Abstract
This paper is devoted to the disclosure of the term ‘information operations’, which are components of a broader concept - hybrid warfare. The paper examines the main thing of this modern term and reveals the logical and semantic content by studying its historical origin and analyzing information sources containing information on this topic. The material also provides a semantic description of the concept of ‘information warfare’, which is similar to information operations, but is a separate war, which can then develop into a hybrid warfare. Also, the elements of information operations, such as psychological impact, electronic warfare and computer security, are considered. In the paper, the main focus is on the description of methods of protection against computer threats. Also, in addition to the very definition of the meaning of hybrid warfare, attention is paid to the economic, social and political elements that are part of this concept. In parallel, methods of identifying elements of information operations - cyberattacks, analysis of schemes and methods of their implementation, using which such attacks are detected and eliminated are considered. Methods of protection against cyberattacks and methods of ensuring computer security are also described. The topic under consideration will be of interest to specialists in the field of information security and IT technologies. The study of this material will expand knowledge in the field of information security in the modern world and will provide a basis for further study of the topic in this area.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Mitrovic, M.: Hybrid genesis of information operations in cyberspace. Hybrid Warfare Exp. Perspect. 17(4), 1359–1372 (2018). https://doi.org/10.22190/TEME1804359M
Nyrkov, A., Sokolov, S., Chernyi, S., Mamunts, D.: Using information technologies in dredging. Metall. Min. Ind. 7(6), 521–524 (2015). https://doi.org/10.1088/1757-899X/91/1/012064
Sokolov, S., Zhilenkov, A., Chernyi, S., Nyrkov, A., Mamunts, D.: Dynamics models of synchronized piecewise linear discrete chaotic systems of high order. Symmetry 11(2), 236 (2019). https://doi.org/10.3390/sym11020236
Sokolov, S.S., Alimov, O.M., Tyapkin, D.A., Katorin, Y.F., Moiseev, A.I.: Modern social engineering voice cloning technologies. In: 2020 IEEE Conference of Russian Young Researchers in Electrical and Electronic Engineering (EIConRus), St. Petersburg and Moscow, Russia (2020). https://doi.org/10.1109/EIConRus49466.2020.9038954
Soofi, A., Irfan Khan, M., Amin, F.-E.: A review on data security in cloud computing. Int. J. Comput. Appl. 94, 975–8887 (2014). https://doi.org/10.5120/16338-5625
Kandasamy, K., Srinivas, S., Achuthan, K.: IoT cyber risk: a holistic analysis of cyber risk assessment frameworks, risk vectors, and risk ranking process. EURASIP J. Inf. Secur. 2020, 8 (2020). https://doi.org/10.1186/s13635-020-00111-0
Rubio-Hernan, J., De Cicco, L., Garcia-Alfaro, J.: On the use of watermark-based schemes to detect cyber-physical attacks. EURASIP J. Inf. Secur. 2017, 8 (2017). https://doi.org/10.1186/s13635-017-0060-9
Sokolov, S.S., Alimov, O.M., Nekrashevich, P.S., Moiseev, A.I., Degtyarev, A.V.: Security issues and IoT integration for in Russian industry. In: 2020 IEEE Conference of Russian Young Researchers in Electrical and Electronic Engineering (EIConRus), St. Petersburg and Moscow, Russia (2020). https://doi.org/10.1109/EIConRus49466.2020.9039213
Ullrich, J., Cropper, J., Frühwirt, P.: The role and security of firewalls in cyber-physical cloud computing. EURASIP J. Inf. Secur. 2016, 18 (2016). https://doi.org/10.1186/s13635-016-0042-3
Mamunts, D., Sokolov, S., Nyrkov, A., Bukhurmetov, M., Kuznetsov, V.: Models and algorithms for estimation and minimization of the risks associated with dredging. Transp. Telecommun. 18(2), 139–145 (2017). https://doi.org/10.1515/ttj-2017-0013
Abikoye, O.C., Abubakar, A., Dokoro, A.H.: A novel technique to prevent SQL injection and cross-site scripting attacks using Knuth-Morris-Pratt string match algorithm. EURASIP J. Inf. Secur. 2020, 14 (2020). https://doi.org/10.1186/s13635-020-00113-y
Panagiotis, I., Radoglou, G.: Securing the Internet of Things: challenges, threats and solutions . Internet Things J. (2019). https://doi.org/10.1016/j.iot.2018.11.003
Nyrkov, A., Shnurenko, A., Sokolov, S., Chernyi, S., Korotkov, V.: Some methods of increasing the efficiency of river transport system. Procedia Eng. 178, 543–550 (2017). https://doi.org/10.1016/j.proeng.2017.01.106
Sokolov, S.S., Alimov, O.M., Golubeva, M.G., Burlov, V.G., Vikhrov, N.M.: The automating process of information security management. In: 2018 IEEE Conference of Russian Young Researchers in Electrical and Electronic Engineering (EIConRus), Moscow, Russia (2018). https://doi.org/10.1109/EIConRus.2018.8317045
Tian, J., Wang, Z., Li, Z.: Low-cost data partitioning and encrypted backup scheme for defending against co-resident attacks. EURASIP J. Inf. Secur. 2020, 7 (2020). https://doi.org/10.1186/s13635-020-00110-1
Barrowclough, J.P., Asif, R.: Securing cloud hypervisors: a survey of the threats, vulnerabilities, and countermeasures. Secur. Commun. Netw. 20 (2018). https://doi.org/10.1155/2018/1681908
Boriev, Z.V., Sokolov, S.S., Nyrkov, A.P.: Review of modern biometric user authentication and their development prospects. IOP Conf. Ser. Mater. Sci. Eng. 91(1), 012063 (2015). https://doi.org/10.1088/1757-899X/91/1/012063
Gehrmann, C., Rodan, M., Jönsson, N.: Metadata filtering for user-friendly centralized biometric authentication. EURASIP J. Inf. Secur. 2019, 7 (2019). https://doi.org/10.1186/s13635-019-0093-3
Sokolov, S., Zhilenkov, A., Chernyi, S., Nyrkov, A., Glebov, N.: Hybrid neural networks in cyper physical system interface control system. Bull. Electr. Eng. Inform. 9(3), 1268–1275 (2020). https://doi.org/10.11591/eei.v9i3.1293
Jang, Y., Choi, J.: Detecting SQL injection attacks using query result size. Comput. Secur. 1–15 (2014). https://doi.org/10.1016/j.cose.2014.04.007
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2021 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Sokolov, S., Nyrkov, A., Knysh, T., Shvets, A. (2021). Countering Cyberattacks During Information Operations. In: Mottaeva, A. (eds) Proceedings of the XIII International Scientific Conference on Architecture and Construction 2020. ISCAC 2020. Lecture Notes in Civil Engineering, vol 130. Springer, Singapore. https://doi.org/10.1007/978-981-33-6208-6_9
Download citation
DOI: https://doi.org/10.1007/978-981-33-6208-6_9
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-33-6207-9
Online ISBN: 978-981-33-6208-6
eBook Packages: EngineeringEngineering (R0)