Skip to main content

Abstract

This paper is devoted to the disclosure of the term ‘information operations’, which are components of a broader concept - hybrid warfare. The paper examines the main thing of this modern term and reveals the logical and semantic content by studying its historical origin and analyzing information sources containing information on this topic. The material also provides a semantic description of the concept of ‘information warfare’, which is similar to information operations, but is a separate war, which can then develop into a hybrid warfare. Also, the elements of information operations, such as psychological impact, electronic warfare and computer security, are considered. In the paper, the main focus is on the description of methods of protection against computer threats. Also, in addition to the very definition of the meaning of hybrid warfare, attention is paid to the economic, social and political elements that are part of this concept. In parallel, methods of identifying elements of information operations - cyberattacks, analysis of schemes and methods of their implementation, using which such attacks are detected and eliminated are considered. Methods of protection against cyberattacks and methods of ensuring computer security are also described. The topic under consideration will be of interest to specialists in the field of information security and IT technologies. The study of this material will expand knowledge in the field of information security in the modern world and will provide a basis for further study of the topic in this area.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 189.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 249.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 329.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Mitrovic, M.: Hybrid genesis of information operations in cyberspace. Hybrid Warfare Exp. Perspect. 17(4), 1359–1372 (2018). https://doi.org/10.22190/TEME1804359M

  2. Nyrkov, A., Sokolov, S., Chernyi, S., Mamunts, D.: Using information technologies in dredging. Metall. Min. Ind. 7(6), 521–524 (2015). https://doi.org/10.1088/1757-899X/91/1/012064

    Article  Google Scholar 

  3. Sokolov, S., Zhilenkov, A., Chernyi, S., Nyrkov, A., Mamunts, D.: Dynamics models of synchronized piecewise linear discrete chaotic systems of high order. Symmetry 11(2), 236 (2019). https://doi.org/10.3390/sym11020236

    Article  MATH  Google Scholar 

  4. Sokolov, S.S., Alimov, O.M., Tyapkin, D.A., Katorin, Y.F., Moiseev, A.I.: Modern social engineering voice cloning technologies. In: 2020 IEEE Conference of Russian Young Researchers in Electrical and Electronic Engineering (EIConRus), St. Petersburg and Moscow, Russia (2020). https://doi.org/10.1109/EIConRus49466.2020.9038954

  5. Soofi, A., Irfan Khan, M., Amin, F.-E.: A review on data security in cloud computing. Int. J. Comput. Appl. 94, 975–8887 (2014). https://doi.org/10.5120/16338-5625

    Article  Google Scholar 

  6. Kandasamy, K., Srinivas, S., Achuthan, K.: IoT cyber risk: a holistic analysis of cyber risk assessment frameworks, risk vectors, and risk ranking process. EURASIP J. Inf. Secur. 2020, 8 (2020). https://doi.org/10.1186/s13635-020-00111-0

    Article  Google Scholar 

  7. Rubio-Hernan, J., De Cicco, L., Garcia-Alfaro, J.: On the use of watermark-based schemes to detect cyber-physical attacks. EURASIP J. Inf. Secur. 2017, 8 (2017). https://doi.org/10.1186/s13635-017-0060-9

    Article  Google Scholar 

  8. Sokolov, S.S., Alimov, O.M., Nekrashevich, P.S., Moiseev, A.I., Degtyarev, A.V.: Security issues and IoT integration for in Russian industry. In: 2020 IEEE Conference of Russian Young Researchers in Electrical and Electronic Engineering (EIConRus), St. Petersburg and Moscow, Russia (2020). https://doi.org/10.1109/EIConRus49466.2020.9039213

  9. Ullrich, J., Cropper, J., Frühwirt, P.: The role and security of firewalls in cyber-physical cloud computing. EURASIP J. Inf. Secur. 2016, 18 (2016). https://doi.org/10.1186/s13635-016-0042-3

    Article  Google Scholar 

  10. Mamunts, D., Sokolov, S., Nyrkov, A., Bukhurmetov, M., Kuznetsov, V.: Models and algorithms for estimation and minimization of the risks associated with dredging. Transp. Telecommun. 18(2), 139–145 (2017). https://doi.org/10.1515/ttj-2017-0013

    Article  Google Scholar 

  11. Abikoye, O.C., Abubakar, A., Dokoro, A.H.: A novel technique to prevent SQL injection and cross-site scripting attacks using Knuth-Morris-Pratt string match algorithm. EURASIP J. Inf. Secur. 2020, 14 (2020). https://doi.org/10.1186/s13635-020-00113-y

    Article  Google Scholar 

  12. Panagiotis, I., Radoglou, G.: Securing the Internet of Things: challenges, threats and solutions . Internet Things J. (2019). https://doi.org/10.1016/j.iot.2018.11.003

    Article  Google Scholar 

  13. Nyrkov, A., Shnurenko, A., Sokolov, S., Chernyi, S., Korotkov, V.: Some methods of increasing the efficiency of river transport system. Procedia Eng. 178, 543–550 (2017). https://doi.org/10.1016/j.proeng.2017.01.106

    Article  Google Scholar 

  14. Sokolov, S.S., Alimov, O.M., Golubeva, M.G., Burlov, V.G., Vikhrov, N.M.: The automating process of information security management. In: 2018 IEEE Conference of Russian Young Researchers in Electrical and Electronic Engineering (EIConRus), Moscow, Russia (2018). https://doi.org/10.1109/EIConRus.2018.8317045

  15. Tian, J., Wang, Z., Li, Z.: Low-cost data partitioning and encrypted backup scheme for defending against co-resident attacks. EURASIP J. Inf. Secur. 2020, 7 (2020). https://doi.org/10.1186/s13635-020-00110-1

    Article  Google Scholar 

  16. Barrowclough, J.P., Asif, R.: Securing cloud hypervisors: a survey of the threats, vulnerabilities, and countermeasures. Secur. Commun. Netw. 20 (2018). https://doi.org/10.1155/2018/1681908

  17. Boriev, Z.V., Sokolov, S.S., Nyrkov, A.P.: Review of modern biometric user authentication and their development prospects. IOP Conf. Ser. Mater. Sci. Eng. 91(1), 012063 (2015). https://doi.org/10.1088/1757-899X/91/1/012063

    Article  Google Scholar 

  18. Gehrmann, C., Rodan, M., Jönsson, N.: Metadata filtering for user-friendly centralized biometric authentication. EURASIP J. Inf. Secur. 2019, 7 (2019). https://doi.org/10.1186/s13635-019-0093-3

    Article  Google Scholar 

  19. Sokolov, S., Zhilenkov, A., Chernyi, S., Nyrkov, A., Glebov, N.: Hybrid neural networks in cyper physical system interface control system. Bull. Electr. Eng. Inform. 9(3), 1268–1275 (2020). https://doi.org/10.11591/eei.v9i3.1293

    Article  Google Scholar 

  20. Jang, Y., Choi, J.: Detecting SQL injection attacks using query result size. Comput. Secur. 1–15 (2014). https://doi.org/10.1016/j.cose.2014.04.007

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Artem Shvets .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Sokolov, S., Nyrkov, A., Knysh, T., Shvets, A. (2021). Countering Cyberattacks During Information Operations. In: Mottaeva, A. (eds) Proceedings of the XIII International Scientific Conference on Architecture and Construction 2020. ISCAC 2020. Lecture Notes in Civil Engineering, vol 130. Springer, Singapore. https://doi.org/10.1007/978-981-33-6208-6_9

Download citation

  • DOI: https://doi.org/10.1007/978-981-33-6208-6_9

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-33-6207-9

  • Online ISBN: 978-981-33-6208-6

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics