首页 > 最新文献

European Conference on Cyber Warfare and Security最新文献

英文 中文
A Methodical Framework for Conducting Reconnaissance and Enumeration in the Ethical Hacking Lifecycle 在道德黑客生命周期中进行侦察和枚举的方法框架
Pub Date : 2023-06-19 DOI: 10.34190/eccws.22.1.1438
Fouz Barman, N. Alkaabi, Hamda Almenhali, Mahra Alshedi, R. Ikuesan
Reconnaissance and enumeration are both equally significant phases of the penetration testing lifecycle. In hindsight, both reconnaissance and enumeration seem to be very similar as the pair involve information gathering. Whilst reconnaissance leverages passive approaches without direct interaction with the target, enumeration exploits susceptibilities and vulnerabilities in direct client-server communication. Both phases involve gathering information and pinpointing the attack surface within the network of the target. To do so, powerful tools such as Nmap and Netcat are utilized by ethical hackers and penetration testers to identify and resolve security vulnerabilities and weaknesses. Nmap is an open-source command-line tool used for information gathering, network discovery, and security auditing. Whereas Netcat is a back-end tool that manages networks, monitors traffic flow between systems, as well as allows port scanning and listening. However, the plethora of tools and approaches available for these two phases often introduce inconsistencies and time wastage, which can lead to frustration and poor outcome for inexperienced penetration testers. Additionally, not all commands found online are relevant and applicable. In such situations, there is a high probability that the user will feel overwhelmed and exasperated with the overflow of new and foreign information. To address this daunting challenge, this study developed a methodical framework that can provide a technical guide for the reconnaissance and enumeration phases of the penetration testing lifecycle. Furthermore, a clear and thorough step-by-step procedure and detailed explanations of each stage and commands initiated using Nmap and Netcat are provided. The output of this study will be extremely beneficial and informative to a vast group of audience, ranging from university students majoring in security to individuals interested in ethical hacking, and even someone looking for a job with a position of a penetration tester. Furthermore, this technical guide on Nmap and Netcat extends the common body of knowledge in penetration, as a bridge between the industry and academia.
侦察和枚举是渗透测试生命周期中同等重要的两个阶段。事后看来,侦察和列举似乎非常相似,因为两者都涉及信息收集。侦察利用被动方法而不与目标直接交互,枚举利用直接客户机-服务器通信中的易感性和漏洞。这两个阶段都涉及收集信息和确定目标网络中的攻击面。为此,道德黑客和渗透测试人员利用Nmap和Netcat等强大的工具来识别和解决安全漏洞和弱点。Nmap是一个开源命令行工具,用于信息收集、网络发现和安全审计。而Netcat是一个管理网络的后端工具,监视系统之间的流量,以及允许端口扫描和侦听。然而,这两个阶段可用的过多的工具和方法通常会引入不一致和时间浪费,这可能会导致缺乏经验的渗透测试人员沮丧和糟糕的结果。此外,并非所有在网上找到的命令都是相关和适用的。在这种情况下,用户很可能会对大量的新信息和外来信息感到不知所措和恼怒。为了解决这个令人生畏的挑战,本研究开发了一个系统框架,可以为渗透测试生命周期的侦察和枚举阶段提供技术指导。此外,还提供了一个清晰而彻底的逐步过程,并详细解释了使用Nmap和Netcat启动的每个阶段和命令。这项研究的结果将对广大的受众群体非常有益和有益,从主修安全的大学生到对道德黑客感兴趣的个人,甚至是寻找渗透测试员职位的人。此外,本关于Nmap和Netcat的技术指南扩展了渗透方面的共同知识体系,作为工业界和学术界之间的桥梁。
{"title":"A Methodical Framework for Conducting Reconnaissance and Enumeration in the Ethical Hacking Lifecycle","authors":"Fouz Barman, N. Alkaabi, Hamda Almenhali, Mahra Alshedi, R. Ikuesan","doi":"10.34190/eccws.22.1.1438","DOIUrl":"https://doi.org/10.34190/eccws.22.1.1438","url":null,"abstract":"Reconnaissance and enumeration are both equally significant phases of the penetration testing lifecycle. In hindsight, both reconnaissance and enumeration seem to be very similar as the pair involve information gathering. Whilst reconnaissance leverages passive approaches without direct interaction with the target, enumeration exploits susceptibilities and vulnerabilities in direct client-server communication. Both phases involve gathering information and pinpointing the attack surface within the network of the target. To do so, powerful tools such as Nmap and Netcat are utilized by ethical hackers and penetration testers to identify and resolve security vulnerabilities and weaknesses. Nmap is an open-source command-line tool used for information gathering, network discovery, and security auditing. Whereas Netcat is a back-end tool that manages networks, monitors traffic flow between systems, as well as allows port scanning and listening. However, the plethora of tools and approaches available for these two phases often introduce inconsistencies and time wastage, which can lead to frustration and poor outcome for inexperienced penetration testers. Additionally, not all commands found online are relevant and applicable. In such situations, there is a high probability that the user will feel overwhelmed and exasperated with the overflow of new and foreign information. To address this daunting challenge, this study developed a methodical framework that can provide a technical guide for the reconnaissance and enumeration phases of the penetration testing lifecycle. Furthermore, a clear and thorough step-by-step procedure and detailed explanations of each stage and commands initiated using Nmap and Netcat are provided. The output of this study will be extremely beneficial and informative to a vast group of audience, ranging from university students majoring in security to individuals interested in ethical hacking, and even someone looking for a job with a position of a penetration tester. Furthermore, this technical guide on Nmap and Netcat extends the common body of knowledge in penetration, as a bridge between the industry and academia.","PeriodicalId":258360,"journal":{"name":"European Conference on Cyber Warfare and Security","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129954403","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cybersecurity Through Thesis in Laurea University of Applied Sciences 美国劳瑞亚应用科学大学网络安全研究论文
Pub Date : 2023-06-19 DOI: 10.34190/eccws.22.1.1447
Ilona Frisk, Harri Ruoslahti, Ilkka Tikanmäki
Information technology and its applications surround us and those have become crucial to our lives. However, the understanding of the digital world is not as strong. Successful and functional cybersecurity is a vital component for the defence of a civilised society. This study looks at how cybersecurity has been handled in thesis written at one University of Applied Sciences and what kind of topics have been chosen by thesis writers, and what is written about cybersecurity in them to understand how cybersecurity is seen in higher education. The goal of this paper was to find out how cybersecurity has been handled in theses and what kind of topics have been chosen by thesis writers. The two research questions are: what theses have been published that handle cybersecurity; and how does cybersecurity in them? As typical of a case study, attention is paid to a small number of cases (n = 15) attempting to describe the phenomenon they represent. Of the fifteen theses, two were master’s and thirteen bachelor’s theses, and mostly completed in Safety, Security and Risk Management, Security Management, and Business information technology programmes. Based on the results in this case, cyber security is being examined or developed from several, different points of view and in multidisciplinary ways.
信息技术及其应用就在我们身边,对我们的生活至关重要。然而,对数字世界的理解并没有那么强烈。成功和有效的网络安全是保卫文明社会的重要组成部分。本研究着眼于在一所应用科学大学撰写的论文中如何处理网络安全问题,论文作者选择了什么样的主题,以及其中写了哪些关于网络安全的内容,以了解网络安全如何在高等教育中被看到。本文的目的是找出网络安全在论文中是如何处理的,以及论文作者选择了什么样的主题。这两个研究问题是:已经发表了哪些关于网络安全的论文;网络安全在其中又扮演了什么角色?作为典型的案例研究,关注的是少数案例(n = 15),试图描述它们所代表的现象。在这十五篇论文中,有两篇是硕士论文,十三篇是学士论文,主要完成于安全、保安及风险管理、保安管理和商业资讯科技课程。基于这个案例的结果,网络安全正在从几个不同的角度和多学科的方式进行检查或发展。
{"title":"Cybersecurity Through Thesis in Laurea University of Applied Sciences","authors":"Ilona Frisk, Harri Ruoslahti, Ilkka Tikanmäki","doi":"10.34190/eccws.22.1.1447","DOIUrl":"https://doi.org/10.34190/eccws.22.1.1447","url":null,"abstract":"Information technology and its applications surround us and those have become crucial to our lives. However, the understanding of the digital world is not as strong. Successful and functional cybersecurity is a vital component for the defence of a civilised society. This study looks at how cybersecurity has been handled in thesis written at one University of Applied Sciences and what kind of topics have been chosen by thesis writers, and what is written about cybersecurity in them to understand how cybersecurity is seen in higher education. The goal of this paper was to find out how cybersecurity has been handled in theses and what kind of topics have been chosen by thesis writers. The two research questions are: what theses have been published that handle cybersecurity; and how does cybersecurity in them? As typical of a case study, attention is paid to a small number of cases (n = 15) attempting to describe the phenomenon they represent. Of the fifteen theses, two were master’s and thirteen bachelor’s theses, and mostly completed in Safety, Security and Risk Management, Security Management, and Business information technology programmes. Based on the results in this case, cyber security is being examined or developed from several, different points of view and in multidisciplinary ways.","PeriodicalId":258360,"journal":{"name":"European Conference on Cyber Warfare and Security","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130640305","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Deep-learning-based Intrusion Detection for Software-defined Networking Space Systems 基于深度学习的软件定义网络空间系统入侵检测
Pub Date : 2023-06-19 DOI: 10.34190/eccws.22.1.1085
Uakomba Uhongora, Ronald Mulinde, Yee Wei Law, J. Slay
This paper briefly reviews the application of the Software-defined Networking (SDN) architecture to satellite networks. It highlights the prominent cyber threats that SDN-based satellite networks are vulnerable to and proposes relevant defence mechanisms. SDN transforms traditional networking architectures by separating the control plane from the forwarding (data) plane. This separation enhances scalability and centralises management. In comparison, in traditional networks, the control plane and the data plane are usually combined, resulting in complex network management and reduced scalability. Satellite networks can take advantage of these benefits offered by SDN and this supports them as key enablers of critical services, including weather prediction, global broadband Internet coverage, and Internet of Things (IoT) services. Ease of configuration and flexibility are essential for satellites providing critical services to instantly adapt to network changes. These desirable attributes can be realised by applying SDN to satellite networks.  Although SDN offers significant benefits to satellite networks, it is vulnerable to cyber-attacks and particularly due to its centralised architecture. A common attack on SDN is the Distributed Denial of Service (DDoS) attack which could render the entire SDN unavailable. To mitigate such threats, an efficient Intrusion Detection System (IDS) is required to monitor the network and detect any suspicious traffic. However, traditional IDSs produce too many false positives and often fail to detect advanced attacks. For their ability to learn feature hierarchies in network traffic data automatically, whether, for network traffic classification or anomaly detection, deep learning (DL) plays an increasingly important role in IDSs. In this paper, we present a brief review of recent developments in cyber security for SDN-based space systems, and we identify vulnerabilities and threats to an SDN-based satellite network. We further discuss the potential of a DL-based IDS for the detection of cyber threats. Finally, we identify further research gaps in the recent literature and propose future research directions.
本文简要综述了软件定义网络(SDN)体系结构在卫星网络中的应用。强调了基于sdn的卫星网络易受的突出网络威胁,并提出了相关防御机制。SDN通过将控制平面与转发(数据)平面分离,改变了传统的网络架构。这种分离增强了可伸缩性和集中管理。相比之下,在传统网络中,控制平面和数据平面通常是结合在一起的,导致网络管理复杂,可扩展性降低。卫星网络可以利用SDN提供的这些优势,这支持它们成为关键服务的关键推动者,包括天气预报、全球宽带互联网覆盖和物联网(IoT)服务。易于配置和灵活性是卫星提供关键服务以立即适应网络变化的必要条件。通过将SDN应用于卫星网络,可以实现这些理想的属性。尽管SDN为卫星网络提供了巨大的好处,但它很容易受到网络攻击,特别是由于其集中式架构。对SDN的常见攻击是分布式拒绝服务(DDoS)攻击,它可以使整个SDN不可用。为了减轻这些威胁,需要一个有效的入侵检测系统(IDS)来监控网络并检测任何可疑的流量。然而,传统的入侵防御系统产生了太多的误报,往往无法检测到高级攻击。由于能够自动学习网络流量数据中的特征层次结构,无论是网络流量分类还是异常检测,深度学习(DL)在ids中发挥着越来越重要的作用。在本文中,我们简要回顾了基于sdn的空间系统网络安全的最新发展,并确定了基于sdn的卫星网络的漏洞和威胁。我们进一步讨论了基于dll的IDS检测网络威胁的潜力。最后,我们指出了近期文献中进一步的研究空白,并提出了未来的研究方向。
{"title":"Deep-learning-based Intrusion Detection for Software-defined Networking Space Systems","authors":"Uakomba Uhongora, Ronald Mulinde, Yee Wei Law, J. Slay","doi":"10.34190/eccws.22.1.1085","DOIUrl":"https://doi.org/10.34190/eccws.22.1.1085","url":null,"abstract":"This paper briefly reviews the application of the Software-defined Networking (SDN) architecture to satellite networks. It highlights the prominent cyber threats that SDN-based satellite networks are vulnerable to and proposes relevant defence mechanisms. SDN transforms traditional networking architectures by separating the control plane from the forwarding (data) plane. This separation enhances scalability and centralises management. In comparison, in traditional networks, the control plane and the data plane are usually combined, resulting in complex network management and reduced scalability. Satellite networks can take advantage of these benefits offered by SDN and this supports them as key enablers of critical services, including weather prediction, global broadband Internet coverage, and Internet of Things (IoT) services. Ease of configuration and flexibility are essential for satellites providing critical services to instantly adapt to network changes. These desirable attributes can be realised by applying SDN to satellite networks.  Although SDN offers significant benefits to satellite networks, it is vulnerable to cyber-attacks and particularly due to its centralised architecture. A common attack on SDN is the Distributed Denial of Service (DDoS) attack which could render the entire SDN unavailable. To mitigate such threats, an efficient Intrusion Detection System (IDS) is required to monitor the network and detect any suspicious traffic. However, traditional IDSs produce too many false positives and often fail to detect advanced attacks. For their ability to learn feature hierarchies in network traffic data automatically, whether, for network traffic classification or anomaly detection, deep learning (DL) plays an increasingly important role in IDSs. In this paper, we present a brief review of recent developments in cyber security for SDN-based space systems, and we identify vulnerabilities and threats to an SDN-based satellite network. We further discuss the potential of a DL-based IDS for the detection of cyber threats. Finally, we identify further research gaps in the recent literature and propose future research directions.","PeriodicalId":258360,"journal":{"name":"European Conference on Cyber Warfare and Security","volume":"130 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131742874","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
How Does the Tallinn Manual 2.0 Shed Light on the Threat of Cyber Attacks against Taiwan? 《塔林手册2.0》如何揭示网络攻击对台湾的威胁?
Pub Date : 2023-06-19 DOI: 10.34190/eccws.22.1.1294
Chih-Hsiang Chang
This paper will identify possible unsettled issues when applying jus ad bellum and jus in bello to case scenarios based on China's cyber operations against Taiwan, pursuant to the rules of international law governing cyber or military operations attributable to States reflected in Tallinn Manual 2.0. This paper will argue that because of Taiwan’s legal international status as a sovereign State, the different responsive actions it may take, should it be faced with any such aggressive cyber or military attack, may be considered controversial.  This paper will then identify the possible legal issues that may pertain under current international law, should any such armed conflict occur between China and Taiwan.
本文将根据《塔林手册2.0》中反映的适用于国家的网络或军事行动的国际法规则,在基于中国对台湾的网络行动的情况下,确定在适用战时法和战时法时可能存在的未解决问题。本文将认为,由于台湾作为一个主权国家的法律国际地位,如果它面临任何这种侵略性的网络或军事攻击,它可能采取的不同反应行动可能被认为是有争议的。然后,本文将确定在现行国际法下可能涉及的法律问题,如果中国和台湾之间发生任何此类武装冲突。
{"title":"How Does the Tallinn Manual 2.0 Shed Light on the Threat of Cyber Attacks against Taiwan?","authors":"Chih-Hsiang Chang","doi":"10.34190/eccws.22.1.1294","DOIUrl":"https://doi.org/10.34190/eccws.22.1.1294","url":null,"abstract":"This paper will identify possible unsettled issues when applying jus ad bellum and jus in bello to case scenarios based on China's cyber operations against Taiwan, pursuant to the rules of international law governing cyber or military operations attributable to States reflected in Tallinn Manual 2.0. This paper will argue that because of Taiwan’s legal international status as a sovereign State, the different responsive actions it may take, should it be faced with any such aggressive cyber or military attack, may be considered controversial.  This paper will then identify the possible legal issues that may pertain under current international law, should any such armed conflict occur between China and Taiwan.","PeriodicalId":258360,"journal":{"name":"European Conference on Cyber Warfare and Security","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133597459","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Fake news as a distortion of media reality: tell-truth strategy in the post-truth era 假新闻是对媒体现实的扭曲:后真相时代的真相战略
Pub Date : 2023-06-19 DOI: 10.34190/eccws.22.1.1080
Anastasiia Iufereva
The article deals with fake news which has been considered one of the greatest threats to information security. The expansion of digital technologies and the development of communication networks have contributed to the spreading of misinformation. In particular, the emergence of different sources of information on the Internet, the growing polarization of opinions in the political and socio-economic dimensions, the devaluation of the fact, and the widespread fake news on the Internet (e.g., social media) form the question of revision of the process of collecting, verifying presenting information, methods, and technologies for verifying facts, including methods for countering fake news. Although this issue has been widely investigated in academic discourse, there are still controversial arguments regarding which elements should form a tell-truth strategy. This paper focuses on recent research that reflects trends and patterns in this field and on the author’s empirical survey - interviews with university professors and media experts (N=6), journalists (N=6), and students (N=14) in Russia. In this study, the author describes the key characteristics of fake news and the elements of this tell-truth strategy. It is intended that this paper focuses on both professional journalists and professors who may use the results of this investigation in such courses as political science, sociology, philosophy, and journalism.
这篇文章涉及假新闻,假新闻被认为是对信息安全的最大威胁之一。数字技术的扩展和通信网络的发展助长了错误信息的传播。特别是,互联网上不同信息来源的出现,政治和社会经济层面的观点日益两极分化,事实的贬值,以及互联网(例如社交媒体)上广泛存在的假新闻,形成了对收集,验证呈现信息的过程,验证事实的方法和技术进行修订的问题,包括打击假新闻的方法。尽管这一问题在学术话语中得到了广泛的研究,但关于哪些要素应该构成一个说实话策略,仍然存在争议。本文着重于反映这一领域趋势和模式的最新研究,以及作者的实证调查——对俄罗斯的大学教授和媒体专家(N=6)、记者(N=6)和学生(N=14)的采访。在本研究中,作者描述了假新闻的主要特征以及这种说实话策略的要素。这篇论文的目的是关注专业记者和教授,他们可能会在政治学、社会学、哲学和新闻学等课程中使用这项调查的结果。
{"title":"Fake news as a distortion of media reality: tell-truth strategy in the post-truth era","authors":"Anastasiia Iufereva","doi":"10.34190/eccws.22.1.1080","DOIUrl":"https://doi.org/10.34190/eccws.22.1.1080","url":null,"abstract":"The article deals with fake news which has been considered one of the greatest threats to information security. The expansion of digital technologies and the development of communication networks have contributed to the spreading of misinformation. In particular, the emergence of different sources of information on the Internet, the growing polarization of opinions in the political and socio-economic dimensions, the devaluation of the fact, and the widespread fake news on the Internet (e.g., social media) form the question of revision of the process of collecting, verifying presenting information, methods, and technologies for verifying facts, including methods for countering fake news. Although this issue has been widely investigated in academic discourse, there are still controversial arguments regarding which elements should form a tell-truth strategy. This paper focuses on recent research that reflects trends and patterns in this field and on the author’s empirical survey - interviews with university professors and media experts (N=6), journalists (N=6), and students (N=14) in Russia. In this study, the author describes the key characteristics of fake news and the elements of this tell-truth strategy. It is intended that this paper focuses on both professional journalists and professors who may use the results of this investigation in such courses as political science, sociology, philosophy, and journalism.","PeriodicalId":258360,"journal":{"name":"European Conference on Cyber Warfare and Security","volume":"306 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133690340","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cyberspace Geography and Cyber Terrain: Challenges Producing a Universal map of Cyberspace 网络空间地理和网络地形:制作网络空间通用地图的挑战
Pub Date : 2023-06-19 DOI: 10.34190/eccws.22.1.1255
Alexander Grandin
Much in the same way that cyber has become the fifth military domain, cyberspace has also brought forth the research area of Cyberspace Geography. The challenge of producing a universal map of cyberspace however still exists. Cybersecurity specialists, military personnel and researchers still begin with a blank sheet on which the wanted elements of cyberspace are arranged before solving their actual problem. The abundance of elements in cyberspace requires a careful selection of factors to include in one's map, depending on how it will be used. However, a complex and ever-changing environment such as cyberspace could make use of a generally acknowledged starting point, facilitating this work. In previous research cyberspace has been described as a combination of the physical world, the social world and the information world. The multidisciplinary research in Cyberspace Geography has developed models for mapping and displaying cyberspace. This is often done by creating topological maps, much like the map of the New York subway system. Military cybersecurity researchers have through the concept of Cyber Terrain presented similar models of cyberspace for military operations. Research has also been produced on the techniques and methods for mapping cyberspace as well as the different presentations of the mapped information. Graph theory has for instance been used as a mathematical model of cyberspace. It is nonetheless unclear if there is some degree of universality in the elements that the different research presents. Which are e.g. the similar features between the cyberspace maps that are used for military operations, that describe the cyber environment of a country or between the elements used for modelling a cybersecurity system? This paper aims to present a solution to this challenge by systematically reviewing the research on Cyberspace Geography and Cyber Terrain using thematic analysis. The different elements of the maps of cyberspace are reviewed. The research will answer if a universal map, that can be used as a starting point for solving multiple challenges in cyberspace, can at present be prepared.
正如网络空间已成为第五军事领域一样,网络空间也催生了网络空间地理学这一研究领域。然而,制作网络空间通用地图的挑战仍然存在。网络安全专家、军事人员和研究人员在解决实际问题之前,仍然是从一张白纸开始,在上面安排网络空间的通缉元素。网络空间的元素丰富,需要仔细选择包括在地图中的因素,这取决于它将如何被使用。然而,网络空间等复杂多变的环境可以利用一个公认的起点,为这项工作提供便利。在以往的研究中,网络空间被描述为物理世界、社会世界和信息世界的结合。网络空间地理学的多学科研究发展了网络空间的映射和显示模型。这通常是通过创建拓扑地图来完成的,就像纽约地铁系统的地图一样。军事网络安全研究人员通过网络地形的概念提出了类似的军事行动网络空间模型。还研究了绘制网络空间地图的技术和方法以及地图信息的不同表示方式。例如,图论被用作网络空间的数学模型。然而,尚不清楚不同研究所呈现的要素是否存在某种程度的普遍性。例如,用于军事行动的网络空间地图,描述一个国家的网络环境的网络空间地图,或用于网络安全系统建模的元素之间的相似特征是什么?本文旨在通过系统回顾网络空间地理学和网络地形研究的专题分析,提出解决这一挑战的方法。回顾了网络空间地图的不同元素。这项研究将回答目前是否可以准备一个通用地图,作为解决网络空间多重挑战的起点。
{"title":"Cyberspace Geography and Cyber Terrain: Challenges Producing a Universal map of Cyberspace","authors":"Alexander Grandin","doi":"10.34190/eccws.22.1.1255","DOIUrl":"https://doi.org/10.34190/eccws.22.1.1255","url":null,"abstract":"Much in the same way that cyber has become the fifth military domain, cyberspace has also brought forth the research area of Cyberspace Geography. The challenge of producing a universal map of cyberspace however still exists. Cybersecurity specialists, military personnel and researchers still begin with a blank sheet on which the wanted elements of cyberspace are arranged before solving their actual problem. The abundance of elements in cyberspace requires a careful selection of factors to include in one's map, depending on how it will be used. However, a complex and ever-changing environment such as cyberspace could make use of a generally acknowledged starting point, facilitating this work. In previous research cyberspace has been described as a combination of the physical world, the social world and the information world. The multidisciplinary research in Cyberspace Geography has developed models for mapping and displaying cyberspace. This is often done by creating topological maps, much like the map of the New York subway system. Military cybersecurity researchers have through the concept of Cyber Terrain presented similar models of cyberspace for military operations. Research has also been produced on the techniques and methods for mapping cyberspace as well as the different presentations of the mapped information. Graph theory has for instance been used as a mathematical model of cyberspace. It is nonetheless unclear if there is some degree of universality in the elements that the different research presents. Which are e.g. the similar features between the cyberspace maps that are used for military operations, that describe the cyber environment of a country or between the elements used for modelling a cybersecurity system? This paper aims to present a solution to this challenge by systematically reviewing the research on Cyberspace Geography and Cyber Terrain using thematic analysis. The different elements of the maps of cyberspace are reviewed. The research will answer if a universal map, that can be used as a starting point for solving multiple challenges in cyberspace, can at present be prepared.","PeriodicalId":258360,"journal":{"name":"European Conference on Cyber Warfare and Security","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130700599","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
NCSS: A global census of national positions on conflict, neutrality and cooperation NCSS:关于冲突、中立和合作的各国立场的全球普查
Pub Date : 2023-06-19 DOI: 10.34190/eccws.22.1.1168
Radu Antonio Serrano Iova, Tomoe Watashiba
The ubiquity of ICT and the increase in cyber threats have pushed countries to view cybersecurity from a national perspective and draft appropriate national strategies on the topic. While containing similar terminology, these strategies are tailored to the national contexts and hence, differ across regions, cultures, and political contexts. Previous research of these documents has been focused on comparative analysis of countries that can either be considered well developed on this topic or for specific subtopics of cybersecurity. However, some of the subtopics have not been addressed, only now having become more prevalent due to current international conflicts and national / regional socio-political scuffles that have spilled into cyberspace. In our paper, we investigate all countries that have published a National Cyber Security Strategy - NCSS - (or any similar document under a different nomenclature, e.g., policy, decree, etc.), specifically in reference to their position on war, neutrality, and international cooperation. Countries maintaining an NCSS will first be identified using international databases, upon which further study of the aforementioned topics in the NCSSs will occur. We hypothesize, that while international cooperation will be present in most, if not all NCSSs, armed conflicts and neutrality will not be addressed at all nor in depth, in those that contain any reference to them. The resulting paper will present a near-global case study of these topics, which can then signify potential areas of improvement, capacity building, and strengthening of democratic coalitions, globally.
信息通信技术的无处不在和网络威胁的增加促使各国从国家角度看待网络安全,并就此主题起草适当的国家战略。虽然包含类似的术语,但这些战略是根据国家情况量身定制的,因此在不同区域、文化和政治背景下有所不同。以前对这些文件的研究主要集中在对国家的比较分析上,这些国家要么可以被认为在这个主题上很发达,要么可以被认为在网络安全的特定子主题上很发达。然而,由于当前的国际冲突和国家/地区的社会政治冲突已经蔓延到网络空间,一些子主题尚未得到解决,只是现在变得更加普遍。在我们的论文中,我们调查了所有发布了国家网络安全战略(NCSS)(或任何不同术语下的类似文件,例如政策、法令等)的国家,特别是参考了他们在战争、中立和国际合作方面的立场。将首先利用国际数据库确定维持国家安全保障体系的国家,然后在此基础上进一步研究国家安全保障体系中的上述专题。我们假设,虽然国际合作将出现在大多数(如果不是所有的话)国家中,但在那些提及武装冲突和中立的国家中,它们将根本不会得到解决,也不会得到深入解决。由此产生的论文将展示这些主题的近全球案例研究,然后可以指出全球范围内改进、能力建设和加强民主联盟的潜在领域。
{"title":"NCSS: A global census of national positions on conflict, neutrality and cooperation","authors":"Radu Antonio Serrano Iova, Tomoe Watashiba","doi":"10.34190/eccws.22.1.1168","DOIUrl":"https://doi.org/10.34190/eccws.22.1.1168","url":null,"abstract":"The ubiquity of ICT and the increase in cyber threats have pushed countries to view cybersecurity from a national perspective and draft appropriate national strategies on the topic. While containing similar terminology, these strategies are tailored to the national contexts and hence, differ across regions, cultures, and political contexts. Previous research of these documents has been focused on comparative analysis of countries that can either be considered well developed on this topic or for specific subtopics of cybersecurity. However, some of the subtopics have not been addressed, only now having become more prevalent due to current international conflicts and national / regional socio-political scuffles that have spilled into cyberspace. In our paper, we investigate all countries that have published a National Cyber Security Strategy - NCSS - (or any similar document under a different nomenclature, e.g., policy, decree, etc.), specifically in reference to their position on war, neutrality, and international cooperation. Countries maintaining an NCSS will first be identified using international databases, upon which further study of the aforementioned topics in the NCSSs will occur. We hypothesize, that while international cooperation will be present in most, if not all NCSSs, armed conflicts and neutrality will not be addressed at all nor in depth, in those that contain any reference to them. The resulting paper will present a near-global case study of these topics, which can then signify potential areas of improvement, capacity building, and strengthening of democratic coalitions, globally.","PeriodicalId":258360,"journal":{"name":"European Conference on Cyber Warfare and Security","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132910577","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Role of Techno-Economic Coalitions in Future Cyberspace Governance: 'Backcasting' as a Method for Strategic Foresight 技术经济联盟在未来网络空间治理中的作用:作为战略预见方法的“回溯”
Pub Date : 2023-06-19 DOI: 10.34190/eccws.22.1.1078
Mari Ristolainen
In an increasingly complex threat landscape, many nations struggle with developing and implementing effective cybersecurity policies for cyberspace governance at a national and international level. Balancing between the demands for establishing national sovereignty and strengthening international collaboration in cyberspace have become a problematic assignment. Collaborating with nations supporting extensively dissimilar ideologies and cybersecurity policies is controversial. Yet, it is almost impossible for a single country to achieve 'self-sufficiency' in cyberspace. Thus, in order to remain competitive, protected, and resilient one must either join or strengthen a developing techno-economic coalition with similar national cybersecurity policies and/or ideological framework. Consequently, this paper argues that techno-economic coalitions serve as an emerging issue or trend for strategic foresight in cyberspace governance in the future. This paper discusses the potential formation of techno-economic coalitions and shows how 'backcasting' can be used in strategic foresight. In this paper, 'backcasting' is not used as a method for creating a traditional strategic map to a future goal, but as a framework for determining what should have happened in order for the techno-economic coalitions to emerge in future cyberspace, i.e. for finding issues or trends that should be followed in strategic foresight today. Firstly, cyberspace governance in relation to national cybersecurity policies is contextualised. Secondly, the concept of techno-economic coalition is defined and the potential emerging techno-economic coalitions are explicated. Thirdly, 'backcasting' as a method for strategic foresight is described. Fourthly, the results of a 'backcasting' experiment in a strategic foresight workshop are presented. And finally, the future formation and role of techno-economic coalitions in cyberspace governance and in cyber defence both at a national and international level are discussed. The role of techno-economic coalitions in future cyberspace governance should be understood and considered today when developing strategic plans and implementing national and international cybersecurity policies.
在日益复杂的威胁形势下,许多国家都在努力制定和实施有效的网络安全政策,以促进国家和国际层面的网络空间治理。在维护国家主权和加强网络空间国际合作之间寻找平衡已经成为一个棘手的课题。与支持完全不同意识形态和网络安全政策的国家合作是有争议的。然而,一个国家在网络空间实现“自给自足”几乎是不可能的。因此,为了保持竞争力,保护和弹性,必须加入或加强具有类似国家网络安全政策和/或意识形态框架的发展中的技术-经济联盟。因此,本文认为技术-经济联盟是未来网络空间治理战略远见的新兴问题或趋势。本文讨论了技术-经济联盟的潜在形成,并展示了“回溯”如何用于战略预见。在本文中,“回溯”不是作为一种创建未来目标的传统战略地图的方法,而是作为一种框架来确定应该发生什么,以便在未来的网络空间中出现技术-经济联盟,即发现今天应该在战略预见中遵循的问题或趋势。首先,与国家网络安全政策相关的网络空间治理是情境化的。其次,界定了技术经济联盟的概念,并对可能出现的技术经济联盟进行了阐述。第三,描述了“回溯法”作为战略预见的一种方法。第四,介绍了在战略前瞻研讨会上进行的“回溯”实验的结果。最后,讨论了国家和国际层面上技术经济联盟在网络空间治理和网络防御中的未来形成和作用。在制定战略计划和实施国家和国际网络安全政策时,应该理解和考虑技术经济联盟在未来网络空间治理中的作用。
{"title":"Role of Techno-Economic Coalitions in Future Cyberspace Governance: 'Backcasting' as a Method for Strategic Foresight","authors":"Mari Ristolainen","doi":"10.34190/eccws.22.1.1078","DOIUrl":"https://doi.org/10.34190/eccws.22.1.1078","url":null,"abstract":"In an increasingly complex threat landscape, many nations struggle with developing and implementing effective cybersecurity policies for cyberspace governance at a national and international level. Balancing between the demands for establishing national sovereignty and strengthening international collaboration in cyberspace have become a problematic assignment. Collaborating with nations supporting extensively dissimilar ideologies and cybersecurity policies is controversial. Yet, it is almost impossible for a single country to achieve 'self-sufficiency' in cyberspace. Thus, in order to remain competitive, protected, and resilient one must either join or strengthen a developing techno-economic coalition with similar national cybersecurity policies and/or ideological framework. Consequently, this paper argues that techno-economic coalitions serve as an emerging issue or trend for strategic foresight in cyberspace governance in the future. This paper discusses the potential formation of techno-economic coalitions and shows how 'backcasting' can be used in strategic foresight. In this paper, 'backcasting' is not used as a method for creating a traditional strategic map to a future goal, but as a framework for determining what should have happened in order for the techno-economic coalitions to emerge in future cyberspace, i.e. for finding issues or trends that should be followed in strategic foresight today. Firstly, cyberspace governance in relation to national cybersecurity policies is contextualised. Secondly, the concept of techno-economic coalition is defined and the potential emerging techno-economic coalitions are explicated. Thirdly, 'backcasting' as a method for strategic foresight is described. Fourthly, the results of a 'backcasting' experiment in a strategic foresight workshop are presented. And finally, the future formation and role of techno-economic coalitions in cyberspace governance and in cyber defence both at a national and international level are discussed. The role of techno-economic coalitions in future cyberspace governance should be understood and considered today when developing strategic plans and implementing national and international cybersecurity policies.","PeriodicalId":258360,"journal":{"name":"European Conference on Cyber Warfare and Security","volume":"2012 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114800137","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Analysis of the MTI Crypto Investment Scam: User Case MTI加密投资骗局分析:用户案例
Pub Date : 2023-06-19 DOI: 10.34190/eccws.22.1.1441
J. Botha, Thor Pederson, L. Leenen
Since the start of the Covid-19 pandemic, blockchain and cryptocurrency adoption has increased significantly. The adoption rate of blockchain-based technologies has surpassed the Internet adoption rate in the 90s and early 2000s. As this industry has grown significantly, so too has the instances of crypto scams. Numerous cryptocurrency scams exist to exploit users. The generally limited understanding of how cryptocurrencies operate has increased the possible number of scams, relying on people’s misplaced sense of trust and desire for making money quickly and easily. As such, investment scams have also been growing in popularity. Mirror Trading International (MTI) has been named South Africa’s biggest crypto scam in 2020, resulting in losses of $1.7 billion. It is also one of the largest reported international crypto investment scams. This paper focuses on a specific aspect of the MTI scam; an analysis on the fund movements on the blockchain from the perpetrators and members who benefited the most from the scam. The authors used various Open-Source Intelligence (OSINT) tools, alongside QLUE, as well as news articles and blockchain explorers. These tools and techniques are used to follow the money-trial on the blockchain, in search of possible mistakes made by the perpetrator. This could include instances where some personal information might have been leaked. With such disclosed personal information, OSINT tools and investigative techniques can be used to identify the criminals. Due to the CEO of MTI having been arrested, and the case currently being dealt with in the court of law in South Africa, this paper also presents investigative processes that could be followed. Thus, the focus of this paper is to follow the money and consequently propose a process for an investigator to investigate crypto crimes and scams on the blockchain. As the adoption of blockchain technologies continues to increase at unprecedented rates, it is imperative to produce investigative toolkits and use cases to help reduce time spent trying to catch bad actors within the generally anonymous realm of cryptocurrencies.
自Covid-19大流行开始以来,区块链和加密货币的采用大幅增加。区块链技术的采用率已经超过了90年代和21世纪初的互联网采用率。随着这个行业的显着增长,加密诈骗的实例也在增加。存在许多加密货币骗局来利用用户。对加密货币如何运作的普遍有限的理解增加了骗局的可能数量,这依赖于人们错误的信任感和快速轻松赚钱的愿望。因此,投资诈骗也越来越受欢迎。Mirror Trading International (MTI)被评为2020年南非最大的加密骗局,造成17亿美元的损失。这也是据报道最大的国际加密投资骗局之一。本文侧重于MTI诈骗的一个具体方面;对从骗局中受益最多的犯罪者和成员在区块链上的资金流动进行分析。作者使用了各种开源智能(OSINT)工具,以及QLUE、新闻文章和区块链探索者。这些工具和技术用于跟踪区块链上的货币试验,以寻找犯罪者可能犯的错误。这可能包括一些个人信息可能已经泄露的情况。有了这些公开的个人信息,OSINT工具和调查技术就可以用来识别罪犯。由于MTI的首席执行官已被逮捕,案件目前正在南非法院处理,本文还提出了可以遵循的调查程序。因此,本文的重点是跟踪资金,从而为调查人员提供一个调查区块链上的加密犯罪和诈骗的流程。随着区块链技术的采用继续以前所未有的速度增长,有必要制作调查工具包和用例,以帮助减少在通常匿名的加密货币领域中捕捉坏人所花费的时间。
{"title":"An Analysis of the MTI Crypto Investment Scam: User Case","authors":"J. Botha, Thor Pederson, L. Leenen","doi":"10.34190/eccws.22.1.1441","DOIUrl":"https://doi.org/10.34190/eccws.22.1.1441","url":null,"abstract":"Since the start of the Covid-19 pandemic, blockchain and cryptocurrency adoption has increased significantly. The adoption rate of blockchain-based technologies has surpassed the Internet adoption rate in the 90s and early 2000s. As this industry has grown significantly, so too has the instances of crypto scams. Numerous cryptocurrency scams exist to exploit users. The generally limited understanding of how cryptocurrencies operate has increased the possible number of scams, relying on people’s misplaced sense of trust and desire for making money quickly and easily. As such, investment scams have also been growing in popularity. Mirror Trading International (MTI) has been named South Africa’s biggest crypto scam in 2020, resulting in losses of $1.7 billion. It is also one of the largest reported international crypto investment scams. This paper focuses on a specific aspect of the MTI scam; an analysis on the fund movements on the blockchain from the perpetrators and members who benefited the most from the scam. The authors used various Open-Source Intelligence (OSINT) tools, alongside QLUE, as well as news articles and blockchain explorers. These tools and techniques are used to follow the money-trial on the blockchain, in search of possible mistakes made by the perpetrator. This could include instances where some personal information might have been leaked. With such disclosed personal information, OSINT tools and investigative techniques can be used to identify the criminals. Due to the CEO of MTI having been arrested, and the case currently being dealt with in the court of law in South Africa, this paper also presents investigative processes that could be followed. Thus, the focus of this paper is to follow the money and consequently propose a process for an investigator to investigate crypto crimes and scams on the blockchain. As the adoption of blockchain technologies continues to increase at unprecedented rates, it is imperative to produce investigative toolkits and use cases to help reduce time spent trying to catch bad actors within the generally anonymous realm of cryptocurrencies.","PeriodicalId":258360,"journal":{"name":"European Conference on Cyber Warfare and Security","volume":"77 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117223340","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Digital Forensic Readiness Model for Internet Voting 互联网投票的数字取证准备模型
Pub Date : 2023-06-19 DOI: 10.34190/eccws.22.1.1186
Edmore Muyambo, Stacey O Baror
Voting is an exercise of choosing a preferred candidate through a process called an election. In many countries, this exercise is a basic human right. In every election process, there are some pre-requisite processes and procedures which must be set up first. These are essential in the pre-vote-casting stage, during vote-casting and post-vote-casting stage. Electoral disagreements amongst stakeholders and parties of interest are usually experienced in each of the above-mentioned voting process stages. The main points of conflict in an election process are vote rigging and vote fraud. Failure to amicably mitigate these issues can result in a criticised/rejected election result. Therefore, this research aims to address the problem of vote rigging and vote fraud allegations in an election process. The resolution thereof is achieved through the introduction of an online based voting system which is supported by a digital forensic readiness mechanism. Online voting system gives citizens the flexibility to use internet-enabled devices such as cell phones and laptops to cast their votes in a safe, secrete and secure protocol. To address the problem of vote rigging and vote fraud, the online voting system is integrated with cyber security and vote protection mechanisms. The cyber security and vote protection mechanism is based on Blockchain algorithms. A Blockchain-based voting process is a peer-to-peer mechanism where a decentralised database is used to store data. Tokens move directly from one peer (voter) to another peer (candidate). The results are tallied by counting the number of tokens paid to each candidate. Each voter is allocated a Bitcoin token and each candidate is allocated a Bitcoin address. During vote casting, the voter transfers their Bitcoin token into the wallet of a registered candidate. At the end of the voting process, the total number of Bitcoin tokens transferred to each candidate is counted and tallied up. The wallet is loaded with only one Bitcoin token, hence there is no possibility of double voting. The model ensures vote security, anonymity, auditability, accountability, accuracy and uniqueness.
投票是通过一个被称为选举的过程来选择一个受欢迎的候选人。在许多国家,这是一项基本人权。在每一个选举过程中,都有一些必须首先建立的先决程序和程序。这些在投票前、投票中和投票后阶段都是必不可少的。在上述投票过程的每个阶段,通常都会遇到利益相关者和利益团体之间的选举分歧。选举过程中的主要冲突点是操纵选举和欺诈选举。如果不能友好地缓和这些问题,选举结果可能会受到批评或拒绝。因此,本研究旨在解决选举过程中操纵选票和投票欺诈指控的问题。该解决方案是通过引入基于在线的投票系统来实现的,该系统由数字取证准备机制支持。网上投票系统使公民能够灵活地使用手机和笔记本电脑等联网设备,以安全、保密和可靠的协议进行投票。为了解决操纵选票和欺诈投票的问题,在线投票系统与网络安全和投票保护机制相结合。网络安全和投票保护机制基于区块链算法。基于区块链的投票过程是一种点对点机制,其中使用分散的数据库来存储数据。令牌直接从一个对等点(选民)移动到另一个对等点(候选人)。通过计算支付给每位候选人的令牌数量来计算结果。每位选民分配一个比特币令牌,每位候选人分配一个比特币地址。在投票过程中,选民将他们的比特币转移到注册候选人的钱包中。在投票过程结束时,将对转移给每位候选人的比特币令牌总数进行统计。钱包只装载了一个比特币令牌,因此不存在双重投票的可能性。该模型保证了投票的安全性、匿名性、可审计性、可问责性、准确性和唯一性。
{"title":"Digital Forensic Readiness Model for Internet Voting","authors":"Edmore Muyambo, Stacey O Baror","doi":"10.34190/eccws.22.1.1186","DOIUrl":"https://doi.org/10.34190/eccws.22.1.1186","url":null,"abstract":"Voting is an exercise of choosing a preferred candidate through a process called an election. In many countries, this exercise is a basic human right. In every election process, there are some pre-requisite processes and procedures which must be set up first. These are essential in the pre-vote-casting stage, during vote-casting and post-vote-casting stage. Electoral disagreements amongst stakeholders and parties of interest are usually experienced in each of the above-mentioned voting process stages. The main points of conflict in an election process are vote rigging and vote fraud. Failure to amicably mitigate these issues can result in a criticised/rejected election result. Therefore, this research aims to address the problem of vote rigging and vote fraud allegations in an election process. The resolution thereof is achieved through the introduction of an online based voting system which is supported by a digital forensic readiness mechanism. Online voting system gives citizens the flexibility to use internet-enabled devices such as cell phones and laptops to cast their votes in a safe, secrete and secure protocol. To address the problem of vote rigging and vote fraud, the online voting system is integrated with cyber security and vote protection mechanisms. The cyber security and vote protection mechanism is based on Blockchain algorithms. A Blockchain-based voting process is a peer-to-peer mechanism where a decentralised database is used to store data. Tokens move directly from one peer (voter) to another peer (candidate). The results are tallied by counting the number of tokens paid to each candidate. Each voter is allocated a Bitcoin token and each candidate is allocated a Bitcoin address. During vote casting, the voter transfers their Bitcoin token into the wallet of a registered candidate. At the end of the voting process, the total number of Bitcoin tokens transferred to each candidate is counted and tallied up. The wallet is loaded with only one Bitcoin token, hence there is no possibility of double voting. The model ensures vote security, anonymity, auditability, accountability, accuracy and uniqueness.","PeriodicalId":258360,"journal":{"name":"European Conference on Cyber Warfare and Security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124249794","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
European Conference on Cyber Warfare and Security
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1