A methodological review on attack and defense strategies in cyber warfare

被引:0
|
作者
Ramaswamy Swarnammal Shaji
V. Sachin Dev
Thomas Brindha
机构
[1] St. Xavier’s Catholic College of Engineering,Department of Computer Science and Engineering
[2] Noorul Islam Centre for Higher Education,Department of Information Technology
来源
Wireless Networks | 2019年 / 25卷
关键词
Cyberspace; Cyber attack; Cyber threat; Cyber warfare; Cyber defense; Cyber forensics;
D O I
暂无
中图分类号
学科分类号
摘要
Cyberspace is an integration of cyber physical system components that integrates computation, networking, physical processes, embedded computers and network monitors which uses feedback loops for controlling the processes where the computations are affected by processes and vice versa. More general, cyber physical systems include all equipments operated on preprogrammed instructions ranging from simple electronic devices to the ultra-modern warfare equipments along with life saving devices. Active cyber-attacks can cause cyber warfare situations by disrupting an entire community of people, which in turn raises an emergency situation to the nation. Thus, cyber warfare is a major threat to the nation at large. In this paper, we analyze the various aspects of cyber warfare situations and a survey on ongoing attacks, defense and cyber forensics strategies in that field. Internet of Things (IoT) is an emerging computing area which enables Machine to Machine communication in cyber physical systems. An attack on IoT causes major issues to the security on the devices and thus, the various threats and attacks on IoT are analyzed here. Overall monitoring and data acquisition in cyber physical systems is done by Supervisory Control and Data Acquisition systems and are mainly targeted by the attackers in order to leave the cyberspace applications not functioning. Therefore, the various threats, attacks and research issues pertaining to the cyberspace are surveyed in this paper along with a few research issues and challenges that are to be solved in the area of cyber warfare.
引用
收藏
页码:3323 / 3334
页数:11
相关论文
共 50 条
  • [31] Cyber Attack Defense Control for Fast Frequency Response System
    Sun K.
    Qiu W.
    Li K.
    Yao W.
    Liu Y.
    Zhongguo Dianji Gongcheng Xuebao/Proceedings of the Chinese Society of Electrical Engineering, 2021, 41 (16): : 5476 - 5485
  • [33] ShadowNet: An Active Defense Infrastructure for Insider Cyber Attack Prevention
    Cui, Xiaohui
    Gasior, Wade
    Beaver, Justin
    Treadwell, Jim
    COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2012, PT IV, 2012, 7336 : 646 - 653
  • [34] CYBER WARFARE
    Solis, Gary D.
    MILITARY LAW REVIEW, 2014, 219 : 1 - 52
  • [35] Jamming sensor networks: Attack and defense strategies
    Xu, Wenyuan
    Ma, Ke
    Trappe, Wade
    Zhang, Yanyong
    IEEE NETWORK, 2006, 20 (03): : 41 - 47
  • [36] AN ATTACK-DEFENSE GAME WITH MATRIX STRATEGIES
    COHEN, ND
    NAVAL RESEARCH LOGISTICS QUARTERLY, 1966, 13 (04): : 391 - &
  • [37] Analysis of ARP Spoofing Attack and Defense Strategies
    Xu, Shuxin
    Zhang, Weigang
    ASIA-PACIFIC MANAGEMENT AND ENGINEERING CONFERENCE (APME 2014), 2014, : 193 - 198
  • [38] Analysis of Attack and Defense Strategies on Complex Networks
    Jiang Yu
    Wang Yubo
    2013 INTERNATIONAL CONFERENCE ON SENSOR NETWORK SECURITY TECHNOLOGY AND PRIVACY COMMUNICATION SYSTEM (SNS & PCS), 2013, : 58 - 62
  • [39] Cyber Warfare and Electronic Warfare Integration in the operational environment of the future: Cyber Electronic Warfare
    Askin, Osman
    Irmak, Riza
    Avsever, Mustafa
    CYBER SENSING 2015, 2015, 9458
  • [40] Nanomaterial Development, Characterization, and Integration Strategies for Chemical Warfare Defense
    Peterson, Gregory W.
    Whitfield, Tracee
    Farha, Omar
    ACS APPLIED MATERIALS & INTERFACES, 2020, 12 (13) : 14629 - 14630