Abstract
The revelation of Stuxnet in 2010 as the world’s first cyber weapon of its own kind that attacked Iranian enrichment facility has led to an extensive debate on the issue of cyber security. In every cyber attack, the attacker may risk of handing over the ammunition to the enemy as a blueprint for the latter to develop a cyber weapon of its own. In cyber warfare, there is possibility that victims of cyber attack develop their own cyber weapon resulting into proliferation of cyber weapons, which is going to be awfully perilous for the security of international system given the complex interconnectivity of computer networks and internet across the world. Since, until now the cyber weapons are used in an offensive mode; therefore, the probability of more states developing offensive cyber weapons is increasing. The chapter argues that the offensive nature of cyber weapons without having an adequate defensive character is destabilizing for the international security system. In this regard, this chapter examines the offense-defense balance in the cyber warfare, and how does offense has the advantage in the cyber warfare that can destabilize the security.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Adhikari, R. (2010). Stuxnet: Dissecting the worm. Tech News World. Retrieved September September 30, 2012 http://www.technewsworld.com/story/70622.html
Albright, D., Brannan, P., & Walrond, C. (2011). Stuxnet malware and Nntanz: Update of ISIS December 22, 2010 Report. Institute for Science and International Security. Retrieved September 30, 2012 from http://isis-online.org/uploads/isis-reports/documents/stuxnet_update_15Feb2011.pdf
Bajaj, K. (2010). The Cybersecurity agenda: Mobilizing for international action. EastWest Institute Report. Retrieved October 20, 2012 from http://www.ewi.info/system/files/Bajaj_Web.pdf
Ball, D. (2011). China’s cyber warfare capabilities. Security Challenges, 7(2), 81–103.
Bean, R. (1973). War and the birth of the nation state. Journal of Economic History, (33)
Beaumont, P. (2010). Stuxnet worm heralds new era of global cyberwar. The Guardian. Retrieved October 21, 2011 from http://www.guardian.co.uk/technology/2010/sep/30/stuxnet-worm-new-era-global-cyberwar
Bradbury, D. (2012). SCADA: A critical vulnerability. Computer Fraud and Security, (4).
Broad, W. J. et. al. (2011). Israel test on worm called crucial in Iran nuclear delay. The New York Times.
Carr, J. (2012). Inside cyber warfare: Mapping the cyber underworld. : O’Reilly Media, Inc.
Clayton, M. (2010). Stuxnet Malware is ‘Weapon’ Out To Destroy … Iran’s Bushehr Nuclear Plant? The Christian Science Monitor. Retrieved October 10, 2012 from http://www.colorado.edu/physics/phys3000/phys3000_fa10/articles-f10/0606.pdf
Cole, E. (2002). Hackers Beware. (London: New Riders) quoted in Geers, Kenneth. 2011. Strategic cyber security. Estonia: CCD COE Publication.
Constantin, L. (2012). Report: Flame part of US-Israel cyber attack campaign against Iran. InfoWorld. Retrieved October 20, 2012 from http://www.infoworld.com/d/security/report-flame-part-of-us-israeli-cyber-attack-campaign-against-iran-195994
Constantin, L. (2012a). Kaspersky discovers miniflame cyberespionage malware directly linked to flame and gauss. ComputerWorld. Retrieved October 20, 2012 from http://www.computerworld.com/s/article/9232367/Kaspersky_discovers_miniFlame_cyberespionage_malware_directly_linked_to_Flame_and_Gauss
Craig, P. A. Jr., & McKenna, T. P Jr. (2012). Technology security assessment for capabilities and applicability in energy sector industrial control systems. McAfee. Retrieved October 10, 2012 from http://www.mcafee.com/us/resources/reports/rp-energy-sector-industrial-control.pdf
Davis, J. (2009). Hackers take down the most wired country in Europe. Wired Magazine, (15).
Dawson, R. (2003). Living Networks: Leading your company, customers, and partners in the hyper-connected economy. New Jersey: Pearson Education, Inc.
Farwell, J. P., & Rohozinski, R. (2011). Stuxnet and the Future of Cyber War. Survival, 53(1), 23–40.
Geers, K. (2011). Strategic cyber security. Estonia: CCD COE Publication.
Kremer, J. F. & Müller, B. (2005). The lesson of titan rain: Articulate the dangers of cyber attack to upper management. Homeland Security News Wire. Retrieved November 1, 2012 from http://www.homelandsecuritynewswire.com/lesson-titan-rain-articulate-dangers-cyber-attack-upper-management
Kremer, J. F. & Müller, B. (2007a). A cyber-riot. The economist. Retrieved September 23, 2012 from http://www.economist.com/node/9163598
Kremer, J. F. & Müller, B. (2007b). Newly nasty. The economist. Retrieved September 23, 2012 from http://www.economist.com/node/9228757
Kremer, J. F. & Müller, B. (2010). A worm in the centrifuge. The economist. Retrieved October 15, 2012 from http://www.economist.com/node/17147818
George Tech. (2012). Emerging cyber threats report 2013. Report of the Georgia Tech Information Security Summit. Retrieved November 15, 2012 from http://www.gtsecuritysummit.com/report.html
Gilpin, R. (1981). War and change in world politics. Cambridge: Cambridge University Press.
Glaser, C. (1992). The political consequences of military strategy: Expanding and refining the spiral and deterrence models. World Politics, 44(4), 497–501.
Glenny, M. (2012). We will ruse stuxnet’s cavalier deployment. The Financial Times. Retrieved October 10, 2012 from http://www.ft.com/cms/s/0/6b674600-afc7-11e1-a025-00144feabdc0.html#axzz2CitmOS74
Hildreth, S. A. (2001). Cyberwarfare. Congressional Research Services Report. Retrieved October 10, 2012 from http://www.fas.org/irp/crs/RL30735.pdf
Hypponen, M. (2012). Stuxnet shifts the cyber arms race up a gear. BBC news. Retrieved October 10, 2012 from http://www.bbc.co.uk/news/technology-18825742
Jervis, R. (1978). Cooperation under the security dilemma. World Politics, 30(2), 66–80.
Kelsey. J. T. G. (2008). Hacking into international humanitarian law: The principles of distinction and neutrality in the age of cyber warfare. The Michigan Law Review, 106(7), 1434–1436.
Levy, J. S. (1984). The offensive/defensive balance of military technology: A theoretical and historical analysis. International studies quarterly, (28), 220–222.
Libicki, M. C. (2009). Cyberdeterrence and cyberwar. RAND Monograph. Retrieved October 20, 2012 from http://www.rand.org/pubs/monographs/2009/RAND_MG877.pdf
Libicki, M. C. (2011). Cyberwar as a confidence game. Strategic Studies Quarterly, 5(1), p. 133.
Lin, H. S. (2010). Offensive cyber operations and the use of force. Journal of National Security Law and Policy, 4(63), p. 63.
Loeb, V. (2001). NSA adviser says cyber-assaults on pentagon persist with few clues. The Washington Post. REtrieved October 30, 2012 from http://www.washingtonpost.com/ac2/wp-dyn?pagename=article&node=&contentId=A51965-2001May6¬Found=true
Marquand, R. (2007). China emerges as leader in cyberwarfare. The Christian Science Monitor. Retrieved January 20, 2013 from http://www.csmonitor.com/2007/0914/p01s01-woap.html
Matsubara, M. (2012). A stuxnet future? Yes, offensive cyber-warfare is already here. International Relations and Security Network (ISN). Retrieved September 20, 2012 from http://www.isn.ethz.ch/isn/Digital-Library/Special-Feature/Detail?lng=en&id=154095&contextid774=154095&contextid775=154091&tabid=1453372088
McAfee. (2009). In the crossfire—critical infrastructure in the age of cyber war. Retrieved September 10, 2012 from http://resources.mcafee.com/content/NACIPReport
McElroy, D. (2012). Flame virus ‘has infected 189 systems in Iran’. The Telegraph. Retrieved January 20, 2013 from http://www.telegraph.co.uk/news/worldnews/middleeast/iran/9297703/Flame-virus-has-infected-189-systems-in-Iran.html
Milevski, L. (2011). Stuxnet and strategy: A space operation in cyberspace. JFQ. (Issue 63). Retrieved September 20, 2012 from http://www.ndu.edu/press/lib/images/jfq-63/JFQ63_64-69_Milevski.pdf
Mitchell, C. (2012). Stuxnet, flame foretell age of cyber warfare. CBN News. Retrieved September 30, 2012 from http://www.cbn.com/cbnnews/insideisrael/2012/June/Stuxnet-Flame-Foretell-Age-of-Cyber-Warfare-/
Nicholson, A. et al. (2012). SCADA security in the light of cyber warfare. Computers and Security, (31), 421–422.
Obama, B. (2012). Taking the cyberattack threat seriously. The Wall Street Journal. Retrieved September 15,2012 from http://online.wsj.com/article/SB10000872396390444330904577535492693044650.html
Quester, G. (1977). Offense and defense in the international system. New York: Wiley.
Reisinger, D. (2012). Obama takes cyberwarfare to new level, report says. CNET News. Retrieved September 20, 2012 from http://news.cnet.com/8301-1009_3-57445275-83/obama-takes-cyberwarfare-to-new-level-report-says/
Rid. T. (2012). Think again: Cyberwar. Foreign Policy. Retrieved September 20, 2012 from http://www.foreignpolicy.com/articles/2012/02/27/cyberwar?page=0,4
Sanger, D. (2012). Obama order sped up wave of cyberattacks against Iran. The New York Times. Retrieved September 20, 2012 from http://www.nytimes.com/2012/06/01/world/middleeast/obama-ordered-wave-of-cyberattacks-against-iran.html?pagewanted=all
Schweller, R. (1996). Neorealism’s status-quo bias: What security dilemma? Security Studies, 5(3), 90–121.
Schweller, R. (2011). Rational theory for a bygone era. Security Studies, 20, 460–468.
Scissors, D. & Bucci, S. P. (2012). China cyber threat: Huawei and American policy toward Chinese companies. The Heritage Foundation, (3761). Retrieved November 1, 2012 from http://www.heritage.org/research/reports/2012/10/china-cyber-threat-huawei-and-american-policy-toward-chinese-companies
Steed, D. (2011). Cyber power and strategy: So what? Infinity Journal, 1(2), 21–24.
Van Evera, S. (1998). Offense, defense, and the causes of war. International Security, 22, 5–15.
Wilcox, L. (2009). Gendering the cult of the offensive. Security Studies, 18(2), 214–240.
World Economic Forum. (2012). Global risks 2012 (7th edn.). Retrieved November 5, 2012 from http://www3.weforum.org/docs/WEF_GlobalRisks_Report_2012.pdf
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2014 Springer-Verlag Berlin Heidelberg
About this chapter
Cite this chapter
Shaheen, S. (2014). Offense–Defense Balance in Cyber Warfare. In: Kremer, JF., Müller, B. (eds) Cyberspace and International Relations. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-37481-4_5
Download citation
DOI: https://doi.org/10.1007/978-3-642-37481-4_5
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-37480-7
Online ISBN: 978-3-642-37481-4
eBook Packages: Humanities, Social Sciences and LawPolitical Science and International Studies (R0)