首页 > 最新文献

European Conference on Cyber Warfare and Security最新文献

英文 中文
Semiotics of Strategic Narratives of "Antichrist" in Russia’s War in Ukraine 俄罗斯乌克兰战争中“敌基督”战略叙事的符号学研究
Pub Date : 2023-06-19 DOI: 10.34190/eccws.22.1.1102
M. Hotchkiss
The Russian war in Ukraine which began on February 24, 2022 coincides with the ongoing schism of the Moscow Patriarchate of the Russian Orthodox Church from the Ecumenical Patriarchate of Constantinople, to which the Orthodox Church of Ukraine affiliates. In this setting, spiritual and secular leaders in Russia and Ukraine have mutually utilised narratives of the Antichrist and Satan to explain Russian attacks on Ukraine, imbuing a “spiritual” dimension to the strategic communications in the conflict. This paper applies a semiotic approach to analysing the antichrist and satanic myths at play in the context of ideological “strategic narratives”, and the conflict of meanings which emerges from these competing narratives. In Russia, these ideomyths have long been utilised as ideological tools which place the nation metaphysically in perennial militant opposition to the West. However, Ukraine which is striving to leave the Russian orbit and join the West has reciprocally framed Russia and its leader in similar concepts. In conclusion, this paper argues that there is opportunity for the creation of political messaging which can frame the conflict in spiritual and moral terms that can resonate with both Western and Russian thinkers.
俄罗斯在乌克兰的战争始于2022年2月24日,与此同时,俄罗斯东正教莫斯科宗主教区与乌克兰东正教附属的君士坦丁堡普世宗主教区正在分裂。在这种背景下,俄罗斯和乌克兰的精神和世俗领袖相互利用反基督者和撒旦的叙述来解释俄罗斯对乌克兰的袭击,为冲突中的战略沟通注入了“精神”层面。本文运用符号学方法分析了意识形态“战略叙事”背景下的反基督和撒旦神话,以及这些相互竞争的叙事所产生的意义冲突。在俄罗斯,这些意识形态神话长期以来一直被用作意识形态工具,将这个国家形而上地置于与西方长期斗争的对立面。然而,正在努力脱离俄罗斯轨道并加入西方的乌克兰也以类似的概念相互陷害俄罗斯及其领导人。总之,本文认为,有机会创造政治信息,可以在精神和道德方面构建冲突,这可以引起西方和俄罗斯思想家的共鸣。
{"title":"Semiotics of Strategic Narratives of \"Antichrist\" in Russia’s War in Ukraine","authors":"M. Hotchkiss","doi":"10.34190/eccws.22.1.1102","DOIUrl":"https://doi.org/10.34190/eccws.22.1.1102","url":null,"abstract":"The Russian war in Ukraine which began on February 24, 2022 coincides with the ongoing schism of the Moscow Patriarchate of the Russian Orthodox Church from the Ecumenical Patriarchate of Constantinople, to which the Orthodox Church of Ukraine affiliates. In this setting, spiritual and secular leaders in Russia and Ukraine have mutually utilised narratives of the Antichrist and Satan to explain Russian attacks on Ukraine, imbuing a “spiritual” dimension to the strategic communications in the conflict. This paper applies a semiotic approach to analysing the antichrist and satanic myths at play in the context of ideological “strategic narratives”, and the conflict of meanings which emerges from these competing narratives. In Russia, these ideomyths have long been utilised as ideological tools which place the nation metaphysically in perennial militant opposition to the West. However, Ukraine which is striving to leave the Russian orbit and join the West has reciprocally framed Russia and its leader in similar concepts. In conclusion, this paper argues that there is opportunity for the creation of political messaging which can frame the conflict in spiritual and moral terms that can resonate with both Western and Russian thinkers.","PeriodicalId":258360,"journal":{"name":"European Conference on Cyber Warfare and Security","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130693987","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Digital Forensic in A Virtual World; A Case of Metaverse and VR 虚拟世界中的数字取证研究虚拟现实和虚拟现实的案例
Pub Date : 2023-06-19 DOI: 10.34190/eccws.22.1.1149
Tayba Al ali, Sara Al Fulaiti, Manal Abuzour, Sheikha Almaqahami, R. Ikuesan
Metaverse is a virtual space where users can interact with each other. It is a combination of virtual reality, augmented reality, and mixed reality. This evolving technology can offer many exciting opportunities that can be used for individuals and businesses. Although this technology has many advantages, people are misusing it for their benefit. Many cyberattacks are occurring in the metaverse world because it has various vulnerabilities and privacy issues. This paper explains four cyberattacks and a case scenario of each attack as it relates to the metaverse. Additionally, this study developed a metaverse forensic framework that can be used to investigate cyberattacks in the metaverse world. Furthermore, this study describes how forensic examiners can conduct a forensic investigation using state-of-the-art forensic solutions and tools. The developed framework can be used by forensic examiners, security researchers, as well as the general scientific community for the security of the metaverse.
虚拟世界是一个用户可以相互交流的虚拟空间。它是虚拟现实、增强现实和混合现实的结合。这种不断发展的技术可以为个人和企业提供许多令人兴奋的机会。尽管这项技术有很多优点,但人们为了自己的利益而滥用它。许多网络攻击发生在虚拟世界,因为它有各种漏洞和隐私问题。本文解释了四种网络攻击以及与元宇宙相关的每种攻击的案例场景。此外,本研究还开发了一个可用于调查虚拟世界网络攻击的虚拟取证框架。此外,本研究描述了法医检验员如何使用最先进的法医解决方案和工具进行法医调查。开发的框架可以被法医审查员、安全研究人员以及一般的科学社区用于虚拟世界的安全。
{"title":"Digital Forensic in A Virtual World; A Case of Metaverse and VR","authors":"Tayba Al ali, Sara Al Fulaiti, Manal Abuzour, Sheikha Almaqahami, R. Ikuesan","doi":"10.34190/eccws.22.1.1149","DOIUrl":"https://doi.org/10.34190/eccws.22.1.1149","url":null,"abstract":"Metaverse is a virtual space where users can interact with each other. It is a combination of virtual reality, augmented reality, and mixed reality. This evolving technology can offer many exciting opportunities that can be used for individuals and businesses. Although this technology has many advantages, people are misusing it for their benefit. Many cyberattacks are occurring in the metaverse world because it has various vulnerabilities and privacy issues. This paper explains four cyberattacks and a case scenario of each attack as it relates to the metaverse. Additionally, this study developed a metaverse forensic framework that can be used to investigate cyberattacks in the metaverse world. Furthermore, this study describes how forensic examiners can conduct a forensic investigation using state-of-the-art forensic solutions and tools. The developed framework can be used by forensic examiners, security researchers, as well as the general scientific community for the security of the metaverse.","PeriodicalId":258360,"journal":{"name":"European Conference on Cyber Warfare and Security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128814665","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A New Interpretation of Integrated Deterrence: Physical and Virtual Strategies 综合威慑的新诠释:物理与虚拟战略
Pub Date : 2023-06-19 DOI: 10.34190/eccws.22.1.1314
Jim Chen
The integrated deterrence strategy, backstopped by nuclear deterrent, calls for seamless collaboration in deterrence across warfighting domains, using all instruments of national power, and with allies and partners. Being a warfighting domain and being closely related to the information instrument of national power, the cyber domain should certainly be included, and cyber deterrence should play a significant role in the integrated deterrence strategy. Nevertheless, as cyber deterrence seems not to be as effective as it is expected at least currently, some scholars and practitioners doubt its mere existence, not mentioning the role that it can play in the integrated deterrence strategy. This paper argues that not having deterrence in cyberspace leaves a blank spot in the strategy since some critical functionality of deterrence in cyberspace cannot easily be replaced. By recognizing the unique strategic context of cyberspace, the paper maintains that deterrent effect can actually be achieved in unique ways in this space. To further explore the unique role that deterrence in cyberspace plays within the integrated deterrence strategy, this paper proposes a multi-level and multi-aspect architecture for integrated deterrence strategy. This novel architecture is able to cover varied levels of strategic environments both below and above the threshold of armed conflict. It is also able to correlate varied deterrent measures with varied strategic environments categorized via various aspects, such as diplomacy, information, military, economy, etc. This paper shows that the inclusion of deterrence in cyberspace can empower the strategy by making the strategy flexible enough in tackling various challenges. Eventually, the strategy can make its contribution in preventing war and maintaining peace.
以核威慑为后盾的综合威慑战略要求在各个作战领域进行无缝协作,使用国家力量的所有工具,并与盟国和伙伴进行威慑。网络领域作为作战领域,与国家权力的信息工具密切相关,当然应该纳入其中,网络威慑应该在综合威慑战略中发挥重要作用。然而,至少从目前来看,网络威慑似乎并不像预期的那样有效,一些学者和实践者怀疑它的存在,更不用说它在综合威慑战略中可以发挥的作用。本文认为,由于网络空间威慑的一些关键功能无法轻易取代,因此不具备网络空间威慑在战略上留下了空白。通过认识到网络空间独特的战略背景,本文认为,在这一空间中,威慑效果实际上可以通过独特的方式实现。为进一步探索网络空间威慑在综合威慑战略中发挥的独特作用,本文提出了一个多层次、多面向的综合威慑战略架构。这种新颖的架构能够涵盖武装冲突阈值以下和以上的各种战略环境。它还能够将各种威慑措施与通过外交、信息、军事、经济等各个方面分类的各种战略环境相关联。本文表明,将威慑纳入网络空间可以使战略在应对各种挑战时具有足够的灵活性,从而赋予战略权力。最终,该战略可以在防止战争和维护和平方面做出贡献。
{"title":"A New Interpretation of Integrated Deterrence: Physical and Virtual Strategies","authors":"Jim Chen","doi":"10.34190/eccws.22.1.1314","DOIUrl":"https://doi.org/10.34190/eccws.22.1.1314","url":null,"abstract":"The integrated deterrence strategy, backstopped by nuclear deterrent, calls for seamless collaboration in deterrence across warfighting domains, using all instruments of national power, and with allies and partners. Being a warfighting domain and being closely related to the information instrument of national power, the cyber domain should certainly be included, and cyber deterrence should play a significant role in the integrated deterrence strategy. Nevertheless, as cyber deterrence seems not to be as effective as it is expected at least currently, some scholars and practitioners doubt its mere existence, not mentioning the role that it can play in the integrated deterrence strategy. This paper argues that not having deterrence in cyberspace leaves a blank spot in the strategy since some critical functionality of deterrence in cyberspace cannot easily be replaced. By recognizing the unique strategic context of cyberspace, the paper maintains that deterrent effect can actually be achieved in unique ways in this space. To further explore the unique role that deterrence in cyberspace plays within the integrated deterrence strategy, this paper proposes a multi-level and multi-aspect architecture for integrated deterrence strategy. This novel architecture is able to cover varied levels of strategic environments both below and above the threshold of armed conflict. It is also able to correlate varied deterrent measures with varied strategic environments categorized via various aspects, such as diplomacy, information, military, economy, etc. This paper shows that the inclusion of deterrence in cyberspace can empower the strategy by making the strategy flexible enough in tackling various challenges. Eventually, the strategy can make its contribution in preventing war and maintaining peace.","PeriodicalId":258360,"journal":{"name":"European Conference on Cyber Warfare and Security","volume":"111 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116463360","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Designing an Email Attack by Analysing the Victim’s Profile. An Alternative Anti-Phishing Training Method 通过分析受害者的个人资料设计电子邮件攻击。另一种反网络钓鱼培训方法
Pub Date : 2023-06-19 DOI: 10.34190/eccws.22.1.1178
D. Lappas, P. Karampelas
According to Thomson-Reuters the top cyber threat today is phishing in which people are tricked either to click a malicious link or give out personal information. It’s a fact that 96% of these phishing attacks comes from emails, which amount to more than 3.4 billion daily, as reported by Cisco. Austrian aerospace company FACC, Belgian bank Crelan, Acorn financial services and many other companies were recently fell victims of phishing emails losing millions of dollars. Even if experts provide lists of signs that users should seek in an email in order to understand if it is legitimate or scam, the attackers have elevated the quality of the email messages making them believable and very hard to discern them. In order to respond to this elevated threat, unconventional user training is required, focusing on recognizing a phishing email. Knowing how an attacker thinks and prepares the attack vector against a target, we claim that it will make users more suspicious when they receive one. In this regard, an innovative education intervention (consisted of two phases) was designed and developed. In the first phase, 98 participants were asked to visit an artificial social media profile and prepare a phishing email in order to persuade the victim to click a link. Then, the participants were presented with an innovative guided workflow to prepare a spear phishing email which was based on social media intelligence. In the second phase, they were asked to prepare one more email for the same person applying this time the guided workflow. Comparing the two different emails created, we found that the guided workflow led to the creation of more authentic emails which could potentially trick the victim easier. Based on the theory of active learning, we believe that by teaching users how attackers exploit their personal information in order to develop their attack vectors, it will increase their awareness not only for the typical phishing emails but also for more sophisticated spear phishing attacks.
据汤森路透报道,当今最大的网络威胁是网络钓鱼,人们被诱骗点击恶意链接或提供个人信息。事实上,根据思科的报告,96%的网络钓鱼攻击来自电子邮件,每天的电子邮件数量超过34亿封。奥地利航空航天公司FACC、比利时克兰银行、Acorn金融服务公司和许多其他公司最近都成为了网络钓鱼邮件的受害者,损失了数百万美元。即使专家提供了用户应该在电子邮件中寻找的迹象列表,以便了解它是合法的还是骗局,攻击者也提高了电子邮件信息的质量,使它们变得可信,并且很难辨别。为了应对这种升级的威胁,需要非常规的用户培训,重点是识别网络钓鱼电子邮件。了解攻击者如何思考和准备针对目标的攻击向量,我们声称当用户收到攻击向量时,这会使他们更加怀疑。在这方面,设计和开发了一种创新的教育干预(包括两个阶段)。在第一阶段,98名参与者被要求访问一个虚假的社交媒体个人资料,并准备一封网络钓鱼邮件,以说服受害者点击链接。然后,向参与者展示了一个创新的指导工作流程,以准备基于社交媒体情报的鱼叉式网络钓鱼电子邮件。在第二阶段,他们被要求为同一个人准备另一封电子邮件,这一次他们应用了指导的工作流程。比较两种不同的电子邮件,我们发现引导的工作流程导致创建更真实的电子邮件,这可能更容易欺骗受害者。基于主动学习理论,我们认为,通过教导用户攻击者如何利用他们的个人信息来开发攻击向量,不仅可以提高他们对典型的网络钓鱼邮件的认识,还可以提高他们对更复杂的鱼叉式网络钓鱼攻击的认识。
{"title":"Designing an Email Attack by Analysing the Victim’s Profile. An Alternative Anti-Phishing Training Method","authors":"D. Lappas, P. Karampelas","doi":"10.34190/eccws.22.1.1178","DOIUrl":"https://doi.org/10.34190/eccws.22.1.1178","url":null,"abstract":"According to Thomson-Reuters the top cyber threat today is phishing in which people are tricked either to click a malicious link or give out personal information. It’s a fact that 96% of these phishing attacks comes from emails, which amount to more than 3.4 billion daily, as reported by Cisco. Austrian aerospace company FACC, Belgian bank Crelan, Acorn financial services and many other companies were recently fell victims of phishing emails losing millions of dollars. Even if experts provide lists of signs that users should seek in an email in order to understand if it is legitimate or scam, the attackers have elevated the quality of the email messages making them believable and very hard to discern them. In order to respond to this elevated threat, unconventional user training is required, focusing on recognizing a phishing email. Knowing how an attacker thinks and prepares the attack vector against a target, we claim that it will make users more suspicious when they receive one. In this regard, an innovative education intervention (consisted of two phases) was designed and developed. In the first phase, 98 participants were asked to visit an artificial social media profile and prepare a phishing email in order to persuade the victim to click a link. Then, the participants were presented with an innovative guided workflow to prepare a spear phishing email which was based on social media intelligence. In the second phase, they were asked to prepare one more email for the same person applying this time the guided workflow. Comparing the two different emails created, we found that the guided workflow led to the creation of more authentic emails which could potentially trick the victim easier. Based on the theory of active learning, we believe that by teaching users how attackers exploit their personal information in order to develop their attack vectors, it will increase their awareness not only for the typical phishing emails but also for more sophisticated spear phishing attacks.","PeriodicalId":258360,"journal":{"name":"European Conference on Cyber Warfare and Security","volume":"167 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127198512","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Hybrid threats-possible consequences in societal contexts 混合威胁——在社会环境中可能产生的后果
Pub Date : 2023-06-19 DOI: 10.34190/eccws.22.1.1119
Georgiana-Daniela Lupulescu
Hybrid threats have become a persistent term in the 21st century geopolitical architecture, acquiring new values ​​as innovative unconventional means come to be used by both state and non-state actors in contemporary conflicts, with a view to obtaining strategic advantages, yet with devastating consequences at individual level. While the armed conflict effects have long been studied, the war metamorphosis with hybrid threats innuendos bring new challenges in assessing societal consequences, even more so, as they are increasingly identified in apparently peaceful times. A multifaced perspective on the threat outcome reveals multiple latent consequences, such as physical, material, psychological and emotional ones. Fear, one of the dominant human emotions, is the first to be triggered when any threat is present, regardless of its occurrence probability or possible effects. Fear becomes a strong drive for individuals’ future actions, sometimes prompting an offensive or defensive reaction previously embedded in the main actor’s behavior. In this context, the present paper aims to identify, analyze and understand the Russian-Ukrainian conflict consequences on the European states’ neighboring population, looking at the reactions and decisions triggered by fear. Using observation as a research method but also the case study method, we identified a series of similarities and differences in these countries’ reaction to solving situations, migration- generated crises, Russian disinformation and propaganda and Ukraine or other European state oriented cyber-attack. The main goal for this approach is to highlight the hybrid threats emotional consequences in conflicts that are more than psychological. Moreover, this is a preliminary step in a PhD research thesis with a view to provide states with solutions for resilience policies, to ensure their citizens’ survival and well-being.
混合威胁已成为21世纪地缘政治架构中的一个持久术语,随着国家和非国家行为体在当代冲突中使用创新的非常规手段,获得新的价值,以期获得战略优势,但在个人层面上造成毁灭性后果。尽管人们对武装冲突的影响进行了长期的研究,但带有混合威胁暗示的战争蜕变为评估社会后果带来了新的挑战,尤其是在明显的和平时期,人们越来越多地认识到这一点。对威胁结果的多面视角揭示了多重潜在后果,如身体、物质、心理和情感方面的后果。恐惧是人类的主要情绪之一,当任何威胁出现时,无论其发生的概率或可能的影响如何,它都是首先被触发的。恐惧成为个人未来行为的强大驱动力,有时会引发先前嵌入主要行为者行为中的攻击或防御反应。在此背景下,本文旨在识别、分析和理解俄罗斯-乌克兰冲突对欧洲国家邻国人口的影响,研究恐惧引发的反应和决定。我们将观察作为一种研究方法,同时也采用案例研究方法,确定了这些国家在解决局势、移民引发的危机、俄罗斯的虚假信息和宣传以及乌克兰或其他欧洲国家导向的网络攻击方面的一系列反应的异同。这种方法的主要目标是强调冲突中的混合威胁和情绪后果,而不仅仅是心理上的。此外,这是博士研究论文的初步步骤,旨在为各国提供弹性政策的解决方案,以确保其公民的生存和福祉。
{"title":"Hybrid threats-possible consequences in societal contexts","authors":"Georgiana-Daniela Lupulescu","doi":"10.34190/eccws.22.1.1119","DOIUrl":"https://doi.org/10.34190/eccws.22.1.1119","url":null,"abstract":"Hybrid threats have become a persistent term in the 21st century geopolitical architecture, acquiring new values ​​as innovative unconventional means come to be used by both state and non-state actors in contemporary conflicts, with a view to obtaining strategic advantages, yet with devastating consequences at individual level. While the armed conflict effects have long been studied, the war metamorphosis with hybrid threats innuendos bring new challenges in assessing societal consequences, even more so, as they are increasingly identified in apparently peaceful times. A multifaced perspective on the threat outcome reveals multiple latent consequences, such as physical, material, psychological and emotional ones. Fear, one of the dominant human emotions, is the first to be triggered when any threat is present, regardless of its occurrence probability or possible effects. Fear becomes a strong drive for individuals’ future actions, sometimes prompting an offensive or defensive reaction previously embedded in the main actor’s behavior. In this context, the present paper aims to identify, analyze and understand the Russian-Ukrainian conflict consequences on the European states’ neighboring population, looking at the reactions and decisions triggered by fear. Using observation as a research method but also the case study method, we identified a series of similarities and differences in these countries’ reaction to solving situations, migration- generated crises, Russian disinformation and propaganda and Ukraine or other European state oriented cyber-attack. The main goal for this approach is to highlight the hybrid threats emotional consequences in conflicts that are more than psychological. Moreover, this is a preliminary step in a PhD research thesis with a view to provide states with solutions for resilience policies, to ensure their citizens’ survival and well-being.","PeriodicalId":258360,"journal":{"name":"European Conference on Cyber Warfare and Security","volume":"258 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124232111","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Detect, Deny, Degrade, Disrupt, Destroy, Deceive: which is the greatest in OCO? 探测、否认、降级、干扰、破坏、欺骗:OCO中哪个是最大的?
Pub Date : 2023-06-19 DOI: 10.34190/eccws.22.1.1089
Tim D. Grant
In the cyber kill chain literature, possible courses of action are listed as detect, deny, degrade, disrupt, destroy, and deceive (a.k.a. “the 6Ds”). These verbs denote defensive action to be taken against an intruder. By comparison, military doctrine for cyberspace operations encompasses cyberspace exploitation and attack, as well as defence. The question arises whether the 6Ds are also applicable to offensive action, i.e. exploitation and attack, or whether additional action verbs are needed. Military doctrine is evolving towards all-domain operations, in which action in cyberspace is integrated with action in the physical domains of land, sea, air, and space. This prompts the question as to whether the 6Ds are also suited to action in a physical domain. A pilot study of actual military operations that integrated cyber and physical action suggests that deception, delay, and denial of organisational and cyber entities is suited to cyber action, while seizure, capture, and destruction of physical entities is suited to physical action. Preference among action verbs may indicate when it is best to engage targets using cyber or physical resources and which action is preferred. This paper identifies which action verbs are best suited to offensive cyber operations in the context of all-domain operations. The paper reviews related theory on cyberspace and the cyber kill chain. It identifies action verbs in US Department of Defense (DoD) doctrine on information and cyberspace operations, comparing them to those in the US DoD Dictionary of Military and Associated Terms. After discussing the findings, the paper draws conclusions and recommends further work.
在网络杀伤链的文献中,可能的行动方案被列出为探测、拒绝、降级、破坏、摧毁和欺骗(又名“6d”)。这些动词都表示对入侵者采取的防御行动。相比之下,网络空间作战的军事理论包括网络空间的利用和攻击,以及防御。问题是6d是否也适用于进攻性行为,即利用和攻击,或者是否需要额外的动作动词。军事理论正朝着全域作战的方向发展,即网络空间的行动与陆地、海洋、空中和太空等物理领域的行动相结合。这就提出了一个问题,即6d是否也适合在物理领域采取行动。一项综合网络和实体行动的实际军事行动的试点研究表明,对组织和网络实体的欺骗、延迟和拒绝适用于网络行动,而对实体实体的扣押、捕获和破坏适用于实体行动。动作动词之间的偏好可能表明何时使用网络或物理资源与目标交战是最好的,以及哪种动作是首选的。本文确定了在全域作战背景下,哪些动作动词最适合进攻性网络作战。本文综述了网络空间和网络杀伤链的相关理论。它识别了美国国防部(DoD)关于信息和网络空间作战的学说中的行为动词,并将其与美国国防部军事及相关术语词典中的行为动词进行了比较。在讨论了这些发现之后,论文得出结论并建议进一步的工作。
{"title":"Detect, Deny, Degrade, Disrupt, Destroy, Deceive: which is the greatest in OCO?","authors":"Tim D. Grant","doi":"10.34190/eccws.22.1.1089","DOIUrl":"https://doi.org/10.34190/eccws.22.1.1089","url":null,"abstract":"In the cyber kill chain literature, possible courses of action are listed as detect, deny, degrade, disrupt, destroy, and deceive (a.k.a. “the 6Ds”). These verbs denote defensive action to be taken against an intruder. By comparison, military doctrine for cyberspace operations encompasses cyberspace exploitation and attack, as well as defence. The question arises whether the 6Ds are also applicable to offensive action, i.e. exploitation and attack, or whether additional action verbs are needed. Military doctrine is evolving towards all-domain operations, in which action in cyberspace is integrated with action in the physical domains of land, sea, air, and space. This prompts the question as to whether the 6Ds are also suited to action in a physical domain. A pilot study of actual military operations that integrated cyber and physical action suggests that deception, delay, and denial of organisational and cyber entities is suited to cyber action, while seizure, capture, and destruction of physical entities is suited to physical action. Preference among action verbs may indicate when it is best to engage targets using cyber or physical resources and which action is preferred. This paper identifies which action verbs are best suited to offensive cyber operations in the context of all-domain operations. The paper reviews related theory on cyberspace and the cyber kill chain. It identifies action verbs in US Department of Defense (DoD) doctrine on information and cyberspace operations, comparing them to those in the US DoD Dictionary of Military and Associated Terms. After discussing the findings, the paper draws conclusions and recommends further work.","PeriodicalId":258360,"journal":{"name":"European Conference on Cyber Warfare and Security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129732116","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Whole-of-Society Approach to Organise for Offensive Cyberspace Operations: The Case of the Smart State Sweden 组织进攻性网络空间行动的全社会方法:智能国家瑞典的案例
Pub Date : 2023-06-19 DOI: 10.34190/eccws.22.1.1188
Gazmend Huskaj, Stefan Axelsson
Threat actors conduct offensive cyberspace operations for many purposes, such as espionage, to destroy information assets, and cybercrime. These operations are possible thanks to the innovation and development of information and communications technologies (ICT). Interconnected information systems have transformed societies positively. However, specific states exploit these systems' vulnerabilities to advance their strategic national interests. Therefore, it is important to know how a state can organise itself to defend against threat actors. The purpose of this research is to present how the smart state Sweden can through a whole-of-society approach organise for Offensive Cyberspace Operations. The intent is to conduct an active and independent foreign-, security- and defence policy, but also as a base for deterrence and defence. This article is based on a mixed methods approach. It uses the case study research strategy to discover new information. Fourteen men and women participated in individual semi-structured interviews. The respondents ranged in age from 40 to 65 with more than 20 years of experience in cyberspace operations, intelligence operations, military operations, special forces operations, and knowledge and understanding about information warfare and information operations. The analytic strategies include thematic analysis and quantitative methods to interpret the data. The results show many themes, but the article is especially focused on the themes of Operations, Capability, Policy & Governance, and Legal Frameworks. Finally, a conceptual map of a whole-of-society approach to organise for offensive cyberspace operations is presented inferred from the themes, codes, and content, and mapped to each responsible agency based on the interviews and codes. The answer to the research question is that Sweden should have a whole-of-society approach to organise for Offensive Cyberspace Operations to project power in and through cyberspace with the intent to conduct an active and independent foreign, security and defence policy and for deterrence, as described in Figure 2.
威胁行为者出于多种目的进行攻击性网络空间行动,如间谍活动、破坏信息资产和网络犯罪。由于信息和通信技术(ICT)的创新和发展,这些行动成为可能。互联的信息系统积极地改变了社会。然而,某些国家利用这些系统的脆弱性来推进其战略国家利益。因此,了解一个国家如何组织起来抵御威胁行为者是很重要的。本研究的目的是展示智能国家瑞典如何通过全社会方法组织进攻性网络空间行动。其目的是实施积极和独立的外交、安全和国防政策,但也作为威慑和防御的基础。本文基于混合方法方法。它使用案例研究策略来发现新的信息。14名男性和女性参加了单独的半结构化访谈。受访者的年龄从40岁到65岁不等,在网络空间作战、情报作战、军事作战、特种部队作战方面有20年以上的经验,对信息战和信息作战有一定的认识和理解。分析策略包括专题分析和定量分析。结果显示了许多主题,但本文特别关注于操作、能力、政策和治理以及法律框架的主题。最后,从主题、代码和内容中推断出组织进攻性网络空间行动的全社会方法的概念图,并根据访谈和代码映射到每个责任机构。研究问题的答案是,瑞典应该有一个全社会的方法来组织进攻性网络空间行动,在网络空间中并通过网络空间投射力量,意图实施积极和独立的外交、安全和国防政策,并进行威慑,如图2所示。
{"title":"A Whole-of-Society Approach to Organise for Offensive Cyberspace Operations: The Case of the Smart State Sweden","authors":"Gazmend Huskaj, Stefan Axelsson","doi":"10.34190/eccws.22.1.1188","DOIUrl":"https://doi.org/10.34190/eccws.22.1.1188","url":null,"abstract":"Threat actors conduct offensive cyberspace operations for many purposes, such as espionage, to destroy information assets, and cybercrime. These operations are possible thanks to the innovation and development of information and communications technologies (ICT). Interconnected information systems have transformed societies positively. However, specific states exploit these systems' vulnerabilities to advance their strategic national interests. Therefore, it is important to know how a state can organise itself to defend against threat actors. The purpose of this research is to present how the smart state Sweden can through a whole-of-society approach organise for Offensive Cyberspace Operations. The intent is to conduct an active and independent foreign-, security- and defence policy, but also as a base for deterrence and defence. This article is based on a mixed methods approach. It uses the case study research strategy to discover new information. Fourteen men and women participated in individual semi-structured interviews. The respondents ranged in age from 40 to 65 with more than 20 years of experience in cyberspace operations, intelligence operations, military operations, special forces operations, and knowledge and understanding about information warfare and information operations. The analytic strategies include thematic analysis and quantitative methods to interpret the data. The results show many themes, but the article is especially focused on the themes of Operations, Capability, Policy & Governance, and Legal Frameworks. Finally, a conceptual map of a whole-of-society approach to organise for offensive cyberspace operations is presented inferred from the themes, codes, and content, and mapped to each responsible agency based on the interviews and codes. The answer to the research question is that Sweden should have a whole-of-society approach to organise for Offensive Cyberspace Operations to project power in and through cyberspace with the intent to conduct an active and independent foreign, security and defence policy and for deterrence, as described in Figure 2.","PeriodicalId":258360,"journal":{"name":"European Conference on Cyber Warfare and Security","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127106120","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Demand Analysis of the Cybersecurity Knowledge Areas and Skills for the Nurses: Preliminary Findings 护士网络安全知识领域和技能需求分析:初步调查结果
Pub Date : 2023-06-19 DOI: 10.34190/eccws.22.1.1181
J. Rajamäki, Paresh Rathod, K. Kioskli
The purpose of this paper is to present a preliminary analysis of the cybersecurity market demand in the nursing and health sector. Currently, the market demand study is ongoing under the Digital Europe Programme CyberSecPro project, which strengthens the role of higher education institutions as a provider of practical and working life skills. The project promotes reliable digital transformation in critical sectors, such as healthcare. The rapid development of e-health emphasizes the central position of cybersecurity in healthcare organizations that are increasingly the targets of cyber-attacks. This descriptive literature review explores what a nurse needs to know about cybersecurity. Our results show that awareness of cyber risks is weak in the healthcare sector. Understanding cyber risks and recognizing the effects of one's own activities increases the cybersecurity of the entire organization, therefore cybersecurity training for nurses should be increased. Our study suggested that nurses’ most important cyber skills are their own cyber-safe way of operations, identifying cyber threats related to equipment, identifying the effects of cyber disruptions, and acting in a cyber disruption situation. Future nurse training programs should be updated to include these skills. Additionally, the teaching of nurses must be developed so that it meets these competence needs.
本文的目的是对护理和卫生部门的网络安全市场需求进行初步分析。目前,数字欧洲计划CyberSecPro项目正在进行市场需求研究,以加强高等教育机构作为实用和工作生活技能提供者的作用。该项目促进医疗保健等关键部门的可靠数字化转型。电子医疗的快速发展强调了网络安全在日益成为网络攻击目标的医疗机构中的核心地位。这篇描述性文献综述探讨了护士需要了解的网络安全知识。我们的研究结果表明,医疗保健行业对网络风险的认识较弱。了解网络风险并认识到自己活动的影响可以提高整个组织的网络安全,因此应该增加对护士的网络安全培训。我们的研究表明,护士最重要的网络技能是他们自己的网络安全操作方式,识别与设备相关的网络威胁,识别网络中断的影响,并在网络中断的情况下采取行动。未来的护士培训计划应该更新以包括这些技能。此外,必须发展护士的教学,使其满足这些能力需求。
{"title":"Demand Analysis of the Cybersecurity Knowledge Areas and Skills for the Nurses: Preliminary Findings","authors":"J. Rajamäki, Paresh Rathod, K. Kioskli","doi":"10.34190/eccws.22.1.1181","DOIUrl":"https://doi.org/10.34190/eccws.22.1.1181","url":null,"abstract":"The purpose of this paper is to present a preliminary analysis of the cybersecurity market demand in the nursing and health sector. Currently, the market demand study is ongoing under the Digital Europe Programme CyberSecPro project, which strengthens the role of higher education institutions as a provider of practical and working life skills. The project promotes reliable digital transformation in critical sectors, such as healthcare. The rapid development of e-health emphasizes the central position of cybersecurity in healthcare organizations that are increasingly the targets of cyber-attacks. This descriptive literature review explores what a nurse needs to know about cybersecurity. Our results show that awareness of cyber risks is weak in the healthcare sector. Understanding cyber risks and recognizing the effects of one's own activities increases the cybersecurity of the entire organization, therefore cybersecurity training for nurses should be increased. Our study suggested that nurses’ most important cyber skills are their own cyber-safe way of operations, identifying cyber threats related to equipment, identifying the effects of cyber disruptions, and acting in a cyber disruption situation. Future nurse training programs should be updated to include these skills. Additionally, the teaching of nurses must be developed so that it meets these competence needs.","PeriodicalId":258360,"journal":{"name":"European Conference on Cyber Warfare and Security","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130898750","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
On Benchmarking and Validation in Wargames 关于战争游戏中的基准测试和验证
Pub Date : 2023-06-19 DOI: 10.34190/eccws.22.1.1132
Adam Wilden, Mehwish Nasim, P. Williams, Tim Legrand, Benjamin Turnbull, P. Williams
There are multiple arguments for and against wargames. Many scientists do not recognise the science in wargames. It is suggested that there is not enough literature relating to wargaming, for there to be any large-scale research into wargames. This is primarily because scientists often refuse to publish results, thus creating a vicious cycle where research is not published because there is not enough research being published. This ultimately deters researchers from studying wargaming in any serious fashion. Owing to this limitation, published work on the results, and protocols of wargames are scarce in scholarly research. Wargaming has considerably less academic focus with a fragmented and practical focus on design and benchmarking. This is surprising given the long history of wargaming (dating back to the early 1600’s), when compared to the relatively recent history of other domains such as software engineering. To better understand the current state of research into wargaming in reference to benchmarking and validation, a scoping review (SR) was conducted. The scholarly research into wargaming reveals papers on general modelling, conflict modelling, influence modelling, evaluation of wargames, analytical tools, use of AI in wargame design, evaluation of predictive modelling in wargames, improving command and control through wargaming, and cost-benefit analysis for decision making. The initial analysis of the coverage of wargaming research, together with the limited number of papers found, indicate that there is a distinct lack of academic research into wargaming. Additionally, there is a wide variety of areas that are interested in the wargaming field, however, with no universal method of analysis or benchmarking, this limits the reproducibility of results, and the ability to judge the overall effectiveness of wargaming efforts. Wargame designers need to be able to assess wargame components to validate, compare, and predict the effects on gameplay and for decision-makers to draw conclusions with more confidence.
支持和反对兵棋推演的理由有很多。许多科学家不承认兵棋推演的科学性。有人认为没有足够的关于兵棋的文献,因此没有任何大规模的兵棋研究。这主要是因为科学家经常拒绝发表结果,从而造成了一个恶性循环,即研究没有发表,因为没有足够的研究被发表。这最终阻碍了研究人员以任何严肃的方式研究兵棋。由于这一限制,在学术研究中,关于兵棋推演结果和协议的出版工作很少。wg对学术的关注相对较少,更多的是注重设计和基准测试。考虑到兵棋推演的悠久历史(可以追溯到17世纪早期),与软件工程等其他领域相对较近的历史相比,这是令人惊讶的。为了更好地了解当前兵棋推演在基准测试和验证方面的研究状况,我们进行了一次范围评估(SR)。对兵棋推演的学术研究包括一般建模、冲突建模、影响建模、兵棋推演评估、分析工具、人工智能在兵棋推演设计中的应用、兵棋推演预测模型的评估、通过兵棋推演改进指挥和控制、决策的成本效益分析等。对兵棋推演研究覆盖范围的初步分析,以及所发现的有限论文数量,表明对兵棋推演的学术研究明显缺乏。此外,有很多领域对兵棋推演感兴趣,然而,由于没有通用的分析方法或基准,这限制了结果的可重复性,以及判断兵棋推演工作整体有效性的能力。战争游戏设计师需要能够评估战争游戏组件,以验证、比较和预测对游戏玩法的影响,并让决策者更有信心地得出结论。
{"title":"On Benchmarking and Validation in Wargames","authors":"Adam Wilden, Mehwish Nasim, P. Williams, Tim Legrand, Benjamin Turnbull, P. Williams","doi":"10.34190/eccws.22.1.1132","DOIUrl":"https://doi.org/10.34190/eccws.22.1.1132","url":null,"abstract":"There are multiple arguments for and against wargames. Many scientists do not recognise the science in wargames. It is suggested that there is not enough literature relating to wargaming, for there to be any large-scale research into wargames. This is primarily because scientists often refuse to publish results, thus creating a vicious cycle where research is not published because there is not enough research being published. This ultimately deters researchers from studying wargaming in any serious fashion. Owing to this limitation, published work on the results, and protocols of wargames are scarce in scholarly research. Wargaming has considerably less academic focus with a fragmented and practical focus on design and benchmarking. This is surprising given the long history of wargaming (dating back to the early 1600’s), when compared to the relatively recent history of other domains such as software engineering. To better understand the current state of research into wargaming in reference to benchmarking and validation, a scoping review (SR) was conducted. The scholarly research into wargaming reveals papers on general modelling, conflict modelling, influence modelling, evaluation of wargames, analytical tools, use of AI in wargame design, evaluation of predictive modelling in wargames, improving command and control through wargaming, and cost-benefit analysis for decision making. The initial analysis of the coverage of wargaming research, together with the limited number of papers found, indicate that there is a distinct lack of academic research into wargaming. Additionally, there is a wide variety of areas that are interested in the wargaming field, however, with no universal method of analysis or benchmarking, this limits the reproducibility of results, and the ability to judge the overall effectiveness of wargaming efforts. Wargame designers need to be able to assess wargame components to validate, compare, and predict the effects on gameplay and for decision-makers to draw conclusions with more confidence.","PeriodicalId":258360,"journal":{"name":"European Conference on Cyber Warfare and Security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131646317","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Designing a high-fidelity testbed for 5G-based Industrial IoT 5g工业物联网高保真测试平台设计
Pub Date : 2023-06-19 DOI: 10.34190/eccws.22.1.1204
D. Cruz, T. Cruz, Vasco Pereira, P. Simões
With the rise of the Industrial IoT (Internet of Things) and Industry 4.0 paradigms, many control and sensor systems used for IACS (Industrial Automation and Control Systems) have become more complex, due to the increasing number of interconnected field devices, sensors and actuators often being geographically spread across large areas. Supporting these increasingly sophisticated networked scenarios calls for the involvement of telecommunications and utility providers to better support Machine-to-Machine (M2M) communications and infrastructure orchestration, for which 5G technology is considered a perfect match. Nowadays, such 5G networks empower solutions both for consumer and for industrial IoT scenarios, providing the capacity and the means to seamlessly connect a massive number of gadgets and sensors, with diverse data rate requirements, low latency, and low power consumption. Part of this flexibility is also due to the nature of the 5G Service Architecture (SA), which is based on a microservice concept, dividing its core through multiple functions, allowing it to horizontally scale in a flexible way. Furthermore, the 3GPP specifications encompass specific support for verticals by means of slicing and 5G LANs, paving the way for a paradigm shift in terms of the relationship between service, telecom, and operational infrastructure tenants. However, such benefits come at the cost of extra complexity and, consequently, an increased vulnerability surface. This calls for further research focused on improving 5G infrastructure management, service integration and security, which cannot be safely undertaken in production environments, thus motivating the development of suitable 5G testbeds. This research work, which was developed in the scope of the POWER and Smart5Grid P2020 projects, addresses the creation of a high-fidelity environment for 5G-related research, which encompasses a gNodeB and 5G core, together with emulated User Elements (terminal devices) and IoT nodes (in this specific case, Programmable Logic Controllers), constituting a 5G Industrial IoT scenario designed for development and validation of new solutions, security research, or even advanced training purposes. The entire infrastructure is supported via container orchestration technology, providing enhanced scalability and resilience characteristics.
随着工业物联网(IoT)和工业4.0范例的兴起,由于越来越多的互连现场设备,传感器和执行器通常在地理上分布在大片区域,因此用于IACS(工业自动化和控制系统)的许多控制和传感器系统变得更加复杂。支持这些日益复杂的网络场景需要电信和公用事业提供商的参与,以更好地支持机器对机器(M2M)通信和基础设施编排,5G技术被认为是完美的匹配。如今,这种5G网络为消费者和工业物联网场景提供了解决方案,提供了无缝连接大量设备和传感器的能力和手段,具有不同的数据速率要求、低延迟和低功耗。这种灵活性的部分原因还在于5G服务架构(SA)的性质,它基于微服务概念,通过多个功能划分其核心,允许其以灵活的方式横向扩展。此外,3GPP规范包括通过切片和5G局域网对垂直行业的特定支持,为服务、电信和运营基础设施租户之间关系的范式转变铺平了道路。然而,这样的好处是以额外的复杂性为代价的,因此,增加了脆弱性。这要求进一步研究重点放在改善5G基础设施管理、业务集成和安全性方面,这些在生产环境中无法安全地进行,从而推动开发合适的5G测试平台。这项研究工作是在POWER和Smart5Grid P2020项目范围内开展的,旨在为5G相关研究创建高保真环境,其中包括gndeb和5G核心,以及仿真用户元素(终端设备)和物联网节点(在本例中为可编程逻辑控制器),构成5G工业物联网场景,旨在开发和验证新解决方案,安全研究,甚至高级培训目的。整个基础设施由容器编排技术支持,提供增强的可伸缩性和弹性特征。
{"title":"Designing a high-fidelity testbed for 5G-based Industrial IoT","authors":"D. Cruz, T. Cruz, Vasco Pereira, P. Simões","doi":"10.34190/eccws.22.1.1204","DOIUrl":"https://doi.org/10.34190/eccws.22.1.1204","url":null,"abstract":"With the rise of the Industrial IoT (Internet of Things) and Industry 4.0 paradigms, many control and sensor systems used for IACS (Industrial Automation and Control Systems) have become more complex, due to the increasing number of interconnected field devices, sensors and actuators often being geographically spread across large areas. Supporting these increasingly sophisticated networked scenarios calls for the involvement of telecommunications and utility providers to better support Machine-to-Machine (M2M) communications and infrastructure orchestration, for which 5G technology is considered a perfect match. Nowadays, such 5G networks empower solutions both for consumer and for industrial IoT scenarios, providing the capacity and the means to seamlessly connect a massive number of gadgets and sensors, with diverse data rate requirements, low latency, and low power consumption. Part of this flexibility is also due to the nature of the 5G Service Architecture (SA), which is based on a microservice concept, dividing its core through multiple functions, allowing it to horizontally scale in a flexible way. Furthermore, the 3GPP specifications encompass specific support for verticals by means of slicing and 5G LANs, paving the way for a paradigm shift in terms of the relationship between service, telecom, and operational infrastructure tenants. However, such benefits come at the cost of extra complexity and, consequently, an increased vulnerability surface. This calls for further research focused on improving 5G infrastructure management, service integration and security, which cannot be safely undertaken in production environments, thus motivating the development of suitable 5G testbeds. This research work, which was developed in the scope of the POWER and Smart5Grid P2020 projects, addresses the creation of a high-fidelity environment for 5G-related research, which encompasses a gNodeB and 5G core, together with emulated User Elements (terminal devices) and IoT nodes (in this specific case, Programmable Logic Controllers), constituting a 5G Industrial IoT scenario designed for development and validation of new solutions, security research, or even advanced training purposes. The entire infrastructure is supported via container orchestration technology, providing enhanced scalability and resilience characteristics.","PeriodicalId":258360,"journal":{"name":"European Conference on Cyber Warfare and Security","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131711218","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
European Conference on Cyber Warfare and Security
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1