Skip to main content
Log in

A methodological review on attack and defense strategies in cyber warfare

  • Published:
Wireless Networks Aims and scope Submit manuscript

Abstract

Cyberspace is an integration of cyber physical system components that integrates computation, networking, physical processes, embedded computers and network monitors which uses feedback loops for controlling the processes where the computations are affected by processes and vice versa. More general, cyber physical systems include all equipments operated on preprogrammed instructions ranging from simple electronic devices to the ultra-modern warfare equipments along with life saving devices. Active cyber-attacks can cause cyber warfare situations by disrupting an entire community of people, which in turn raises an emergency situation to the nation. Thus, cyber warfare is a major threat to the nation at large. In this paper, we analyze the various aspects of cyber warfare situations and a survey on ongoing attacks, defense and cyber forensics strategies in that field. Internet of Things (IoT) is an emerging computing area which enables Machine to Machine communication in cyber physical systems. An attack on IoT causes major issues to the security on the devices and thus, the various threats and attacks on IoT are analyzed here. Overall monitoring and data acquisition in cyber physical systems is done by Supervisory Control and Data Acquisition systems and are mainly targeted by the attackers in order to leave the cyberspace applications not functioning. Therefore, the various threats, attacks and research issues pertaining to the cyberspace are surveyed in this paper along with a few research issues and challenges that are to be solved in the area of cyber warfare.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Fig. 1
Fig. 2
Fig. 3

Similar content being viewed by others

References

  1. Cyberspace. https://en.wikipedia.org/wiki/Cyberspace. Accessed March 1, 2016.

  2. Tzipora, H., Haoyu, L., Di, M., Nitesh, S., Jonathan, V., & Tuo, X. (2014). Context-aware defenses to RFID unauthorized reading and relay attacks. IEEE Transactions on Emerging Topics in Computing, 1(2), 307–318.

    Google Scholar 

  3. Jan, Z., Oscar, M., & Klaus, W. (2014). Privacy in the internet of things: Threats and challenges. Security and Communication Networks, 7(12), 2728–2742.

    Article  Google Scholar 

  4. Goodman, D. (1997). Why the Police don’t care about computer crime. Law & Techology, 10(3), 465–494.

    Google Scholar 

  5. Aditya, S., & Richard, E. (2013). Targeted cyberattacks: A superset of advanced persistent threats. Computer and Reliability Societies, 11(1), 54–61.

    Google Scholar 

  6. Aditya, S., Rohit, B., & Richard, E. (2013). Cybercrime: Dissecting the state of underground enterprise. IEEE Internet Computing, 17(1), 60–68.

    Article  Google Scholar 

  7. Ross, B., & Log, R. (2015). Cyber threats reducing the time to detect and respond. Network Security, 5(5), 5–8.

    Google Scholar 

  8. Andrew, N., Stuart, W., Shaun, D., Tanuja, P., & Helge, J. (2012). SCADA security in the light of cyber-warfare. Computers & Security, 31(4), 418–436.

    Article  Google Scholar 

  9. Juels, A. (2006). RFID security and privacy: A research survey. IEEE Journal on Selected Areas in Communications, 24(12), 381–394.

    Article  Google Scholar 

  10. Daniele, G., Velio, M., Giovanni, M., & Aurelio, C. (2003). Is it feasible to reconstruct body segment 3D position and orientation using accelerometric data? IEEE Transactions on Biomedical Engineering, 50(4), 476–483.

    Article  Google Scholar 

  11. John, F., & Andres, F. (2005). SCADA systems: vulnerabilities and remediation. Journal of Computing Sciences in Colleges, 20(4), 160–168.

    Google Scholar 

  12. Anita, A., Kirsten, W., Daniel, T., Brianne, B., & Emilie, R. (2005). Achieving cyber defense situation awareness: A cognitive task analysis of information assurance analysts. Proceedings of the human factors and ergonomics society annual meeting, 49(3), 229–233.

    Article  Google Scholar 

  13. Pin-Yu, C., & Kwang-Cheng, C. (2012). Smart attacks in smart grid communication networks. IEEE Communications Magazine, 50(8), 24–29.

    Article  Google Scholar 

  14. Pin-Yu, C., Shin-Ming, C., & Kwang-Cheng, C. (2014). Information fusion to defend intentional attack in internet of things. IEEE Internet of Things, 1(4), 337–348.

    Article  Google Scholar 

  15. Réka, A., Hawoong, J., & Albert-Lazlo, B. (2000). Error and attack tolerance of complex networks. Letters to Nature, 406(6794), 378–382.

    Article  Google Scholar 

  16. Adel, E., & Michael, L. (2014). Cyber security challenges in smart cities: safety, security and privacy. Journal of Advanced Research, 5(4), 491–497.

    Article  Google Scholar 

  17. Shui, Y., Song, G., & Ivan, S. (2015). Fool me if you can: Mimicking attacks and anti-attacks in cyberspace. IEEE Transactions on Computers, 64(1), 139–151.

    Article  MathSciNet  MATH  Google Scholar 

  18. Rogers, K. (2006). A two-dimensional circumplex approach to the development of a hacker taxonomy. Digital Investigation, 3(2), 97–102.

    Article  MathSciNet  Google Scholar 

  19. Ahmed, P., Mona, T., Kaveh, B., & Joaquim, C. J. (2013). An intrusion detection and prevention system in cloud computing: A systematic review. Journal of Network and Computer Applications, 36(1), 25–41.

    Article  Google Scholar 

  20. Miao, H., & Junshan, Z. (2011). A dependency graph approach for fault detection and localization towards secure smart grid. IEEE Transactions on Smart Grid, 2(2), 342–351.

    Article  Google Scholar 

  21. Glenn, A. F., Jereme, N. H., David, M. A., & Errin, W. F. (2014). Defense on the move: Ant-based cyber defense. IEEE Computer and Reliability Societies, 12(2), 36–43.

    Google Scholar 

  22. Sicari, S., Grieco, L. A., Boggia, G., & Coen-Porisini, A. (2012). DyDAP: A dynamic data aggregation scheme for privacy aware wireless sensor networks. Journal of Systems and Software, 85(1), 152–166.

    Article  Google Scholar 

  23. Oliver, K., Liyan, J., Robert, J., & Lang, T. (2011). Malicious data attacks on the smart grid. IEEE Transactions on Smart Grid, 2(4), 645–658.

    Article  Google Scholar 

  24. Klaus, J. (2013). Understanding and overcoming cyber security anti-patterns. Computer Networks, 57(10), 2206–2211.

    Article  Google Scholar 

  25. Amir, H., & Haya, S. (2012). Security of patched DNS. Computer Security—ESORICS 2012. https://doi.org/10.1007/978-3-642-33167-1. Accessed March 1, 2016.

  26. Stamatis, K. (2011). Stuxnet worm impact on industrial cyber-physical system security. IECON 2011—37th Annual Conference on IEEE Industrial Electronics Society. https://doi.org/10.1109/iecon.2011.6120048.

  27. Noam, B., & Cleotilde, G. (2015). Effects of cyber security knowledge on attack detection. Computers in Human Behavior. https://doi.org/10.1016/j.chb.2015.01.039.

    Article  Google Scholar 

  28. Claudio, B., & Daniele, R. (2015). Privacy protection in pervasive systems: State of the art and technical challenges. Pervasive and Mobile Computing. https://doi.org/10.1016/j.pmcj.2014.09.010.

    Article  Google Scholar 

  29. Sabrina, S., Cinzia, C., Francesco, P., Daniele, M., & Alberto, C. (2014). A security-and quality-aware system architecture for internet of things. Information Systems Frontiers. https://doi.org/10.1007/s10796-014-9538-x.

    Article  Google Scholar 

  30. Buyens, K., De, W. B., & Joosen, W. (2007). Empirical and statistical analysis of risk analysis- driven techniques for threat management. IEEE Computer Society, the First International Workshop on Secure Software Engineering. https://doi.org/10.1109/ARES.2007.78.

    Article  Google Scholar 

  31. Ryan, S. (2015). A typology of hackers: Classifying cyber malfeasance using a weighted arc circumplex model. Digital Investigation. https://doi.org/10.1016/j.diin.2015.07.002.

    Article  Google Scholar 

  32. Wenying, F., Qinglei, Z., Gongzhu, H., & Jimmy, H. X. (2014). Mining network data for intrusion detection through combining SVMs with ant colony networks. Future Generation Computer Systems. https://doi.org/10.1016/j.future.2013.06.027.

    Article  Google Scholar 

  33. Wenke, L., Stolfo, S. J., & Mok, K. W. (1999). A data mining framework for building intrusion detection models. Proceedings of IEEE Symposium on Security and Privacy. https://doi.org/10.1109/SECPRI.1999.766909.

    Article  MATH  Google Scholar 

  34. Sergio, P., Juan, E. T., Agustin, O., & Pedro, P. L. (2015). DEFIDNET: A framework for optimal allocation of cyber defenses in intrusion detection networks. Computer Networks. https://doi.org/10.1016/j.comnet.2015.01.012.

    Article  Google Scholar 

  35. Abraham, A., & Ramos, V. (2003). Web usage mining using artificial ant colony clustering and linear genetic programming. Evolutionary Computation. CEC ‘03. https://doi.org/10.1109/cec.2003.1299832.

  36. Alanson, S., Daniel, Y., Pauline, P., & Joshua, S. (2007). Design of a passively powered, programmable sensing platform for UHF RFID systems. RFID 2007. IEEE international conference. https://doi.org/10.1109/rfid.2007.346163.

  37. Angelyn, F., & Sherali, Z. (2014). Cyber war: The what, when, why, and how. IEEE Technology and Society Magazine. https://doi.org/10.1109/MTS.2014.2345196.

    Article  Google Scholar 

  38. https://ics.sans.org/media/EISAC_SANS_Ukraine_DUC_5.pdf. Accessed March 1, 2016.

  39. Amir, H., & Haya, S. (2013). Vulnerable delegation of DNS resolution. European Symposium on Research in Computer Security (ESORICS). https://doi.org/10.1007/978-3-642-40203-6-13.

  40. Haya, S., & Michael, W. (2014). DNSSEC for cyber forensics. EURASIP Journal on Information Security. https://doi.org/10.1186/s13635-014-0016-2.

    Article  Google Scholar 

  41. Bojan, M. (1991). The Laplacian spectrum of graphs. In Y. Alavi, G. Chartrand, O. Ollermann, & A. Schwenk (Eds.), Graph theory, combinatorics, and applications (pp. 871–898). Hoboken: Wiley.

    Google Scholar 

  42. Saar, D., & Steven, M. (2007). Keep your enemies close: Distance bounding against smartcard relay attacks, 16th USENIX Security Symposium. Resource Document. Security Symposium. http://static.usenix.org/events/sec07/tech/drimer/drimer_html. Accessed March 1, 2016.

  43. http://csrc.nist.gov/groups/SMA/fisma/ics/documents/Maroochy-Water-Services-Case-Study_report.pdf. Accessed March 1, 2016.

  44. Katherine, A. (2003). No RFID tracking chips in clothing! Press Release. Boycott Benetton. http://www.boycottbenetton.com/PR_030407.html. Accessed March 1, 2016.

  45. Cuijpers, C., & Bert-Jaap, K. (2012). Smart metering and privacy in Europe: lessons from the Dutch case. Tilburg Institute for Law, Technology, and Society (TILT), Tilburg University, The Netherlands. Resource Document. Tilburg University. https://pure.uvt.nl/ws/files/1477311/CPDP_final_Cuijper_Koops_springer_1_.pdf. Accessed March 1, 2016.

  46. Antoine, S., Nicolas, L., Philippe, O., Pierre, B., & Patrice, A. (2007). Non-gaussian and long memory statistical characterizations for internet traffic with anomalies. IEEE Transactions on Dependable and Secure Computing, 4(1), 56–70.

    Article  Google Scholar 

  47. Zhenxin, Z., Maochao, X., & Shouhuai, X. (2013). Characterizing honeypot-captured cyberattacks: Statistical framework and case Study. IEEE Transactions on Information Forensics and Security, 8(11), 1775–1789.

    Article  Google Scholar 

  48. Chenfeng, V. Z., Christopher, L., & Shanika, K. (2010). A survey of coordinated attacks and collaborative intrusion detection. Computers & Security, 29(1), 124–140.

    Article  Google Scholar 

  49. Michael, R., Kevin, J., & Helge, J. (2015). Cyber warfare: issues and challenges. Computers & Security. https://doi.org/10.1016/j.cose.2014.11.007.

    Article  Google Scholar 

  50. El-Atawy, A., Al-Shaer, E., Tran, T., & Boutaba, R. (2009). Adaptive early packet filtering for protecting firewalls against DOS attacks. INFOCOM 2009, IEEE. https://doi.org/10.1109/infcom.2009.5062171.

  51. Kfir, Z., & Wool, A. (2005). Picking virtual pockets using relay attacks on contactless smartcard. Security and Privacy for Emerging Areas in Communications Networks. https://doi.org/10.1109/SECURECOMM.2005.32.

    Article  Google Scholar 

  52. Alexei, C., Karl, K., Joshua, R., & Tadayoshi, K. (2008). RFIDs and secret handshakes: Defending against ghost-and-leech attacks and unauthorized reads with context-aware communications. In Proceedings of the 15th ACM conference on computer and communications security. https://doi.org/10.1145/1455770.1455831.

  53. Kristin, H., Frank, S., Ben, S., & Roshan, T. (2015). Denial and deception in cyber defense. IEEE computer society, 48(4), 36–44.

    Article  Google Scholar 

  54. Parunak, H. V. D., Paul, N., Sven, B., & Rafael, A. (2007). Hybrid multi-agent systems: Integrating swarming and BDI agents. Engineering Self-Organizing Systems. https://doi.org/10.1007/978-3-540-69868-5-1.

    Article  Google Scholar 

  55. Andre, T., Saurabh, A., Henrik, S., Karl, H. J., & Shankar, S. S. (2010). Cyber-security analysis of state estimators in electric power systems. 49th IEEE conference on decision and control (CDC). https://doi.org/10.1109/cdc.2010.5717318.

  56. Adams, C., & Lloyd, S. (2003). Understanding PKI: Concepts, standards, and deployment considerations (pp. 11–15). Boston: Addison-Wesley Professional.

    Google Scholar 

  57. Sushil, J., Peng, L.P., Vipin, S., & Cliff, W. (2010). Cyber situational awareness: Issues and research. Advances in information security. https://doi.org/10.1007/978-1-4419-0140-8. Accessed March 1, 2016.

    Book  MATH  Google Scholar 

  58. Peter, W., & Jeanne, R. (2004). IT governance: How top performers manage IT decision rights for superior results. Boston: Harvard Business Press.

    Google Scholar 

  59. Bob. (2003). Benetton to Tag 15 Million Items. RFID Journal. Resource Document. http://www.rfidjournal.com/articles/view?344. Accessed March 1, 2016.

  60. Antonatos, S., Akritidis, P., Markatos, E. P., & Anagnostakis, K. G. (2007). Defending against hitlist worms using network address space randomization. Computer Networks, 51(12), 3471–3490.

    Article  MATH  Google Scholar 

  61. Mario, G., & Björn, S. (2011). Requirements for a future EWS cyber defence in internet of the future. Cyber conflict (ICCC) 3rd international conference. Resource Document. ICCC International Conference. https://ccdcoe.org/sites/default/files/multimedia/pdf/RequirementsForAFutureEWSCyberDefenceInTheInternetOfTheFuture-Golling-Stelte.pdf. Accessed March 1, 2016.

  62. Abdoul, K. G., Julien, B., Renaud, B., & Francois, S. (2008). A global security architecture for intrusion detection on computer networks. Computers & Security, 27(1–2), 30–47.

    Google Scholar 

  63. Wenjia, L., James, P., & Anupam, J. (2012). Security through collaboration and trust in MANETs. Mobile Networks and Applications, 17(3), 342–352.

    Article  MATH  Google Scholar 

  64. Peter, W., & Jeanne, R. (2005). A matrixed approach to designing IT governance. MIT Sloan Management Review, 46(2), 26–34.

    Google Scholar 

  65. Yoan, C., Aurelie, B., Christophe, N., & M-Tahar, K. (2014). A complete formalized knowledge representation model for advanced digital forensics timeline analysis. Digital Investigation, 11(2), S95–S105.

    Google Scholar 

  66. Chikuni, E., & Dondo, M. (2007). Investigating the security of electrical power systems. SCADA. https://doi.org/10.1109/AFRCON.2007.4401531.

    Article  Google Scholar 

  67. Marcus, R. (2010). The psyche of cybercriminals: A psycho-social perspective. Cybercrimes: A Multidisciplinary Analysis. https://doi.org/10.1007/978-3-642-13547-7_14.

    Book  Google Scholar 

  68. Joshua, S., Alanson, S., Pauline, P., Sumit, R., & Alexander, M. (2006). A wirelessly powered platform for sensing and computation. 8th International conference UbiComp. https://doi.org/10.1007/11853565-29.

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ramaswamy Swarnammal Shaji.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Shaji, R.S., Sachin Dev, V. & Brindha, T. A methodological review on attack and defense strategies in cyber warfare. Wireless Netw 25, 3323–3334 (2019). https://doi.org/10.1007/s11276-018-1724-1

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11276-018-1724-1

Keywords

Navigation