A methodological review on attack and defense strategies in cyber warfare

被引:0
|
作者
Ramaswamy Swarnammal Shaji
V. Sachin Dev
Thomas Brindha
机构
[1] St. Xavier’s Catholic College of Engineering,Department of Computer Science and Engineering
[2] Noorul Islam Centre for Higher Education,Department of Information Technology
来源
Wireless Networks | 2019年 / 25卷
关键词
Cyberspace; Cyber attack; Cyber threat; Cyber warfare; Cyber defense; Cyber forensics;
D O I
暂无
中图分类号
学科分类号
摘要
Cyberspace is an integration of cyber physical system components that integrates computation, networking, physical processes, embedded computers and network monitors which uses feedback loops for controlling the processes where the computations are affected by processes and vice versa. More general, cyber physical systems include all equipments operated on preprogrammed instructions ranging from simple electronic devices to the ultra-modern warfare equipments along with life saving devices. Active cyber-attacks can cause cyber warfare situations by disrupting an entire community of people, which in turn raises an emergency situation to the nation. Thus, cyber warfare is a major threat to the nation at large. In this paper, we analyze the various aspects of cyber warfare situations and a survey on ongoing attacks, defense and cyber forensics strategies in that field. Internet of Things (IoT) is an emerging computing area which enables Machine to Machine communication in cyber physical systems. An attack on IoT causes major issues to the security on the devices and thus, the various threats and attacks on IoT are analyzed here. Overall monitoring and data acquisition in cyber physical systems is done by Supervisory Control and Data Acquisition systems and are mainly targeted by the attackers in order to leave the cyberspace applications not functioning. Therefore, the various threats, attacks and research issues pertaining to the cyberspace are surveyed in this paper along with a few research issues and challenges that are to be solved in the area of cyber warfare.
引用
收藏
页码:3323 / 3334
页数:11
相关论文
共 50 条
  • [1] A methodological review on attack and defense strategies in cyber warfare
    Shaji, Ramaswamy Swarnammal
    Dev, V. Sachin
    Brindha, Thomas
    WIRELESS NETWORKS, 2019, 25 (06) : 3323 - 3334
  • [2] A Game Theoretic Approach to Model Cyber Attack and Defense Strategies
    Attiah, Afraa
    Chatterjee, Mainak
    Zou, Cliff C.
    2018 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2018,
  • [3] Smart Grid Cyber-Physical Attack and Defense: A Review
    Zhang, Hang
    Liu, Bo
    Wu, Hongyu
    IEEE ACCESS, 2021, 9 : 29641 - 29659
  • [4] Just Warfare: Is a Nuclear Attack an Appropriate Response to a Cyber Attack?
    Fitz, Alexia
    Wilson, Richard L.
    PROCEEDINGS OF THE 18TH INTERNATIONAL CONFERENCE ON CYBER WARFARE AND SECURITY ICCWS, 2023, : 534 - 541
  • [5] Changing the Face of Cyber Warfare with International Cyber Defense Collaboration
    Grobler, Marthie
    van Vuuren, Joey Jansen
    Zaaiman, Jannie
    PROCEEDINGS OF THE 6TH INTERNATIONAL CONFERENCE ON INFORMATION WARFARE AND SECURITY, 2011, : 92 - 98
  • [6] Rewired warfare: rethinking the law of cyber attack
    Schmitt, Michael N.
    INTERNATIONAL REVIEW OF THE RED CROSS, 2014, 96 (893) : 189 - 206
  • [7] Attack and Defense Strategies in Cyber War Involving Production and Stockpiling of Zero-Day Cyber Exploits
    Kjell Hausken
    Jonathan W. Welburn
    Information Systems Frontiers, 2021, 23 : 1609 - 1620
  • [8] Attack and Defense Strategies in Cyber War Involving Production and Stockpiling of Zero-Day Cyber Exploits
    Hausken, Kjell
    Welburn, Jonathan W.
    INFORMATION SYSTEMS FRONTIERS, 2021, 23 (06) : 1609 - 1620
  • [9] Cyber Attack and Defense Emulation Agents
    Yoo, Jeong Do
    Park, Eunji
    Lee, Gyungmin
    Ahn, Myung Kil
    Kim, Donghwa
    Seo, Seongyun
    Kim, Huy Kang
    APPLIED SCIENCES-BASEL, 2020, 10 (06):
  • [10] A Review: Outrageous Cyber Warfare
    Sahu, Sachin Kumar
    Anand, Abhishek
    Sharma, Aseem
    Nautiyal, Nidhi
    2016 1ST INTERNATIONAL CONFERENCE ON INNOVATION AND CHALLENGES IN CYBER SECURITY (ICICCS 2016), 2016, : 70 - 74