Cyber Threats and Cyber Deception in Hybrid Warfare

被引:0
|
作者
Steingartner, William [1 ]
Galinec, Darko [2 ]
机构
[1] Tech Univ Kosice, Fac Elect Engn & Informat, Letna 9, Kosice 04200, Slovakia
[2] Zagreb Univ Appl Sci, Dept Informat & Comp, Vrbik 8, Zagreb 10000, Croatia
关键词
cyber attack; cyber deception; cyber threats; hybrid threats; hybrid warfare;
D O I
暂无
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
Paper deals with the design of the model of hybrid threats and cyber deception platform and solution for cyber threat detection. National networks face a broad range of cyber threats. It includes advanced and persistent peril that can evade commercially available detection tools and defeat generic security measures. Cyber attacks are becoming more intense and complex as they reflect an increasing level of sophistication, e. g. by advanced persistent threat (APT) activity. This environment of menace is of a global nature when transcending geographic boundaries and characterized by the emerging development of offensive cyber capabilities that are an inherent part of conflicts. Deception methods and techniques are being successfully employed by attackers to breach networks and remain undetected in the physical and in the virtual worlds. However, in the world of cyber security, deception as a tactic and element of a more robust defensive strategy has been still largely underexploited. The broad concepts of deception within cyber security were introduced decades ago. Still, these were technological solutions focused on providing technical capabilities to distract, mislead or misdirect the attacker. Only recently has the focus shifted on to how to shape the attackers' sense-making of what is happening as they illegitimately explore networks. In this way, Cyber Deception nowadays provides an opportunity to scare, deter, and retaliate against those that violate organizations' systems. In connection with the foregoing authors created and presented the novel model of hybrid threats in hybrid warfare as a combination of multiple conventional and unconventional tools of warfare. Authors investigate the cyber deception platform and industrial model and solution for threat detection using deception-based methods.
引用
收藏
页码:25 / 45
页数:21
相关论文
共 50 条
  • [1] Cyber Threats in Hybrid Warfare: the Ukrainian Case
    Teodor, Mihaela
    Teodor, Bogdan-Alexandru
    [J]. COUNTERING HYBRID THREATS: LESSONS LEARNED FROM UKRAINE, 2016, 128 : 148 - 153
  • [2] Threat Defense: Cyber Deception Approach and Education for Resilience in Hybrid Threats Model
    Steingartner, William
    Galinec, Darko
    Kozina, Andrija
    [J]. SYMMETRY-BASEL, 2021, 13 (04):
  • [3] Policing Cyber Hate, Cyber Threats and Cyber Terrorism
    Halder, Debarati
    [J]. INTERNATIONAL JOURNAL OF CYBER CRIMINOLOGY, 2013, 7 (02): : 169 - 170
  • [4] CYBER WARFARE
    Solis, Gary D.
    [J]. MILITARY LAW REVIEW, 2014, 219 : 1 - 52
  • [5] Cyber Alliances and Proxy Cyber Warfare
    Barbosa, Jorge
    [J]. PROCEEDINGS OF THE 15TH INTERNATIONAL CONFERENCE ON CYBER WARFARE AND SECURITY (ICCWS 2020), 2020, : 33 - 38
  • [6] Inside Cyber Warfare, Mapping the Cyber Underworld
    Marks, Larry
    [J]. INFORMATION SECURITY JOURNAL, 2013, 22 (04): : 201 - +
  • [7] Cyber Threats Mega Trends in Cyber Space
    Rusi, Tarja
    Lehto, Martti
    [J]. PROCEEDINGS OF THE 12TH INTERNATIONAL CONFERENCE ON CYBER WARFARE AND SECURITY (ICCWS 2017), 2017, : 323 - 331
  • [8] Cyber Warfare and Electronic Warfare Integration in the operational environment of the future: Cyber Electronic Warfare
    Askin, Osman
    Irmak, Riza
    Avsever, Mustafa
    [J]. CYBER SENSING 2015, 2015, 9458
  • [9] Inside cyber warfare
    Zotti, Alexander
    [J]. GLOBAL CHANGE PEACE & SECURITY, 2011, 23 (03) : 437 - 438
  • [10] Encyclopedia of Cyber Warfare
    Davis, Evan
    [J]. REFERENCE & USER SERVICES QUARTERLY, 2018, 57 (03) : 225 - 225