首页 > 最新文献

2016 International Conference on Cyber Conflict (CyCon U.S.)最新文献

英文 中文
International cyber incident repository system: information sharing on a global scale 国际网络事件存储系统:全球范围内的信息共享
Pub Date : 2016-10-24 DOI: 10.1109/cyconus.2016.7836618
Amanda Joyce, Nathaniel Evans
{"title":"International cyber incident repository system: information sharing on a global scale","authors":"Amanda Joyce, Nathaniel Evans","doi":"10.1109/cyconus.2016.7836618","DOIUrl":"https://doi.org/10.1109/cyconus.2016.7836618","url":null,"abstract":"","PeriodicalId":358914,"journal":{"name":"2016 International Conference on Cyber Conflict (CyCon U.S.)","volume":"604 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130335276","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Acting in the unknown: the cynefin framework for managing cybersecurity risk in dynamic decision making 在未知中行动:动态决策中管理网络安全风险的动态框架
Pub Date : 2016-10-01 DOI: 10.1109/CYCONUS.2016.7836616
J. Dykstra, S. R. Orr
Researchers have shown that human decision making in complex environments like cyber is a significant risk factor. Unfortunately, much work on cyber situational awareness has been technology-focused, despite the ultimate importance of human decisions, especially in crisis situations like real-time cyber-attacks and data breaches. Cybersecurity practitioners and leaders require an appropriate framework to help decision makers at all levels guide and act while managing risk in unexpected and dynamic situations. Without such a framework, failure to enlighten the unknown leads to heightened risk, uncertainty, and insecurity. The ability to establish context, adapt, and apply the most appropriate decision-making style to unique situations increases the likelihood of security. We offer an application of the Cynefin Framework, a sensemaking solution, to cybersecurity which allows practitioners and leaders to identify the context and appropriate response type in complex situations using the cause-and-effect relationship. We also illustrate how orienting oneself in the five Cynefin domains – disorder, obvious, complicated, complex, and chaotic – can help manage risk. By comparing Cynefin to other decision-making frameworks, we show how this framework is uniquely appropriate for acting through complexity and risk in cyber.
研究人员表明,在网络等复杂环境中,人类的决策是一个重要的风险因素。不幸的是,尽管人类决策的最终重要性,特别是在实时网络攻击和数据泄露等危机情况下,许多关于网络态势感知的工作都是以技术为中心的。网络安全从业者和领导者需要一个适当的框架来帮助各级决策者在管理意外和动态情况下的风险时进行指导和行动。如果没有这样一个框架,就无法启发未知的事物,从而导致风险、不确定性和不安全感的增加。建立上下文、适应和应用最合适的决策风格的能力增加了安全的可能性。我们将Cynefin框架应用于网络安全,这是一种意义构建解决方案,允许从业者和领导者在复杂情况下使用因果关系识别上下文和适当的响应类型。我们还说明了如何将自己定位在五个Cynefin领域-无序,明显,复杂,复杂和混乱-可以帮助管理风险。通过将Cynefin与其他决策框架进行比较,我们展示了该框架如何独特地适用于应对网络中的复杂性和风险。
{"title":"Acting in the unknown: the cynefin framework for managing cybersecurity risk in dynamic decision making","authors":"J. Dykstra, S. R. Orr","doi":"10.1109/CYCONUS.2016.7836616","DOIUrl":"https://doi.org/10.1109/CYCONUS.2016.7836616","url":null,"abstract":"Researchers have shown that human decision making in complex environments like cyber is a significant risk factor. Unfortunately, much work on cyber situational awareness has been technology-focused, despite the ultimate importance of human decisions, especially in crisis situations like real-time cyber-attacks and data breaches. Cybersecurity practitioners and leaders require an appropriate framework to help decision makers at all levels guide and act while managing risk in unexpected and dynamic situations. Without such a framework, failure to enlighten the unknown leads to heightened risk, uncertainty, and insecurity. The ability to establish context, adapt, and apply the most appropriate decision-making style to unique situations increases the likelihood of security. We offer an application of the Cynefin Framework, a sensemaking solution, to cybersecurity which allows practitioners and leaders to identify the context and appropriate response type in complex situations using the cause-and-effect relationship. We also illustrate how orienting oneself in the five Cynefin domains – disorder, obvious, complicated, complex, and chaotic – can help manage risk. By comparing Cynefin to other decision-making frameworks, we show how this framework is uniquely appropriate for acting through complexity and risk in cyber.","PeriodicalId":358914,"journal":{"name":"2016 International Conference on Cyber Conflict (CyCon U.S.)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114747247","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Countering cyber threats: answers from international law 应对网络威胁:来自国际法的答案
Pub Date : 2016-10-01 DOI: 10.1109/CYCONUS.2016.7836625
Anna Rotondo
Cyber activities, particularly those of a cross-border nature, have not yet been subjected to international regulation despite the fact that cyberspace has become a strategic domain for all States. This lack puts at risk the efficacy of national defence strategies inasmuch as the decision maker remains inactive because assailed by the so-called response crises. That is the dilemma arising from the doubt that in case of a cyber threat, or cyber attack, any operative choice may lead to a violation of international law. In this scenario States are obliged to reconsider new defence strategies and theories of deterrence such as that of deterrence by denial, which is primarily based on the concept of resilience in order to reassure service continuity in the aftermath of destructive events, especially when they are unpredictable. In the silence of international law active defense strategies seem to be a sustainable legal-functional solution for the targeted State which does not wish to remain defenseless, but only if these strategies do not reach the threshold of unlawful conducts. However the reaction against in coming cyber attacks remains a tangled problem for the targeted State because if on the one hand the customary international law on direct responsibility is almost never applied, on the other hand the discipline of indirect responsibility doesn’t give any contribution to the decision maker who has to choose for a prompt option of reaction.
尽管网络空间已成为所有国家的战略领域,但网络活动,特别是跨境网络活动尚未受到国际监管。这种缺乏使国防战略的效力受到威胁,因为决策者由于受到所谓的反应危机的攻击而仍然不活跃。在网络威胁或网络攻击的情况下,任何行动选择都可能导致违反国际法。在这种情况下,各国必须重新考虑新的防御战略和威慑理论,例如拒止威慑理论,拒止威慑理论主要基于复原力的概念,以便在破坏性事件,特别是不可预测事件发生后确保服务的连续性。在国际法沉默的情况下,积极防御战略似乎是不希望毫无防御能力的目标国家的一种可持续的、具有法律功能的解决办法,但前提是这些战略没有达到非法行为的门槛。然而,对即将到来的网络攻击的反应对于目标国家来说仍然是一个纠结的问题,因为一方面,关于直接责任的习惯国际法几乎从未适用过,另一方面,间接责任的纪律并没有给决策者提供任何帮助,他们必须选择一个迅速的反应选项。
{"title":"Countering cyber threats: answers from international law","authors":"Anna Rotondo","doi":"10.1109/CYCONUS.2016.7836625","DOIUrl":"https://doi.org/10.1109/CYCONUS.2016.7836625","url":null,"abstract":"Cyber activities, particularly those of a cross-border nature, have not yet been subjected to international regulation despite the fact that cyberspace has become a strategic domain for all States. This lack puts at risk the efficacy of national defence strategies inasmuch as the decision maker remains inactive because assailed by the so-called response crises. That is the dilemma arising from the doubt that in case of a cyber threat, or cyber attack, any operative choice may lead to a violation of international law. In this scenario States are obliged to reconsider new defence strategies and theories of deterrence such as that of deterrence by denial, which is primarily based on the concept of resilience in order to reassure service continuity in the aftermath of destructive events, especially when they are unpredictable. In the silence of international law active defense strategies seem to be a sustainable legal-functional solution for the targeted State which does not wish to remain defenseless, but only if these strategies do not reach the threshold of unlawful conducts. However the reaction against in coming cyber attacks remains a tangled problem for the targeted State because if on the one hand the customary international law on direct responsibility is almost never applied, on the other hand the discipline of indirect responsibility doesn’t give any contribution to the decision maker who has to choose for a prompt option of reaction.","PeriodicalId":358914,"journal":{"name":"2016 International Conference on Cyber Conflict (CyCon U.S.)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117183162","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cyber workforce development using a behavioral cybersecurity paradigm 使用行为网络安全范式的网络劳动力发展
Pub Date : 2016-10-01 DOI: 10.1109/CYCONUS.2016.7836614
Bruce D. Caulkins, Karla A. Badillo-Urquiola, Patricia S. Bockelman, Rebecca A. Leis
This paper contributes to the ongoing efforts in the cybersecurity community to strengthen cyber workforce development by providing an overview of key gaps and proposing practical education strategies. Leveraging documented incidents from defense, industry, and academia and the rest of the United States government, we identify emerging cyber-education opportunities highlighting human-centric elements using a gap analysis approach. We closely examine the National Initiative for Cybersecurity Education’s (NICE) National Cybersecurity Workforce Framework (NCWF) as well as the Department of Homeland Security’s (DHS) National Initiative for Cybersecurity Careers and Studies (NICCS) educational framework. These documents provide a foundation for current and future research with cybersecurity workforce development. Next, the paper outlines a pilot education program launched at the University of Central Florida (UCF), designed to address the unique challenges of the human dimension in cybersecurity. The purpose of highlighting this pilot program is to provide an example of human-centric cyber-educational curriculum. The present paper offers a launching point for further discussion about the human side of cybersecurity, closing with considerations of the “lessons learned” from early responses to the UCF program from the program’s inaugural student cohort.
本文通过概述主要差距并提出实用的教育策略,为网络安全社区加强网络劳动力发展的持续努力做出了贡献。利用来自国防、工业、学术界和美国政府其他部门的记录事件,我们使用差距分析方法识别新兴的网络教育机会,突出以人为中心的要素。我们仔细研究了国家网络安全教育倡议(NICE)国家网络安全劳动力框架(NCWF)以及国土安全部(DHS)国家网络安全职业和研究倡议(NICCS)教育框架。这些文件为当前和未来的网络安全劳动力发展研究提供了基础。接下来,本文概述了中佛罗里达大学(UCF)启动的一项试点教育计划,该计划旨在解决网络安全中人类层面的独特挑战。强调这个试点项目的目的是提供一个以人为本的网络教育课程的例子。本文为进一步讨论网络安全的人为方面提供了一个出发点,最后考虑了从该项目首届学生群体对UCF项目的早期反应中获得的“经验教训”。
{"title":"Cyber workforce development using a behavioral cybersecurity paradigm","authors":"Bruce D. Caulkins, Karla A. Badillo-Urquiola, Patricia S. Bockelman, Rebecca A. Leis","doi":"10.1109/CYCONUS.2016.7836614","DOIUrl":"https://doi.org/10.1109/CYCONUS.2016.7836614","url":null,"abstract":"This paper contributes to the ongoing efforts in the cybersecurity community to strengthen cyber workforce development by providing an overview of key gaps and proposing practical education strategies. Leveraging documented incidents from defense, industry, and academia and the rest of the United States government, we identify emerging cyber-education opportunities highlighting human-centric elements using a gap analysis approach. We closely examine the National Initiative for Cybersecurity Education’s (NICE) National Cybersecurity Workforce Framework (NCWF) as well as the Department of Homeland Security’s (DHS) National Initiative for Cybersecurity Careers and Studies (NICCS) educational framework. These documents provide a foundation for current and future research with cybersecurity workforce development. Next, the paper outlines a pilot education program launched at the University of Central Florida (UCF), designed to address the unique challenges of the human dimension in cybersecurity. The purpose of highlighting this pilot program is to provide an example of human-centric cyber-educational curriculum. The present paper offers a launching point for further discussion about the human side of cybersecurity, closing with considerations of the “lessons learned” from early responses to the UCF program from the program’s inaugural student cohort.","PeriodicalId":358914,"journal":{"name":"2016 International Conference on Cyber Conflict (CyCon U.S.)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128943785","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
NATO’s new cyber domain challenge 北约新的网络领域挑战
Pub Date : 2016-10-01 DOI: 10.1109/CYCONUS.2016.7836609
Siim Alatalu
Cyber has been on NATO’s agenda since 2002, with clear mandates and taskings from Summits and Ministerials on how to develop its capacity in the area. Yet, despite an increasingly cyber-dependent world and visible progress on the Alliance’s civilian side, NATO has had no visible track record on how this change in the way the world does business has had an impact on its key military structure and enabler for collective defence - the NATO Command Structure (NCS). At their July 2016 Summit in Warsaw the NATO Heads of State and Government declared cyber to become an operational domain for the Alliance. The paper argues that in order to cope with the new situation and to deliver on the commitment NATO needs to consider establishing a Cyber Command within the NCS. This is a matter of urgency especially as within the new domain the Alliance will need to face an increasingly challenging cyber threat landscape. In addition, it will also need to live up to its current Strategic Concept by addressing all the three core areas – collective defence, crisis management and cooperative security – in cyber. Last but not least, it would play an increasing role for the Alliance in terms of its deterrence posture.
自2002年以来,网络一直在北约的议程上,峰会和部长级会议就如何发展其在该地区的能力提出了明确的授权和任务。然而,尽管世界越来越依赖网络,联盟的民用方面也取得了明显的进展,但北约没有明显的记录表明,世界商业方式的这种变化对其关键的军事结构和集体防御的推手——北约指挥结构(NCS)产生了怎样的影响。在2016年7月的华沙峰会上,北约国家元首和政府首脑宣布网络将成为北约的一个作战领域。该文件认为,为了应对新形势并履行承诺,北约需要考虑在NCS内建立一个网络司令部。这是一个紧迫的问题,特别是在新的领域,联盟将需要面对日益具有挑战性的网络威胁环境。此外,它还需要通过解决网络中的所有三个核心领域——集体防御、危机管理和合作安全——来实现其当前的战略概念。最后但并非最不重要的是,它将在北约的威慑态势方面发挥越来越大的作用。
{"title":"NATO’s new cyber domain challenge","authors":"Siim Alatalu","doi":"10.1109/CYCONUS.2016.7836609","DOIUrl":"https://doi.org/10.1109/CYCONUS.2016.7836609","url":null,"abstract":"Cyber has been on NATO’s agenda since 2002, with clear mandates and taskings from Summits and Ministerials on how to develop its capacity in the area. Yet, despite an increasingly cyber-dependent world and visible progress on the Alliance’s civilian side, NATO has had no visible track record on how this change in the way the world does business has had an impact on its key military structure and enabler for collective defence - the NATO Command Structure (NCS). At their July 2016 Summit in Warsaw the NATO Heads of State and Government declared cyber to become an operational domain for the Alliance. The paper argues that in order to cope with the new situation and to deliver on the commitment NATO needs to consider establishing a Cyber Command within the NCS. This is a matter of urgency especially as within the new domain the Alliance will need to face an increasingly challenging cyber threat landscape. In addition, it will also need to live up to its current Strategic Concept by addressing all the three core areas – collective defence, crisis management and cooperative security – in cyber. Last but not least, it would play an increasing role for the Alliance in terms of its deterrence posture.","PeriodicalId":358914,"journal":{"name":"2016 International Conference on Cyber Conflict (CyCon U.S.)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127590445","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Stuxnet as cyber-enabled sanctions enforcement Stuxnet作为网络制裁的执行手段
Pub Date : 2016-10-01 DOI: 10.1109/CYCONUS.2016.7836630
Panayotis A. Yannakogeorgos, Eneken Tikk
Our re-reinterpretation of Stuxnet to connect the dot between geopolitics and technology tell a different story with a secondary set of lessons. We believe Stuxnet deserves a broader legal and political analysis for the purposes of critical thinking about how cyberspace is used to achieve international security objectives from legal and political angles. In particular, we seek to address a gap in the literature, asking whether the worm was authorized under article 41 of the UN charter as a sanctions enforcement tool through an interpretation of UNSC resolutions and related documents of the International Atomic Energy Agency (IAEA). If such authorization exists (and we believe it might), Stuxnet would qualify as a lawful action under international law, targeting Iran’s nuclear equipment and software pursuant to international sanctions.
我们对震网病毒的重新解读,将地缘政治和技术之间的点联系起来,讲述了一个不同的故事,并提供了一系列次要的教训。我们认为Stuxnet应该得到更广泛的法律和政治分析,以便从法律和政治角度批判性地思考如何利用网络空间来实现国际安全目标。特别是,我们试图解决文献中的空白,通过对联合国安理会决议和国际原子能机构(IAEA)相关文件的解释,询问蠕虫是否根据《联合国宪章》第41条授权作为制裁执行工具。如果这样的授权存在(我们相信有可能),根据国际法,Stuxnet将有资格作为合法行动,根据国际制裁针对伊朗的核设备和软件。
{"title":"Stuxnet as cyber-enabled sanctions enforcement","authors":"Panayotis A. Yannakogeorgos, Eneken Tikk","doi":"10.1109/CYCONUS.2016.7836630","DOIUrl":"https://doi.org/10.1109/CYCONUS.2016.7836630","url":null,"abstract":"Our re-reinterpretation of Stuxnet to connect the dot between geopolitics and technology tell a different story with a secondary set of lessons. We believe Stuxnet deserves a broader legal and political analysis for the purposes of critical thinking about how cyberspace is used to achieve international security objectives from legal and political angles. In particular, we seek to address a gap in the literature, asking whether the worm was authorized under article 41 of the UN charter as a sanctions enforcement tool through an interpretation of UNSC resolutions and related documents of the International Atomic Energy Agency (IAEA). If such authorization exists (and we believe it might), Stuxnet would qualify as a lawful action under international law, targeting Iran’s nuclear equipment and software pursuant to international sanctions.","PeriodicalId":358914,"journal":{"name":"2016 International Conference on Cyber Conflict (CyCon U.S.)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126636940","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Stigmatizing cyber war: mission impossible? 污名化网络战争:不可能完成的任务?
Pub Date : 2016-10-01 DOI: 10.1109/CYCONUS.2016.7836623
Brian M. Mazanec, Patricia Shamai
This paper addresses the question of whether a stigma associated with cyber warfare could ever emerge. It examines whether there would be enough of a mass ‘reaction’ to the prospect of cyber warfare and would this then promote an international response and international consensus towards the control and proscription of cyber weapons? The authors unpack the norms associated with cyber warfare and relate these to research addressing the development of the stigmatization of WMD. Comparing the WMD threat with that of cyber warfare, we argue that at present while cyber warfare is characterized as unique, a stigma does not exist towards the threat of cyber warfare. This is because the cyber threat is secretive, diffuse and lacks a clear definition. Cyber threats range in scale, effect and lack an association with “mass destruction”. For these reasons it has been difficult to gather international consensus to constrain cyber threats. We argue that cyber norms do matter and greater attention needs to be paid to ways in which a stigma fostering these norms can develop. We offer some suggestions and stress that further knowledge and understanding of this subject can enhance academic and policy insight to address cyber warfare threats within the context of changing world politics.
这篇论文讨论了与网络战相关的耻辱是否会出现的问题。它研究了是否会有足够的大规模“反应”来应对网络战争的前景,这是否会促进国际社会对控制和禁止网络武器的反应和国际共识?作者揭示了与网络战相关的规范,并将这些规范与解决大规模杀伤性武器污名化发展的研究联系起来。将大规模杀伤性武器威胁与网络战威胁进行比较,我们认为,目前,虽然网络战具有独特性,但对网络战威胁并不存在污名化。这是因为网络威胁是隐秘的、分散的,而且缺乏明确的定义。网络威胁的规模和影响各不相同,与“大规模杀伤性”没有关联。由于这些原因,很难就限制网络威胁达成国际共识。我们认为,网络规范确实很重要,需要更多地关注促进这些规范发展的污名化的方式。我们提出了一些建议,并强调进一步了解和理解这一主题可以提高学术和政策洞察力,以应对不断变化的世界政治背景下的网络战威胁。
{"title":"Stigmatizing cyber war: mission impossible?","authors":"Brian M. Mazanec, Patricia Shamai","doi":"10.1109/CYCONUS.2016.7836623","DOIUrl":"https://doi.org/10.1109/CYCONUS.2016.7836623","url":null,"abstract":"This paper addresses the question of whether a stigma associated with cyber warfare could ever emerge. It examines whether there would be enough of a mass ‘reaction’ to the prospect of cyber warfare and would this then promote an international response and international consensus towards the control and proscription of cyber weapons? The authors unpack the norms associated with cyber warfare and relate these to research addressing the development of the stigmatization of WMD. Comparing the WMD threat with that of cyber warfare, we argue that at present while cyber warfare is characterized as unique, a stigma does not exist towards the threat of cyber warfare. This is because the cyber threat is secretive, diffuse and lacks a clear definition. Cyber threats range in scale, effect and lack an association with “mass destruction”. For these reasons it has been difficult to gather international consensus to constrain cyber threats. We argue that cyber norms do matter and greater attention needs to be paid to ways in which a stigma fostering these norms can develop. We offer some suggestions and stress that further knowledge and understanding of this subject can enhance academic and policy insight to address cyber warfare threats within the context of changing world politics.","PeriodicalId":358914,"journal":{"name":"2016 International Conference on Cyber Conflict (CyCon U.S.)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131031291","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cyber deterrence in times of cyber anarchy - evaluating the divergences in U.S. and Chinese strategic thinking 网络无政府状态下的网络威慑——评估中美战略思维的分歧
Pub Date : 2016-10-01 DOI: 10.1109/CYCONUS.2016.7836619
Elsa B. Kania
The advent of the cyber domain has introduced a new dimension into warfare and complicated existing strategic concepts, provoking divergent responses within different national contexts and strategic cultures. Although current theories regarding cyber deterrence remain relatively nascent, a comparison of U.S. and Chinese strategic thinking highlights notable asymmetries between their respective approaches. While U.S. debates on cyber deterrence have primarily focused on the deterrence of cyber threats, Chinese theorists have also emphasized the potential importance of cyber capabilities to enhance strategic deterrence. Whereas the U.S. government has maintained a consistent declaratory policy for response, Beijing has yet to progress toward transparency regarding its cyber strategy or capabilities. However, certain PLA strategists, informed by a conceptualization of deterrence as integrated with warfighting, have advocated for the actualization of deterrence through engaging in cyber attacks. Regardless of whether these major cyber powers' evolving strategic thinking on cyber deterrence will prove logically consistent or feasibly operational, their respective perspectives will certainly shape their attempts to achieve cyber deterrence. Ultimately, cyber deterrence may continue to be "what states make of it," given conditions of "cyber anarchy" and prevailing uncertainties regarding cyber conflict. Looking forward, future strategic stability in Sino-U.S. cyber interactions will require mitigation of the misperceptions and heightened risks of escalation that could be exacerbated by these divergent strategic approaches.
网络领域的出现为战争引入了一个新的维度,使现有的战略概念复杂化,在不同的国家背景和战略文化中引发了不同的反应。尽管目前关于网络威慑的理论仍处于相对初级阶段,但对美国和中国战略思维的比较突出了各自方法之间显著的不对称。虽然美国关于网络威慑的辩论主要集中在对网络威胁的威慑上,但中国理论家也强调了网络能力对增强战略威慑的潜在重要性。尽管美国政府保持了一贯的公开回应政策,但北京在其网络战略或能力方面尚未取得进展。然而,某些PLA战略家,通过将威慑概念与作战相结合,已经提倡通过参与网络攻击来实现威慑。无论这些主要网络大国关于网络威慑的战略思维是否在逻辑上是一致的或可行的,它们各自的观点肯定会影响它们实现网络威慑的努力。最终,在“网络无政府状态”和网络冲突的普遍不确定性的条件下,网络威慑可能继续是“国家制造的”。展望未来,中美战略稳定。网络互动将需要减少误解,减少因这些不同的战略方针而可能加剧的升级风险。
{"title":"Cyber deterrence in times of cyber anarchy - evaluating the divergences in U.S. and Chinese strategic thinking","authors":"Elsa B. Kania","doi":"10.1109/CYCONUS.2016.7836619","DOIUrl":"https://doi.org/10.1109/CYCONUS.2016.7836619","url":null,"abstract":"The advent of the cyber domain has introduced a new dimension into warfare and complicated existing strategic concepts, provoking divergent responses within different national contexts and strategic cultures. Although current theories regarding cyber deterrence remain relatively nascent, a comparison of U.S. and Chinese strategic thinking highlights notable asymmetries between their respective approaches. While U.S. debates on cyber deterrence have primarily focused on the deterrence of cyber threats, Chinese theorists have also emphasized the potential importance of cyber capabilities to enhance strategic deterrence. Whereas the U.S. government has maintained a consistent declaratory policy for response, Beijing has yet to progress toward transparency regarding its cyber strategy or capabilities. However, certain PLA strategists, informed by a conceptualization of deterrence as integrated with warfighting, have advocated for the actualization of deterrence through engaging in cyber attacks. Regardless of whether these major cyber powers' evolving strategic thinking on cyber deterrence will prove logically consistent or feasibly operational, their respective perspectives will certainly shape their attempts to achieve cyber deterrence. Ultimately, cyber deterrence may continue to be \"what states make of it,\" given conditions of \"cyber anarchy\" and prevailing uncertainties regarding cyber conflict. Looking forward, future strategic stability in Sino-U.S. cyber interactions will require mitigation of the misperceptions and heightened risks of escalation that could be exacerbated by these divergent strategic approaches.","PeriodicalId":358914,"journal":{"name":"2016 International Conference on Cyber Conflict (CyCon U.S.)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134188292","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Sovereignty in cyberspace: Balkanization or democratization 网络空间的主权:巴尔干化还是民主化
Pub Date : 2016-10-01 DOI: 10.1109/CYCONUS.2016.7836628
A. Cattaruzza, Didier Danet, Stéphane Taillat, A. Laudrain
Inherently linked to States’ sovereignty and its relationship with third-party stakeholders, the governance of cyberspace has become a subject of great debate and controversies. One of the most prominent of them -the dominance of the United States as an hegemon- has raised concerns and triggered diverging reactions within the international community. Looking at recent events such as the invalidation of the Safe Harbor Agreement through the lenses of the balance of power, we found that the reassertion of States in cyberspace is dependent on the political significance given to cyberspace as both a transnational realm and an American-dominated space. If most States have adopted a balancing policy vis-à-vis the US by means of either critical cooperation (EU, France) or what could be described as a form of containment (Russia, China), some others pursue free-riding policies (Ireland, Luxembourg), causing regional struggles. We suggest that, given this fragmentation of the Web, regulation of cyberspace would be best served through a multilateral mode of governance which could enhance collective security.
网络空间治理与国家主权及其与第三方利益攸关方的关系有着内在联系,已成为一个备受争议的话题。其中最突出的是美国的霸主地位,这引起了国际社会的关注,并引发了不同的反应。从权力平衡的角度审视最近发生的事件,如《安全港协议》(Safe Harbor Agreement)的失效,我们发现,国家在网络空间中的重新主张取决于网络空间作为跨国领域和美国主导的空间所具有的政治意义。如果大多数国家通过关键合作(欧盟、法国)或所谓的遏制形式(俄罗斯、中国)对-à-vis美国采取平衡政策,那么其他一些国家则采取搭便车政策(爱尔兰、卢森堡),导致地区斗争。鉴于网络的碎片化趋势,我们建议通过多边治理模式来管理网络空间,从而加强集体安全。
{"title":"Sovereignty in cyberspace: Balkanization or democratization","authors":"A. Cattaruzza, Didier Danet, Stéphane Taillat, A. Laudrain","doi":"10.1109/CYCONUS.2016.7836628","DOIUrl":"https://doi.org/10.1109/CYCONUS.2016.7836628","url":null,"abstract":"Inherently linked to States’ sovereignty and its relationship with third-party stakeholders, the governance of cyberspace has become a subject of great debate and controversies. One of the most prominent of them -the dominance of the United States as an hegemon- has raised concerns and triggered diverging reactions within the international community. Looking at recent events such as the invalidation of the Safe Harbor Agreement through the lenses of the balance of power, we found that the reassertion of States in cyberspace is dependent on the political significance given to cyberspace as both a transnational realm and an American-dominated space. If most States have adopted a balancing policy vis-à-vis the US by means of either critical cooperation (EU, France) or what could be described as a form of containment (Russia, China), some others pursue free-riding policies (Ireland, Luxembourg), causing regional struggles. We suggest that, given this fragmentation of the Web, regulation of cyberspace would be best served through a multilateral mode of governance which could enhance collective security.","PeriodicalId":358914,"journal":{"name":"2016 International Conference on Cyber Conflict (CyCon U.S.)","volume":"518 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116241790","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Extracting attack narratives from traffic datasets 从流量数据集中提取攻击叙述
Pub Date : 2016-10-01 DOI: 10.1109/CYCONUS.2016.7836624
J. D. Mireles, Jin-Hee Cho, Shouhuai Xu
Parsing through large amounts of network traffic to extract attack signatures is a complex and time consuming process. It is an even harder process to piece together those signatures to formulate an attack narrative. An attack narrative can be defined as the set of attack signatures, that when combined provides an overview of the attack and the attacker themselves. In this paper, we propose a framework for extracting attack narratives from traffic datasets. Within this framework, we propose the re-examination of packet grepping for attack signatures in network traffic as a viable, fast, and effective means to extract attack narratives from large amounts of network traffic. By combining attack signature packet grepping with Mandiant’s Attack Lifecycle Model, we increase the effectiveness of packet grepping and create a methodology that is simple and powerful for constructing attack narratives. In order to show the effectiveness of the framework, we conduct a case study by using the 2015 National Collegiate Cyber Defense Competition (NCCDC) network traffic. Our preliminary results show that the framework is promising.
对大量网络流量进行解析提取攻击特征是一个复杂且耗时的过程。将这些签名拼凑起来,形成攻击叙事,是一个更加困难的过程。攻击叙述可以定义为一组攻击签名,当它们结合在一起时,可以提供攻击和攻击者本身的概述。在本文中,我们提出了一个从流量数据集中提取攻击叙述的框架。在此框架内,我们建议重新检查网络流量中的攻击签名的数据包抓取,作为从大量网络流量中提取攻击叙述的可行,快速和有效的方法。通过将攻击签名数据包抓取与Mandiant的攻击生命周期模型相结合,我们提高了数据包抓取的有效性,并创建了一种简单而强大的方法来构建攻击叙述。为了证明该框架的有效性,我们利用2015年全国大学网络防御竞赛(NCCDC)的网络流量进行了案例研究。我们的初步结果表明,该框架是有希望的。
{"title":"Extracting attack narratives from traffic datasets","authors":"J. D. Mireles, Jin-Hee Cho, Shouhuai Xu","doi":"10.1109/CYCONUS.2016.7836624","DOIUrl":"https://doi.org/10.1109/CYCONUS.2016.7836624","url":null,"abstract":"Parsing through large amounts of network traffic to extract attack signatures is a complex and time consuming process. It is an even harder process to piece together those signatures to formulate an attack narrative. An attack narrative can be defined as the set of attack signatures, that when combined provides an overview of the attack and the attacker themselves. In this paper, we propose a framework for extracting attack narratives from traffic datasets. Within this framework, we propose the re-examination of packet grepping for attack signatures in network traffic as a viable, fast, and effective means to extract attack narratives from large amounts of network traffic. By combining attack signature packet grepping with Mandiant’s Attack Lifecycle Model, we increase the effectiveness of packet grepping and create a methodology that is simple and powerful for constructing attack narratives. In order to show the effectiveness of the framework, we conduct a case study by using the 2015 National Collegiate Cyber Defense Competition (NCCDC) network traffic. Our preliminary results show that the framework is promising.","PeriodicalId":358914,"journal":{"name":"2016 International Conference on Cyber Conflict (CyCon U.S.)","volume":"173 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133873194","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
期刊
2016 International Conference on Cyber Conflict (CyCon U.S.)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1