Cyber Peacekeeping

  • Nikolay AkatyevEmail author
  • Joshua I. James
Conference paper
Part of the Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering book series (LNICST, volume 157)


Until now, many works have focused on attempting to define cyber warfare, as well as appropriate response leading to conflict escalation. Instead, this paper proposes a comprehensive definition of Cyber Peacekeeping motivated by prior research on peacekeeping, cyber conflict and warfare, and international relations in cyberspace. Cyber Peacekeeping works to promote online safety and security, which assists in both physical and cyber conflict cessation, and helps protect cyber civilians from becoming either victims or participants in cyber conflicts. This work defines key terms of cyber peacekeeping, as well as its scope and goals in relation to conflict prevention, mitigation, aftermath containment and cleanup. We then propose a potential organizational structure of Cyber Peacekeeping to support its defined roles and functions. Through a case study of a notable past cyber conflict, examples of practical cyber peacekeeping are shown, as well as the roles that peacekeeping could have played in such conflicts.


Cyber peacekeeping Cyber conflicts Cyber war Cyberspace safe layer International relations in cyberspace Stability and security Information clearinghouse 


  1. 1.
    Bellamy, A.J., Williams, P.D., Griffin, S.: Understanding Peacekeeping. Polity, Cambridge (2010)Google Scholar
  2. 2.
    Lynn III, W.J.: Defending a new domain: the pentagon’s cyberstrategy. Foreign Aff. 89, 97–108 (2010)Google Scholar
  3. 3.
    Melzer, N.: Cyberwarfare and International Law. UNDIR Resources, Helgafell (2011)Google Scholar
  4. 4.
    Schmitt, M.N. (ed.): Tallinn Manual on the International Law Applicable to Cyber Warfare. Cambridge University Press, Cambridge (2013)Google Scholar
  5. 5.
    Hathaway, O.A.: The Law of Cyber-Attack. Faculty Scholarship Series. Paper 3852 (2012)Google Scholar
  6. 6.
    Allen, P.D., Demchak, C.: The Palestinian-Israeli Cyberwar. Mil. Rev. 83, 52 (2003)Google Scholar
  7. 7.
    Rehman, S.: Estonia’s Lessons in Cyberwarfare. USNews (2013)Google Scholar
  8. 8.
    Boo, H.-W., Lee, K.-K.: Cyber war and policy suggestions for South Korean planners. Int. J. Korean Unification Stud. 21(2), 85–106 (2012)Google Scholar
  9. 9.
    Cahill, T.P., Rozinov, K., Mule, C.: Cyber warfare peacekeeping, pp. 100. In: Proceedings of the 2003 IEEE Workshop on Information Assurance (2003)Google Scholar
  10. 10.
    Kleffner, J.K.: Keeping the cyber peace: international legal aspects of cyber activities in peace operations. Int. Law Stud. 89, 1 (2013)Google Scholar
  11. 11.
    Bayo, O.A.: The factors behind success and failures of United Nations peacekeeping missions: a case of the Democratic Republic of Congo. J. Altern. Perspect. Soc. Sci. 3(4), 19 (2012)Google Scholar
  12. 12.
    ITU International Multilateral Partnership Against Cyber Threats.
  13. 13.
    NATO Cooperative Cyber Defense Center of Excellence.
  14. 14.
    Bronk, C.: Hacks on Gas: Energy, Cybersecurity, and U.S. Defense. Rice University, Houston (2014)Google Scholar
  15. 15.
    Chang, Y.: Cyber conflict between Taiwan and China. Strateg. Insights 10(1), 25–35 (2011)Google Scholar
  16. 16.
    Farwell, J.P., Arakelian, D.: A Better Syria Option: Cyber War. The National Interest (2013)Google Scholar
  17. 17.
    Al-Marashi, I.: The Angel of Death is coming for you, ISIL. AlJazeera (2015)Google Scholar
  18. 18.
    Mobile Continues to Steal Share of US Adults’ Daily Time Spent with Media. eMarketer (2014)Google Scholar
  19. 19.
    Eugene Kaspersky Press Club 2013. Canberra, Australia (2013).
  20. 20.
    Kulikova, A.: Is a cyber arms race between the US and Russia possible? Russia Direct (2015)Google Scholar
  21. 21.
    Cole, J.M.: China’s Shifting Cyber Focus on Taiwan. The Diplomat (2013)Google Scholar
  22. 22.
    Sartre, P.: Making UN Peacekeeping More Robust: Protecting the Mission, Persuading the Actors. International Peace Institute, New York (2011)Google Scholar
  23. 23.
    Das, S.K., Kant, K., Zhang, N.: Handbook on Securing Cyber-Physical Critical Infrastructure. Elsevier, Amsterdam (2012)Google Scholar

Copyright information

© Institute for Computer Sciences, Social informatics and Telecommunication Engineering 2015

Authors and Affiliations

  1. 1.Seoul Tech SocietySeoulSouth Korea
  2. 2.Digital Forensic Investigation Research LaboratoryHallym UniversityChuncheonSouth Korea

Personalised recommendations