首页 > 最新文献

European Conference on Cyber Warfare and Security最新文献

英文 中文
Agile Methods For Improved Cyber Operations Planning 改进网络运营计划的敏捷方法
Pub Date : 2023-06-19 DOI: 10.34190/eccws.22.1.1138
Jami Carroll
Cyber Ranges provide an interactive simulated environment of hardware and software for simulation. This closed environment provides a safe and legal environment where cyber warfighters can refine their skills. They enable mock cyber mission rehearsal of operation playbooks. Simulated cyber capabilities in the cyber range parallel the intelligence, surveillance, and reconnaissance (ISR), Order of Battle (OOB), and battle damage assessment (BDA) in a closed, safe environment for experimentation. Scrum has been used in collegial cyber competitions with success because it has allowed Capture-the-Flag cyber games to create quicker simulations. Defense Innovation Units (DIUs) are using agile Scrum processes to numerous warfighting areas in order to make them more agile. This research argues that the agile software development processes could be used to optimize the planning and execution of offensive, defensive, and operation and maintenance (O&M) of cyber warfare simulations within cyber ranges. O&M can be done quicker, new exploitable modules can be includer more rapidly, and the capability can be reconstituted to the appropriate skill level for the next set of trainees quicker. The White team as maintainers of the networks, systems, applications and cyber tools select the CVE exploits and spend an enormous amount of time installing and configuring these capabilities for the next set of trainees. Quite often, there are different skill levels which require multiple builds and the ability to refresh the cyber range with varying levels of cyber trainee complexity. This requirement to restore the cyber range quickly with a variety of builds, varying levels of difficulty, and ensure the experiential learning is maximized with the best availability lends to agile methods such as Scrum could lend to improvements with cyber operations. This research will illustrate how a cyber range could leverage agile Scrum processes to provide an improved cyber range environment quicker and with more capabilities.
Cyber Ranges为仿真提供了一个交互式的硬件和软件模拟环境。这种封闭的环境为网络作战人员提供了一个安全和合法的环境,使他们能够完善自己的技能。它们可以模拟网络任务,演练行动剧本。在一个封闭、安全的实验环境中,网络范围内的模拟网络能力与情报、监视和侦察(ISR)、战斗秩序(OOB)和战斗损害评估(BDA)并行。Scrum已经在大学网络竞赛中获得了成功,因为它使夺旗网络游戏能够创建更快的模拟。国防创新单位(diu)正在将敏捷Scrum过程应用于许多作战领域,以使其更加敏捷。本研究认为,敏捷软件开发过程可用于优化网络范围内网络战模拟的进攻、防御和运维(O&M)的规划和执行。可以更快地完成运维,可以更快地包括新的可利用模块,并且可以更快地为下一组受训者重新构建相应的技能水平。White团队作为网络、系统、应用程序和网络工具的维护者,选择CVE漏洞,并花费大量时间为下一批学员安装和配置这些功能。通常,不同的技能水平需要多次构建,并且能够根据不同的网络培训复杂程度刷新网络范围。通过各种构建、不同难度级别快速恢复网络范围,并确保体验式学习以最佳可用性最大化,这一要求有助于敏捷方法(如Scrum)改进网络运营。这项研究将说明网络范围如何利用敏捷Scrum流程来更快地提供改进的网络范围环境,并提供更多的功能。
{"title":"Agile Methods For Improved Cyber Operations Planning","authors":"Jami Carroll","doi":"10.34190/eccws.22.1.1138","DOIUrl":"https://doi.org/10.34190/eccws.22.1.1138","url":null,"abstract":"Cyber Ranges provide an interactive simulated environment of hardware and software for simulation. This closed environment provides a safe and legal environment where cyber warfighters can refine their skills. They enable mock cyber mission rehearsal of operation playbooks. Simulated cyber capabilities in the cyber range parallel the intelligence, surveillance, and reconnaissance (ISR), Order of Battle (OOB), and battle damage assessment (BDA) in a closed, safe environment for experimentation. Scrum has been used in collegial cyber competitions with success because it has allowed Capture-the-Flag cyber games to create quicker simulations. Defense Innovation Units (DIUs) are using agile Scrum processes to numerous warfighting areas in order to make them more agile. This research argues that the agile software development processes could be used to optimize the planning and execution of offensive, defensive, and operation and maintenance (O&M) of cyber warfare simulations within cyber ranges. O&M can be done quicker, new exploitable modules can be includer more rapidly, and the capability can be reconstituted to the appropriate skill level for the next set of trainees quicker. The White team as maintainers of the networks, systems, applications and cyber tools select the CVE exploits and spend an enormous amount of time installing and configuring these capabilities for the next set of trainees. Quite often, there are different skill levels which require multiple builds and the ability to refresh the cyber range with varying levels of cyber trainee complexity. This requirement to restore the cyber range quickly with a variety of builds, varying levels of difficulty, and ensure the experiential learning is maximized with the best availability lends to agile methods such as Scrum could lend to improvements with cyber operations. This research will illustrate how a cyber range could leverage agile Scrum processes to provide an improved cyber range environment quicker and with more capabilities.","PeriodicalId":258360,"journal":{"name":"European Conference on Cyber Warfare and Security","volume":"27 10","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120848437","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Reconnaissance Techniques and Industrial Control System Tactics Knowledge Graph 侦察技术与工控系统战术知识图谱
Pub Date : 2023-06-19 DOI: 10.34190/eccws.22.1.1221
T. Heverin
In the initial stages of industrial control system (ICS) penetration testing, pentesters conduct reconnaissance by using various tools including Nmap, Shodan, Maltego, Google, Google Hacking Database (GHDB), Recon-ng and more. Testers use various reconnaissance techniques (RTs) within the tools to directly access ICS devices. Many novice ICS-pentesters stop their reconnaissance work upon successfully accessing an ICS device. However, continuing to conduct reconnaissance after initial access can lead to pentesters finding even more information to find more ICS devices, ICS networks, and ways to make ICS exploitation more effective.  Our research motivation stems from finding ways to explicitly model the continuation of using RTs once an ICS device is accessed. Knowledge graphs offer an approach for linking RTs together and creating chains of RTs.   MITRE ATT&CK ICS provides a matrix of ICS adversarial behaviours. The matrix consists of main exploit tactics and techniques used to accomplish these tactics. Example techniques include ICS alarm suppression, blocking command messages, starting a device, and stopping services. ATT&CK ICS also provides ICS data sources that defenders use to detect the adversarial techniques. Application logs, files, logon sessions, network traffic, and operational databases represent some of the ICS data sources. We reasoned that if adversaries could find the ICS data sources and discover the ability to modify the data sources, then adversaries could cover their tracks to successfully carry out ICS tactics. For example, ICS attackers could modify log entries to hide the attacker’s steps or ICS attackers could delete alarm notifications that showed that ICS attackers changed ICS settings.   In this work in progress research, we used knowledge-graph modelling techniques to link together RTs with ICS data sources, the ability to modify the data sources, the ability to then cover tracks of ICS techniques, and the impact of techniques on accomplishing ICS tactics. We named the graph RT-ICS Graph. With knowledge graph queries and shortest-path algorithms run over the RT-ICS graph, we showed how RTs can explicitly lead to impacts on adversaries carrying out ICS tactics. The accomplishment of ICS tactics can cause severe damage or harm.
在工业控制系统(ICS)渗透测试的初始阶段,渗透测试人员通过使用各种工具进行侦察,包括Nmap, Shodan, Maltego, Google, Google Hacking Database (GHDB), recocon -ng等。测试人员使用工具中的各种侦察技术(RTs)直接访问ICS设备。许多ICS渗透测试新手在成功访问ICS设备后停止了他们的侦察工作。但是,在初始访问之后继续进行侦察可能会导致渗透测试人员发现更多信息,从而发现更多ICS设备、ICS网络以及使ICS利用更有效的方法。我们的研究动机源于寻找方法来明确地模拟一旦ICS设备被访问后使用RTs的延续。知识图谱提供了一种将RTs连接在一起并创建RTs链的方法。MITRE ATT&CK ICS提供了ICS对抗行为的矩阵。矩阵包括主要的攻击策略和实现这些策略所使用的技术。示例技术包括ICS告警抑制、阻塞命令消息、启动设备和停止服务。ATT&CK ICS还提供了ICS数据源,防御者使用这些数据源来检测对抗性技术。应用程序日志、文件、登录会话、网络流量和操作数据库代表一些ICS数据源。我们认为,如果攻击者能够找到ICS数据源并发现修改数据源的能力,那么攻击者就可以掩盖他们的踪迹,从而成功实施ICS战术。例如,ICS攻击者可以修改日志条目以隐藏攻击者的步骤,或者ICS攻击者可以删除显示ICS攻击者更改ICS设置的告警通知。在这项正在进行的研究中,我们使用知识图谱建模技术将RTs与ICS数据源、修改数据源的能力、覆盖ICS技术轨迹的能力以及技术对实现ICS战术的影响联系起来。我们将此图命名为RT-ICS图。通过知识图查询和最短路径算法在RT-ICS图上运行,我们展示了RTs如何明确地导致对执行ICS策略的对手的影响。ICS战术的完成会造成严重的破坏或伤害。
{"title":"Reconnaissance Techniques and Industrial Control System Tactics Knowledge Graph","authors":"T. Heverin","doi":"10.34190/eccws.22.1.1221","DOIUrl":"https://doi.org/10.34190/eccws.22.1.1221","url":null,"abstract":"In the initial stages of industrial control system (ICS) penetration testing, pentesters conduct reconnaissance by using various tools including Nmap, Shodan, Maltego, Google, Google Hacking Database (GHDB), Recon-ng and more. Testers use various reconnaissance techniques (RTs) within the tools to directly access ICS devices. Many novice ICS-pentesters stop their reconnaissance work upon successfully accessing an ICS device. However, continuing to conduct reconnaissance after initial access can lead to pentesters finding even more information to find more ICS devices, ICS networks, and ways to make ICS exploitation more effective.  Our research motivation stems from finding ways to explicitly model the continuation of using RTs once an ICS device is accessed. Knowledge graphs offer an approach for linking RTs together and creating chains of RTs. \u0000  \u0000MITRE ATT&CK ICS provides a matrix of ICS adversarial behaviours. The matrix consists of main exploit tactics and techniques used to accomplish these tactics. Example techniques include ICS alarm suppression, blocking command messages, starting a device, and stopping services. ATT&CK ICS also provides ICS data sources that defenders use to detect the adversarial techniques. Application logs, files, logon sessions, network traffic, and operational databases represent some of the ICS data sources. We reasoned that if adversaries could find the ICS data sources and discover the ability to modify the data sources, then adversaries could cover their tracks to successfully carry out ICS tactics. For example, ICS attackers could modify log entries to hide the attacker’s steps or ICS attackers could delete alarm notifications that showed that ICS attackers changed ICS settings. \u0000  \u0000In this work in progress research, we used knowledge-graph modelling techniques to link together RTs with ICS data sources, the ability to modify the data sources, the ability to then cover tracks of ICS techniques, and the impact of techniques on accomplishing ICS tactics. We named the graph RT-ICS Graph. With knowledge graph queries and shortest-path algorithms run over the RT-ICS graph, we showed how RTs can explicitly lead to impacts on adversaries carrying out ICS tactics. The accomplishment of ICS tactics can cause severe damage or harm.","PeriodicalId":258360,"journal":{"name":"European Conference on Cyber Warfare and Security","volume":"470 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129705492","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Hybrid Threat and Information Influence in Connection with Security of Supply 与供应安全相关的混合威胁和信息影响
Pub Date : 2023-06-19 DOI: 10.34190/eccws.22.1.1180
J. Rajamäki, Tehi Palletvuori
Hybrid threat is a multidimensional and hard-to-detect activity. It includes a wide range of actions, from influencing information to the military means by which the hybrid actor achieves its goals. These goals can include weakening or even destroying the target. Security of supply means preparedness and continuity management actions, which aim to safeguard economic activities and related systems that are necessary for the population’s livelihood, the country’s economic life, and national defense in the event of exceptional conditions and comparable serious disruptions. Both hybrid threat and information influencing can disrupt the realization of the goals of security of supply. This work-in-progress paper proposes a framework, which consists of hybrid threat and its sub-classification, and information influencing as one of the means to implement hybrid threat. The framework also describes the security of supply and elements that are used to combat information influence and maintain the security of supply. In addition, the framework paper discusses what kind of elements measuring the maturity level of an organization’s prevention of information influence could consist of.
混合威胁是一种多维度且难以检测的活动。它包括范围广泛的行动,从影响信息到混合行动者实现其目标的军事手段。这些目标包括削弱甚至摧毁目标。供应安全是指准备和连续性管理行动,其目的是在发生特殊情况和类似的严重中断时,保障人民生计、国家经济生活和国防所必需的经济活动和相关系统。混合威胁和信息影响都会破坏供应安全目标的实现。本文提出了一个由混合威胁及其子分类组成的框架,并将信息影响作为实现混合威胁的手段之一。该框架还描述了供应安全以及用于打击信息影响和维护供应安全的要素。此外,该框架文件还讨论了衡量组织预防信息影响的成熟度水平的要素类型。
{"title":"Hybrid Threat and Information Influence in Connection with Security of Supply","authors":"J. Rajamäki, Tehi Palletvuori","doi":"10.34190/eccws.22.1.1180","DOIUrl":"https://doi.org/10.34190/eccws.22.1.1180","url":null,"abstract":"Hybrid threat is a multidimensional and hard-to-detect activity. It includes a wide range of actions, from influencing information to the military means by which the hybrid actor achieves its goals. These goals can include weakening or even destroying the target. Security of supply means preparedness and continuity management actions, which aim to safeguard economic activities and related systems that are necessary for the population’s livelihood, the country’s economic life, and national defense in the event of exceptional conditions and comparable serious disruptions. Both hybrid threat and information influencing can disrupt the realization of the goals of security of supply. This work-in-progress paper proposes a framework, which consists of hybrid threat and its sub-classification, and information influencing as one of the means to implement hybrid threat. The framework also describes the security of supply and elements that are used to combat information influence and maintain the security of supply. In addition, the framework paper discusses what kind of elements measuring the maturity level of an organization’s prevention of information influence could consist of.","PeriodicalId":258360,"journal":{"name":"European Conference on Cyber Warfare and Security","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128960260","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Radiograph Manufacturer and Model Identification Using Deep-RSI 使用深rsi的x光片制造商和模型识别
Pub Date : 2023-06-19 DOI: 10.34190/eccws.22.1.1177
Farid Ghareh Mohammadi, Ronnie Sebro
Malware attacks of healthcare institutions are simultaneously becoming more common and more sophisticated.  Artificial intelligence (AI) has resulted in the ability to rapidly alter or generate false images, advancing the ease of forgery of digital images. Digital image manipulation and substitution of radiographs are major threats to healthcare institutions because these altered images may affect patient care. Identifying the source (manufacturer, model) of radiology images is one method of validating the origin of radiology images in a healthcare system. In a previous study, researchers demonstrated that features from magnetic resonance imaging (MRI) could be used to trace and authenticate the source of the MRI images. We previously developed and tested the Deep learning for Radiograph Source Identification (Deep-RSI) approach for source identification of radiographs obtained of the upper extremities (hands, wrists, forearms, elbows, and shoulders). In this research, we present an empirical and quantitative investigation using deep learning to validate the source of digital radiographic images of the lower extremities (knees, legs, ankles, and feet). A convolutional neural network (CNN) is employed to extract features, which are then followed by three fully connected layers (FCNN). To ensure that our proposed method is a content-free approach, we added a new layer before the CNN to extract the initial content-free pixels and train the features using the CNN and FCNN layers. This proposed approach was used to identify the source of each digital image of a lower extremity. Adult patients of both sexes who had radiographs of the lower extremities at Mayo Clinic between 01/01/2010 and 12/31/2021 were evaluated. The data was randomly split by patient into training/validation and test datasets. There were 9 radiographic machine models and 6 manufacturers. Deep-RSI had an accuracy of 99.00% (AUC= 0.99) and 97.00% (AUC=0.94) for detecting the manufacturer and model of the radiographic machine for radiographs of the feet respectively, confirming that forensic evaluation of radiographs can be performed. This is the first medical forensics examination of this type to identify and confirm the source origins for radiographs of the lower extremities. This technique may be helpful to detect radiology malware attacks and scientific fraud.    
针对医疗机构的恶意软件攻击同时变得越来越普遍和复杂。人工智能(AI)导致了快速改变或生成虚假图像的能力,提高了数字图像伪造的便利性。数字图像处理和x光片的替代是对医疗机构的主要威胁,因为这些改变的图像可能会影响患者的护理。识别放射科图像的来源(制造商、型号)是在医疗保健系统中验证放射科图像来源的一种方法。在之前的一项研究中,研究人员证明了磁共振成像(MRI)的特征可以用来追踪和验证MRI图像的来源。我们之前开发并测试了用于放射源识别的深度学习(Deep- rsi)方法,用于上肢(手、手腕、前臂、肘部和肩部)获得的放射源识别。在这项研究中,我们提出了一项实证和定量调查,使用深度学习来验证下肢(膝盖、腿、脚踝和脚)的数字放射图像的来源。使用卷积神经网络(CNN)提取特征,然后进行三个全连接层(FCNN)。为了确保我们提出的方法是一种无内容的方法,我们在CNN之前增加了一个新的层来提取初始的无内容像素,并使用CNN和FCNN层来训练特征。该方法被用于识别每个下肢数字图像的源。对2010年1月1日至2021年12月31日期间在梅奥诊所接受下肢x线片检查的成年男女患者进行评估。数据按患者随机分为训练/验证和测试数据集。共有9种型号的放射线机,6家生产厂家。Deep-RSI检测足部x线片生产厂家和型号的准确率分别为99.00% (AUC= 0.99)和97.00% (AUC=0.94),证实可以对x线片进行法医鉴定。这是第一次进行这种类型的医学法医检查,以确定和确认下肢x线片的来源。该技术可能有助于检测放射恶意软件攻击和科学欺诈。
{"title":"Radiograph Manufacturer and Model Identification Using Deep-RSI","authors":"Farid Ghareh Mohammadi, Ronnie Sebro","doi":"10.34190/eccws.22.1.1177","DOIUrl":"https://doi.org/10.34190/eccws.22.1.1177","url":null,"abstract":"Malware attacks of healthcare institutions are simultaneously becoming more common and more sophisticated.  Artificial intelligence (AI) has resulted in the ability to rapidly alter or generate false images, advancing the ease of forgery of digital images. Digital image manipulation and substitution of radiographs are major threats to healthcare institutions because these altered images may affect patient care. Identifying the source (manufacturer, model) of radiology images is one method of validating the origin of radiology images in a healthcare system. In a previous study, researchers demonstrated that features from magnetic resonance imaging (MRI) could be used to trace and authenticate the source of the MRI images. We previously developed and tested the Deep learning for Radiograph Source Identification (Deep-RSI) approach for source identification of radiographs obtained of the upper extremities (hands, wrists, forearms, elbows, and shoulders). In this research, we present an empirical and quantitative investigation using deep learning to validate the source of digital radiographic images of the lower extremities (knees, legs, ankles, and feet). A convolutional neural network (CNN) is employed to extract features, which are then followed by three fully connected layers (FCNN). To ensure that our proposed method is a content-free approach, we added a new layer before the CNN to extract the initial content-free pixels and train the features using the CNN and FCNN layers. This proposed approach was used to identify the source of each digital image of a lower extremity. Adult patients of both sexes who had radiographs of the lower extremities at Mayo Clinic between 01/01/2010 and 12/31/2021 were evaluated. The data was randomly split by patient into training/validation and test datasets. There were 9 radiographic machine models and 6 manufacturers. Deep-RSI had an accuracy of 99.00% (AUC= 0.99) and 97.00% (AUC=0.94) for detecting the manufacturer and model of the radiographic machine for radiographs of the feet respectively, confirming that forensic evaluation of radiographs can be performed. This is the first medical forensics examination of this type to identify and confirm the source origins for radiographs of the lower extremities. This technique may be helpful to detect radiology malware attacks and scientific fraud. \u0000  \u0000 ","PeriodicalId":258360,"journal":{"name":"European Conference on Cyber Warfare and Security","volume":"69 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128972483","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The UN Global Digital Compact (GDC), Achieving a trusted, free, open, and Secure Internet: Trust-building 联合国全球数字契约(GDC):实现可信、自由、开放和安全的互联网:建立信任
Pub Date : 2023-06-19 DOI: 10.34190/eccws.22.1.1448
Allison Wylde
A United Nations’ (UN) public consultation, underway, is reviewing requirements for the Global Digital Compact (GDC) to advance UN goals for an ‘open, free, and secure digital future for all’ (UN, GDC, 2022). Achieving the goals relies on proposed principles, including: connecting everyone; avoiding fragmentation; protecting data; applying human rights; accountability for discrimination and misleading content; regulation of artificial intelligence; digital commons as a public good; and ‘other’ areas. The purpose of this paper is to present an argument that trust must be included as a central ‘other’ principle. Although successful achievement of the GDC goals is contingent on building trust in each principle, a method for trust-building is not provided. Through leveraging well-established organization and conflict management trust-building literature the contribution of this paper presents a fresh conceptual framework, allowing trust and trust-building in the goals to be operationalized and assessed. In, addressing the research gap as to how build trust in the GDC goals as they are implemented, the novel trust-building process as presented helps policymakers, practitioners, and academics better address potential risks to the future internet, such as, increased; state isolation, sovereignty, and internet fragmentation. Limitations and calls for further research highlight that understanding state-level trust-building in policy is not yet mature. Further, scholars needs to better categorize the processes, dynamics and norms involved in state-level trust-building, helping to counter future internet challenges.
联合国正在进行的公众咨询正在审查全球数字契约(GDC)的要求,以推进联合国“为所有人创造开放、自由和安全的数字未来”的目标(UN, GDC, 2022)。实现这些目标取决于所提出的原则,包括:连接每个人;避免碎片;保护数据;落实人权;对歧视和误导内容的问责;人工智能监管;数字共享作为一种公共产品;还有“其他”领域。本文的目的是提出一个论点,即信任必须作为一个核心的“其他”原则。虽然GDC目标的成功实现取决于在每个原则中建立信任,但并未提供建立信任的方法。通过利用成熟的组织和冲突管理信任建设文献,本文的贡献提出了一个新的概念框架,允许在目标中的信任和信任建设被操作和评估。为了解决关于如何在GDC目标实施过程中建立信任的研究差距,本文提出的新型信任建立过程有助于政策制定者、从业者和学者更好地应对未来互联网的潜在风险,例如,增加;国家孤立、主权和互联网碎片化。局限性和对进一步研究的呼吁突出表明,对国家层面的政策信任建设的理解尚不成熟。此外,学者们需要更好地对国家级信任建设的过程、动态和规范进行分类,以帮助应对未来的互联网挑战。
{"title":"The UN Global Digital Compact (GDC), Achieving a trusted, free, open, and Secure Internet: Trust-building","authors":"Allison Wylde","doi":"10.34190/eccws.22.1.1448","DOIUrl":"https://doi.org/10.34190/eccws.22.1.1448","url":null,"abstract":"A United Nations’ (UN) public consultation, underway, is reviewing requirements for the Global Digital Compact (GDC) to advance UN goals for an ‘open, free, and secure digital future for all’ (UN, GDC, 2022). Achieving the goals relies on proposed principles, including: connecting everyone; avoiding fragmentation; protecting data; applying human rights; accountability for discrimination and misleading content; regulation of artificial intelligence; digital commons as a public good; and ‘other’ areas. The purpose of this paper is to present an argument that trust must be included as a central ‘other’ principle. Although successful achievement of the GDC goals is contingent on building trust in each principle, a method for trust-building is not provided. Through leveraging well-established organization and conflict management trust-building literature the contribution of this paper presents a fresh conceptual framework, allowing trust and trust-building in the goals to be operationalized and assessed. In, addressing the research gap as to how build trust in the GDC goals as they are implemented, the novel trust-building process as presented helps policymakers, practitioners, and academics better address potential risks to the future internet, such as, increased; state isolation, sovereignty, and internet fragmentation. Limitations and calls for further research highlight that understanding state-level trust-building in policy is not yet mature. Further, scholars needs to better categorize the processes, dynamics and norms involved in state-level trust-building, helping to counter future internet challenges.","PeriodicalId":258360,"journal":{"name":"European Conference on Cyber Warfare and Security","volume":"913 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121038269","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cyber power in the African context: an exploratory analysis and proposition 非洲背景下的网络力量:探索性分析与命题
Pub Date : 2023-06-19 DOI: 10.34190/eccws.22.1.1046
P. Duvenage, W. Bernhardt, Sebastian von Solms
While the centrality of cyber power in the safeguarding and advancing nation states’ national interests and objectives is now widely accepted, the academic discourse (on cyber power) is still incipient. In literature reviewed, cyber power is predominantly viewed as comprising of two dimensions, namely offensive and defensive. The exploratory analysis we conducted found that Africa’s unique, contextual factors necessitate an expanded conceptualisation of cyber power. This alternative conceptualisation does not dispute the existing notion that cyber power has offensive and defensive dimensions. The fact that cyber is by its very nature borderless and that African countries function in an interconnected global arena of competition and conflict, are also not contested.  What is required is the addition of a third dimension to cyber power, namely developmental power. This paper advances a tentative proposition on a cyber-power triad (with offensive, defensive and developmental dimensions). This proposition, we argue, is more apposite to African countries’ national objectives —strategically and in the allocation of resources.  At least on a notional level, the cyber-power triad can guide the leveraging of the asymmetric advantages that cyber space offers African nation states and in a manner that pursues all three (cyber power) dimensions in a complementary manner. Such synergetic wielding of cyber power is one of the keys indispensable to African countries addressing their substantial challenges and unlocking their vast potential.
虽然网络力量在维护和推进民族国家利益和目标方面的中心地位已被广泛接受,但(关于网络力量的)学术论述仍处于起步阶段。在文献综述中,网络力量主要被视为由两个维度组成,即进攻性和防御性。我们进行的探索性分析发现,非洲独特的背景因素需要扩大网络力量的概念化。这种不同的概念并不质疑现有的概念,即网络力量有进攻和防御两个维度。网络本质上是无国界的,非洲国家在相互关联的全球竞争和冲突舞台上发挥作用,这些事实也没有争议。我们需要的是在网络力量的基础上增加第三个维度,即发展力量。本文提出了网络力量三位一体(包括进攻、防御和发展三个维度)的设想。我们认为,这一主张更符合非洲国家在战略和资源分配方面的国家目标。至少在概念层面上,网络力量三位一体可以指导利用网络空间为非洲民族国家提供的不对称优势,并以一种互补的方式追求所有三个(网络力量)维度。协同运用网络力量,是非洲国家应对重大挑战、释放巨大潜力不可或缺的关键之一。
{"title":"Cyber power in the African context: an exploratory analysis and proposition","authors":"P. Duvenage, W. Bernhardt, Sebastian von Solms","doi":"10.34190/eccws.22.1.1046","DOIUrl":"https://doi.org/10.34190/eccws.22.1.1046","url":null,"abstract":"While the centrality of cyber power in the safeguarding and advancing nation states’ national interests and objectives is now widely accepted, the academic discourse (on cyber power) is still incipient. In literature reviewed, cyber power is predominantly viewed as comprising of two dimensions, namely offensive and defensive. The exploratory analysis we conducted found that Africa’s unique, contextual factors necessitate an expanded conceptualisation of cyber power. This alternative conceptualisation does not dispute the existing notion that cyber power has offensive and defensive dimensions. The fact that cyber is by its very nature borderless and that African countries function in an interconnected global arena of competition and conflict, are also not contested.  What is required is the addition of a third dimension to cyber power, namely developmental power. This paper advances a tentative proposition on a cyber-power triad (with offensive, defensive and developmental dimensions). This proposition, we argue, is more apposite to African countries’ national objectives —strategically and in the allocation of resources.  At least on a notional level, the cyber-power triad can guide the leveraging of the asymmetric advantages that cyber space offers African nation states and in a manner that pursues all three (cyber power) dimensions in a complementary manner. Such synergetic wielding of cyber power is one of the keys indispensable to African countries addressing their substantial challenges and unlocking their vast potential.","PeriodicalId":258360,"journal":{"name":"European Conference on Cyber Warfare and Security","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124871129","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Design Lessons from Building Deep Learning Disinformation Generation and Detection Solutions 构建深度学习虚假信息生成和检测解决方案的设计经验
Pub Date : 2023-06-19 DOI: 10.34190/eccws.22.1.1071
Clara Maathuis, Iddo Kerkhof, Rik Godschalk, H. Passier
In its essence, social media is on its way of representing the superposition of all digital representations of human concepts, ideas, believes, attitudes, and experiences. In this realm, the information is not only shared, but also {mis, dis}interpreted either unintentionally or intentionally guided by (some kind of) awareness, uncertainty, or offensive purposes. This can produce implications and consequences such as societal and political polarization, and influence or alter human behaviour and beliefs. To tackle these issues corresponding to social media manipulation mechanisms like disinformation and misinformation, a diverse palette of efforts represented by governmental and social media platforms strategies, policies, and methods plus academic and independent studies and solutions are proposed. However, such solutions are based on a technical standpoint mainly on gaming or AI-based techniques and technologies, but often only consider the defender’s perspective and address in a limited way the social perspective of this phenomenon becoming single angled. To address these issues, this research combines the defenders’ perspective with the one of the offenders by (i) building a hybrid deep learning disinformation generation and detection model and (ii) capturing and proposing a set of design recommendations that could be considered when establishing patterns, requirements, and features for building future gaming and AI-based solutions for combating social media manipulation mechanisms. This is done using the Design Science Research methodology in Data Science approach aiming at enhancing security awareness and resilience against social media manipulation.
从本质上讲,社交媒体正在表现人类概念、想法、信仰、态度和经验的所有数字表现的叠加。在这个领域中,信息不仅是共享的,而且在(某种)意识、不确定性或攻击性目的的引导下,无意地或有意地解释了信息。这可能产生影响和后果,如社会和政治两极分化,并影响或改变人类的行为和信仰。为了解决这些与虚假信息和错误信息等社交媒体操纵机制相对应的问题,提出了由政府和社交媒体平台战略、政策和方法以及学术和独立研究和解决方案所代表的多样化努力。然而,这些解决方案主要基于基于游戏或ai的技术和技术的技术立场,但通常只考虑防御者的视角,并以有限的方式解决这种现象的社会视角。为了解决这些问题,本研究将捍卫者的观点与犯罪者的观点结合起来,通过(i)建立一个混合深度学习虚假信息生成和检测模型;(ii)捕获并提出一组设计建议,这些建议可以在建立模式、需求和功能时考虑,以构建未来的游戏和基于人工智能的解决方案,以对抗社交媒体操纵机制。这是使用数据科学方法中的设计科学研究方法来完成的,旨在增强对社交媒体操纵的安全意识和弹性。
{"title":"Design Lessons from Building Deep Learning Disinformation Generation and Detection Solutions","authors":"Clara Maathuis, Iddo Kerkhof, Rik Godschalk, H. Passier","doi":"10.34190/eccws.22.1.1071","DOIUrl":"https://doi.org/10.34190/eccws.22.1.1071","url":null,"abstract":"In its essence, social media is on its way of representing the superposition of all digital representations of human concepts, ideas, believes, attitudes, and experiences. In this realm, the information is not only shared, but also {mis, dis}interpreted either unintentionally or intentionally guided by (some kind of) awareness, uncertainty, or offensive purposes. This can produce implications and consequences such as societal and political polarization, and influence or alter human behaviour and beliefs. To tackle these issues corresponding to social media manipulation mechanisms like disinformation and misinformation, a diverse palette of efforts represented by governmental and social media platforms strategies, policies, and methods plus academic and independent studies and solutions are proposed. However, such solutions are based on a technical standpoint mainly on gaming or AI-based techniques and technologies, but often only consider the defender’s perspective and address in a limited way the social perspective of this phenomenon becoming single angled. To address these issues, this research combines the defenders’ perspective with the one of the offenders by (i) building a hybrid deep learning disinformation generation and detection model and (ii) capturing and proposing a set of design recommendations that could be considered when establishing patterns, requirements, and features for building future gaming and AI-based solutions for combating social media manipulation mechanisms. This is done using the Design Science Research methodology in Data Science approach aiming at enhancing security awareness and resilience against social media manipulation.","PeriodicalId":258360,"journal":{"name":"European Conference on Cyber Warfare and Security","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125287652","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
JTF-ARES as a Model of a Persistent, Joint Cyber Task Force JTF-ARES作为持久的联合网络特遣部队的典范
Pub Date : 2023-06-19 DOI: 10.34190/eccws.22.1.1200
Charlotte Donnelly, Marcel Stolz
Military involvement in cyberspace has traditionally been limited to operations in service of “kinetic,” or physical, missions. Military cyberoperations are therefore usually described using traditional “kinetic” descriptors and rarely articulate cyber-related goals that are independent of kinetic operations. Recently, the concepts of “persistence” and “jointness” have been increasingly used by the U.S. Cyber Command to describe cyberoperations. Persistence describes operations that focus on a target over time (in contrast to the episodic “response” concepts articulated in kinetic warfare). “Jointness” describes working across group or agency lines. This paper will investigate the effectiveness of “persistent” and “joint” task forces in accomplishing cyber-related goals by means of a case study of Joint Task Force – ARES (“JTF-ARES”). JTF-ARES was set up as a task force by the U.S. Cyber Command to disrupt ISIS cyberoperations – a singularly cyber (as opposed to kinetic) goal. By contrasting the approach of JTF-ARES with the existing history of US operations in cyberspace, militaries can apply JTF-ARES’ successful approach to accomplish future cyber-related goals that are independent of kinetic military units. After discussing a brief history of the U.S. Cyber Command and defining the terms “persistence” and “jointness,” the paper discusses JTF-ARES’ successful operation and contributing factors, most notably its organization within the U.S. Cyber Command. Next, it explores a counterfactual organization of JTF-ARES, suggesting that alternative organizational structures would likely have ended in failure and highlighting factors that may have influenced its success. Furthermore, the paper discusses the administrative challenges associated with creating a JTF, which include administration hurdles as well as collaboration and training requirements specific to joint operations. Since JTF-ARES deviates from traditional organizational structures within U.S. Cyber Command, this paper articulates criteria for creating a joint, persistent cyber task force, which militaries may find useful when considering how to implement cyber-specific goals. The first criterion concerns the operations required for the mission – namely, are reconnaissance, offensive, and defensive cyberoperations required? The second criterion asks whether the cyberoperation has a uniquely cyber-oriented end state: for missions with non-kinetic goals, it may be helpful to consider a joint, persistent task force.
传统上,军事介入网络空间仅限于为“动力”或物理任务服务的行动。因此,军事网络行动通常使用传统的“动态”描述符来描述,很少阐明与网络相关的独立于动态行动的目标。最近,美国网络司令部越来越多地使用“持续性”和“联合性”这两个概念来描述网络作战。持续性描述的是一段时间内专注于目标的行动(与动态战中表达的偶发“反应”概念相反)。“联合性”描述了跨团队或代理线的工作。本文将通过联合特遣部队-ARES(“JTF-ARES”)的案例研究,研究“持久”和“联合”特遣部队在实现网络相关目标方面的有效性。JTF-ARES是由美国网络司令部设立的一个特遣部队,目的是破坏ISIS的网络行动——这是一个独特的网络(而不是动力)目标。通过将JTF-ARES的方法与美国现有的网络空间作战历史进行对比,军队可以应用JTF-ARES的成功方法来实现独立于动态军事单位的未来网络相关目标。在简要讨论了美国网络司令部的历史并定义了术语“持久性”和“联合性”之后,本文讨论了JTF-ARES的成功运作及其促成因素,最值得注意的是其在美国网络司令部的组织。接下来,本文探讨了JTF-ARES的反事实组织,表明其他组织结构可能以失败告终,并强调了可能影响其成功的因素。此外,本文还讨论了与创建联合特遣部队相关的管理挑战,其中包括管理障碍以及针对联合作战的协作和培训要求。由于JTF-ARES偏离了美国网络司令部的传统组织结构,本文阐明了创建联合、持久网络特遣部队的标准,在考虑如何实现网络特定目标时,军方可能会发现这些标准很有用。第一个标准涉及任务所需的操作-即,是否需要侦察,进攻和防御网络操作?第二个标准询问网络行动是否具有独特的以网络为导向的最终状态:对于具有非动态目标的任务,考虑联合、持久的特遣部队可能会有所帮助。
{"title":"JTF-ARES as a Model of a Persistent, Joint Cyber Task Force","authors":"Charlotte Donnelly, Marcel Stolz","doi":"10.34190/eccws.22.1.1200","DOIUrl":"https://doi.org/10.34190/eccws.22.1.1200","url":null,"abstract":"Military involvement in cyberspace has traditionally been limited to operations in service of “kinetic,” or physical, missions. Military cyberoperations are therefore usually described using traditional “kinetic” descriptors and rarely articulate cyber-related goals that are independent of kinetic operations. Recently, the concepts of “persistence” and “jointness” have been increasingly used by the U.S. Cyber Command to describe cyberoperations. Persistence describes operations that focus on a target over time (in contrast to the episodic “response” concepts articulated in kinetic warfare). “Jointness” describes working across group or agency lines. This paper will investigate the effectiveness of “persistent” and “joint” task forces in accomplishing cyber-related goals by means of a case study of Joint Task Force – ARES (“JTF-ARES”). JTF-ARES was set up as a task force by the U.S. Cyber Command to disrupt ISIS cyberoperations – a singularly cyber (as opposed to kinetic) goal. By contrasting the approach of JTF-ARES with the existing history of US operations in cyberspace, militaries can apply JTF-ARES’ successful approach to accomplish future cyber-related goals that are independent of kinetic military units. After discussing a brief history of the U.S. Cyber Command and defining the terms “persistence” and “jointness,” the paper discusses JTF-ARES’ successful operation and contributing factors, most notably its organization within the U.S. Cyber Command. Next, it explores a counterfactual organization of JTF-ARES, suggesting that alternative organizational structures would likely have ended in failure and highlighting factors that may have influenced its success. Furthermore, the paper discusses the administrative challenges associated with creating a JTF, which include administration hurdles as well as collaboration and training requirements specific to joint operations. Since JTF-ARES deviates from traditional organizational structures within U.S. Cyber Command, this paper articulates criteria for creating a joint, persistent cyber task force, which militaries may find useful when considering how to implement cyber-specific goals. The first criterion concerns the operations required for the mission – namely, are reconnaissance, offensive, and defensive cyberoperations required? The second criterion asks whether the cyberoperation has a uniquely cyber-oriented end state: for missions with non-kinetic goals, it may be helpful to consider a joint, persistent task force.","PeriodicalId":258360,"journal":{"name":"European Conference on Cyber Warfare and Security","volume":"108 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115621965","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Processing Model and Classification of Cybercognitive Attacks: Based on Cognitive Psychology 基于认知心理学的网络认知攻击加工模型与分类
Pub Date : 2023-06-19 DOI: 10.34190/eccws.22.1.1015
Ki Beom Kim, Eugene Lim, Hun-Yeong Kwon
Cybercognitive attacks, as witnessed in large and small wars and events along with the recent Russia-Ukraine war, are no longer traditional cyber operations, but are increasingly attacking the psychological weaknesses of targeted members of society and target organizations. Therefore, it is timely to systematically analyse and model cybercognitive attacks. Various definitions and case analyses of cybercognitive attacks are currently being actively conducted, but studies on clear classification and processing models of cybercognitive attacks are almost absent. Accordingly, this paper analyzed cases of cybercognitive attacks. The types derived through case analysis were divided into four categories, and cybercognitive attacks were classified and defined. On such basis, a processing model for cybercognitive attacks was designed, and furthermore, cybercognitive attack layers were classified and presented from the attacker and defender's perspective. The corresponding model and layer presented in this paper model both the countermeasures that can be used to perform cyber operations and the psychological mechanisms hidden in each response process. Specifically, a psychology-based cybercognitive attack processing model was designed to achieve goals by inducing behaviour from collecting information for system managers to inducing response/cognitive processing/decision making/compensation. As such, this paper focused on clarifying the definition of cybercognitive attacks and establishing performance procedures, which are only used as actions using deception by presenting cybercognitive attacks scientifically and logically using psychology descriptions. With that, this paper is expected to serve as the ground for cybercognitive kill chain research that can defend against further cyberattacks using cognitive vulnerabilities.
网络认知攻击,在大大小小的战争和事件以及最近的俄罗斯-乌克兰战争中都可以看到,不再是传统的网络行动,而是越来越多地攻击目标社会成员和目标组织的心理弱点。因此,系统地分析和建模网络认知攻击是及时的。目前,人们对网络认知攻击的各种定义和案例分析都很活跃,但对网络认知攻击的明确分类和处理模型的研究却很少。据此,本文对网络认知攻击案例进行了分析。通过案例分析,将网络认知攻击类型分为四类,并对网络认知攻击进行了分类和定义。在此基础上,设计了网络认知攻击的处理模型,并从攻击者和防御者的角度对网络认知攻击层进行了分类和呈现。本文提出的相应模型和层次既模拟了实施网络作战的对策,也模拟了每种应对过程中隐藏的心理机制。具体而言,设计了一个基于心理学的网络认知攻击处理模型,通过诱导行为来实现目标,从为系统管理员收集信息到诱导反应/认知加工/决策/补偿。因此,本文重点阐明了网络认知攻击的定义,并通过心理学描述科学、逻辑地呈现网络认知攻击,建立了仅作为欺骗行为的行为程序。因此,本文有望成为网络认知杀伤链研究的基础,该研究可以利用认知漏洞防御进一步的网络攻击。
{"title":"Processing Model and Classification of Cybercognitive Attacks: Based on Cognitive Psychology","authors":"Ki Beom Kim, Eugene Lim, Hun-Yeong Kwon","doi":"10.34190/eccws.22.1.1015","DOIUrl":"https://doi.org/10.34190/eccws.22.1.1015","url":null,"abstract":"Cybercognitive attacks, as witnessed in large and small wars and events along with the recent Russia-Ukraine war, are no longer traditional cyber operations, but are increasingly attacking the psychological weaknesses of targeted members of society and target organizations. Therefore, it is timely to systematically analyse and model cybercognitive attacks. Various definitions and case analyses of cybercognitive attacks are currently being actively conducted, but studies on clear classification and processing models of cybercognitive attacks are almost absent. Accordingly, this paper analyzed cases of cybercognitive attacks. The types derived through case analysis were divided into four categories, and cybercognitive attacks were classified and defined. On such basis, a processing model for cybercognitive attacks was designed, and furthermore, cybercognitive attack layers were classified and presented from the attacker and defender's perspective. The corresponding model and layer presented in this paper model both the countermeasures that can be used to perform cyber operations and the psychological mechanisms hidden in each response process. Specifically, a psychology-based cybercognitive attack processing model was designed to achieve goals by inducing behaviour from collecting information for system managers to inducing response/cognitive processing/decision making/compensation. As such, this paper focused on clarifying the definition of cybercognitive attacks and establishing performance procedures, which are only used as actions using deception by presenting cybercognitive attacks scientifically and logically using psychology descriptions. With that, this paper is expected to serve as the ground for cybercognitive kill chain research that can defend against further cyberattacks using cognitive vulnerabilities.","PeriodicalId":258360,"journal":{"name":"European Conference on Cyber Warfare and Security","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114544711","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Digital Streets of Rage: Identifying Rhizomatic Extremist Messages During a Hybrid Media Event using Natural Language Processing 愤怒的数字街道:在使用自然语言处理的混合媒体事件中识别根茎极端主义信息
Pub Date : 2023-06-19 DOI: 10.34190/eccws.22.1.1128
Teija Sederholm, Petri Jääskeläinen, Milla Lonka, A. Huhtinen
This research explores how to identify extreme messages during a hybrid media event happening in a small language area by utilizing natural language processing (NLP), a type of artificial intelligence (AI). A hybrid media event gathers attention all sides of the media environment: mainstream media, social media, instant messaging apps and fringe communities. Hybrid media events call attention for participation and activities both in the physical world and online. On the darker side of media events, the media landscape can act as a channel for all kinds of disinformation, hate speech and conspiracy theories. In addition, fringe communities such as 4chan also spread hate speech and duplicated content during hybrid media events. From theoretical point of view, this connection between the physical world and information networks can be seen as rhizomatic in nature, because information spreads without regard to a traditional hierarchy. The result is that when individuals participate in a big media event, there is a viral awareness of different viewpoints and all kind of topics may be posted online for discussion. In addition, in rhizomatic context different kind of arguments can twist each other, “copy and paste”, and create very diversity meanings of new comments. The role of extremist speech in online spaces can have effects in physical world. The focus of this paper is to present the findings of a case study on messages posted online by three different actor groups who participated in demonstrations organized on Finnish Independence Day. In this research, two data sets were collected from Twitter and Telegram and Natural Language Processing (NLP) was used to classify messages using extremist media index labels. Three actor groups were identified as participating in the demonstrations, and they were labelled as: far-right, antifascists and conspiracists. Computational analysis was done by using NLP to categorize the messages based upon the definitions provided by the extremist media index. The analysis shows how AI technology can help identifying messages which include extremist content and approve the use of violence in a small language area. The model of rhizome was valid in making the connections between fringe, extremist content and moderate discussion visible. This article is part of larger project related to extremist networks and criminality in online darknet environments.
本研究探讨了如何利用人工智能(AI)的一种自然语言处理(NLP),在小语言区域发生的混合媒体事件中识别极端信息。一个混合媒体事件聚集了媒体环境的各个方面的关注:主流媒体,社交媒体,即时通讯应用程序和边缘社区。混合媒体活动呼吁人们关注现实世界和网络世界的参与和活动。在媒体事件的阴暗面,媒体景观可以成为各种虚假信息、仇恨言论和阴谋论的渠道。此外,像4chan这样的边缘社区也在混合媒体活动中传播仇恨言论和复制内容。从理论的角度来看,物理世界和信息网络之间的这种联系在本质上可以看作是根茎状的,因为信息的传播不考虑传统的等级制度。结果是,当个人参与一个大型媒体活动时,不同观点的意识就会像病毒一样传播开来,各种话题都可能被发布到网上进行讨论。此外,在根茎上下文中,不同类型的论点可以相互扭曲,“复制粘贴”,并创造出非常多样化的新评论含义。网络空间中的极端言论可能会对现实世界产生影响。本文的重点是展示一个案例研究的结果,该研究是关于三个不同的演员团体在芬兰独立日参加示威活动时在网上发布的信息。在本研究中,从Twitter和Telegram收集了两个数据集,并使用自然语言处理(NLP)对极端媒体索引标签的消息进行分类。三个演员团体被确定参与了示威活动,他们被贴上了极右翼、反法西斯和阴谋论者的标签。根据极端主义媒体索引提供的定义,使用NLP对信息进行计算分析。该分析显示了人工智能技术如何帮助识别包含极端主义内容的信息,并批准在小语种地区使用暴力。根茎模型在边缘、极端内容和温和讨论之间的联系是有效的。这篇文章是与极端主义网络和在线暗网环境中的犯罪有关的大型项目的一部分。
{"title":"Digital Streets of Rage: Identifying Rhizomatic Extremist Messages During a Hybrid Media Event using Natural Language Processing","authors":"Teija Sederholm, Petri Jääskeläinen, Milla Lonka, A. Huhtinen","doi":"10.34190/eccws.22.1.1128","DOIUrl":"https://doi.org/10.34190/eccws.22.1.1128","url":null,"abstract":"This research explores how to identify extreme messages during a hybrid media event happening in a small language area by utilizing natural language processing (NLP), a type of artificial intelligence (AI). A hybrid media event gathers attention all sides of the media environment: mainstream media, social media, instant messaging apps and fringe communities. Hybrid media events call attention for participation and activities both in the physical world and online. On the darker side of media events, the media landscape can act as a channel for all kinds of disinformation, hate speech and conspiracy theories. In addition, fringe communities such as 4chan also spread hate speech and duplicated content during hybrid media events. From theoretical point of view, this connection between the physical world and information networks can be seen as rhizomatic in nature, because information spreads without regard to a traditional hierarchy. The result is that when individuals participate in a big media event, there is a viral awareness of different viewpoints and all kind of topics may be posted online for discussion. In addition, in rhizomatic context different kind of arguments can twist each other, “copy and paste”, and create very diversity meanings of new comments. The role of extremist speech in online spaces can have effects in physical world. \u0000The focus of this paper is to present the findings of a case study on messages posted online by three different actor groups who participated in demonstrations organized on Finnish Independence Day. In this research, two data sets were collected from Twitter and Telegram and Natural Language Processing (NLP) was used to classify messages using extremist media index labels. Three actor groups were identified as participating in the demonstrations, and they were labelled as: far-right, antifascists and conspiracists. Computational analysis was done by using NLP to categorize the messages based upon the definitions provided by the extremist media index. The analysis shows how AI technology can help identifying messages which include extremist content and approve the use of violence in a small language area. The model of rhizome was valid in making the connections between fringe, extremist content and moderate discussion visible. This article is part of larger project related to extremist networks and criminality in online darknet environments.","PeriodicalId":258360,"journal":{"name":"European Conference on Cyber Warfare and Security","volume":"73 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117324933","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
European Conference on Cyber Warfare and Security
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1