Abstract
With the development of automated and AI technology permeating into all sectors of public, private and industry life, the interconnectivity of once remote, siloed and air gapped systems is on the increase. Whilst this affords productive, streamlined and efficient ways of working, monitoring and maximise the effectivity of these systems, it is the connectivity, that can create a critical vulnerability. This vulnerability, is the source of exploitative measures that we refer to in the context of cyberwarfare. Where state and or adversarial threat actors can, utilising mechanisms on the internet, infiltrate, manipulate and attack these systems, to great and potentially devasting effect. It is paramount that the appropriate measures are taken to minimise the risk of these threats and vulnerabilities, through the review and security of internal systems, but also understanding where the vulnerabilities in the systems could lie, and to what effect they would cause should they be exploited. It is also important to understand not only the capabilities of how to respond should such an attack take place, but also the proportionality and legal of such responses.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Bibliography
3GPP (2017) SA3-security. The Third Generation Partnership Project (3GPP)
Agiwal M, Roy A, Saxena N Next generation 5G wireless networks: a comprehensive survey. IEEE Commun Surv Tutor 18(3):1617–1655. thirdquarter 2016
Akghar B, Yates SJ (2011) Strategic intelligence management for combating crime and terrorism. In: Akhgar B., Yates S. (eds) Intelligence Management. Advanced Information and Knowledge Processing. Springer, London
Alliance N (2015) NGMN 5G white paper. Next generation mobile networks, White paper
Cook A, Smith R, Maglaras L, Janicke H (2016) Measuring the risk of cyber attack in industrial control systems. BCS eWiC
Cook A, Nicholson A, Janicke H, Maglaras L, Smith R Attribution of cyber attacks on industrial control systems. EAI Endors Trans Ind Netw Intell Syst 3(7):151158
Cyber attack led to bristol airport blank screens. https://www.bbc.com/news/uk-england-bristol-45539841
Energy sector on alert for cyber attacks on UK power network. https://www.ft.com/content/d2b2aaec-4252-11e8-93cf-67ac3a6482fd. Accessed on 5 Feb 2018
Ericsson GN (2010) Cyber security and power system communication—essential parts of a smart grid infrastructure. IEEE Trans Power Deliv 25(3):1501–1507
Evans M, He Y, Maglaras L, Janicke H (2018) Heart-is: a novel technique for evaluating human error-related information security incidents. Comput Secur
Ferrag MA, Maglaras LA, Janicke H, Jiang J, Shu L (2018) A systematic review of data protection and privacy preservation schemes for smart grid communications. Sustain Cities Soc 38:806–835
Ferrag MA, Maglaras L, Argyriou A, Kosmanos D, Janicke H (2018) Security for 4g and 5g cellular networks: a survey of existing authentication and privacy-preserving schemes. J Netw Comput Appl 101:55–82
Freudiger J, Manshaei MH, Hubaux J-P, Parkes DC (2009) On noncooperative location privacy: a game-theoretic analysis. In: Proceedings of the 16th ACM conference on computer and communications security, ser. CCS ’09. ACM, New York, pp 324–337
Fujita H, Gaeta A, Loia V, Orciuoli F (2018) Resilience analysis of critical infrastructures: a cognitive approach based on granular computing. IEEE Trans Cybern:1–14
Geraci G, Dhillon HS, Andrews JG, Yuan J, Collings IB (2014) Physical layer security in downlink multi-antenna cellular networks. IEEE Trans Commun 62(6):2006–2021
Gope P, Hwang T (2016) Bsn-care: a secure iot-based modern healthcare system using body sensor network. IEEE Sensors J 16(5):1368–1376
Huawei (2016) 5G security: forward thinking. Huawei, Technical .report
Knapp ED, Langill JT (2014) Industrial Network Security: Securing critical infrastructure networks for smart grid, SCADA, and other industrial control systems. Syngress, Waltham
Kulkarni P, Khanai R, Bindagi G (2016) Security frameworks for mobile cloud computing: a survey. In: 2016 international conference on electrical, electronics, and optimization techniques (ICEEOT), pp 2507–2511
Maglaras LA, Jiang J (2014) Intrusion detection in SCADA systems using machine learning techniques. In: Science and information conference (SAI), IEEE, pp 626–631
Maglaras LA, Kim K-H, Janicke H, Ferrag MA, Rallis S, Fragkou P, Maglaras A, Cruz TJ (2018) Cyber security of critical infrastructures. ICT Express 4(1):42–45
Nicholson A, Watson T, Norris P, Duffy A, Isbell R (2012) A taxonomy of technical attribution techniques for cyber attacks. In: European conference on information warfare and security, p 188
ONF (2013) SDN security considerations in the data center. Open Networking Foundation
Panayiotou CG, Ellinas G, Kyriakides E, Polycarpou MM (2016) Critical information infrastructures Security. Springer, Berlin/Heidelberg
Petit J, Shladover SE (2015) Potential cyberattacks on automated vehicles. IEEE Trans Intell Transp Syst 16(2):546–556
Pipyros K, Thraskias C, Mitrou L, Gritzalis D, Apostolopoulos T (2018) A new strategy for improving cyber-attacks evaluation in the context of Tallinn manual. Comput Secur 74:371–383
Polla ML, Martinelli F, Sgandurra D A survey on security for mobile devices. IEEE Commun Surv Tutor 15(1):446–471. First 2013
Ralston PAS, Graham JH, Hieb JL (2007) Cyber security risk assessment for SCADA and DCS networks. ISA Trans 46(4):583–594
Robinson M, Jones K, Janicke H (2015) Cyber warfare: issues and challenges. Comput Secur 49:70–94
Robinson M, Jones K, Janicke H, Maglaras L (2018) An introduction to cyber peacekeeping. J Netw Comput Appl 114:70–87
Robinson M, Jones K, Janicke H, Maglaras L (2018) Developing cyber peacekeeping: observation, monitoring and reporting. Gover Inform Q 36(2):276–293
Rye dam attack. https://www.newsweek.com/cyber-attack-rye-dam-iran-441940
Saalbach K (2017) Attribution von cyber-attacken – methoden und praxis
Schmitt MN (2013) Tallinn manual on the international law applicable to cyber warfare. Cambridge University Press, Cambridge
Stellios I, Kotzanikolaou P, Psarakis M, Alcaraz C, Lopez J (2018) A survey of iot-enabled cyberattacks: assessing attack paths to critical infrastructures and services. IEEE Commu Surv Tutor 20(4):3453–3495
Ten C-W, Manimaran G, Liu CC (2010) Cybersecurity for critical infrastructures: attack and defense modeling. IEEE Trans Syst Man Cybern Part A Syst Hum 40(4):853–865
Ukraine cyber attack energy. https://www.wired.com/story/crash-override-malware/
Vikas SS, Pawan K, Gurudatt AK, Shyam G (2014) Mobile cloud computing: security threats. In: 2014 international conference on electronics and communication systems (ICECS), pp 1–4
Wolf creek nuclear plant hit cyberattack. https://www.theenergytimes.com/cybersecurity/wolf-creek-nuclear-plant-hit-cyberattack
Zonouz SA, Rogers KM, Berthier R, Bobba R, Sanders WH, Overbye TJ (2012) Scpse: Security-oriented cyber-physical state estimation for power grid critical infrastructures. IEEE Trans Smart Grid 3(4):1790–1799
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Switzerland AG
About this chapter
Cite this chapter
Chelvachandran, N., Kendzierskyj, S., Shah, Y., Jahankhani, H. (2020). Cyberwarfare – Associated Technologies and Countermeasures. In: Jahankhani, H., Kendzierskyj, S., Chelvachandran, N., Ibarra, J. (eds) Cyber Defence in the Age of AI, Smart Societies and Augmented Humanity. Advanced Sciences and Technologies for Security Applications. Springer, Cham. https://doi.org/10.1007/978-3-030-35746-7_2
Download citation
DOI: https://doi.org/10.1007/978-3-030-35746-7_2
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-35745-0
Online ISBN: 978-3-030-35746-7
eBook Packages: Computer ScienceComputer Science (R0)