A methodological review on attack and defense strategies in cyber warfare

  • Ramaswamy Swarnammal Shaji
  • V. Sachin Dev
  • Thomas Brindha
Article
  • 99 Downloads

Abstract

Cyberspace is an integration of cyber physical system components that integrates computation, networking, physical processes, embedded computers and network monitors which uses feedback loops for controlling the processes where the computations are affected by processes and vice versa. More general, cyber physical systems include all equipments operated on preprogrammed instructions ranging from simple electronic devices to the ultra-modern warfare equipments along with life saving devices. Active cyber-attacks can cause cyber warfare situations by disrupting an entire community of people, which in turn raises an emergency situation to the nation. Thus, cyber warfare is a major threat to the nation at large. In this paper, we analyze the various aspects of cyber warfare situations and a survey on ongoing attacks, defense and cyber forensics strategies in that field. Internet of Things (IoT) is an emerging computing area which enables Machine to Machine communication in cyber physical systems. An attack on IoT causes major issues to the security on the devices and thus, the various threats and attacks on IoT are analyzed here. Overall monitoring and data acquisition in cyber physical systems is done by Supervisory Control and Data Acquisition systems and are mainly targeted by the attackers in order to leave the cyberspace applications not functioning. Therefore, the various threats, attacks and research issues pertaining to the cyberspace are surveyed in this paper along with a few research issues and challenges that are to be solved in the area of cyber warfare.

Keywords

Cyberspace Cyber attack Cyber threat Cyber warfare Cyber defense Cyber forensics 

References

  1. 1.
    Cyberspace. https://en.wikipedia.org/wiki/Cyberspace. Accessed March 1, 2016.
  2. 2.
    Tzipora, H., Haoyu, L., Di, M., Nitesh, S., Jonathan, V., & Tuo, X. (2014). Context-aware defenses to RFID unauthorized reading and relay attacks. IEEE Transactions on Emerging Topics in Computing, 1(2), 307–318.Google Scholar
  3. 3.
    Jan, Z., Oscar, M., & Klaus, W. (2014). Privacy in the internet of things: Threats and challenges. Security and Communication Networks, 7(12), 2728–2742.CrossRefGoogle Scholar
  4. 4.
    Goodman, D. (1997). Why the Police don’t care about computer crime. Law & Techology, 10(3), 465–494.Google Scholar
  5. 5.
    Aditya, S., & Richard, E. (2013). Targeted cyberattacks: A superset of advanced persistent threats. Computer and Reliability Societies, 11(1), 54–61.Google Scholar
  6. 6.
    Aditya, S., Rohit, B., & Richard, E. (2013). Cybercrime: Dissecting the state of underground enterprise. IEEE Internet Computing, 17(1), 60–68.CrossRefGoogle Scholar
  7. 7.
    Ross, B., & Log, R. (2015). Cyber threats reducing the time to detect and respond. Network Security, 5(5), 5–8.Google Scholar
  8. 8.
    Andrew, N., Stuart, W., Shaun, D., Tanuja, P., & Helge, J. (2012). SCADA security in the light of cyber-warfare. Computers & Security, 31(4), 418–436.CrossRefGoogle Scholar
  9. 9.
    Juels, A. (2006). RFID security and privacy: A research survey. IEEE Journal on Selected Areas in Communications, 24(12), 381–394.CrossRefGoogle Scholar
  10. 10.
    Daniele, G., Velio, M., Giovanni, M., & Aurelio, C. (2003). Is it feasible to reconstruct body segment 3D position and orientation using accelerometric data? IEEE Transactions on Biomedical Engineering, 50(4), 476–483.CrossRefGoogle Scholar
  11. 11.
    John, F., & Andres, F. (2005). SCADA systems: vulnerabilities and remediation. Journal of Computing Sciences in Colleges, 20(4), 160–168.Google Scholar
  12. 12.
    Anita, A., Kirsten, W., Daniel, T., Brianne, B., & Emilie, R. (2005). Achieving cyber defense situation awareness: A cognitive task analysis of information assurance analysts. Proceedings of the human factors and ergonomics society annual meeting, 49(3), 229–233.CrossRefGoogle Scholar
  13. 13.
    Pin-Yu, C., & Kwang-Cheng, C. (2012). Smart attacks in smart grid communication networks. IEEE Communications Magazine, 50(8), 24–29.CrossRefGoogle Scholar
  14. 14.
    Pin-Yu, C., Shin-Ming, C., & Kwang-Cheng, C. (2014). Information fusion to defend intentional attack in internet of things. IEEE Internet of Things, 1(4), 337–348.CrossRefGoogle Scholar
  15. 15.
    Réka, A., Hawoong, J., & Albert-Lazlo, B. (2000). Error and attack tolerance of complex networks. Letters to Nature, 406(6794), 378–382.CrossRefGoogle Scholar
  16. 16.
    Adel, E., & Michael, L. (2014). Cyber security challenges in smart cities: safety, security and privacy. Journal of Advanced Research, 5(4), 491–497.CrossRefGoogle Scholar
  17. 17.
    Shui, Y., Song, G., & Ivan, S. (2015). Fool me if you can: Mimicking attacks and anti-attacks in cyberspace. IEEE Transactions on Computers, 64(1), 139–151.MathSciNetMATHCrossRefGoogle Scholar
  18. 18.
    Rogers, K. (2006). A two-dimensional circumplex approach to the development of a hacker taxonomy. Digital Investigation, 3(2), 97–102.CrossRefGoogle Scholar
  19. 19.
    Ahmed, P., Mona, T., Kaveh, B., & Joaquim, C. J. (2013). An intrusion detection and prevention system in cloud computing: A systematic review. Journal of Network and Computer Applications, 36(1), 25–41.CrossRefGoogle Scholar
  20. 20.
    Miao, H., & Junshan, Z. (2011). A dependency graph approach for fault detection and localization towards secure smart grid. IEEE Transactions on Smart Grid, 2(2), 342–351.CrossRefGoogle Scholar
  21. 21.
    Glenn, A. F., Jereme, N. H., David, M. A., & Errin, W. F. (2014). Defense on the move: Ant-based cyber defense. IEEE Computer and Reliability Societies, 12(2), 36–43.Google Scholar
  22. 22.
    Sicari, S., Grieco, L. A., Boggia, G., & Coen-Porisini, A. (2012). DyDAP: A dynamic data aggregation scheme for privacy aware wireless sensor networks. Journal of Systems and Software, 85(1), 152–166.CrossRefGoogle Scholar
  23. 23.
    Oliver, K., Liyan, J., Robert, J., & Lang, T. (2011). Malicious data attacks on the smart grid. IEEE Transactions on Smart Grid, 2(4), 645–658.CrossRefGoogle Scholar
  24. 24.
    Klaus, J. (2013). Understanding and overcoming cyber security anti-patterns. Computer Networks, 57(10), 2206–2211.CrossRefGoogle Scholar
  25. 25.
    Amir, H., & Haya, S. (2012). Security of patched DNS. Computer Security—ESORICS 2012.  https://doi.org/10.1007/978-3-642-33167-1. Accessed March 1, 2016.
  26. 26.
    Stamatis, K. (2011). Stuxnet worm impact on industrial cyber-physical system security. IECON 2011—37th Annual Conference on IEEE Industrial Electronics Society.  https://doi.org/10.1109/iecon.2011.6120048.
  27. 27.
    Noam, B., & Cleotilde, G. (2015). Effects of cyber security knowledge on attack detection. Computers in Human Behavior.  https://doi.org/10.1016/j.chb.2015.01.039.Google Scholar
  28. 28.
    Claudio, B., & Daniele, R. (2015). Privacy protection in pervasive systems: State of the art and technical challenges. Pervasive and Mobile Computing.  https://doi.org/10.1016/j.pmcj.2014.09.010.Google Scholar
  29. 29.
    Sabrina, S., Cinzia, C., Francesco, P., Daniele, M., & Alberto, C. (2014). A security-and quality-aware system architecture for internet of things. Information Systems Frontiers.  https://doi.org/10.1007/s10796-014-9538-x.Google Scholar
  30. 30.
    Buyens, K., De, W. B., & Joosen, W. (2007). Empirical and statistical analysis of risk analysis- driven techniques for threat management. IEEE Computer Society, the First International Workshop on Secure Software Engineering.  https://doi.org/10.1109/ARES.2007.78.Google Scholar
  31. 31.
    Ryan, S. (2015). A typology of hackers: Classifying cyber malfeasance using a weighted arc circumplex model. Digital Investigation.  https://doi.org/10.1016/j.diin.2015.07.002.Google Scholar
  32. 32.
    Wenying, F., Qinglei, Z., Gongzhu, H., & Jimmy, H. X. (2014). Mining network data for intrusion detection through combining SVMs with ant colony networks. Future Generation Computer Systems.  https://doi.org/10.1016/j.future.2013.06.027.Google Scholar
  33. 33.
    Wenke, L., Stolfo, S. J., & Mok, K. W. (1999). A data mining framework for building intrusion detection models. Proceedings of IEEE Symposium on Security and Privacy.  https://doi.org/10.1109/SECPRI.1999.766909.MATHGoogle Scholar
  34. 34.
    Sergio, P., Juan, E. T., Agustin, O., & Pedro, P. L. (2015). DEFIDNET: A framework for optimal allocation of cyber defenses in intrusion detection networks. Computer Networks.  https://doi.org/10.1016/j.comnet.2015.01.012.Google Scholar
  35. 35.
    Abraham, A., & Ramos, V. (2003). Web usage mining using artificial ant colony clustering and linear genetic programming. Evolutionary Computation. CEC ‘03.  https://doi.org/10.1109/cec.2003.1299832.
  36. 36.
    Alanson, S., Daniel, Y., Pauline, P., & Joshua, S. (2007). Design of a passively powered, programmable sensing platform for UHF RFID systems. RFID 2007. IEEE international conference.  https://doi.org/10.1109/rfid.2007.346163.
  37. 37.
    Angelyn, F., & Sherali, Z. (2014). Cyber war: The what, when, why, and how. IEEE Technology and Society Magazine.  https://doi.org/10.1109/MTS.2014.2345196.Google Scholar
  38. 38.
  39. 39.
    Amir, H., & Haya, S. (2013). Vulnerable delegation of DNS resolution. European Symposium on Research in Computer Security (ESORICS).  https://doi.org/10.1007/978-3-642-40203-6-13.
  40. 40.
    Haya, S., & Michael, W. (2014). DNSSEC for cyber forensics. EURASIP Journal on Information Security.  https://doi.org/10.1186/s13635-014-0016-2.Google Scholar
  41. 41.
    Bojan, M. (1991). The Laplacian spectrum of graphs. In Y. Alavi, G. Chartrand, O. Ollermann, & A. Schwenk (Eds.), Graph theory, combinatorics, and applications (pp. 871–898). Hoboken: Wiley.Google Scholar
  42. 42.
    Saar, D., & Steven, M. (2007). Keep your enemies close: Distance bounding against smartcard relay attacks, 16th USENIX Security Symposium. Resource Document. Security Symposium. http://static.usenix.org/events/sec07/tech/drimer/drimer_html. Accessed March 1, 2016.
  43. 43.
  44. 44.
    Katherine, A. (2003). No RFID tracking chips in clothing! Press Release. Boycott Benetton. http://www.boycottbenetton.com/PR_030407.html. Accessed March 1, 2016.
  45. 45.
    Cuijpers, C., & Bert-Jaap, K. (2012). Smart metering and privacy in Europe: lessons from the Dutch case. Tilburg Institute for Law, Technology, and Society (TILT), Tilburg University, The Netherlands. Resource Document. Tilburg University. https://pure.uvt.nl/ws/files/1477311/CPDP_final_Cuijper_Koops_springer_1_.pdf. Accessed March 1, 2016.
  46. 46.
    Antoine, S., Nicolas, L., Philippe, O., Pierre, B., & Patrice, A. (2007). Non-gaussian and long memory statistical characterizations for internet traffic with anomalies. IEEE Transactions on Dependable and Secure Computing, 4(1), 56–70.CrossRefGoogle Scholar
  47. 47.
    Zhenxin, Z., Maochao, X., & Shouhuai, X. (2013). Characterizing honeypot-captured cyberattacks: Statistical framework and case Study. IEEE Transactions on Information Forensics and Security, 8(11), 1775–1789.CrossRefGoogle Scholar
  48. 48.
    Chenfeng, V. Z., Christopher, L., & Shanika, K. (2010). A survey of coordinated attacks and collaborative intrusion detection. Computers & Security, 29(1), 124–140.CrossRefGoogle Scholar
  49. 49.
    Michael, R., Kevin, J., & Helge, J. (2015). Cyber warfare: issues and challenges. Computers & Security.  https://doi.org/10.1016/j.cose.2014.11.007.Google Scholar
  50. 50.
    El-Atawy, A., Al-Shaer, E., Tran, T., & Boutaba, R. (2009). Adaptive early packet filtering for protecting firewalls against DOS attacks. INFOCOM 2009, IEEE.  https://doi.org/10.1109/infcom.2009.5062171.
  51. 51.
    Kfir, Z., & Wool, A. (2005). Picking virtual pockets using relay attacks on contactless smartcard. Security and Privacy for Emerging Areas in Communications Networks.  https://doi.org/10.1109/SECURECOMM.2005.32.Google Scholar
  52. 52.
    Alexei, C., Karl, K., Joshua, R., & Tadayoshi, K. (2008). RFIDs and secret handshakes: Defending against ghost-and-leech attacks and unauthorized reads with context-aware communications. In Proceedings of the 15th ACM conference on computer and communications security.  https://doi.org/10.1145/1455770.1455831.
  53. 53.
    Kristin, H., Frank, S., Ben, S., & Roshan, T. (2015). Denial and deception in cyber defense. IEEE computer society, 48(4), 36–44.CrossRefGoogle Scholar
  54. 54.
    Parunak, H. V. D., Paul, N., Sven, B., & Rafael, A. (2007). Hybrid multi-agent systems: Integrating swarming and BDI agents. Engineering Self-Organizing Systems.  https://doi.org/10.1007/978-3-540-69868-5-1.Google Scholar
  55. 55.
    Andre, T., Saurabh, A., Henrik, S., Karl, H. J., & Shankar, S. S. (2010). Cyber-security analysis of state estimators in electric power systems. 49th IEEE conference on decision and control (CDC).  https://doi.org/10.1109/cdc.2010.5717318.
  56. 56.
    Adams, C., & Lloyd, S. (2003). Understanding PKI: Concepts, standards, and deployment considerations (pp. 11–15). Boston: Addison-Wesley Professional.Google Scholar
  57. 57.
    Sushil, J., Peng, L.P., Vipin, S., & Cliff, W. (2010). Cyber situational awareness: Issues and research. Advances in information security.  https://doi.org/10.1007/978-1-4419-0140-8. Accessed March 1, 2016.MATHGoogle Scholar
  58. 58.
    Peter, W., & Jeanne, R. (2004). IT governance: How top performers manage IT decision rights for superior results. Boston: Harvard Business Press.Google Scholar
  59. 59.
    Bob. (2003). Benetton to Tag 15 Million Items. RFID Journal. Resource Document. http://www.rfidjournal.com/articles/view?344. Accessed March 1, 2016.
  60. 60.
    Antonatos, S., Akritidis, P., Markatos, E. P., & Anagnostakis, K. G. (2007). Defending against hitlist worms using network address space randomization. Computer Networks, 51(12), 3471–3490.MATHCrossRefGoogle Scholar
  61. 61.
    Mario, G., & Björn, S. (2011). Requirements for a future EWS cyber defence in internet of the future. Cyber conflict (ICCC) 3rd international conference. Resource Document. ICCC International Conference. https://ccdcoe.org/sites/default/files/multimedia/pdf/RequirementsForAFutureEWSCyberDefenceInTheInternetOfTheFuture-Golling-Stelte.pdf. Accessed March 1, 2016.Google Scholar
  62. 62.
    Abdoul, K. G., Julien, B., Renaud, B., & Francois, S. (2008). A global security architecture for intrusion detection on computer networks. Computers & Security, 27(1–2), 30–47.Google Scholar
  63. 63.
    Wenjia, L., James, P., & Anupam, J. (2012). Security through collaboration and trust in MANETs. Mobile Networks and Applications, 17(3), 342–352.MATHCrossRefGoogle Scholar
  64. 64.
    Peter, W., & Jeanne, R. (2005). A matrixed approach to designing IT governance. MIT Sloan Management Review, 46(2), 26–34.Google Scholar
  65. 65.
    Yoan, C., Aurelie, B., Christophe, N., & M-Tahar, K. (2014). A complete formalized knowledge representation model for advanced digital forensics timeline analysis. Digital Investigation, 11(2), S95–S105.Google Scholar
  66. 66.
    Chikuni, E., & Dondo, M. (2007). Investigating the security of electrical power systems. SCADA.  https://doi.org/10.1109/AFRCON.2007.4401531.Google Scholar
  67. 67.
    Marcus, R. (2010). The psyche of cybercriminals: A psycho-social perspective. Cybercrimes: A Multidisciplinary Analysis.  https://doi.org/10.1007/978-3-642-13547-7_14.Google Scholar
  68. 68.
    Joshua, S., Alanson, S., Pauline, P., Sumit, R., & Alexander, M. (2006). A wirelessly powered platform for sensing and computation. 8th International conference UbiComp.  https://doi.org/10.1007/11853565-29.

Copyright information

© Springer Science+Business Media, LLC, part of Springer Nature 2018

Authors and Affiliations

  • Ramaswamy Swarnammal Shaji
    • 1
  • V. Sachin Dev
    • 2
  • Thomas Brindha
    • 2
  1. 1.Department of Computer Science and EngineeringSt. Xavier’s Catholic College of EngineeringNagercoilIndia
  2. 2.Department of Information TechnologyNoorul Islam Centre for Higher EducationThuckalayIndia

Personalised recommendations