A methodological review on attack and defense strategies in cyber warfare

被引:0
|
作者
Ramaswamy Swarnammal Shaji
V. Sachin Dev
Thomas Brindha
机构
[1] St. Xavier’s Catholic College of Engineering,Department of Computer Science and Engineering
[2] Noorul Islam Centre for Higher Education,Department of Information Technology
来源
Wireless Networks | 2019年 / 25卷
关键词
Cyberspace; Cyber attack; Cyber threat; Cyber warfare; Cyber defense; Cyber forensics;
D O I
暂无
中图分类号
学科分类号
摘要
Cyberspace is an integration of cyber physical system components that integrates computation, networking, physical processes, embedded computers and network monitors which uses feedback loops for controlling the processes where the computations are affected by processes and vice versa. More general, cyber physical systems include all equipments operated on preprogrammed instructions ranging from simple electronic devices to the ultra-modern warfare equipments along with life saving devices. Active cyber-attacks can cause cyber warfare situations by disrupting an entire community of people, which in turn raises an emergency situation to the nation. Thus, cyber warfare is a major threat to the nation at large. In this paper, we analyze the various aspects of cyber warfare situations and a survey on ongoing attacks, defense and cyber forensics strategies in that field. Internet of Things (IoT) is an emerging computing area which enables Machine to Machine communication in cyber physical systems. An attack on IoT causes major issues to the security on the devices and thus, the various threats and attacks on IoT are analyzed here. Overall monitoring and data acquisition in cyber physical systems is done by Supervisory Control and Data Acquisition systems and are mainly targeted by the attackers in order to leave the cyberspace applications not functioning. Therefore, the various threats, attacks and research issues pertaining to the cyberspace are surveyed in this paper along with a few research issues and challenges that are to be solved in the area of cyber warfare.
引用
收藏
页码:3323 / 3334
页数:11
相关论文
共 50 条
  • [41] Deep Reinforcement Learning for Distribution System Cyber Attack Defense with DERs
    Selim, Alaa
    Zhao, Junbo
    Ding, Fei
    Miao, Fei
    Park, Sung-Yeul
    2023 IEEE POWER & ENERGY SOCIETY INNOVATIVE SMART GRID TECHNOLOGIES CONFERENCE, ISGT, 2023,
  • [42] A Hybrid Cyber Defense Mechanism to Mitigate the Persistent Scan and Foothold Attack
    Wang, Shuo
    Pei, Qingqi
    Zhang, Yuchen
    Liu, Xiaohu
    Tang, Guangming
    SECURITY AND COMMUNICATION NETWORKS, 2020, 2020
  • [43] A hybrid cyber defense framework for reconnaissance attack in industrial control systems
    Qin, Xingsheng
    Jiang, Frank
    Dong, Chengzu
    Doss, Robin
    COMPUTERS & SECURITY, 2024, 136
  • [44] Attack-Defense Trees based Cyber Security Analysis for CPSs
    Ji, Xiang
    Yu, HuiQun
    Fan, GuiSheng
    Fu, WenHao
    2016 17TH IEEE/ACIS INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, ARTIFICIAL INTELLIGENCE, NETWORKING AND PARALLEL/DISTRIBUTED COMPUTING (SNPD), 2016, : 693 - 698
  • [45] EVALUATING THE "IMMINENCE" OF A CYBER ATTACK FOR PURPOSES OF ANTICIPATORY SELF-DEFENSE
    Hayward, Ryan J.
    COLUMBIA LAW REVIEW, 2017, 117 (02) : 399 - 434
  • [46] WAMS-Based HVDC Damping Control for Cyber Attack Defense
    Sun, Kaiqi
    Qiu, Wei
    Dong, Yuqing
    Zhang, Chengwen
    Yin, He
    Yao, Wenxuan
    Liu, Yilu
    IEEE TRANSACTIONS ON POWER SYSTEMS, 2023, 38 (01) : 702 - 713
  • [47] Research survey on defense strategy of attack threat in cyber physical systems
    Wen, Cheng-Lin
    Yang, Li
    Kongzhi Lilun Yu Yingyong/Control Theory and Applications, 2024, 41 (12): : 2224 - 2236
  • [48] A Game Between Cyber Attack and Defense Under the Topology of Satellite Networks
    Cui, Yucheng
    Xi, Zhiyu
    Zhang, Xingpeng
    Lecture Notes in Electrical Engineering, 2023, 845 LNEE : 5113 - 5125
  • [49] A Survey of Adversarial Attack and Defense Methods for Malware Classification in Cyber Security
    Yan, Senming
    Ren, Jing
    Wang, Wei
    Sun, Limin
    Zhang, Wei
    Yu, Quan
    IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2023, 25 (01): : 467 - 496
  • [50] Collaborative Cyber Attack Defense in SDN Networks using Blockchain Technology
    Hajizadeh, Mehrdad
    Afraz, Nima
    Ruffini, Marco
    Bauschert, Thomas
    PROCEEDINGS OF THE 2020 6TH IEEE CONFERENCE ON NETWORK SOFTWARIZATION (NETSOFT 2020): BRIDGING THE GAP BETWEEN AI AND NETWORK SOFTWARIZATION, 2020, : 487 - 492