All political and military conflicts now have a cyber dimension, the size and impact of which are difficult to predict. Internet-enabled propaganda, espionage and attacks on critical infrastructure can target decision makers, weapons systems and citizens in general, during times of peace or war. Traditional threats to national security now have a digital delivery mechanism which would increase the speed, diffusion and power of an attack. There have been no true cyber wars to date, but cyber battles of great consequence are easy to find. This book is divided into two sections - Strategic Viewpoints and Technical Challenges & Solutions - and highlights the growing connection between computer security and national security.IOS Press is an international science, technical and medical publisher of high-quality books for academics, scientists, and professionals in all fields. Some of the areas we publish in: -Biomedicine -Oncology -Artificial intelligence -Databases and information systems -Maritime engineering -Nanotechnology -Geoengineering -All aspects of physics -E-governance -E-commerce -The knowledge economy -Urban studies -Arms control -Understanding and responding to terrorism -Medical informatics -Computer Sciences
Author(s): C. Czosseck and K. Geers
Year: 2009
Language: English
Pages: 328
Title page......Page 1
Preface......Page 5
About the Contributors......Page 13
Contents......Page 19
Part I. Strategic Viewpoints......Page 21
Cyber Wars: A Paradigm Shift from Means to Ends......Page 23
Towards an Evolving Theory of Cyberpower......Page 38
Sub Rosa Cyber War......Page 73
Warfare and the Continuum of Cyber Risks: A Policy Perspective......Page 86
Cyber Terrorism: A New Dimension in Battlespace......Page 97
Borders in Cyberspace: Can Sovereignty Adapt to the Challenges of Cyber Security?......Page 108
Towards a Global Regime for Cyber Warfare......Page 126
What Analogies Can Tell Us About the Future of Cybersecurity......Page 138
The Information Sphere Domain –- Increasing Understanding and Cooperation......Page 152
Sun Tzu Was a Hacker: An Examination of the Tactics and Operations from a Real World Cyber Attack......Page 163
Belarus in the Context of European Cyber Security......Page 176
Politically Motivated Denial of Service Attacks......Page 183
A Brief Examination of Media Coverage of Cyberattacks (2007 –- Present)......Page 202
Part II. Technical Challenges and Solutions......Page 209
Behavioral Analysis of Zombie Armies......Page 211
Proactive Botnet Countermeasures –- An Offensive Approach......Page 231
When Not to Pull the Plug – The Need for Network Counter-Surveillance Operations......Page 246
Autonomic Computer Network Defence Using Risk State and Reinforcement Learning......Page 258
Enhancing Graph-Based Automated DoS Attack Response......Page 269
On nth Order Attacks......Page 282
Business and Social Evaluation of Denial of Service Attacks in View of Scaling Economic Counter-Measures......Page 302
Virtual Plots, Real Revolution......Page 314
Subject Index......Page 323
Author Index......Page 325