cummins, Shannon C. The Garrison Domain: Civil Military Relations in the Cyberspace
Domain. AIR COMMAND AND STAFF COLL MAXWELL AFB AL MAXWELL AFB
United States, 2015.
Dilsizian, Steven E., and Eliot L. Siegel. "Artificial intelligence in medicine and cardiac
imaging: harnessing big data and advanced computing to provide personalized medical diagnosis
and treatment." Current cardiology reports 16, no. 1 (2014): 441.
Gartzke, Erik, and Jon R. Lindsay. "Weaving tangled webs: offense, defense, and deception in
cyberspace." Security Studies 24, no. 2 (2015): 316-348.
Gartzke, Erik. "The myth of cyberwar: bringing war in cyberspace back down to
earth." International Security 38, no. 2 (2013): 41-73.
Harknett, Richard J., and Joseph S. Nye Jr. "Is Deterrence Possible in
Cyberspace?." International Security (2017).
Kasprick, Robert, Jordan Hoffman, Jeremy Straub, and Eunjin Kim. "Cyber Security Artificial
Intelligence Expert System." (2016).
17
THE OFFENSE/DEFENSE BALANCE IN CYBERSPACE
Kitano, Hiroaki. "Biological Complexity and the Need for Computational Approaches."
In Philosophy of Systems Biology, pp. 169-180. Springer International Publishing, 2017.
Kishor, N. (2017). Artificial Intelligence in Cyber Security Market to Reach $18.2 Billion by
2023: P&S Market Research. [online] Houseofbots.com. Available at:
http://houseofbots.com/news-detail/1419-1-artificial-intelligence-in-cyber-security-market-to-
reach-dollar18.2-billion-by-2023-ps-market-research [Accessed 13 Nov. 2017].
Kremer, Jan-Frederik, and Benedikt Müller, eds. Cyberspace and international relations:
Theory, prospects and challenges. Springer Science & Business Media, 2013.
Krittanawong, C. "The rise of artificial intelligence and the uncertain future for physicians."
(2017)..
Krittanawong, Chayakrit, HongJu Zhang, Zhen Wang, Mehmet Aydar, and Takeshi Kitai.
"Artificial Intelligence in Precision Cardiovascular Medicine." Journal of the American College
of Cardiology 69, no. 21 (2017): 2657-2664.
Levine, Brian A. "AI has brains--but it's no MD: artificial intelligence has uses in medicine, but
will never replace doctors' intuition." Contemporary OB/GYN 62, no. 4 (2017): 30-32.
Lieber, K., 2014. The Offense-Defence Balance and Cyber Warfare. Cyber Analogies, pp.96-
107.
Medvedev, Sergei A. "Offense-defense theory analysis of Russian cyber capability." PhD diss.,
Monterey, California: Naval Postgraduate School, 2015.
THE OFFENSE/DEFENSE BALANCE IN CYBERSPACE
Kitano, Hiroaki. "Biological Complexity and the Need for Computational Approaches."
In Philosophy of Systems Biology, pp. 169-180. Springer International Publishing, 2017.
Kishor, N. (2017). Artificial Intelligence in Cyber Security Market to Reach $18.2 Billion by
2023: P&S Market Research. [online] Houseofbots.com. Available at:
http://houseofbots.com/news-detail/1419-1-artificial-intelligence-in-cyber-security-market-to-
reach-dollar18.2-billion-by-2023-ps-market-research [Accessed 13 Nov. 2017].
Kremer, Jan-Frederik, and Benedikt Müller, eds. Cyberspace and international relations:
Theory, prospects and challenges. Springer Science & Business Media, 2013.
Krittanawong, C. "The rise of artificial intelligence and the uncertain future for physicians."
(2017)..
Krittanawong, Chayakrit, HongJu Zhang, Zhen Wang, Mehmet Aydar, and Takeshi Kitai.
"Artificial Intelligence in Precision Cardiovascular Medicine." Journal of the American College
of Cardiology 69, no. 21 (2017): 2657-2664.
Levine, Brian A. "AI has brains--but it's no MD: artificial intelligence has uses in medicine, but
will never replace doctors' intuition." Contemporary OB/GYN 62, no. 4 (2017): 30-32.
Lieber, K., 2014. The Offense-Defence Balance and Cyber Warfare. Cyber Analogies, pp.96-
107.
Medvedev, Sergei A. "Offense-defense theory analysis of Russian cyber capability." PhD diss.,
Monterey, California: Naval Postgraduate School, 2015.
18
THE OFFENSE/DEFENSE BALANCE IN CYBERSPACE
Merat, Soorena, and Wahab Almuhtadi. "Artificial intelligence application for improving cyber-
security acquirement." In Electrical and Computer Engineering (CCECE), 2015 IEEE 28th
Canadian Conference on, pp. 1445-1450. IEEE, 2015.
Lemaire, Vincent, Christophe Salperwyck, and Alexis Bondu. "A survey on supervised
classification on data streams." In Business Intelligence, pp. 88-125. Springer International
Publishing, 2015.
Miller, Steven E., and Stephen Van Evera, eds. The Star Wars Controversy: An" International
Security" Reader. Princeton University Press, 2014.
Pan, Yunhe. "Heading toward artificial intelligence 2.0." Engineering 2, no. 4 (2016): 409-413.
Riley, S. (2017). [online] Available at: https://www.houseofbots.com/pulse/introducing-
darklight-gaming-changing-artificial-cyber-shawn-riley/ [Accessed 13 Nov. 2017].
Ripsman, Norrin M., Jeffrey W. Taliaferro, and Steven E. Lobell. Neoclassical realist theory of
international politics. Oxford University Press, 2016.
Saltzman, Ilai. "Cyber posturing and the offense-defense balance." Contemporary Security
Policy 34, no. 1 (2013): 40-63.
Schmidt, Charlie. "MD Anderson Breaks With IBM Watson, Raising Questions About Artificial
Intelligence in Oncology." JNCI: Journal of the National Cancer Institute 109, no. 5 (2017).
Shaheen, Salma. "Offense–defense balance in cyber warfare." In Cyberspace and International
Relations, pp. 77-93. Springer Berlin Heidelberg, 2014.
THE OFFENSE/DEFENSE BALANCE IN CYBERSPACE
Merat, Soorena, and Wahab Almuhtadi. "Artificial intelligence application for improving cyber-
security acquirement." In Electrical and Computer Engineering (CCECE), 2015 IEEE 28th
Canadian Conference on, pp. 1445-1450. IEEE, 2015.
Lemaire, Vincent, Christophe Salperwyck, and Alexis Bondu. "A survey on supervised
classification on data streams." In Business Intelligence, pp. 88-125. Springer International
Publishing, 2015.
Miller, Steven E., and Stephen Van Evera, eds. The Star Wars Controversy: An" International
Security" Reader. Princeton University Press, 2014.
Pan, Yunhe. "Heading toward artificial intelligence 2.0." Engineering 2, no. 4 (2016): 409-413.
Riley, S. (2017). [online] Available at: https://www.houseofbots.com/pulse/introducing-
darklight-gaming-changing-artificial-cyber-shawn-riley/ [Accessed 13 Nov. 2017].
Ripsman, Norrin M., Jeffrey W. Taliaferro, and Steven E. Lobell. Neoclassical realist theory of
international politics. Oxford University Press, 2016.
Saltzman, Ilai. "Cyber posturing and the offense-defense balance." Contemporary Security
Policy 34, no. 1 (2013): 40-63.
Schmidt, Charlie. "MD Anderson Breaks With IBM Watson, Raising Questions About Artificial
Intelligence in Oncology." JNCI: Journal of the National Cancer Institute 109, no. 5 (2017).
Shaheen, Salma. "Offense–defense balance in cyber warfare." In Cyberspace and International
Relations, pp. 77-93. Springer Berlin Heidelberg, 2014.
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
19
THE OFFENSE/DEFENSE BALANCE IN CYBERSPACE
Slayton, Rebecca. "What Is the Cyber Offense-Defense Balance? Conceptions, Causes, and
Assessment." International Security 41, no. 3 (2017): 72-109.
Somashekhar, S. P., R. Kumarc, A. Rauthan, K. R. Arun, P. Patil, and Y. E. Ramya. "Abstract
S6-07: Double blinded validation study to assess performance of IBM artificial intelligence
platform, Watson for oncology in comparison with Manipal multidisciplinary tumour board–
First study of 638 breast cancer cases." (2017): S6-07.
Yampolskiy, Roman V., and M. S. Spellchecker. "Artificial Intelligence Safety and
Cybersecurity: a Timeline of AI Failures." arXiv preprint arXiv:1610.07997 (2016).
THE OFFENSE/DEFENSE BALANCE IN CYBERSPACE
Slayton, Rebecca. "What Is the Cyber Offense-Defense Balance? Conceptions, Causes, and
Assessment." International Security 41, no. 3 (2017): 72-109.
Somashekhar, S. P., R. Kumarc, A. Rauthan, K. R. Arun, P. Patil, and Y. E. Ramya. "Abstract
S6-07: Double blinded validation study to assess performance of IBM artificial intelligence
platform, Watson for oncology in comparison with Manipal multidisciplinary tumour board–
First study of 638 breast cancer cases." (2017): S6-07.
Yampolskiy, Roman V., and M. S. Spellchecker. "Artificial Intelligence Safety and
Cybersecurity: a Timeline of AI Failures." arXiv preprint arXiv:1610.07997 (2016).
1 out of 20
Related Documents
Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
© 2024 | Zucol Services PVT LTD | All rights reserved.