Abstract
Cyberspace is an integration of cyber physical system components that integrates computation, networking, physical processes, embedded computers and network monitors which uses feedback loops for controlling the processes where the computations are affected by processes and vice versa. More general, cyber physical systems include all equipments operated on preprogrammed instructions ranging from simple electronic devices to the ultra-modern warfare equipments along with life saving devices. Active cyber-attacks can cause cyber warfare situations by disrupting an entire community of people, which in turn raises an emergency situation to the nation. Thus, cyber warfare is a major threat to the nation at large. In this paper, we analyze the various aspects of cyber warfare situations and a survey on ongoing attacks, defense and cyber forensics strategies in that field. Internet of Things (IoT) is an emerging computing area which enables Machine to Machine communication in cyber physical systems. An attack on IoT causes major issues to the security on the devices and thus, the various threats and attacks on IoT are analyzed here. Overall monitoring and data acquisition in cyber physical systems is done by Supervisory Control and Data Acquisition systems and are mainly targeted by the attackers in order to leave the cyberspace applications not functioning. Therefore, the various threats, attacks and research issues pertaining to the cyberspace are surveyed in this paper along with a few research issues and challenges that are to be solved in the area of cyber warfare.
Similar content being viewed by others
References
Cyberspace. https://en.wikipedia.org/wiki/Cyberspace. Accessed March 1, 2016.
Tzipora, H., Haoyu, L., Di, M., Nitesh, S., Jonathan, V., & Tuo, X. (2014). Context-aware defenses to RFID unauthorized reading and relay attacks. IEEE Transactions on Emerging Topics in Computing, 1(2), 307–318.
Jan, Z., Oscar, M., & Klaus, W. (2014). Privacy in the internet of things: Threats and challenges. Security and Communication Networks, 7(12), 2728–2742.
Goodman, D. (1997). Why the Police don’t care about computer crime. Law & Techology, 10(3), 465–494.
Aditya, S., & Richard, E. (2013). Targeted cyberattacks: A superset of advanced persistent threats. Computer and Reliability Societies, 11(1), 54–61.
Aditya, S., Rohit, B., & Richard, E. (2013). Cybercrime: Dissecting the state of underground enterprise. IEEE Internet Computing, 17(1), 60–68.
Ross, B., & Log, R. (2015). Cyber threats reducing the time to detect and respond. Network Security, 5(5), 5–8.
Andrew, N., Stuart, W., Shaun, D., Tanuja, P., & Helge, J. (2012). SCADA security in the light of cyber-warfare. Computers & Security, 31(4), 418–436.
Juels, A. (2006). RFID security and privacy: A research survey. IEEE Journal on Selected Areas in Communications, 24(12), 381–394.
Daniele, G., Velio, M., Giovanni, M., & Aurelio, C. (2003). Is it feasible to reconstruct body segment 3D position and orientation using accelerometric data? IEEE Transactions on Biomedical Engineering, 50(4), 476–483.
John, F., & Andres, F. (2005). SCADA systems: vulnerabilities and remediation. Journal of Computing Sciences in Colleges, 20(4), 160–168.
Anita, A., Kirsten, W., Daniel, T., Brianne, B., & Emilie, R. (2005). Achieving cyber defense situation awareness: A cognitive task analysis of information assurance analysts. Proceedings of the human factors and ergonomics society annual meeting, 49(3), 229–233.
Pin-Yu, C., & Kwang-Cheng, C. (2012). Smart attacks in smart grid communication networks. IEEE Communications Magazine, 50(8), 24–29.
Pin-Yu, C., Shin-Ming, C., & Kwang-Cheng, C. (2014). Information fusion to defend intentional attack in internet of things. IEEE Internet of Things, 1(4), 337–348.
Réka, A., Hawoong, J., & Albert-Lazlo, B. (2000). Error and attack tolerance of complex networks. Letters to Nature, 406(6794), 378–382.
Adel, E., & Michael, L. (2014). Cyber security challenges in smart cities: safety, security and privacy. Journal of Advanced Research, 5(4), 491–497.
Shui, Y., Song, G., & Ivan, S. (2015). Fool me if you can: Mimicking attacks and anti-attacks in cyberspace. IEEE Transactions on Computers, 64(1), 139–151.
Rogers, K. (2006). A two-dimensional circumplex approach to the development of a hacker taxonomy. Digital Investigation, 3(2), 97–102.
Ahmed, P., Mona, T., Kaveh, B., & Joaquim, C. J. (2013). An intrusion detection and prevention system in cloud computing: A systematic review. Journal of Network and Computer Applications, 36(1), 25–41.
Miao, H., & Junshan, Z. (2011). A dependency graph approach for fault detection and localization towards secure smart grid. IEEE Transactions on Smart Grid, 2(2), 342–351.
Glenn, A. F., Jereme, N. H., David, M. A., & Errin, W. F. (2014). Defense on the move: Ant-based cyber defense. IEEE Computer and Reliability Societies, 12(2), 36–43.
Sicari, S., Grieco, L. A., Boggia, G., & Coen-Porisini, A. (2012). DyDAP: A dynamic data aggregation scheme for privacy aware wireless sensor networks. Journal of Systems and Software, 85(1), 152–166.
Oliver, K., Liyan, J., Robert, J., & Lang, T. (2011). Malicious data attacks on the smart grid. IEEE Transactions on Smart Grid, 2(4), 645–658.
Klaus, J. (2013). Understanding and overcoming cyber security anti-patterns. Computer Networks, 57(10), 2206–2211.
Amir, H., & Haya, S. (2012). Security of patched DNS. Computer Security—ESORICS 2012. https://doi.org/10.1007/978-3-642-33167-1. Accessed March 1, 2016.
Stamatis, K. (2011). Stuxnet worm impact on industrial cyber-physical system security. IECON 2011—37th Annual Conference on IEEE Industrial Electronics Society. https://doi.org/10.1109/iecon.2011.6120048.
Noam, B., & Cleotilde, G. (2015). Effects of cyber security knowledge on attack detection. Computers in Human Behavior. https://doi.org/10.1016/j.chb.2015.01.039.
Claudio, B., & Daniele, R. (2015). Privacy protection in pervasive systems: State of the art and technical challenges. Pervasive and Mobile Computing. https://doi.org/10.1016/j.pmcj.2014.09.010.
Sabrina, S., Cinzia, C., Francesco, P., Daniele, M., & Alberto, C. (2014). A security-and quality-aware system architecture for internet of things. Information Systems Frontiers. https://doi.org/10.1007/s10796-014-9538-x.
Buyens, K., De, W. B., & Joosen, W. (2007). Empirical and statistical analysis of risk analysis- driven techniques for threat management. IEEE Computer Society, the First International Workshop on Secure Software Engineering. https://doi.org/10.1109/ARES.2007.78.
Ryan, S. (2015). A typology of hackers: Classifying cyber malfeasance using a weighted arc circumplex model. Digital Investigation. https://doi.org/10.1016/j.diin.2015.07.002.
Wenying, F., Qinglei, Z., Gongzhu, H., & Jimmy, H. X. (2014). Mining network data for intrusion detection through combining SVMs with ant colony networks. Future Generation Computer Systems. https://doi.org/10.1016/j.future.2013.06.027.
Wenke, L., Stolfo, S. J., & Mok, K. W. (1999). A data mining framework for building intrusion detection models. Proceedings of IEEE Symposium on Security and Privacy. https://doi.org/10.1109/SECPRI.1999.766909.
Sergio, P., Juan, E. T., Agustin, O., & Pedro, P. L. (2015). DEFIDNET: A framework for optimal allocation of cyber defenses in intrusion detection networks. Computer Networks. https://doi.org/10.1016/j.comnet.2015.01.012.
Abraham, A., & Ramos, V. (2003). Web usage mining using artificial ant colony clustering and linear genetic programming. Evolutionary Computation. CEC ‘03. https://doi.org/10.1109/cec.2003.1299832.
Alanson, S., Daniel, Y., Pauline, P., & Joshua, S. (2007). Design of a passively powered, programmable sensing platform for UHF RFID systems. RFID 2007. IEEE international conference. https://doi.org/10.1109/rfid.2007.346163.
Angelyn, F., & Sherali, Z. (2014). Cyber war: The what, when, why, and how. IEEE Technology and Society Magazine. https://doi.org/10.1109/MTS.2014.2345196.
https://ics.sans.org/media/EISAC_SANS_Ukraine_DUC_5.pdf. Accessed March 1, 2016.
Amir, H., & Haya, S. (2013). Vulnerable delegation of DNS resolution. European Symposium on Research in Computer Security (ESORICS). https://doi.org/10.1007/978-3-642-40203-6-13.
Haya, S., & Michael, W. (2014). DNSSEC for cyber forensics. EURASIP Journal on Information Security. https://doi.org/10.1186/s13635-014-0016-2.
Bojan, M. (1991). The Laplacian spectrum of graphs. In Y. Alavi, G. Chartrand, O. Ollermann, & A. Schwenk (Eds.), Graph theory, combinatorics, and applications (pp. 871–898). Hoboken: Wiley.
Saar, D., & Steven, M. (2007). Keep your enemies close: Distance bounding against smartcard relay attacks, 16th USENIX Security Symposium. Resource Document. Security Symposium. http://static.usenix.org/events/sec07/tech/drimer/drimer_html. Accessed March 1, 2016.
http://csrc.nist.gov/groups/SMA/fisma/ics/documents/Maroochy-Water-Services-Case-Study_report.pdf. Accessed March 1, 2016.
Katherine, A. (2003). No RFID tracking chips in clothing! Press Release. Boycott Benetton. http://www.boycottbenetton.com/PR_030407.html. Accessed March 1, 2016.
Cuijpers, C., & Bert-Jaap, K. (2012). Smart metering and privacy in Europe: lessons from the Dutch case. Tilburg Institute for Law, Technology, and Society (TILT), Tilburg University, The Netherlands. Resource Document. Tilburg University. https://pure.uvt.nl/ws/files/1477311/CPDP_final_Cuijper_Koops_springer_1_.pdf. Accessed March 1, 2016.
Antoine, S., Nicolas, L., Philippe, O., Pierre, B., & Patrice, A. (2007). Non-gaussian and long memory statistical characterizations for internet traffic with anomalies. IEEE Transactions on Dependable and Secure Computing, 4(1), 56–70.
Zhenxin, Z., Maochao, X., & Shouhuai, X. (2013). Characterizing honeypot-captured cyberattacks: Statistical framework and case Study. IEEE Transactions on Information Forensics and Security, 8(11), 1775–1789.
Chenfeng, V. Z., Christopher, L., & Shanika, K. (2010). A survey of coordinated attacks and collaborative intrusion detection. Computers & Security, 29(1), 124–140.
Michael, R., Kevin, J., & Helge, J. (2015). Cyber warfare: issues and challenges. Computers & Security. https://doi.org/10.1016/j.cose.2014.11.007.
El-Atawy, A., Al-Shaer, E., Tran, T., & Boutaba, R. (2009). Adaptive early packet filtering for protecting firewalls against DOS attacks. INFOCOM 2009, IEEE. https://doi.org/10.1109/infcom.2009.5062171.
Kfir, Z., & Wool, A. (2005). Picking virtual pockets using relay attacks on contactless smartcard. Security and Privacy for Emerging Areas in Communications Networks. https://doi.org/10.1109/SECURECOMM.2005.32.
Alexei, C., Karl, K., Joshua, R., & Tadayoshi, K. (2008). RFIDs and secret handshakes: Defending against ghost-and-leech attacks and unauthorized reads with context-aware communications. In Proceedings of the 15th ACM conference on computer and communications security. https://doi.org/10.1145/1455770.1455831.
Kristin, H., Frank, S., Ben, S., & Roshan, T. (2015). Denial and deception in cyber defense. IEEE computer society, 48(4), 36–44.
Parunak, H. V. D., Paul, N., Sven, B., & Rafael, A. (2007). Hybrid multi-agent systems: Integrating swarming and BDI agents. Engineering Self-Organizing Systems. https://doi.org/10.1007/978-3-540-69868-5-1.
Andre, T., Saurabh, A., Henrik, S., Karl, H. J., & Shankar, S. S. (2010). Cyber-security analysis of state estimators in electric power systems. 49th IEEE conference on decision and control (CDC). https://doi.org/10.1109/cdc.2010.5717318.
Adams, C., & Lloyd, S. (2003). Understanding PKI: Concepts, standards, and deployment considerations (pp. 11–15). Boston: Addison-Wesley Professional.
Sushil, J., Peng, L.P., Vipin, S., & Cliff, W. (2010). Cyber situational awareness: Issues and research. Advances in information security. https://doi.org/10.1007/978-1-4419-0140-8. Accessed March 1, 2016.
Peter, W., & Jeanne, R. (2004). IT governance: How top performers manage IT decision rights for superior results. Boston: Harvard Business Press.
Bob. (2003). Benetton to Tag 15 Million Items. RFID Journal. Resource Document. http://www.rfidjournal.com/articles/view?344. Accessed March 1, 2016.
Antonatos, S., Akritidis, P., Markatos, E. P., & Anagnostakis, K. G. (2007). Defending against hitlist worms using network address space randomization. Computer Networks, 51(12), 3471–3490.
Mario, G., & Björn, S. (2011). Requirements for a future EWS cyber defence in internet of the future. Cyber conflict (ICCC) 3rd international conference. Resource Document. ICCC International Conference. https://ccdcoe.org/sites/default/files/multimedia/pdf/RequirementsForAFutureEWSCyberDefenceInTheInternetOfTheFuture-Golling-Stelte.pdf. Accessed March 1, 2016.
Abdoul, K. G., Julien, B., Renaud, B., & Francois, S. (2008). A global security architecture for intrusion detection on computer networks. Computers & Security, 27(1–2), 30–47.
Wenjia, L., James, P., & Anupam, J. (2012). Security through collaboration and trust in MANETs. Mobile Networks and Applications, 17(3), 342–352.
Peter, W., & Jeanne, R. (2005). A matrixed approach to designing IT governance. MIT Sloan Management Review, 46(2), 26–34.
Yoan, C., Aurelie, B., Christophe, N., & M-Tahar, K. (2014). A complete formalized knowledge representation model for advanced digital forensics timeline analysis. Digital Investigation, 11(2), S95–S105.
Chikuni, E., & Dondo, M. (2007). Investigating the security of electrical power systems. SCADA. https://doi.org/10.1109/AFRCON.2007.4401531.
Marcus, R. (2010). The psyche of cybercriminals: A psycho-social perspective. Cybercrimes: A Multidisciplinary Analysis. https://doi.org/10.1007/978-3-642-13547-7_14.
Joshua, S., Alanson, S., Pauline, P., Sumit, R., & Alexander, M. (2006). A wirelessly powered platform for sensing and computation. 8th International conference UbiComp. https://doi.org/10.1007/11853565-29.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Shaji, R.S., Sachin Dev, V. & Brindha, T. A methodological review on attack and defense strategies in cyber warfare. Wireless Netw 25, 3323–3334 (2019). https://doi.org/10.1007/s11276-018-1724-1
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11276-018-1724-1