A methodological review on attack and defense strategies in cyber warfare

被引:0
|
作者
Ramaswamy Swarnammal Shaji
V. Sachin Dev
Thomas Brindha
机构
[1] St. Xavier’s Catholic College of Engineering,Department of Computer Science and Engineering
[2] Noorul Islam Centre for Higher Education,Department of Information Technology
来源
Wireless Networks | 2019年 / 25卷
关键词
Cyberspace; Cyber attack; Cyber threat; Cyber warfare; Cyber defense; Cyber forensics;
D O I
暂无
中图分类号
学科分类号
摘要
Cyberspace is an integration of cyber physical system components that integrates computation, networking, physical processes, embedded computers and network monitors which uses feedback loops for controlling the processes where the computations are affected by processes and vice versa. More general, cyber physical systems include all equipments operated on preprogrammed instructions ranging from simple electronic devices to the ultra-modern warfare equipments along with life saving devices. Active cyber-attacks can cause cyber warfare situations by disrupting an entire community of people, which in turn raises an emergency situation to the nation. Thus, cyber warfare is a major threat to the nation at large. In this paper, we analyze the various aspects of cyber warfare situations and a survey on ongoing attacks, defense and cyber forensics strategies in that field. Internet of Things (IoT) is an emerging computing area which enables Machine to Machine communication in cyber physical systems. An attack on IoT causes major issues to the security on the devices and thus, the various threats and attacks on IoT are analyzed here. Overall monitoring and data acquisition in cyber physical systems is done by Supervisory Control and Data Acquisition systems and are mainly targeted by the attackers in order to leave the cyberspace applications not functioning. Therefore, the various threats, attacks and research issues pertaining to the cyberspace are surveyed in this paper along with a few research issues and challenges that are to be solved in the area of cyber warfare.
引用
收藏
页码:3323 / 3334
页数:11
相关论文
共 50 条
  • [21] CYBER ATTACK AND DEFENSE TRAINING: USING EMULAB AS A PLATFORM
    Kuo, Cheng-Chung
    Chain, Kai
    Yang, Chu-Sing
    INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING INFORMATION AND CONTROL, 2018, 14 (06): : 2245 - 2258
  • [22] Game Control of Attack and Defense in Cyber Physical System
    Cai, Xiaobo
    Wang, Baijuan
    Cao, Zhiyong
    Zhang, Haitao
    Han, Ke
    Chen, Min
    Xu, Jiajun
    Zi, Caifei
    Wu, Wendou
    2020 INTERNATIONAL CONFERENCE ON IDENTIFICATION, INFORMATION AND KNOWLEDGE IN THE INTERNET OF THINGS (IIKI2020), 2021, 187 : 488 - 494
  • [23] GPU Obfuscation: Attack and Defense Strategies
    Chakraborty, Abhishek
    Xie, Yang
    Srivastava, Ankur
    2018 55TH ACM/ESDA/IEEE DESIGN AUTOMATION CONFERENCE (DAC), 2018,
  • [24] Cyber-Attack Risks Analysis Based on Attack-Defense Trees
    Sun, Wenjun
    Lv, Liqun
    Su, Yang
    Wang, Xu An
    ADVANCES IN INTERNETWORKING, DATA & WEB TECHNOLOGIES, EIDWT-2017, 2018, 6 : 667 - 678
  • [25] Design and analysis of cyber warfare model with intelligent predictive stochastic networks for attack-defend strategies on critical infrastructures
    Majeed, Khalid
    Masood, Zaheer
    Ghori, Muhammad Rizwan
    Raja, Muhammad Asif Zahoor
    APPLIED SOFT COMPUTING, 2023, 148
  • [26] Cyber Attack-Defense Game Strategy Solving Based on Reinforcement Learning and Self-play Cyber Attack-Defense Game Solver
    Zhang, Jie
    Luo, Yunfeng
    PROCEEDINGS OF 2024 3RD INTERNATIONAL CONFERENCE ON CRYPTOGRAPHY, NETWORK SECURITY AND COMMUNICATION TECHNOLOGY, CNSCT 2024, 2024, : 135 - 141
  • [27] Strategies for the prevention of a successful biological warfare aerosol attack
    Wiener, SL
    MILITARY MEDICINE, 1996, 161 (05) : 251 - 256
  • [28] Impact of computer users on cyber defense strategies
    Colvett, Christopher Daniel
    Petty, Mikel D.
    Bland, John A.
    SYSTEMS ENGINEERING, 2024, 27 (03) : 532 - 555
  • [29] Review On The IT Security Attack And Defense
    Krit, Salah-ddine
    Haimoud, Elbachir
    2016 INTERNATIONAL CONFERENCE ON ENGINEERING & MIS (ICEMIS), 2016,
  • [30] A Model of APT Attack Defense Based on Cyber Threat Detection
    Li, Yue
    Zhang, Teng
    Li, Xue
    Li, Ting
    CYBER SECURITY, CNCERT 2018, 2019, 970 : 122 - 135