Skip to main content
Top
Published in: Wireless Networks 6/2019

05-04-2018

A methodological review on attack and defense strategies in cyber warfare

Authors: Ramaswamy Swarnammal Shaji, V. Sachin Dev, Thomas Brindha

Published in: Wireless Networks | Issue 6/2019

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Cyberspace is an integration of cyber physical system components that integrates computation, networking, physical processes, embedded computers and network monitors which uses feedback loops for controlling the processes where the computations are affected by processes and vice versa. More general, cyber physical systems include all equipments operated on preprogrammed instructions ranging from simple electronic devices to the ultra-modern warfare equipments along with life saving devices. Active cyber-attacks can cause cyber warfare situations by disrupting an entire community of people, which in turn raises an emergency situation to the nation. Thus, cyber warfare is a major threat to the nation at large. In this paper, we analyze the various aspects of cyber warfare situations and a survey on ongoing attacks, defense and cyber forensics strategies in that field. Internet of Things (IoT) is an emerging computing area which enables Machine to Machine communication in cyber physical systems. An attack on IoT causes major issues to the security on the devices and thus, the various threats and attacks on IoT are analyzed here. Overall monitoring and data acquisition in cyber physical systems is done by Supervisory Control and Data Acquisition systems and are mainly targeted by the attackers in order to leave the cyberspace applications not functioning. Therefore, the various threats, attacks and research issues pertaining to the cyberspace are surveyed in this paper along with a few research issues and challenges that are to be solved in the area of cyber warfare.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
2.
go back to reference Tzipora, H., Haoyu, L., Di, M., Nitesh, S., Jonathan, V., & Tuo, X. (2014). Context-aware defenses to RFID unauthorized reading and relay attacks. IEEE Transactions on Emerging Topics in Computing, 1(2), 307–318. Tzipora, H., Haoyu, L., Di, M., Nitesh, S., Jonathan, V., & Tuo, X. (2014). Context-aware defenses to RFID unauthorized reading and relay attacks. IEEE Transactions on Emerging Topics in Computing, 1(2), 307–318.
3.
go back to reference Jan, Z., Oscar, M., & Klaus, W. (2014). Privacy in the internet of things: Threats and challenges. Security and Communication Networks, 7(12), 2728–2742.CrossRef Jan, Z., Oscar, M., & Klaus, W. (2014). Privacy in the internet of things: Threats and challenges. Security and Communication Networks, 7(12), 2728–2742.CrossRef
4.
go back to reference Goodman, D. (1997). Why the Police don’t care about computer crime. Law & Techology, 10(3), 465–494. Goodman, D. (1997). Why the Police don’t care about computer crime. Law & Techology, 10(3), 465–494.
5.
go back to reference Aditya, S., & Richard, E. (2013). Targeted cyberattacks: A superset of advanced persistent threats. Computer and Reliability Societies, 11(1), 54–61. Aditya, S., & Richard, E. (2013). Targeted cyberattacks: A superset of advanced persistent threats. Computer and Reliability Societies, 11(1), 54–61.
6.
go back to reference Aditya, S., Rohit, B., & Richard, E. (2013). Cybercrime: Dissecting the state of underground enterprise. IEEE Internet Computing, 17(1), 60–68.CrossRef Aditya, S., Rohit, B., & Richard, E. (2013). Cybercrime: Dissecting the state of underground enterprise. IEEE Internet Computing, 17(1), 60–68.CrossRef
7.
go back to reference Ross, B., & Log, R. (2015). Cyber threats reducing the time to detect and respond. Network Security, 5(5), 5–8. Ross, B., & Log, R. (2015). Cyber threats reducing the time to detect and respond. Network Security, 5(5), 5–8.
8.
go back to reference Andrew, N., Stuart, W., Shaun, D., Tanuja, P., & Helge, J. (2012). SCADA security in the light of cyber-warfare. Computers & Security, 31(4), 418–436.CrossRef Andrew, N., Stuart, W., Shaun, D., Tanuja, P., & Helge, J. (2012). SCADA security in the light of cyber-warfare. Computers & Security, 31(4), 418–436.CrossRef
9.
go back to reference Juels, A. (2006). RFID security and privacy: A research survey. IEEE Journal on Selected Areas in Communications, 24(12), 381–394.CrossRef Juels, A. (2006). RFID security and privacy: A research survey. IEEE Journal on Selected Areas in Communications, 24(12), 381–394.CrossRef
10.
go back to reference Daniele, G., Velio, M., Giovanni, M., & Aurelio, C. (2003). Is it feasible to reconstruct body segment 3D position and orientation using accelerometric data? IEEE Transactions on Biomedical Engineering, 50(4), 476–483.CrossRef Daniele, G., Velio, M., Giovanni, M., & Aurelio, C. (2003). Is it feasible to reconstruct body segment 3D position and orientation using accelerometric data? IEEE Transactions on Biomedical Engineering, 50(4), 476–483.CrossRef
11.
go back to reference John, F., & Andres, F. (2005). SCADA systems: vulnerabilities and remediation. Journal of Computing Sciences in Colleges, 20(4), 160–168. John, F., & Andres, F. (2005). SCADA systems: vulnerabilities and remediation. Journal of Computing Sciences in Colleges, 20(4), 160–168.
12.
go back to reference Anita, A., Kirsten, W., Daniel, T., Brianne, B., & Emilie, R. (2005). Achieving cyber defense situation awareness: A cognitive task analysis of information assurance analysts. Proceedings of the human factors and ergonomics society annual meeting, 49(3), 229–233.CrossRef Anita, A., Kirsten, W., Daniel, T., Brianne, B., & Emilie, R. (2005). Achieving cyber defense situation awareness: A cognitive task analysis of information assurance analysts. Proceedings of the human factors and ergonomics society annual meeting, 49(3), 229–233.CrossRef
13.
go back to reference Pin-Yu, C., & Kwang-Cheng, C. (2012). Smart attacks in smart grid communication networks. IEEE Communications Magazine, 50(8), 24–29.CrossRef Pin-Yu, C., & Kwang-Cheng, C. (2012). Smart attacks in smart grid communication networks. IEEE Communications Magazine, 50(8), 24–29.CrossRef
14.
go back to reference Pin-Yu, C., Shin-Ming, C., & Kwang-Cheng, C. (2014). Information fusion to defend intentional attack in internet of things. IEEE Internet of Things, 1(4), 337–348.CrossRef Pin-Yu, C., Shin-Ming, C., & Kwang-Cheng, C. (2014). Information fusion to defend intentional attack in internet of things. IEEE Internet of Things, 1(4), 337–348.CrossRef
15.
go back to reference Réka, A., Hawoong, J., & Albert-Lazlo, B. (2000). Error and attack tolerance of complex networks. Letters to Nature, 406(6794), 378–382.CrossRef Réka, A., Hawoong, J., & Albert-Lazlo, B. (2000). Error and attack tolerance of complex networks. Letters to Nature, 406(6794), 378–382.CrossRef
16.
go back to reference Adel, E., & Michael, L. (2014). Cyber security challenges in smart cities: safety, security and privacy. Journal of Advanced Research, 5(4), 491–497.CrossRef Adel, E., & Michael, L. (2014). Cyber security challenges in smart cities: safety, security and privacy. Journal of Advanced Research, 5(4), 491–497.CrossRef
17.
go back to reference Shui, Y., Song, G., & Ivan, S. (2015). Fool me if you can: Mimicking attacks and anti-attacks in cyberspace. IEEE Transactions on Computers, 64(1), 139–151.MathSciNetMATHCrossRef Shui, Y., Song, G., & Ivan, S. (2015). Fool me if you can: Mimicking attacks and anti-attacks in cyberspace. IEEE Transactions on Computers, 64(1), 139–151.MathSciNetMATHCrossRef
18.
go back to reference Rogers, K. (2006). A two-dimensional circumplex approach to the development of a hacker taxonomy. Digital Investigation, 3(2), 97–102.MathSciNetCrossRef Rogers, K. (2006). A two-dimensional circumplex approach to the development of a hacker taxonomy. Digital Investigation, 3(2), 97–102.MathSciNetCrossRef
19.
go back to reference Ahmed, P., Mona, T., Kaveh, B., & Joaquim, C. J. (2013). An intrusion detection and prevention system in cloud computing: A systematic review. Journal of Network and Computer Applications, 36(1), 25–41.CrossRef Ahmed, P., Mona, T., Kaveh, B., & Joaquim, C. J. (2013). An intrusion detection and prevention system in cloud computing: A systematic review. Journal of Network and Computer Applications, 36(1), 25–41.CrossRef
20.
go back to reference Miao, H., & Junshan, Z. (2011). A dependency graph approach for fault detection and localization towards secure smart grid. IEEE Transactions on Smart Grid, 2(2), 342–351.CrossRef Miao, H., & Junshan, Z. (2011). A dependency graph approach for fault detection and localization towards secure smart grid. IEEE Transactions on Smart Grid, 2(2), 342–351.CrossRef
21.
go back to reference Glenn, A. F., Jereme, N. H., David, M. A., & Errin, W. F. (2014). Defense on the move: Ant-based cyber defense. IEEE Computer and Reliability Societies, 12(2), 36–43. Glenn, A. F., Jereme, N. H., David, M. A., & Errin, W. F. (2014). Defense on the move: Ant-based cyber defense. IEEE Computer and Reliability Societies, 12(2), 36–43.
22.
go back to reference Sicari, S., Grieco, L. A., Boggia, G., & Coen-Porisini, A. (2012). DyDAP: A dynamic data aggregation scheme for privacy aware wireless sensor networks. Journal of Systems and Software, 85(1), 152–166.CrossRef Sicari, S., Grieco, L. A., Boggia, G., & Coen-Porisini, A. (2012). DyDAP: A dynamic data aggregation scheme for privacy aware wireless sensor networks. Journal of Systems and Software, 85(1), 152–166.CrossRef
23.
go back to reference Oliver, K., Liyan, J., Robert, J., & Lang, T. (2011). Malicious data attacks on the smart grid. IEEE Transactions on Smart Grid, 2(4), 645–658.CrossRef Oliver, K., Liyan, J., Robert, J., & Lang, T. (2011). Malicious data attacks on the smart grid. IEEE Transactions on Smart Grid, 2(4), 645–658.CrossRef
24.
go back to reference Klaus, J. (2013). Understanding and overcoming cyber security anti-patterns. Computer Networks, 57(10), 2206–2211.CrossRef Klaus, J. (2013). Understanding and overcoming cyber security anti-patterns. Computer Networks, 57(10), 2206–2211.CrossRef
41.
go back to reference Bojan, M. (1991). The Laplacian spectrum of graphs. In Y. Alavi, G. Chartrand, O. Ollermann, & A. Schwenk (Eds.), Graph theory, combinatorics, and applications (pp. 871–898). Hoboken: Wiley. Bojan, M. (1991). The Laplacian spectrum of graphs. In Y. Alavi, G. Chartrand, O. Ollermann, & A. Schwenk (Eds.), Graph theory, combinatorics, and applications (pp. 871–898). Hoboken: Wiley.
46.
go back to reference Antoine, S., Nicolas, L., Philippe, O., Pierre, B., & Patrice, A. (2007). Non-gaussian and long memory statistical characterizations for internet traffic with anomalies. IEEE Transactions on Dependable and Secure Computing, 4(1), 56–70.CrossRef Antoine, S., Nicolas, L., Philippe, O., Pierre, B., & Patrice, A. (2007). Non-gaussian and long memory statistical characterizations for internet traffic with anomalies. IEEE Transactions on Dependable and Secure Computing, 4(1), 56–70.CrossRef
47.
go back to reference Zhenxin, Z., Maochao, X., & Shouhuai, X. (2013). Characterizing honeypot-captured cyberattacks: Statistical framework and case Study. IEEE Transactions on Information Forensics and Security, 8(11), 1775–1789.CrossRef Zhenxin, Z., Maochao, X., & Shouhuai, X. (2013). Characterizing honeypot-captured cyberattacks: Statistical framework and case Study. IEEE Transactions on Information Forensics and Security, 8(11), 1775–1789.CrossRef
48.
go back to reference Chenfeng, V. Z., Christopher, L., & Shanika, K. (2010). A survey of coordinated attacks and collaborative intrusion detection. Computers & Security, 29(1), 124–140.CrossRef Chenfeng, V. Z., Christopher, L., & Shanika, K. (2010). A survey of coordinated attacks and collaborative intrusion detection. Computers & Security, 29(1), 124–140.CrossRef
52.
go back to reference Alexei, C., Karl, K., Joshua, R., & Tadayoshi, K. (2008). RFIDs and secret handshakes: Defending against ghost-and-leech attacks and unauthorized reads with context-aware communications. In Proceedings of the 15th ACM conference on computer and communications security. https://doi.org/10.1145/1455770.1455831. Alexei, C., Karl, K., Joshua, R., & Tadayoshi, K. (2008). RFIDs and secret handshakes: Defending against ghost-and-leech attacks and unauthorized reads with context-aware communications. In Proceedings of the 15th ACM conference on computer and communications security. https://​doi.​org/​10.​1145/​1455770.​1455831.
53.
go back to reference Kristin, H., Frank, S., Ben, S., & Roshan, T. (2015). Denial and deception in cyber defense. IEEE computer society, 48(4), 36–44.CrossRef Kristin, H., Frank, S., Ben, S., & Roshan, T. (2015). Denial and deception in cyber defense. IEEE computer society, 48(4), 36–44.CrossRef
56.
go back to reference Adams, C., & Lloyd, S. (2003). Understanding PKI: Concepts, standards, and deployment considerations (pp. 11–15). Boston: Addison-Wesley Professional. Adams, C., & Lloyd, S. (2003). Understanding PKI: Concepts, standards, and deployment considerations (pp. 11–15). Boston: Addison-Wesley Professional.
58.
go back to reference Peter, W., & Jeanne, R. (2004). IT governance: How top performers manage IT decision rights for superior results. Boston: Harvard Business Press. Peter, W., & Jeanne, R. (2004). IT governance: How top performers manage IT decision rights for superior results. Boston: Harvard Business Press.
60.
go back to reference Antonatos, S., Akritidis, P., Markatos, E. P., & Anagnostakis, K. G. (2007). Defending against hitlist worms using network address space randomization. Computer Networks, 51(12), 3471–3490.MATHCrossRef Antonatos, S., Akritidis, P., Markatos, E. P., & Anagnostakis, K. G. (2007). Defending against hitlist worms using network address space randomization. Computer Networks, 51(12), 3471–3490.MATHCrossRef
61.
go back to reference Mario, G., & Björn, S. (2011). Requirements for a future EWS cyber defence in internet of the future. Cyber conflict (ICCC) 3rd international conference. Resource Document. ICCC International Conference. https://ccdcoe.org/sites/default/files/multimedia/pdf/RequirementsForAFutureEWSCyberDefenceInTheInternetOfTheFuture-Golling-Stelte.pdf. Accessed March 1, 2016. Mario, G., & Björn, S. (2011). Requirements for a future EWS cyber defence in internet of the future. Cyber conflict (ICCC) 3rd international conference. Resource Document. ICCC International Conference. https://​ccdcoe.​org/​sites/​default/​files/​multimedia/​pdf/​RequirementsForA​FutureEWSCyberDe​fenceInTheIntern​etOfTheFuture-Golling-Stelte.​pdf.​ Accessed March 1, 2016.
62.
go back to reference Abdoul, K. G., Julien, B., Renaud, B., & Francois, S. (2008). A global security architecture for intrusion detection on computer networks. Computers & Security, 27(1–2), 30–47. Abdoul, K. G., Julien, B., Renaud, B., & Francois, S. (2008). A global security architecture for intrusion detection on computer networks. Computers & Security, 27(1–2), 30–47.
63.
go back to reference Wenjia, L., James, P., & Anupam, J. (2012). Security through collaboration and trust in MANETs. Mobile Networks and Applications, 17(3), 342–352.MATHCrossRef Wenjia, L., James, P., & Anupam, J. (2012). Security through collaboration and trust in MANETs. Mobile Networks and Applications, 17(3), 342–352.MATHCrossRef
64.
go back to reference Peter, W., & Jeanne, R. (2005). A matrixed approach to designing IT governance. MIT Sloan Management Review, 46(2), 26–34. Peter, W., & Jeanne, R. (2005). A matrixed approach to designing IT governance. MIT Sloan Management Review, 46(2), 26–34.
65.
go back to reference Yoan, C., Aurelie, B., Christophe, N., & M-Tahar, K. (2014). A complete formalized knowledge representation model for advanced digital forensics timeline analysis. Digital Investigation, 11(2), S95–S105. Yoan, C., Aurelie, B., Christophe, N., & M-Tahar, K. (2014). A complete formalized knowledge representation model for advanced digital forensics timeline analysis. Digital Investigation, 11(2), S95–S105.
Metadata
Title
A methodological review on attack and defense strategies in cyber warfare
Authors
Ramaswamy Swarnammal Shaji
V. Sachin Dev
Thomas Brindha
Publication date
05-04-2018
Publisher
Springer US
Published in
Wireless Networks / Issue 6/2019
Print ISSN: 1022-0038
Electronic ISSN: 1572-8196
DOI
https://doi.org/10.1007/s11276-018-1724-1

Other articles of this Issue 6/2019

Wireless Networks 6/2019 Go to the issue