Cyber Offense-Defense Balance Model
cyberweapons-offense-defenseanalysisPath: /knowledge-base/models/cyberweapons-offense-defense/
E88Entity ID (EID)
Page Recorddatabase.json — merged from MDX frontmatter + Entity YAML + computed metrics at build time
{
"id": "cyberweapons-offense-defense",
"numericId": null,
"path": "/knowledge-base/models/cyberweapons-offense-defense/",
"filePath": "knowledge-base/models/cyberweapons-offense-defense.mdx",
"title": "Cyber Offense-Defense Balance Model",
"quality": 57,
"readerImportance": 58.5,
"researchImportance": 73,
"tacticalValue": null,
"contentFormat": "article",
"tractability": null,
"neglectedness": null,
"uncertainty": null,
"causalLevel": null,
"lastUpdated": "2026-03-13",
"dateCreated": "2026-02-15",
"llmSummary": "Models cyber offense-defense balance with AI, projecting 30-70% net attack success improvement (B_OD ratio 1.2-1.8, best estimate 1.45) driven by automation scaling and vulnerability discovery. Quantifies intervention impacts: government defensive R&D could shift balance by -0.2 to -0.4, with 35% probability offense maintains 30%+ advantage through 2030.",
"description": "This model analyzes whether AI shifts cyber offense-defense balance. It projects 30-70% net improvement in attack success rates, driven by automation scaling and vulnerability discovery.",
"ratings": {
"focus": 8.5,
"novelty": 5,
"rigor": 6.5,
"completeness": 7.5,
"concreteness": 7,
"actionability": 6.5
},
"category": "models",
"subcategory": "domain-models",
"clusters": [
"cyber",
"ai-safety"
],
"metrics": {
"wordCount": 2690,
"tableCount": 14,
"diagramCount": 1,
"internalLinks": 2,
"externalLinks": 0,
"footnoteCount": 0,
"bulletRatio": 0.11,
"sectionCount": 30,
"hasOverview": true,
"structuralScore": 11
},
"suggestedQuality": 73,
"updateFrequency": 90,
"evergreen": true,
"wordCount": 2690,
"unconvertedLinks": [],
"unconvertedLinkCount": 0,
"convertedLinkCount": 0,
"backlinkCount": 1,
"hallucinationRisk": {
"level": "medium",
"score": 60,
"factors": [
"no-citations",
"few-external-sources"
]
},
"entityType": "analysis",
"redundancy": {
"maxSimilarity": 19,
"similarPages": [
{
"id": "fraud-sophistication-curve",
"title": "Fraud Sophistication Curve Model",
"path": "/knowledge-base/models/fraud-sophistication-curve/",
"similarity": 19
},
{
"id": "autonomous-weapons-proliferation",
"title": "LAWS Proliferation Model",
"path": "/knowledge-base/models/autonomous-weapons-proliferation/",
"similarity": 17
},
{
"id": "cyberweapons",
"title": "Cyberweapons",
"path": "/knowledge-base/risks/cyberweapons/",
"similarity": 17
},
{
"id": "authentication-collapse-timeline",
"title": "Authentication Collapse Timeline Model",
"path": "/knowledge-base/models/authentication-collapse-timeline/",
"similarity": 16
},
{
"id": "bioweapons-ai-uplift",
"title": "AI Uplift Assessment Model",
"path": "/knowledge-base/models/bioweapons-ai-uplift/",
"similarity": 16
}
]
},
"coverage": {
"passing": 6,
"total": 13,
"targets": {
"tables": 11,
"diagrams": 1,
"internalLinks": 22,
"externalLinks": 13,
"footnotes": 8,
"references": 8
},
"actuals": {
"tables": 14,
"diagrams": 1,
"internalLinks": 2,
"externalLinks": 0,
"footnotes": 0,
"references": 0,
"quotesWithQuotes": 0,
"quotesTotal": 0,
"accuracyChecked": 0,
"accuracyTotal": 0
},
"items": {
"llmSummary": "green",
"schedule": "green",
"entity": "green",
"editHistory": "red",
"overview": "green",
"tables": "green",
"diagrams": "green",
"internalLinks": "amber",
"externalLinks": "red",
"footnotes": "red",
"references": "red",
"quotes": "red",
"accuracy": "red"
},
"ratingsString": "N:5 R:6.5 A:6.5 C:7.5"
},
"readerRank": 236,
"researchRank": 134,
"recommendedScore": 165.04
}External Links
No external links
Backlinks (1)
| id | title | type | relationship |
|---|---|---|---|
| cyberweapons-attack-automation | Autonomous Cyber Attack Timeline | analysis | — |