Cyber Weapon: Approaches to its Definition

Vol.11,No.21(2020)

Abstract

Discovery of Stuxnet (a computer worm) in 2010 can be described as a turning point leading to intensification of cyber weapons discussions. This paper aims to map different approaches to the term cyber weapons and apply them to real cyber incidents respectively.

Discovery of Stuxnet is determined as a starting point from which the literature review dealing with the concept of cyber weapons was carried out. Papers published within the period 2010-2019 in DBLP Computer Science Bibliography Website, Scopus and Web of Science databases were analysed.

The analysis helped to introduce three main approaches to cyber weapons. These approaches were then analysed and two main factors causing discrepancy were identified.


Keywords:
cyber weapon; cyber incident; Stuxnet; malware

Pages:
s. 47–71
Author biography

Ivana Kudláčková

Institute of Law and Technology, MUNI

Ústav práva a technologií, výzkumná pracovnice
References

  1. ARIMATSU, Louise. A treaty for governing cyber-weapons: Potential benefits and practical limitations. In: Conference on Cyber Conflict Proceedings 2012. Tallinn: CCD COE Publications, 2012, str. 91-109. ISBN 978-9949-9040-9-9.
  2. BAER, Merritt. Toward Criteria for International Cyber Weapons Bans. In: 2013 World Cyberspace Cooperation Summit IV (WCC4) Proceedings. IEEE Explore. 2013, str. 1-3. https://doi.org/10.1109/WCS.2013.7050500
  3. BARZASZKA, Ivanka. Are cyber-weapons effective? The RUSI Journal. 2013, 158(2), str. 48-56. https://doi.org/10.1080/03071847.2013.787735
  4. BELLOVIN, Steven M.; LANDAU, Susan; LIN, Herbert S. Limiting the undesired impact of cyber weapons: technical requirements and policy implications. Journal of Cybersecurity. 2017, 3(1), str. 59-68. https://doi.org/10.2139/ssrn.2809463
  5. CARR, Jeffrey. The misunderstood acronym: Why cyber weapons aren’t WMD. Bulletin of the Atomic Scientists. 2013, 69(5), str. 32-37. https://doi.org/10.1177/0096340213501373
  6. EGGENSCHWILLER, Jacqueline; SILOMON, Jantje. Challenges and opportunities in cyber weapon norm construction. Computer Fraud & Security. 2018, 12, str. 11-18. https://doi.org/10.1016/S1361-3723(18)30120-9
  7. FILSHTINSKIY, Stas. Privacy and security: Cybercrime, Cyberweapons, Cyber Wars: Is There Too Much of It in the Air? Communications of the ACM. 2013, 56(6), 28-30. https://doi.org/10.1145/2461256.2461266
  8. GEERS, Kenneth.Cyber Weapons Convention. Computer Law & Security Review. 2010, 26(5), str. 547-551. https://doi.org/10.1016/j.clsr.2010.07.005
  9. HAMBLING, David. Hints of a new cyberweapon: GPS spoofing may have thrown vessels off course in the Black Sea. New Scientist. 2017, 235(3139), str. 6. https://doi.org/10.1016/S0262-4079(17)31594-4
  10. HARE, Forrest B. Precision cyber weapon systems: An important component of a responsible national security strategy? Contemporary Security Policy. 2019, 40(2), str. 193-213. https://doi.org/10.1080/13523260.2018.1529369
  11. HATCH, Benjamin B. Defining a Class of Cyber Weapons as WMD: An Examination of the Merits. Journal of Strategic Security. 2018, 11(1), str. 43-61. https://doi.org/10.5038/1944-0472.11.1.1657
  12. KALLBERG, Jan. The Second Amendment and Cyber Weapons: Constitutional Relevance of Digital Gun Rights. IEEE Technology and Society Magazine. 2019, 38(2), str. 71-77. https://doi.org/10.1109/MTS.2019.2913073
  13. KARLSSON, Marcus; LARSSON, Erik G. Massive MIMO as a cyber-weapon. In: 2014 48th Asilomar Conference on Signals, Systems and Computers Proceedings. 2014, str. 661-665. ISBN 978-1-4799-8297-4. https://doi.org/10.1109/ACSSC.2014.7094529
  14. KIM, Ki Hoon; EOM, Jung Ho. Modeling of Cyber Target Selection for Effective Acquisition of Cyber Weapon Systems. International Journal of Security and Its Applications. 2016, 10(11), str. 293-302. https://doi.org/10.14257/ijsia.2016.10.11.24
  15. KIRAVUO, Timo; SÄRELÄ, Mikko; MANNER, Jukka. Weapons against Cyber-Physical Targets. In: 2013 IEEE 33rd International Conference on Distributed Computing Systems Workshops Proceedings. USA: IEEE Computer Society Conference Publishing Services. 2013, str. 321-326. ISBN 978-0-7685-5023-7. https://doi.org/10.1109/ICDCSW.2013.43
  16. KOBLENTZ, Gregory D.; MAZANEC, Brian M. Viral Warfare: The Security Implications of Cyber and Biological Weapons. Comparative Strategy. 2013, 32(5), str. 418-434. https://doi.org/10.1080/01495933.2013.821845
  17. KUSHWAHA, Neal; WATSON, Bruce William. Cyber weapons and the U.S. In: Proceedings of the 17th European Conference on Cyber Warfare and Security. 2018, str. 1-11. ISBN: 978-1-911218-85-2
  18. LANGER, Ralph. Stuxnet: Dissecting a Cyberwarfare Weapon. IEEE Security Privacy. 2011, 9(3), str. 49-51. https://doi.org/10.1109/MSP.2011.67
  19. LANGER, Ralph. To Kill a Centrifuge. A Technical Analysis of What Stuxnet’s Creators Tried to Achieve. [online]. 2013 [cit. 25. 10. 2019]. Dostupné z: https://www.langner.com/wp-content/uploads/2017/04/To-kill-a-centrifuge.pdf
  20. LIN, Patrick; ALLHOFF, Fritz; ROWE, Neil C. Computing Ethics: War 2.0 Cyberweapons and Ethics. Communications of the ACM. 2012, 55(3), str. 24-26. https://doi.org/10.1145/2093548.2093558
  21. LORENTS, Peeter; OTTIS, Rain. Knowledge based framework for cyber weapons and conflict. In: Conference on Cyber Conflict Proceedings 2010. Tallinn: CCD COE Publications, 2010, str. 129-142. ISBN: 978-9949-9040-1-3.
  22. MAITRA, Amit K. Offensive cyber-weapons: technical, legal, and strategic aspects. Environment Systems and Decisions. 2015, 35(1), str. 169-182. https://doi.org/10.1007/s10669-014-9520-7
  23. MATHIUS, Clara; PIETERS, Wolter; BERG, Jan van den. Cyber weapons: a profiling framework. In: 2016 IEEE International Conference on Cyber Conflict (CyCon U.S.) Proceedings. USA: IEEE eXpress Conference Publishing. 2016, str. 94-101. ISBN 978-1-5090-5258-5. https://doi.org/10.1109/CYCONUS.2016.7836621
  24. MEZZOUR, Ghita; CARLEY, Kathleen M.; CARLEY, L. Richard. Remote assessment of countries’ cyber weapon capabilities. Social Network Analysis and Mining. 2018, 8(1), str. 1-15. https://doi.org/10.1007/s13278-018-0539-5
  25. NGUYEN, Nam-Phong; NGO, Hien Quoc; DUONG, Trung Quang; TUAN, Hoang Duong; COSTA, Daniel Benevides da. Full-Duplex Cyber-Weapon With Massive Arrays. IEEE Transactions on Communications. 2017, 65(12), str. 5544-5558. https://doi.org/10.1109/TCOMM.2017.2743208
  26. PAVUR, James; MARTINOVIC, Ivan. The Cyber-ASAT: On the Impact of Cyber Weapons in Outer Space. In: Conference on Cyber Conflict Proceedings 2019. Tallinn: CCD COE Publications, 2019, str. 213-230. ISBN 978-9949-9904-5-0. https://doi.org/10.23919/CYCON.2019.8756904
  27. PETERSON, Dale. Offensive Cyber Weapons: Construction, Development, and Employment. Journal of Strategic Studies. 2013, 36(1), str. 120-124. https://doi.org/10.1080/01402390.2012.742014
  28. RAYMOND, David; CONTI, Gregory J.; CROSS, Tom; FANELLI, Robert. A control measure framework to limit collateral damage and propagation of cyber weapons. In: Conference on Cyber Conflict Proceedings 2013. Tallinn: CCD COE Publications, 2013, str. 181-196. ISBN 978-9949-9211-5-7.
  29. RID, Thomas; McBURNEY, Peter. Cyber-Weapons. The RUSI Journal. 2012, 157(1), str. 6-13. https://doi.org/10.1080/03071847.2012.664354
  30. SINGER, Tassilo V. P. Update to revolving door 2.0: The extension of the period for direct participation in hostilities due to autonomous cyber weapons. In: Conference on Cyber Conflict Proceedings 2017. Tallinn: CCD COE Publications, 2017, str. 121-133. ISBN 978-9949-9904-1-2. https://doi.org/10.23919/CYCON.2017.8240332
  31. TYUGU, Enn. Command and control of cyber weapons. In: Conference on Cyber Conflict Proceedings 2012. Tallinn: CCD COE Publications, 2012, str. 333-343. ISBN 978-9949-9040-9-9.
  32. TYUGU, Enn. Situation awareness and control errors of cyber weapons. In: IEEE International Multi-Disciplinary Conference on Cognitive Methods in Situation Awareness and Decision Support (CogSIMA). 2013, str. 143-148. ISBN 9781467324366. https://doi.org/10.1109/CogSIMA.2013.6523838
  33. WELSH, Thomas. A Cybersecurity Threat Model for the Detection of a Ransomware Cyberweapon in a Networked Computing Environment. In: 2019 IEEE 12th International Conference on Global Security, Safety and Sustainability (ICGS3). 2019, str. 212. ISBN 9781538670026. https://doi.org/10.1109/ICGS3.2019.8688353
  34. YAMIN, Muhammad Mudassar; KATT, Basel; KIANPOUR, Mazaher. Cyber Weapons Storage Mechanisms. In: Security, Privacy, and Anonymity in Computation, Communication, and Storage. 2019, str. 354-367. ISBN 9783030249076. https://doi.org/10.1007/978-3-030-24907-6_27
  35. ZHIOUA, Sami. The Middle East under Malware Attack Dissecting Cyber Weapons. In: 2013 IEEE 33rd International Conference on Distributed Computing Systems Workshops Proceedings. USA: IEEE Computer Society Conference Publishing Services. 2013, str. 11-16. ISBN 978-0-7685-5023-7. https://doi.org/10.1109/ICDCSW.2013.30
  36. Staged cyber attack reveals vulnerability in power grid. Dostupné z: https://www.youtube.com/watch?v=fJyWngDco3g [vid. 5. února 2020]

Metrics

0

Crossref logo

0


450

Views

198

PDF (Čeština) views