首页 > 最新文献

2017 International Conference on Cyber Conflict (CyCon U.S.)最新文献

英文 中文
One year after Warsaw: The growing need for a NATO cyber command 华沙战争后一年:北约网络司令部的需求日益增长
Pub Date : 2017-11-01 DOI: 10.1109/CYCONUS.2017.8167513
Siim Alatalu
With cyber on NATO's agenda since 2002 and cyberspace declared a domain of operations for the Alliance at its 2016 Summit, one can ask a straightforward question — how will the Alliance make this declaration work? Starting from defining cyber operations to establishing procedures and delivering practical capability, much needs to be discussed amongst the NATO nations. In a predictable security environment and following all the conventional capacity building steps each of these issues could take years to deliberate. In cyber, however, there is less predictability every moment. One of the ideas that have been proposed as a quick remedy for NATO to deliver on the Warsaw declaration, is the setup of a NATO Cyber Command. One year after Warsaw NATO has yet to take a decision that would establish a NATO-owned cyber-command. Although thus somewhat speculative, the article analyses how and where in the current NCS (NATO Command Structure) a cyber-command can be set up and what should be the key considerations — the ends, ways and means — for NATO in agreeing to its tasks.
自2002年以来,网络就被提上了北约的议程,在2016年峰会上,网络空间被宣布为北约的行动领域,人们可以问一个直截了当的问题——北约将如何实现这一宣言?从定义网络作战到建立程序和提供实际能力,北约国家之间需要讨论很多问题。在一个可预测的安全环境中,按照所有常规的能力建设步骤,这些问题中的每一个都可能需要数年的时间来审议。然而,在网络世界中,每一刻的可预测性都在下降。作为北约履行华沙宣言的快速补救措施,已经提出的一个想法是建立北约网络司令部。华沙会议一年后,北约仍未决定是否建立一个北约拥有的网络司令部。尽管有些推测性,文章分析了在当前的NCS(北约指挥结构)中如何以及在何处建立网络司令部,以及北约同意其任务的关键考虑因素-目的,方式和手段。
{"title":"One year after Warsaw: The growing need for a NATO cyber command","authors":"Siim Alatalu","doi":"10.1109/CYCONUS.2017.8167513","DOIUrl":"https://doi.org/10.1109/CYCONUS.2017.8167513","url":null,"abstract":"With cyber on NATO's agenda since 2002 and cyberspace declared a domain of operations for the Alliance at its 2016 Summit, one can ask a straightforward question — how will the Alliance make this declaration work? Starting from defining cyber operations to establishing procedures and delivering practical capability, much needs to be discussed amongst the NATO nations. In a predictable security environment and following all the conventional capacity building steps each of these issues could take years to deliberate. In cyber, however, there is less predictability every moment. One of the ideas that have been proposed as a quick remedy for NATO to deliver on the Warsaw declaration, is the setup of a NATO Cyber Command. One year after Warsaw NATO has yet to take a decision that would establish a NATO-owned cyber-command. Although thus somewhat speculative, the article analyses how and where in the current NCS (NATO Command Structure) a cyber-command can be set up and what should be the key considerations — the ends, ways and means — for NATO in agreeing to its tasks.","PeriodicalId":259012,"journal":{"name":"2017 International Conference on Cyber Conflict (CyCon U.S.)","volume":"74 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114839970","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Identifying self-inflicted vulnerabilities: The operational implications of technology within U.S. combat systems 识别自身造成的漏洞:美国作战系统中技术的操作含义
Pub Date : 2017-11-01 DOI: 10.1109/CYCONUS.2017.8167505
Rock Stevens
Since the 1970s, the United States has integrated technology into combat platforms to maintain its military superiority. Modern digital vulnerabilities within these platforms place U.S. capabilities and military forces at risk for cyber attack. This paper discusses the impact of digital vulnerabilities for operational commanders through the lens of joint functions and operational factors. The undisciplined pursuit of a technological advantage within its weapons systems stands to revert U.S. military capabilities back to the World War I era. A cursory analysis of these implications yields two policy recommendations that will mitigate risk if adopted. Primarily, the United States needs to extend existing vulnerability disclosure programs to classified capabilities and programs. Secondly, the DoD must implement unscripted attack scenarios within combat readiness exercises that allow commanders to experience the brunt of a cyber attack before lives are at stake in a real-world scenario.
自20世纪70年代以来,美国将技术整合到作战平台中,以保持其军事优势。这些平台中的现代数字漏洞使美国的能力和军事力量面临网络攻击的风险。本文从联合职能和作战因素的角度讨论了数字脆弱性对作战指挥官的影响。对武器系统技术优势的无节制追求,将使美国的军事能力倒退到第一次世界大战时代。对这些影响的粗略分析得出两项政策建议,如果被采纳,将会降低风险。首先,美国需要将现有的漏洞披露项目扩展到机密能力和项目。其次,国防部必须在战备演习中实施无脚本攻击场景,使指挥官能够在现实场景中生命受到威胁之前体验网络攻击的冲击。
{"title":"Identifying self-inflicted vulnerabilities: The operational implications of technology within U.S. combat systems","authors":"Rock Stevens","doi":"10.1109/CYCONUS.2017.8167505","DOIUrl":"https://doi.org/10.1109/CYCONUS.2017.8167505","url":null,"abstract":"Since the 1970s, the United States has integrated technology into combat platforms to maintain its military superiority. Modern digital vulnerabilities within these platforms place U.S. capabilities and military forces at risk for cyber attack. This paper discusses the impact of digital vulnerabilities for operational commanders through the lens of joint functions and operational factors. The undisciplined pursuit of a technological advantage within its weapons systems stands to revert U.S. military capabilities back to the World War I era. A cursory analysis of these implications yields two policy recommendations that will mitigate risk if adopted. Primarily, the United States needs to extend existing vulnerability disclosure programs to classified capabilities and programs. Secondly, the DoD must implement unscripted attack scenarios within combat readiness exercises that allow commanders to experience the brunt of a cyber attack before lives are at stake in a real-world scenario.","PeriodicalId":259012,"journal":{"name":"2017 International Conference on Cyber Conflict (CyCon U.S.)","volume":"13 20","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133205162","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Considerations for secure and resilient satellite architectures 对安全和弹性卫星架构的考虑
Pub Date : 2017-11-01 DOI: 10.1109/CYCONUS.2017.8167508
J. Willis, R. Mills, L. Mailloux, S. Graham
Traditionally, the focus of security and ensuring confidentiality, integrity, and availability of data in spacecraft systems has been on the ground segment and the uplink/downlink components. Although these are the most obvious attack vectors, potential security risks against the satellite's platform is also a serious concern. This paper discusses a notional satellite architecture and explores security vulnerabilities using a systems-level approach. Viewing attacks through this paradigm highlights several potential attack vectors that conventional satellite security approaches fail to consider. If left undetected, these could yield physical effects limiting the satellite's mission or performance. The approach presented aids in risk analysis and gives insight into architectural design considerations which improve the system's overall resiliency.
传统上,航天器系统中安全性和确保数据保密性、完整性和可用性的重点一直放在地面段和上行/下行链路组件上。虽然这些是最明显的攻击媒介,但针对卫星平台的潜在安全风险也是一个严重的问题。本文讨论了一种概念卫星架构,并使用系统级方法探讨了安全漏洞。通过这种模式观察攻击,可以突出传统卫星安全方法无法考虑的几个潜在攻击向量。如果不被发现,这些可能会产生物理影响,限制卫星的任务或性能。所提出的方法有助于进行风险分析,并深入了解提高系统整体弹性的建筑设计考虑。
{"title":"Considerations for secure and resilient satellite architectures","authors":"J. Willis, R. Mills, L. Mailloux, S. Graham","doi":"10.1109/CYCONUS.2017.8167508","DOIUrl":"https://doi.org/10.1109/CYCONUS.2017.8167508","url":null,"abstract":"Traditionally, the focus of security and ensuring confidentiality, integrity, and availability of data in spacecraft systems has been on the ground segment and the uplink/downlink components. Although these are the most obvious attack vectors, potential security risks against the satellite's platform is also a serious concern. This paper discusses a notional satellite architecture and explores security vulnerabilities using a systems-level approach. Viewing attacks through this paradigm highlights several potential attack vectors that conventional satellite security approaches fail to consider. If left undetected, these could yield physical effects limiting the satellite's mission or performance. The approach presented aids in risk analysis and gives insight into architectural design considerations which improve the system's overall resiliency.","PeriodicalId":259012,"journal":{"name":"2017 International Conference on Cyber Conflict (CyCon U.S.)","volume":"190 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123400996","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Cyber security via formal methods: A framework for implementing formal methods 通过形式化方法实现网络安全:实现形式化方法的框架
Pub Date : 2017-11-01 DOI: 10.1109/CYCONUS.2017.8167500
J. Rivera
This paper demonstrates a methodology for how the organizations that employ complex enterprise systems of systems can significantly improve cyber defense while decreasing overall operating costs by using formal methods. The paper demonstrates an approach that uses an event-based methodology to formalize all types of enterprise behavior, to include system, human, and environmental events.
本文展示了一种方法,说明采用复杂企业系统的组织如何通过使用形式化方法显著提高网络防御,同时降低总体运营成本。本文演示了一种方法,该方法使用基于事件的方法来形式化所有类型的企业行为,包括系统、人类和环境事件。
{"title":"Cyber security via formal methods: A framework for implementing formal methods","authors":"J. Rivera","doi":"10.1109/CYCONUS.2017.8167500","DOIUrl":"https://doi.org/10.1109/CYCONUS.2017.8167500","url":null,"abstract":"This paper demonstrates a methodology for how the organizations that employ complex enterprise systems of systems can significantly improve cyber defense while decreasing overall operating costs by using formal methods. The paper demonstrates an approach that uses an event-based methodology to formalize all types of enterprise behavior, to include system, human, and environmental events.","PeriodicalId":259012,"journal":{"name":"2017 International Conference on Cyber Conflict (CyCon U.S.)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122861135","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Proactive identification of exploits in the wild through vulnerability mentions online 通过在线提到的漏洞在野外主动识别漏洞
Pub Date : 2017-11-01 DOI: 10.1109/CYCONUS.2017.8167501
Mohammed Almukaynizi, Eric Nunes, Krishna Dharaiya, M. Senguttuvan, Jana Shakarian, P. Shakarian
The number of software vulnerabilities discovered and publicly disclosed is increasing every year; however, only a small fraction of them is exploited in real-world attacks. With limitations on time and skilled resources, organizations often look at ways to identify threatened vulnerabilities for patch prioritization. In this paper, we present an exploit prediction model that predicts whether a vulnerability will be exploited. Our proposed model leverages data from a variety of online data sources (white-hat community, vulnerability researchers community, and darkweb/deepweb sites) with vulnerability mentions. Compared to the standard scoring system (CVSS base score), our model outperforms the baseline models with an F1 measure of 0.40 on the minority class (266% improvement over CVSS base score) and also achieves high True Positive Rate at low False Positive Rate (90%, 13%, respectively). The results demonstrate that the model is highly effective as an early predictor of exploits that could appear in the wild. We also present a qualitative and quantitative study regarding the increase in the likelihood of exploitation incurred when a vulnerability is mentioned in each of the data sources we examine.
发现和公开披露的软件漏洞数量每年都在增加;然而,其中只有一小部分在现实世界的攻击中被利用。由于时间和技术资源的限制,组织经常寻找方法来识别受威胁的漏洞,以确定补丁的优先级。在本文中,我们提出了一个预测漏洞是否会被利用的漏洞预测模型。我们提出的模型利用了来自各种提到漏洞的在线数据源(白帽社区、漏洞研究人员社区和暗网/深度网站)的数据。与标准评分系统(CVSS基础分数)相比,我们的模型在少数类别上的F1测量值为0.40(比CVSS基础分数提高266%)优于基线模型,并且在低假阳性率(分别为90%和13%)下实现了高真阳性率。结果表明,该模型作为可能出现在野外的漏洞的早期预测器是非常有效的。我们还提出了一项定性和定量研究,研究了当我们检查的每个数据源中提到漏洞时,被利用的可能性会增加。
{"title":"Proactive identification of exploits in the wild through vulnerability mentions online","authors":"Mohammed Almukaynizi, Eric Nunes, Krishna Dharaiya, M. Senguttuvan, Jana Shakarian, P. Shakarian","doi":"10.1109/CYCONUS.2017.8167501","DOIUrl":"https://doi.org/10.1109/CYCONUS.2017.8167501","url":null,"abstract":"The number of software vulnerabilities discovered and publicly disclosed is increasing every year; however, only a small fraction of them is exploited in real-world attacks. With limitations on time and skilled resources, organizations often look at ways to identify threatened vulnerabilities for patch prioritization. In this paper, we present an exploit prediction model that predicts whether a vulnerability will be exploited. Our proposed model leverages data from a variety of online data sources (white-hat community, vulnerability researchers community, and darkweb/deepweb sites) with vulnerability mentions. Compared to the standard scoring system (CVSS base score), our model outperforms the baseline models with an F1 measure of 0.40 on the minority class (266% improvement over CVSS base score) and also achieves high True Positive Rate at low False Positive Rate (90%, 13%, respectively). The results demonstrate that the model is highly effective as an early predictor of exploits that could appear in the wild. We also present a qualitative and quantitative study regarding the increase in the likelihood of exploitation incurred when a vulnerability is mentioned in each of the data sources we examine.","PeriodicalId":259012,"journal":{"name":"2017 International Conference on Cyber Conflict (CyCon U.S.)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133979827","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 49
The control & capabilities test: How a new legal regime is shaping attribution in cyberspace 控制和能力测试:新的法律制度如何塑造网络空间的归属
Pub Date : 2017-11-01 DOI: 10.1109/CYCONUS.2017.8167514
P. Stockburger
Attribution in cyberspace is one of the most difficult questions facing policy makers, lawyers, and jurists. Indeed, the first question often asked in the wake of a cyber incident is “who did it?” The answer to this question is often critical when dealing with the application of international law because it will dictate the rights and responsibilities of States both from an offensive and defensive perspective. Without proper attribution, for example, a State's responsive capabilities are limited. Making matters worse, attribution is difficult to establish factually. Non-State actors often mask their identity, and State actors often hide their true intentions. The degree to which the international rules governing State attribution apply in cyberspace is therefore a matter of great public importance.
网络空间的归属是政策制定者、律师和法学家面临的最困难的问题之一。事实上,网络事件发生后,人们经常问的第一个问题是“谁干的?”在处理国际法的适用问题时,对这个问题的回答往往是至关重要的,因为它将从进攻和防御的角度规定各国的权利和责任。例如,如果没有适当的归属,一个国家的反应能力就会受到限制。更糟糕的是,归因很难在事实中确立。非国家行为者往往掩盖其身份,国家行为者往往隐藏其真实意图。因此,关于国家归属的国际规则在多大程度上适用于网络空间是一个具有重大公共重要性的问题。
{"title":"The control & capabilities test: How a new legal regime is shaping attribution in cyberspace","authors":"P. Stockburger","doi":"10.1109/CYCONUS.2017.8167514","DOIUrl":"https://doi.org/10.1109/CYCONUS.2017.8167514","url":null,"abstract":"Attribution in cyberspace is one of the most difficult questions facing policy makers, lawyers, and jurists. Indeed, the first question often asked in the wake of a cyber incident is “who did it?” The answer to this question is often critical when dealing with the application of international law because it will dictate the rights and responsibilities of States both from an offensive and defensive perspective. Without proper attribution, for example, a State's responsive capabilities are limited. Making matters worse, attribution is difficult to establish factually. Non-State actors often mask their identity, and State actors often hide their true intentions. The degree to which the international rules governing State attribution apply in cyberspace is therefore a matter of great public importance.","PeriodicalId":259012,"journal":{"name":"2017 International Conference on Cyber Conflict (CyCon U.S.)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126449032","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cyber terrain mission mapping: Tools and methodologies 网络地形任务映射:工具和方法
Pub Date : 2017-11-01 DOI: 10.1109/CYCONUS.2017.8167504
Jeffrey Guion, Mark Reith
The Air Force is shifting its cybersecurity paradigm from an information technology (IT)-centric toward a mission oriented approach. Instead of focusing on how to defend its IT infrastructure, it seeks to provide mission assurance by defending mission relevant cyber terrain enabling mission execution in a contested environment. In order to actively defend a mission in cyberspace, efforts must be taken to understand and document that mission's dependence on cyberspace and cyber assets. This is known as cyber terrain mission mapping. This paper seeks to define mission mapping and overview methodologies. We also analyze current tools seeking to provide cyber situational awareness through mission mapping or cyber dependency impact analysis and identify existing shortfalls.
空军正在将其网络安全范式从以信息技术(IT)为中心转向以任务为导向的方法。它不是专注于如何保护其IT基础设施,而是寻求通过保护任务相关的网络地形来提供任务保证,从而在有争议的环境中执行任务。为了积极保护网络空间中的任务,必须努力了解和记录该任务对网络空间和网络资产的依赖。这就是所谓的网络地形任务映射。本文试图定义任务映射和概述方法。我们还分析了通过任务映射或网络依赖影响分析寻求提供网络态势感知的当前工具,并确定了现有的不足之处。
{"title":"Cyber terrain mission mapping: Tools and methodologies","authors":"Jeffrey Guion, Mark Reith","doi":"10.1109/CYCONUS.2017.8167504","DOIUrl":"https://doi.org/10.1109/CYCONUS.2017.8167504","url":null,"abstract":"The Air Force is shifting its cybersecurity paradigm from an information technology (IT)-centric toward a mission oriented approach. Instead of focusing on how to defend its IT infrastructure, it seeks to provide mission assurance by defending mission relevant cyber terrain enabling mission execution in a contested environment. In order to actively defend a mission in cyberspace, efforts must be taken to understand and document that mission's dependence on cyberspace and cyber assets. This is known as cyber terrain mission mapping. This paper seeks to define mission mapping and overview methodologies. We also analyze current tools seeking to provide cyber situational awareness through mission mapping or cyber dependency impact analysis and identify existing shortfalls.","PeriodicalId":259012,"journal":{"name":"2017 International Conference on Cyber Conflict (CyCon U.S.)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115769598","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
1st Troll Battalion: Influencing military and strategic operations through cyber-personas 第一巨魔营:通过网络角色影响军事和战略行动
Pub Date : 2017-11-01 DOI: 10.1109/CYCONUS.2017.8167503
S. Hart, Marcus Klink
The Twenty-First Century has seen the dawn of the Internet as a pervasive medium by which nearly all information flows. However, the permissive environment in which the Internet was founded fostered a community plagued by Internet trolls, individuals who deliberately post inflammatory, off-topic, or offensive material on online message boards to elicit angst, or other emotions, from their targets. Then American adversaries weaponized information using trolling, and stories of its increased use and technology to influence behavior dominated headlines over the past year. Foreign influence in cyberspace directed towards the 2016 Presidential Election demonstrates how trolling has changed the political environment in the United States. Americans are vulnerable to the influence of these foreign actors, and most troubling, some will not realize foreign intelligence services target their online activities. Adversaries leverage access through Internet trolling to shift public opinion in a new and original way by distributing politically charged narratives and suppressing the free exchange of ideas through a variety of means. By combining cyber operations, information warfare, and military intelligence with automated infrastructure in one military unit, the Troll Battalion, leaders can influence military operations by shaping adversaries' social and political environments while protecting Americans from the effects of foreign trolls. The practical application of influencing strategic and tactical outcomes via cyber-personas requires further analysis for use on the battlefield, and the protection and defense of American leaders, institutions, and persons must also be analyzed to protect Americans from information warfare.
21世纪已经见证了互联网的曙光,它是一种无处不在的媒介,几乎所有的信息都通过它流动。然而,互联网建立的宽松环境催生了一个被网络喷子困扰的社区,这些人故意在网上留言板上发布煽动性的、离题的或攻击性的材料,以引起他们的目标的焦虑或其他情绪。然后,美国的对手利用网络攻击将信息武器化,在过去一年里,有关网络攻击的使用和技术越来越多地影响人们的行为的报道占据了新闻头条。外国在网络空间对2016年总统选举的影响表明,网络喷子如何改变了美国的政治环境。美国人很容易受到这些外国行为者的影响,最令人不安的是,有些人不会意识到外国情报机构会针对他们的在线活动。对手利用互联网上的网络攻击,通过散布带有政治色彩的言论和通过各种手段压制思想的自由交流,以一种新的、原创的方式改变公众舆论。通过将网络作战、信息战和军事情报与一个军事单位的自动化基础设施相结合,“巨魔营”的领导人可以通过塑造对手的社会和政治环境来影响军事行动,同时保护美国人免受外国巨魔的影响。通过网络角色影响战略和战术结果的实际应用需要进一步分析在战场上的使用,并且还必须分析对美国领导人、机构和人员的保护和防御,以保护美国人免受信息战的影响。
{"title":"1st Troll Battalion: Influencing military and strategic operations through cyber-personas","authors":"S. Hart, Marcus Klink","doi":"10.1109/CYCONUS.2017.8167503","DOIUrl":"https://doi.org/10.1109/CYCONUS.2017.8167503","url":null,"abstract":"The Twenty-First Century has seen the dawn of the Internet as a pervasive medium by which nearly all information flows. However, the permissive environment in which the Internet was founded fostered a community plagued by Internet trolls, individuals who deliberately post inflammatory, off-topic, or offensive material on online message boards to elicit angst, or other emotions, from their targets. Then American adversaries weaponized information using trolling, and stories of its increased use and technology to influence behavior dominated headlines over the past year. Foreign influence in cyberspace directed towards the 2016 Presidential Election demonstrates how trolling has changed the political environment in the United States. Americans are vulnerable to the influence of these foreign actors, and most troubling, some will not realize foreign intelligence services target their online activities. Adversaries leverage access through Internet trolling to shift public opinion in a new and original way by distributing politically charged narratives and suppressing the free exchange of ideas through a variety of means. By combining cyber operations, information warfare, and military intelligence with automated infrastructure in one military unit, the Troll Battalion, leaders can influence military operations by shaping adversaries' social and political environments while protecting Americans from the effects of foreign trolls. The practical application of influencing strategic and tactical outcomes via cyber-personas requires further analysis for use on the battlefield, and the protection and defense of American leaders, institutions, and persons must also be analyzed to protect Americans from information warfare.","PeriodicalId":259012,"journal":{"name":"2017 International Conference on Cyber Conflict (CyCon U.S.)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116303638","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
A framework for cybersecurity assessments of critical port infrastructure 关键港口基础设施网络安全评估框架
Pub Date : 2017-11-01 DOI: 10.1109/CYCONUS.2017.8167506
D. Trimble, Jonathon Monken, Alexander F. L. Sand
Nearly all global economic trade flows through the ports and a broader intermodal transit system in which supporting technology networks are often privately owned and operated. The majority of government oversight and industry cooperation focuses on physical access and the safe construction and operation of ships. The cybersecurity of critical maritime and interconnected infrastructure remains largely unregulated with minimal, if any, assessment or mitigation of cybersecurity risks. These critical infrastructure networks encompass industrial control, SCADA, and information technology systems — much of it proprietary and dependent on operational support or interdependencies in intersecting domains, from energy to transportation. While many operators of the infrastructure are concerned about cybersecurity, the complexity of their systems, interdependence with other sectors, and an outsized public interest in mitigating cyber risks against such crucial economic arteries demonstrates a compelling need for standardized frameworks for assessing cybersecurity risk in the maritime domain. Our work identifies cyber risk factors affecting maritime infrastructure, present barriers to mitigating risks, and proposes the creation of an independent public/private entity for assessing, containing, and mitigating potential risks.
几乎所有的全球经济贸易都通过港口和更广泛的多式联运系统流动,其中支持技术网络往往是私人拥有和经营的。大多数政府监管和行业合作的重点是船舶的实际进出和安全建造和运营。关键海上和互联基础设施的网络安全在很大程度上仍然不受监管,对网络安全风险的评估或缓解程度最低。这些关键的基础设施网络包括工业控制、SCADA和信息技术系统,其中大部分是专有的,依赖于从能源到交通等交叉领域的运营支持或相互依赖。尽管许多基础设施运营商都担心网络安全问题,但由于其系统的复杂性、与其他部门的相互依赖性,以及公众对减轻这些关键经济要道的网络风险的极大兴趣,迫切需要标准化框架来评估海上网络安全风险。我们的工作确定了影响海事基础设施的网络风险因素,提出了降低风险的障碍,并建议建立一个独立的公共/私人实体来评估、控制和降低潜在风险。
{"title":"A framework for cybersecurity assessments of critical port infrastructure","authors":"D. Trimble, Jonathon Monken, Alexander F. L. Sand","doi":"10.1109/CYCONUS.2017.8167506","DOIUrl":"https://doi.org/10.1109/CYCONUS.2017.8167506","url":null,"abstract":"Nearly all global economic trade flows through the ports and a broader intermodal transit system in which supporting technology networks are often privately owned and operated. The majority of government oversight and industry cooperation focuses on physical access and the safe construction and operation of ships. The cybersecurity of critical maritime and interconnected infrastructure remains largely unregulated with minimal, if any, assessment or mitigation of cybersecurity risks. These critical infrastructure networks encompass industrial control, SCADA, and information technology systems — much of it proprietary and dependent on operational support or interdependencies in intersecting domains, from energy to transportation. While many operators of the infrastructure are concerned about cybersecurity, the complexity of their systems, interdependence with other sectors, and an outsized public interest in mitigating cyber risks against such crucial economic arteries demonstrates a compelling need for standardized frameworks for assessing cybersecurity risk in the maritime domain. Our work identifies cyber risk factors affecting maritime infrastructure, present barriers to mitigating risks, and proposes the creation of an independent public/private entity for assessing, containing, and mitigating potential risks.","PeriodicalId":259012,"journal":{"name":"2017 International Conference on Cyber Conflict (CyCon U.S.)","volume":"90 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126535665","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Solving the fiscal challenge of real-time cyber capability development: How low-cost cyber capability development can be accelerated through the use of Operations and Maintenance funds and what congress can do to help 解决实时网络能力发展的财政挑战:如何通过使用运营和维护资金加速低成本网络能力的发展,以及国会可以提供哪些帮助
Pub Date : 2017-11-01 DOI: 10.1109/CYCONUS.2017.8167509
Rebecca K. Lively, M. Curran
This paper addresses contract and fiscal limitations in the acquisition process often seen as a constraint on real-time cyber capability development. First, the paper advocates for increased use of Operations and Maintenance (O&M) funds for low-cost cyber capability development. Using the Air Force's Real Time Operations and Innovation model, the paper suggests a near-term solution for other services to expand their use O&M funds for certain types of cyber capability development. Next, the paper outlines a course of action to better define and expand Department of Defense authority to spend O&M funds for low-cost cyber capability development.
本文讨论了采购过程中的合同和财政限制,这些限制通常被视为实时网络能力发展的约束。首先,本文主张增加运营和维护(O&M)资金用于低成本网络能力发展。利用空军的实时作战和创新模型,该文件为其他军种提出了一种短期解决方案,以扩大其对某些类型网络能力发展的运维资金的使用。接下来,该文件概述了一个行动方案,以更好地定义和扩大国防部的权力,将运维资金用于低成本网络能力的发展。
{"title":"Solving the fiscal challenge of real-time cyber capability development: How low-cost cyber capability development can be accelerated through the use of Operations and Maintenance funds and what congress can do to help","authors":"Rebecca K. Lively, M. Curran","doi":"10.1109/CYCONUS.2017.8167509","DOIUrl":"https://doi.org/10.1109/CYCONUS.2017.8167509","url":null,"abstract":"This paper addresses contract and fiscal limitations in the acquisition process often seen as a constraint on real-time cyber capability development. First, the paper advocates for increased use of Operations and Maintenance (O&M) funds for low-cost cyber capability development. Using the Air Force's Real Time Operations and Innovation model, the paper suggests a near-term solution for other services to expand their use O&M funds for certain types of cyber capability development. Next, the paper outlines a course of action to better define and expand Department of Defense authority to spend O&M funds for low-cost cyber capability development.","PeriodicalId":259012,"journal":{"name":"2017 International Conference on Cyber Conflict (CyCon U.S.)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127177586","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2017 International Conference on Cyber Conflict (CyCon U.S.)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1