Recent Cyberwar Spectrum and Its Analysis

dc.contributor.author Aslanoğlu, Rabia
dc.contributor.author Tekir, Selma
dc.date.accessioned 2017-03-23T08:47:26Z
dc.date.available 2017-03-23T08:47:26Z
dc.date.issued 2012
dc.description 11th European Conference on Information Warfare and Security 2012, ECIW 2012; Laval; France; 5 July 2012 through 6 July 2012 en_US
dc.description.abstract War is an organized, armed, and often prolonged conflict that is carried on between states, nations or other parties. Every war instance includes some basic components like rising conditions, battlespace, weapons, strategy, tactics, and consequences. Recent developments in the information and communication technologies have brought about changes on the nature of war. As a consequence of this change, cyberwar became the new form of war. In this new form, the new battlespace is cyber space and the contemporary weapons are constantly being renovated viruses, worms, trojans, denial-of-service, botnets, and advanced persistent threat. In this work, we present recent cyberwar spectrum along with its analysis. The spectrum is composed of the Estonia Attack, Georgia Attack, Operation Aurora, and Stuxnet Worm cases. The methodology for analysis is to identify reasons, timeline, effects, responses, and evaluation of each individual case. Moreover, we try to enumerate the fundamental war components for each incident. The analysis results put evidences to the evolution of the weapons into some new forms such as advanced persistent threat. Another outcome of the analysis is that when approaching to the end, confidentiality and integrity attributes of information are being compromised in addition to the availability. Another important observation is that in the last two cases, the responsive actions were not possible due to the lack of the identities of the offending parties. Thus, attribution appears as a significant concern for the modern warfare. The current sophistication level of the cyber weapons poses critical threats to society. Particularly developed countries that have high dependence on information and communication technologies are potential targets since the safety of the critical infrastructures like; healthcare, oil and gas production, water supply, transportation and telecommunication count on the safety of the computer networks. Being aware of this fact, every nation should attach high priorities to cyber security in his agenda and thus behave proactively. en_US
dc.identifier.citation Aslanoğlu, R., and Tekir, S. (2012). Recent cyberwar spectrum and its analysis. Paper presented at the 11th European Conference on Information Warfare and Security 2012 (ECIW 2012) Laval, France, July 5-6 (pp.45-52). Red Hook, NY: Curran. en_US
dc.identifier.isbn 9781622765379
dc.identifier.scopus 2-s2.0-84873194968
dc.identifier.uri https://hdl.handle.net/11147/5130
dc.language.iso en en_US
dc.publisher Curran Associates en_US
dc.relation.ispartof 11th European Conference on Information Warfare and Security 2012, ECIW 2012 en_US
dc.rights info:eu-repo/semantics/openAccess en_US
dc.subject Cyberwar en_US
dc.subject Estonia attack en_US
dc.subject Georgia attack en_US
dc.subject Operation aurora en_US
dc.subject Stuxnet worm en_US
dc.subject Spectrum analysis en_US
dc.title Recent Cyberwar Spectrum and Its Analysis en_US
dc.type Conference Object en_US
dspace.entity.type Publication
gdc.author.institutional Aslanoğlu, Rabia
gdc.author.institutional Tekir, Selma
gdc.coar.access open access
gdc.coar.type text::conference output
gdc.description.department İzmir Institute of Technology. Computer Engineering en_US
gdc.description.endpage 52 en_US
gdc.description.publicationcategory Konferans Öğesi - Uluslararası - Kurum Öğretim Elemanı en_US
gdc.description.scopusquality N/A
gdc.description.startpage 45 en_US
gdc.description.wosquality N/A
gdc.identifier.wos WOS:000308223300006
gdc.index.type WoS
gdc.index.type Scopus
gdc.scopus.citedcount 4
gdc.wos.citedcount 3
relation.isAuthorOfPublication.latestForDiscovery 57639474-3954-4f77-a84c-db8a079648a8
relation.isOrgUnitOfPublication.latestForDiscovery 9af2b05f-28ac-4014-8abe-a4dfe192da5e

Files

Original bundle

Now showing 1 - 1 of 1
Loading...
Name:
5130.pdf
Size:
278.02 KB
Format:
Adobe Portable Document Format
Description:
Conference Paper

License bundle

Now showing 1 - 1 of 1
Loading...
Name:
license.txt
Size:
1.71 KB
Format:
Item-specific license agreed upon to submission
Description: