Abstract
A set of relevant quotes could ‘set the scene’ for research into and discussion of the policy and law aspects of DoS/DDoS against global, national and defence information infrastructures (GII, NII, DII), national critical infrastructure (CNI) and the nation state itself (Information Warfare, Cyber-warfare, Electronic Warfare).
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Notes
- 1.
On 1 January 2011, the social network ‘Facebook’, based on server computers and disk storage devices, connected via the global Internet claimed a population of over 500 million ‘active members’ with over 50% making use of the network each day. Moreover, each one of those members is claimed to have an average of 130 ‘friends’. Any denial of service to this structure is now seen by many members as being of major significance, if not, catastrophic. Even small periods of downtime, as reported on 30 December 2010 by The Australian newspaper, may cause concern and frustration for its users. The question could easily be asked as to whether or not the ‘citizens’ of that ‘Internet Nation’, e.g. ‘Facebook’, and other ‘social networks’, could see DoS to the NII as simply an act of denying access by a citizen to his or her ‘home country’, their ‘homeland’. Essentially these ‘Internet’ nations are operating largely outside the constraints of the geographic nation states of the eighteenth and nineteenth centuries. They are looking for ‘governance’ from a new, private sector ‘government’, often a privately or publicly held company based in one of the traditional nation states, e.g. ‘Facebook’. The ‘citizens’ of this new ‘State’ in cyberspace could even be seen as maintaining human relationships on levels similar to the more traditional situation, e.g. maintaining a hierarchy of associations with other ‘citizens’ of the ‘State’. [16].
- 2.
SMS stands for ‘Short Message Service’. ‘Wikipedia’ explains SMS as “the text communication service component of phone, web or mobile communication systems, using standardized communications protocols that allow the exchange of short text messages between fixed line or mobile phone devices.” It forms part of the internationally accepted ‘Global System for Mobile Communications (GSM)’ standards set developed and agreed in the mid-1980s. An example is the ‘NetCode’ system of Australia’s Commonwealth Bank which is described by the bank as follows:
NetCode SMS is a free service available to all NetBank customers. It replaces Personalised Identification Questions to provide added security when completing certain NetBank transactions…Every time you perform one of these transactions, a new NetCode will be sent to your mobile phone via SMS. To complete your NetBank transaction, simply key in the 6-digit NetCode in the ‘Enter your NetCode’ field. Each NetCode number securely matches the Commonwealth Bank’s NetBank system. [6]
- 3.
The term ICT stands for ‘Information and Communications Technology’. As such, it expresses the concepts of knowledge and process rather than the results of that knowledge, i.e. the artefacts or the products and systems that are created from ICT. As such, it is an expression of the knowledge and experience of humans.
- 4.
The ‘tech-exclusive’ website, on 27 April 2010, reported as follows under the banner headline ‘India faces Disrupted Internet Service Due to Undersea Cable Issue’
Getting slow download speed? Well things will continue like this for the next 3 to 4 days. The slow internet speed is to be blamed on an undersea cable repair going on. The SEA-ME-WE4 undersea cable got cut a few weeks ago and is now being repaired. This cable links Europe, the Middle East and South Asia region. The worst hit country is India. This single cable carries around 89% of the traffic load of the above mentioned region. The major internet players – Bharti Airtel and Tata Communications – get their bandwidth from the same undersea cable. This is not the first time that an undersea cable cut has disrupted the internet speeds in India. In 2008, an undersea cable cut led to India losing around 50% to 60% of its internet bandwidth. [122]
- 5.
A contributing author, Caelli, is the Chair of the SSAC for auDa, the Australian Domain Name Authority.
- 6.
A contributing author, Caelli, has been a member of TC-11 since 1984.
- 7.
The author, Caelli, was a foundation member of this group and served on it until Jan 2011.
- 8.
The Internet Industry Association (IIA) is an industry organisation governed by its own constitution and by a board of directors. It maintains an operational executive group including a Chief Executive Officer based in Australia’s Federal Capital, Canberra. Its home page on the world wide web is at URL http://www.iia.net.au/.
References
About ENISA. 2011. http://www.enisa.europa.eu. Accessed 17 Jan 2011.
Australian Computer Emergency Response Team. 2011. http://www.auscert.org.au/. Accessed 12 Jan 2011.
Australian Telegraphic History. 2011. http://en.wikipedia.org/wiki/Australian_telegraphic_history. Accessed 24 Jan 2011.
Australia’s National Computer Emergency Response Team. 2011. http://www.cert.gov.au/. Accessed 21 Feb 2011.
Cable & Wireless Worldwide. 2011. http://www.answers.com/topic/cable-wireless-jamaica-limited. Accessed 24 Jan 2011.
Commonwealth Bank – Security. 2011. http://www.commbank.com.au/help/faq/netbank/security.aspx#whatisnetcodesms. Accessed 17 Jan 2011.
Communication Convergence Bill 2001. 2011. http://164.100.24.208/ls/committeeR/communication/39.pdf. Accessed 25 Feb 2011.
Communication Division. 2011. http://planningcommission.nic.in/sectors/commun.html. Accessed 25 Feb 2011.
Communications Critical Infrastructure Resilience. 2011. http://www.dbcde.gov.au/online_safety_and_security/Communications_critical_infrastructure_resilience. Accessed 10 Jan 2011.
Critical Infrastructure Resilience. 2011. http://www.ag.gov.au/www/agd/agd.nsf/Page/Nationalsecurity_CriticalInfrastructureProtection. Accessed 10 Jan 2011.
Defence Signals Directorate. 2011. http://www.dsd.gov.au/infosec/csoc.html. Accessed 10 Jan 2011.
Department of Information Technology. 2011. http://www.mit.gov.in/content/overview. Accessed 25 Feb 2011.
Department of Information Technology, Ministry of Communications and Information Technology, Government of India. 2011. http://www.mit.gov.in/content/overview. Accessed 23 Dec 2010.
Department of Telecommunications. 2011 http://www.dot.gov.in/. Accessed 25 Feb 2011.
Eastern Telegraph Co’s System and Its General Connections. 2011. http://upload.wikimedia.org/wikipedia/commons/a/a5/1901_Eastern_Telegraph_cables.png. Accessed 25 Jan 2011.
Facebook. 2011. http://www.facebook.com/press/info.php?statistics. Accessed 1 Jan 2011.
Forum of Incident Response and Security Teams. 2011. http://www.first.org. Accessed 11 Jan 2011.
French Resistance. 2010. http://en.wikipedia.org/wiki/French_Resistance#cite_ref-source1_3-0. Accessed 31 Jan 2010.
IETF STD Index. 2011. http://www.rfc-editor.org. Accessed 8 Jan 2011.
Information Technology Crime. 2011. http://www.interpol.int/public/TechnologyCrime/default.asp. Accessed 11 Jan 2011.
Information Update for CUA Customers. 2011. http://www.cua.com.au/. Accessed 13 Jan 2011.
International Federation for Information Processing. 2011. http://www.ifip.org. Accessed 11 Jan 2011.
Internet. 2011. http://en.wikipedia.org/wiki/Internet. Accessed 5 Jan 2011.
Internet Assigned Numbers Authority. 2011. http://www.iana.org/about/. Accessed 11 Jan 2011.
Internet Corporation for Assigned Names and Numbers. 2011. http://www.icann.org/. Accessed 11 Jan 2011.
Invest India Telecom. 2011. http://www.dot.gov.in/osp/Brochure/Brochure.htm. Accessed 25 Feb 2011.
IT Act of India 2000. 2011. http://www.cyberlawsindia.net/Information-technology-act-of-inida.html. Accessed 4 Feb 2011.
ITU Activities Related to Cybersecurity. 2011. http://www.itu.int/cybersecurity/. Accessed 10 Jan 2011.
The Japanese Bombing of Darwin and Northern Australia. 2010. http://www.cultureandrecreation.gov.au/articles/darwinbombing/. Accessed 30 Dec 2010.
Kerala Police, India. 2011. http://www.keralapolice.org/newsite/hitech_need_cyberlaw.html. Accessed 4 Feb 2011.
Legal Services India. http://www.legalserviceindia.com/cyber/cyber.htmand http://www.legalserviceindia.com/article/l323-Cyber-Crimes-Cyber-Law.html
MOSAIC (Web Browser). 2011. http://en.wikipedia.org/wiki/Mosaic_(web_browser). Accessed 18 Jan 2011.
National Security Science and Technology Branch. 2011. http://www.dpmc.gov.au/nsst/index.cfm. Accessed 10 Jan 2011.
NATO, Wikipedia. 2011. http://en.wikipedia.org/wiki/NATO/. Accessed 17 Jan 2011.
No. 462 Squadron RAAF. 2011. http://en.wikipedia.org/wiki/No._462_Squadron_RAAF. Accessed 5 Jan 2011.
Organisation for Economic Cooperation and Development. 2011. http://www.oecd.org. Accessed 11 Jan 2011.
Packet Switched Network. 2011. http://en.wikipedia.org/wiki/Packetswitched_network. Accessed 14 Jan 2011.
The common criteria recognition arrangement: Purpose of the arrangement. http://www.commoncriteriaportal.org/ccra/. Accessed 11 Jan 2011.
The Information Technology (Amendment) Bill 2006. 2011. https://www.prsindia.org/uploads/media/Information_Technology/1168510210_The_Information_Technology__Amendment__Bill__2006.pdf. Accessed 4 Feb 2011.
TISN for critical infrastructure resilience. http://www.tisn.gov.au/. Accessed 6 Jan 2011.
Uncitral model law. http://www.uncitral.org/. Accessed 4 Feb 2011.
Who we are, Department of the Premier and Cabinet, Queensland. http://www.premiers.qld.gov.au/about-us/who-we-are.aspx. Accessed 17 Jan 2011.
Trusted computer system evaluation criteria. Technical report DoD 5200.28-STD, USA Department of Defense, 26 Dec 1985. (Supersedes CSC-STD-00l-83, dated l5 Aug 83).
ISO 7498-2: 1989 Information processing systems – Open Systems Interconnection – Basic Reference Model – Part 2 Security Architecture. Technical report, International Organization for Standardization, 1989.
History of communications in Australia. 2001. http://www.abs.gov.au/ausstats/abs@.nsf/Previousproducts/1301.0Feature%20Article432001?opendocumenttabname=Summaryprodno=1301.0issue=2001num=view=. Accessed 25 Jan 2011.
(2002). R vs Boden. QCA 164.
SSAC advisory SAC008 DNS distributed denial of service (DDoS) attacks. Technical report, ICANN Security and Stability Advisory Committee, Mar 2006. http://www.icann.org/en/committees/security/dns-ddos-advisory-31mar06.pdf. Accessed 4 Feb 2011.
DNSSEC@ICANN 2008. Signing the root zone: A way forward toward operational readiness. http://icann.org/en/announcements/dnssec-paper-15jul08-en.pdf. Accessed 4 Feb 2011.
Intel plans to tackle cosmic ray threat. 2008. http://news.bbc.co.uk/2/hi/technology/7335322.stm. Accessed 9 Jan 2011.
The Information Technology (Amendment) Act, 2008. 2008. http://www.mit.gov.in/sites/upload_files/dit/files/downloads/itact2000/it_amendment_act2008.pdf. Accessed 4 Feb 2011.
Changing landscape of DDos threats and protection. 2009. http://verisigninc.com/assets/whitepaper-ddos-threats-protection-forrester.pdf. Accessed 23 Feb 2011, March 2009.
United Nations Handbook: 2009–2010: An Annual Guide for those Working with and within the United Nations. United Nations Publications, 308–314.
G with Integrated ADSL2 + Modem DVG834NH. 2010. http://www.netgear.com.au/au/product/routers-and-gateways/3gfemtocells/dvg834nh?gclid=CKuP9OzpzKYCFQHVbgod8VV-Gw. Accessed 18 Jan 2011.
Corporate plan, 2011–2013. 2010. http://www.nbnco.com.au/. Accessed 9 Jan 2011.
(2010, Dec). Critical ICT Infrastructure Protection in India. 2010. cyberlawsindia.blogspot.com/2010/12/critical-ict-infrastructure-protection.html. Accessed 2 Feb 2011. http://cyberlawsinindia.blogspot.com/2011/01/critical-infrastructureprotection-in.html. Cited at 11 Jan 2011.
ICANN’s First DNSSEC Key Ceremony for the Root Zone. 2010. http://www.icann.org/en/announcements/announcement-2-07jun10-en.htm. Accessed 4 Feb 2011.
icode to commence 1 December 2010. http://www.iia.net.au/. Accessed 22 Dec 2010, Oct. 27 10:14 2010.
NEC rewrites the rules for 3G rollout in India. 2010. http://www.nec.com.au/News-Media/Media-Centre/Media-Releases/NEC-rewrites-the-rules-for-3G-rollout-in-India.html. Accessed 4 Jan 2011.
Saraswat: “DRDO working on India’s own computer operating system”. The Hindu, 9 Oct 2010. http://www.thehindu.com/sci-tech/science/article821933.ece. Accessed 25 Feb 2011.
The eighth apec ministerial meeting on the telecommunications and information industry (telmin 8). 2010. http://www.soumu.go.jp/main_content/000087132.pdf. Accessed 23 Feb 2010.
A New Year wish: more digital visionaries. The Australian, 01 Jan 2011. http://www.theaustralian.com.au/news/a-new-year-wish-more-digital-visionaries/story-e6frg6n6-1225979630797. Accessed 1 Jan 2011.
Mondaq IT & Telecoms. 2011. http://www.mondaq.in. Accessed 25 Feb 2011.
Solar energy use in cell towers can reduce co2 emission: Study. 2011. http://www.businessstandard.com/india/news/solar-energy-use-in-cell-towers-can-reduce-co2-emissionstudy/122349/on. Accessed 16 Jan 2011.
The Internet Engineering Task Force. 2011. http://www.ietf.org. Accessed 11 Jan. 2011.
Ahmed, M. 2011. Driving the engine of success. The Australian, 26, 08 Jan 2011.
Alvestrand, H. 2004. A mission statement for the IETF: RFC 3935. Technical report, IETF Network Working Group.
Andreessen, M. 2011. Mosaic – The first global web browser. http://www.livinginternet.com/w/wi_mosaic.htm. Accessed 9 Jan 2011.
APEC Secretariat. 2010. APEC at a glance. "http://publications.apec.org/file-download.php?filename=211_sec_APECatAGlance_F.pdfid=1077. Accessed 23 Feb 2011.
Australian Government. 2006. Denial of service/distributed denial of service MANAGING DoS ATTACKS. http://www.dbcde.gov.au/__data/assets/pdf_file/0011/41312/DoS_Report.pdf. Accessed 23 Feb 2011.
Ball, D. 2008. Australia and cyber-warfare, Chap. 6: An Australian Cyber-warfare Centre, 119–148. ANU, Canberra.
Ballmer, S. 2011. Remarks by Microsoft CEO Steve Ballmer at 2011 International CES Las Vegas, 5 Jan 2011. http://www.microsoft.com/presspass/exec/steve/2011/01-05CES.mspx. Accessed 7 Jan 2011.
Beckstrom, R. 2010. The new internet nation state. Internet Corporation for Assigned Names and Numbers (ICANN) As Prepared for delivery to the United Nations, Department of Economic and Social Affairs, Multi-stakeholder Consultation on Enhanced Cooperation New York. http://www.icann.org/en/presentations/beckstrom-speech-united-nations-14dec10-en.pdf. Accessed 9 Jan 2011.
Broad, W., J. Markoff, and D. Sanger. 2011. Israeli test on worm called crucial in Iran nuclear delay. New York Times. http://www.nytimes.com/2011/01/16/world/middleeast/16stuxnet.html. Accessed 18 Jan. 2011.
BSNL. 2011. Calcutta telephones. http://www.calcutta.bsnl.co.in/history_ctd.shtml. Accessed 25 Feb 2011.
Caelli, W. 2010. Towards the digital city: Information assurance and resilience policy. In Proceedings of the Hong Kong Institute of Engineers (HKIE) Conference “The Way to the Digital City – Sustainable Public Services and Solutions”, Hong Kong – SAR, PRC, 1–2 Nov 2010.
Carpenter, B. 2009. The IETF process: An informal guide. http://www.ietf.org/about/process-docs.html. Accessed 9 Jan 2011, Oct 29 2009.
Carr, J. 2010. Inside cyber warfare: Mapping the cyber underworld. Sebastopol: O’Reilly.
Carr, N. 2009. The big switch: Rewiring the world, from Edison to Google. New York: W.W. Norton & Co.
CCRA. 2011. Common criteria. http://www.commoncriteriaportal.org/. Accessed 23 Feb 2011.
Chabrow, E. 2011. 5 obstacles to infosec reform in 2011 : Some players have changed, but the issues remain the same. GovInfo Security, 7 Jan 2011. http://blogs.govinfosecurity.com/posts.php?postID=844rf=2011-01-10-eg. Accessed 9 Jan 2011.
Christensen, S., W. Caelli, W. Duncan, and E. Georgiades. 2010. An Achilles heel: Denial of service on Australian critical information infrastructure. Information and Communications Technology Law 19(1): 61–85.
CISCO. 2004. Distributed denial of service threats: Risks, mitigation, and best practices. Cisco Systems white paper. https://www.info-point-security.com/open_downloads/alt/cisco_wp_ddos.pdf. Accessed 23 Feb 2011.
Clarke, R. and R.K. Knake. 2010. Cyber war: The next threat to national security and what to do about it. New York: HarperCollins.
CNN. 1998. Heading off an electronic Pearl Harbor. CNN Tech. http://articles.cnn.com/1998-04-06/tech/9804_06_computer.security_1_hackers-national-security-cybercrime?_s=PM:TECH. Accessed 2 Jan 2010.
Creedy, S. and F. Foo. 2010. Virgin brand feeling a bit blue after computer glitch. The Australian, 25, 9 OCtober 2010.
de Villiers, M. 2007. Distributed denial of service: Law technology and policy. Sydney: University of New South Wales, School of Law.
Dudgeon, I. 2008. Australia and cyber-warfare, chapter 4: Targeting Information Infrastructures, 59–83. Canberra: ANU.
Dyer, J.G., M. Lindemann, R. Perez, L. van Doorn, S.W. Smith, and S. Weingart. 2001. Building the IBM 4758 secure coprocessor. IEEE Computer, 57–66, Oct 2001.
Dyson, E. 1997. Release 2.0: A design for living in the digital age. Viking/Penguin.
Evers, J. 2007. New shield foiled Internet backbone attack. http://news.cnet.com/2100-7349_3-6166107.html. Accessed 4 Feb 2011.
Fitzgibbon, J. 2009. Defending Australia in the Asia-Pacific century: Force 2030. Defence white paper. http://www.defence.gov.au/whitepaper/. Accessed 10 Jan. 2011.
Garamone, J. 2010. Cybercom chief details cyberspace defense. http://www.defense.gov/news/newsarticle.aspx?id=60987. Accessed 13 Jan 2011.
Georgiades, E. Crisis on impact: Responding to cyber attacks on critical information infrastructures. In preparation.
Graham, W.R., J.S. Jr. Foster, E. Gjelde, R.J. Hermann, H.M. Kluepfel, R.L. Lawson, G.K. Soper, L.L. Jr. Wood, and J.B. Woodard. 2004. Report of the commission to assess the threat to the United States from electromagnetic pulse (EMP) attack : Volume 1: Executive report. Technical report. http://empcommission.org/docs/empc_exec_rpt.pdf. Accessed 2 Feb 2011.
Hall, E. 2010. Former White House security advisor warns of cyber war. The World Today, ABC Radio National http://www.abc.net.au/worldtoday/content/2010/s3086792.htm. Accessed 7 Dec 2010.
Handley, M. and E. Rescorla. 2006. Internet denial-of-service considerations: RFC 4732. http://tools.ietf.org/html/rfc4732. Accessed 22 Nov 2010.
Harvey, N. 2011. 2010/11/09 – Meeting the cyber challenge. http://www.mod.uk/DefenceInternet/AboutDefence/People/Speeches/MinAF/20101109MeetingTheCyberChallenge.htm. Accessed 4 Jan 2011.
Hilvert, J. 2010. Cybercrime response a win for self-regulation. http://www.itnews.com.au. Accessed 20 Dec 2010.
Hopewell, L. 2011. NBN batteries pose disaster issue: Experts. http://www.zdnet.com.au/nbn-batteries-pose-disaster-issue-experts-339308546.htm. Accessed 13 Jan 2011.
ICANN. 2011. DNSSEC @ ICANN Signing the root zone: A way forward toward operational readiness. http://www.icann.org/en/announcements/dnssec-paper-15jul08-en.pdf. Accessed 23 Feb 2011.
ICT-India. 2011 ICT regulation toolkit. http://www.ictregulationtoolkit.org/en/PracticeNote.1222.html. Accessed 25 Feb 2011.
IndianetZone. 2008. History of Indian telecommunications. http://www.indianetzone.com/42/history_indian_telecommunications.htm. Accessed 25 Feb 2011.
ISO. 2011. Information technology – security techniques – evaluation criteria for it security – part 1: Introduction and general model. http://www.iso.org/iso/iso_catalogue/catalogue_ics/catalogue_detail_ics.htm?csnumber=50341. Cited at 5 Jan 2011.
Jingfei, S. 2009. Solution–Mitigating interference between LTE and 2G/3G networks. Technical report.
Kahn, R. and V. Cerf. 2000. Al Gore and the Internet. http://amsterdam.nettime.org/Lists-Archives/nettime-l-0009/msg00311.html. Accessed 5 Jan 2011.
Kitney, D. 2011. The web whirlwind. The Weekend Australian, 1, 8 Jan 2011.
Koch, C. 1995. Mutable markets. CIO Magazine 9(5): 68–76.
Kramer, F.D., S.H. Starr, and L.K. Wentz, eds. 2009. Cyberpower and national security. Washington, DC: Center for Technology and National Security Policy.
Lemos, R. 2002. Security czar: Button up or get hacked. CNET News. http://news.cnet.com/2100-1001-840335.html. Accessed 31 Dec 2010.
Libicki, M. 2007. Conquest in cyberspace: National security and information warfare. Cambridge: Cambridge University Press.
Loscocco, P. and S. Smalley. 2001. Integrating flexible support for security policies into the Linux operating system. In 2001 USENIX Annual Technical Conference Boston, 25–30 Jun 2001. USENIX.
Lowensohn, J. 2011. Hotmail’s recent message loss hiccup explained. CNET News. http://news.cnet.com/8301-17939_109-20027726-2.html?tag=nl.e776. Accessed 8 Jan 2011. http://news.cnet.com/8301-17939_109-20027726-2.html?tag=nl.e776. Cited at 8 Jan 2011.
Maheshwari, V. 2011. Legal service India.com. http://www.legalserviceindia.com/articles/art222.htm. Accessed 25 Feb 2011.
Mallet, P. (2010, Nov 18). NATO mobilises for cyber warfare. http://www.physorg.com/news/2010-11-nato-mobilises-cyber-warfare.html: Accessed 10 Jan 2011.
Marsh, R.T. 1997. Critical foundations: Protecting America’s infrastructures – The report of the President’s Commission on Critical Infrastructure Protection. Technical report, The White House, Washington, DC. http://www.fas.org/sgp/library/pccip.pdf. Accessed 4 Jan 2011.
Australian War Memorial. 2011. 462 squadron raaf. Australian War Memorial. http://www.awm.gov.au/units/unit_11167.asp. Cited at 5 Jan 2011.
Ohlden, A. 2011. Northrop Grumman opens UK cyber security test range For evaluation of threats on large scale networks. http://www.science20.com/newswire/northrop_grumman_opens_uk_cyber_security_test_range_evaluation_threats_large_scale_networks. Accessed 26 Jan 2011.
Pauli, D. 2010. 2015, the year of cyberwar: Gartner. http://www.zdnet.com.au/2015-the-year-of-cyberwar-gartner-339307693.htm. Accessed 6 Dec 2010.
Perset, K. and S. Paltridge. 2008. The future of the internet economy. Policy brief, OECD. http://www.oecd.org/dataoecd/20/41/40789235.pdf. Accessed 4 Feb 2011.
Preimesberger, C. 2010. 2010 saw the dawn of nation-state cyber wars: Citrix CTO. eWeek. http://www.eweek.com/c/a/Cloud-Computing/2010-Saw-the-Dawn-of-NationState-Cyberwars-Citrix-CTO-430619. Accessed 31 Dec 2010.
Raichaudhuri, R. 2011. “INDIA CALLING” – The rise of the Indian telecommunications industry. http://www.indialawjournal.com/volume2/issue_3/article_by_rohan.html. Accessed 25 Feb 2011.
Rajesh. 2010. India faces disrupted internet service due to undersea cable issue. http://www.tech-exclusive.com/india-faces-disrupted-internet-service-due-to-undersea-cable-issue/. Accessed 22 Feb 2011.
Rattray, G. 2001. Strategic warfare in cyberspace. Cambridge: The MIT Press.
Rudd, K. 2008. Address to Heads of Agencies and members of senior executive service. http://www.apsc.gov.au/media/rudd300408.htm. Accessed 2 Feb 2011.
Rudd, K. and S.M. Krishna. 2011. Australia-India foreign ministers’ framework dialogue. foreignminister.gov.au/releases/2011/kr_mr_110120.html. Accessed 20 Jan 2011.
Rudd, K., S. Smith, W. Hague, and L. Fox. 2011 Australia-United Kingdom ministerial consultations: Joint communiqué; Sydney, 18 Jan. 2011. http://foreignminister.gov.au/releases/2011/kr_mr_110118a.html. Accessed 19 Jan 2011.
Schwartau, W. 1996. Information warfare, 2nd edn. New York: Thunder’s Mouth Press.
Singh, H., A. Soni, and R. Kathuria. 2003. Telecom policy reform in India, chapter 4. World Bank and Oxford University Press.
Stanley, P. 2002. Remembering 1942: The bombing of Darwin, 19 February 1942. Australian War Memorial presentation. http://www.awm.gov.au/atwar/remembering1942/darwin/transcript.asp. Accessed 3 Feb 2011.
Thompson, R. 2010. The sun in action. http://www.ips.gov.au/Educational/2/1/1. Accessed 9 Jan 2011.
TRAI. 2011. Telecom Regulatory Authority of India. http://www.trai.gov.in/Default.asp. Accessed 25 Feb 2011.
TRAI. 1999. New telecom policy 1999. http://www.trai.gov.in/TelecomPolicy_ntp99.asp. Accessed 25 Feb 2011.
Vixie, P. 2002. Securing the edge. http://www.icann.org/en/committees/security/sac004.txt. Accessed 4 Feb 2011.
Waters, G., D. Ball, and I. Dudgeon. 2008. Australia and cyber-warfare. Canberra: ANU Press.
Westervelt, R. 2011. IBM predicts rising mobile threats, critical infrastructure attacks in 2011. http://searchsecurity.techtarget.com/news/article/0,289142,sid14_gci1525624,00.html?track=NL-102ad=806829asrc=EM_NLN_13112830uid=5074973. Accessed 4 Jan 2011.
Wikipedia. 2011. Public call office. http://en.wikipedia.org/wiki/Public_call_office. Accessed 25 Feb 2011.
Wikipedia. 2011. Tandem Computers Inc. Wikipedia. http://en.wikipedia.org/wiki/Tandem_Computers. Cited at 5 Jan 2011.
Wingfield, T. 2009. Cyberpower and national security, Chapter 22: International law and information operations. National Defense University Press.
Zakaria, F. 2008. The post American world. New York: W.W. Norton & Company.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2011 Springer India Pvt. Ltd.
About this chapter
Cite this chapter
Caelli, W.J., Raghavan, S.V., Bhaskar, S.M., Georgiades, J. (2011). Policy and Law: Denial of Service Threat. In: Raghavan, S., Dawson, E. (eds) An Investigation into the Detection and Mitigation of Denial of Service (DoS) Attacks. Springer, India. https://doi.org/10.1007/978-81-322-0277-6_3
Download citation
DOI: https://doi.org/10.1007/978-81-322-0277-6_3
Published:
Publisher Name: Springer, India
Print ISBN: 978-81-322-0276-9
Online ISBN: 978-81-322-0277-6
eBook Packages: Computer ScienceComputer Science (R0)