Skip to main content

Abstract

A set of relevant quotes could ‘set the scene’ for research into and discussion of the policy and law aspects of DoS/DDoS against global, national and defence information infrastructures (GII, NII, DII), national critical infrastructure (CNI) and the nation state itself (Information Warfare, Cyber-warfare, Electronic Warfare).

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 159.00
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    On 1 January 2011, the social network ‘Facebook’, based on server computers and disk storage devices, connected via the global Internet claimed a population of over 500 million ‘active members’ with over 50% making use of the network each day. Moreover, each one of those members is claimed to have an average of 130 ‘friends’. Any denial of service to this structure is now seen by many members as being of major significance, if not, catastrophic. Even small periods of downtime, as reported on 30 December 2010 by The Australian newspaper, may cause concern and frustration for its users. The question could easily be asked as to whether or not the ‘citizens’ of that ‘Internet Nation’, e.g. ‘Facebook’, and other ‘social networks’, could see DoS to the NII as simply an act of denying access by a citizen to his or her ‘home country’, their ‘homeland’. Essentially these ‘Internet’ nations are operating largely outside the constraints of the geographic nation states of the eighteenth and nineteenth centuries. They are looking for ‘governance’ from a new, private sector ‘government’, often a privately or publicly held company based in one of the traditional nation states, e.g. ‘Facebook’. The ‘citizens’ of this new ‘State’ in cyberspace could even be seen as maintaining human relationships on levels similar to the more traditional situation, e.g. maintaining a hierarchy of associations with other ‘citizens’ of the ‘State’. [16].

  2. 2.

    SMS stands for ‘Short Message Service’. ‘Wikipedia’ explains SMS as “the text communication service component of phone, web or mobile communication systems, using standardized communications protocols that allow the exchange of short text messages between fixed line or mobile phone devices.” It forms part of the internationally accepted ‘Global System for Mobile Communications (GSM)’ standards set developed and agreed in the mid-1980s. An example is the ‘NetCode’ system of Australia’s Commonwealth Bank which is described by the bank as follows:

    NetCode SMS is a free service available to all NetBank customers. It replaces Personalised Identification Questions to provide added security when completing certain NetBank transactions…Every time you perform one of these transactions, a new NetCode will be sent to your mobile phone via SMS. To complete your NetBank transaction, simply key in the 6-digit NetCode in the ‘Enter your NetCode’ field. Each NetCode number securely matches the Commonwealth Bank’s NetBank system. [6]

  3. 3.

    The term ICT stands for ‘Information and Communications Technology’. As such, it expresses the concepts of knowledge and process rather than the results of that knowledge, i.e. the artefacts or the products and systems that are created from ICT. As such, it is an expression of the knowledge and experience of humans.

  4. 4.

    The ‘tech-exclusive’ website, on 27 April 2010, reported as follows under the banner headline ‘India faces Disrupted Internet Service Due to Undersea Cable Issue’

    Getting slow download speed? Well things will continue like this for the next 3 to 4 days. The slow internet speed is to be blamed on an undersea cable repair going on. The SEA-ME-WE4 undersea cable got cut a few weeks ago and is now being repaired. This cable links Europe, the Middle East and South Asia region. The worst hit country is India. This single cable carries around 89% of the traffic load of the above mentioned region. The major internet players – Bharti Airtel and Tata Communications – get their bandwidth from the same undersea cable. This is not the first time that an undersea cable cut has disrupted the internet speeds in India. In 2008, an undersea cable cut led to India losing around 50% to 60% of its internet bandwidth. [122]

  5. 5.

    A contributing author, Caelli, is the Chair of the SSAC for auDa, the Australian Domain Name Authority.

  6. 6.

    A contributing author, Caelli, has been a member of TC-11 since 1984.

  7. 7.

    The author, Caelli, was a foundation member of this group and served on it until Jan 2011.

  8. 8.

    The Internet Industry Association (IIA) is an industry organisation governed by its own constitution and by a board of directors. It maintains an operational executive group including a Chief Executive Officer based in Australia’s Federal Capital, Canberra. Its home page on the world wide web is at URL http://www.iia.net.au/.

References

  1. About ENISA. 2011. http://www.enisa.europa.eu. Accessed 17 Jan 2011.

  2. Australian Computer Emergency Response Team. 2011. http://www.auscert.org.au/. Accessed 12 Jan 2011.

  3. Australian Telegraphic History. 2011. http://en.wikipedia.org/wiki/Australian_telegraphic_history. Accessed 24 Jan 2011.

  4. Australia’s National Computer Emergency Response Team. 2011. http://www.cert.gov.au/. Accessed 21 Feb 2011.

  5. Cable & Wireless Worldwide. 2011. http://www.answers.com/topic/cable-wireless-jamaica-limited. Accessed 24 Jan 2011.

  6. Commonwealth Bank – Security. 2011. http://www.commbank.com.au/help/faq/netbank/security.aspx#whatisnetcodesms. Accessed 17 Jan 2011.

  7. Communication Convergence Bill 2001. 2011. http://164.100.24.208/ls/committeeR/communication/39.pdf. Accessed 25 Feb 2011.

  8. Communication Division. 2011. http://planningcommission.nic.in/sectors/commun.html. Accessed 25 Feb 2011.

  9. Communications Critical Infrastructure Resilience. 2011. http://www.dbcde.gov.au/online_safety_and_security/Communications_critical_infrastructure_resilience. Accessed 10 Jan 2011.

  10. Critical Infrastructure Resilience. 2011. http://www.ag.gov.au/www/agd/agd.nsf/Page/Nationalsecurity_CriticalInfrastructureProtection. Accessed 10 Jan 2011.

  11. Defence Signals Directorate. 2011. http://www.dsd.gov.au/infosec/csoc.html. Accessed 10 Jan 2011.

  12. Department of Information Technology. 2011. http://www.mit.gov.in/content/overview. Accessed 25 Feb 2011.

  13. Department of Information Technology, Ministry of Communications and Information Technology, Government of India. 2011. http://www.mit.gov.in/content/overview. Accessed 23 Dec 2010.

  14. Department of Telecommunications. 2011 http://www.dot.gov.in/. Accessed 25 Feb 2011.

  15. Eastern Telegraph Co’s System and Its General Connections. 2011. http://upload.wikimedia.org/wikipedia/commons/a/a5/1901_Eastern_Telegraph_cables.png. Accessed 25 Jan 2011.

  16. Facebook. 2011. http://www.facebook.com/press/info.php?statistics. Accessed 1 Jan 2011.

  17. Forum of Incident Response and Security Teams. 2011. http://www.first.org. Accessed 11 Jan 2011.

  18. French Resistance. 2010. http://en.wikipedia.org/wiki/French_Resistance#cite_ref-source1_3-0. Accessed 31 Jan 2010.

  19. IETF STD Index. 2011. http://www.rfc-editor.org. Accessed 8 Jan 2011.

  20. Information Technology Crime. 2011. http://www.interpol.int/public/TechnologyCrime/default.asp. Accessed 11 Jan 2011.

  21. Information Update for CUA Customers. 2011. http://www.cua.com.au/. Accessed 13 Jan 2011.

  22. International Federation for Information Processing. 2011. http://www.ifip.org. Accessed 11 Jan 2011.

  23. Internet. 2011. http://en.wikipedia.org/wiki/Internet. Accessed 5 Jan 2011.

  24. Internet Assigned Numbers Authority. 2011. http://www.iana.org/about/. Accessed 11 Jan 2011.

  25. Internet Corporation for Assigned Names and Numbers. 2011. http://www.icann.org/. Accessed 11 Jan 2011.

  26. Invest India Telecom. 2011. http://www.dot.gov.in/osp/Brochure/Brochure.htm. Accessed 25 Feb 2011.

  27. IT Act of India 2000. 2011. http://www.cyberlawsindia.net/Information-technology-act-of-inida.html. Accessed 4 Feb 2011.

  28. ITU Activities Related to Cybersecurity. 2011. http://www.itu.int/cybersecurity/. Accessed 10 Jan 2011.

  29. The Japanese Bombing of Darwin and Northern Australia. 2010. http://www.cultureandrecreation.gov.au/articles/darwinbombing/. Accessed 30 Dec 2010.

  30. Kerala Police, India. 2011. http://www.keralapolice.org/newsite/hitech_need_cyberlaw.html. Accessed 4 Feb 2011.

  31. Legal Services India. http://www.legalserviceindia.com/cyber/cyber.htmand http://www.legalserviceindia.com/article/l323-Cyber-Crimes-Cyber-Law.html

  32. MOSAIC (Web Browser). 2011. http://en.wikipedia.org/wiki/Mosaic_(web_browser). Accessed 18 Jan 2011.

  33. National Security Science and Technology Branch. 2011. http://www.dpmc.gov.au/nsst/index.cfm. Accessed 10 Jan 2011.

  34. NATO, Wikipedia. 2011. http://en.wikipedia.org/wiki/NATO/. Accessed 17 Jan 2011.

  35. No. 462 Squadron RAAF. 2011. http://en.wikipedia.org/wiki/No._462_Squadron_RAAF. Accessed 5 Jan 2011.

  36. Organisation for Economic Cooperation and Development. 2011. http://www.oecd.org. Accessed 11 Jan 2011.

  37. Packet Switched Network. 2011. http://en.wikipedia.org/wiki/Packetswitched_network. Accessed 14 Jan 2011.

  38. The common criteria recognition arrangement: Purpose of the arrangement. http://www.commoncriteriaportal.org/ccra/. Accessed 11 Jan 2011.

  39. The Information Technology (Amendment) Bill 2006. 2011. https://www.prsindia.org/uploads/media/Information_Technology/1168510210_The_Information_Technology__Amendment__Bill__2006.pdf. Accessed 4 Feb 2011.

  40. TISN for critical infrastructure resilience. http://www.tisn.gov.au/. Accessed 6 Jan 2011.

  41. Uncitral model law. http://www.uncitral.org/. Accessed 4 Feb 2011.

  42. Who we are, Department of the Premier and Cabinet, Queensland. http://www.premiers.qld.gov.au/about-us/who-we-are.aspx. Accessed 17 Jan 2011.

  43. Trusted computer system evaluation criteria. Technical report DoD 5200.28-STD, USA Department of Defense, 26 Dec 1985. (Supersedes CSC-STD-00l-83, dated l5 Aug 83).

    Google Scholar 

  44. ISO 7498-2: 1989 Information processing systems – Open Systems Interconnection – Basic Reference Model – Part 2 Security Architecture. Technical report, International Organization for Standardization, 1989.

    Google Scholar 

  45. History of communications in Australia. 2001. http://www.abs.gov.au/ausstats/abs@.nsf/Previousproducts/1301.0Feature%20Article432001?opendocumenttabname=Summaryprodno=1301.0issue=2001num=view=. Accessed 25 Jan 2011.

  46. (2002). R vs Boden. QCA 164.

    Google Scholar 

  47. SSAC advisory SAC008 DNS distributed denial of service (DDoS) attacks. Technical report, ICANN Security and Stability Advisory Committee, Mar 2006. http://www.icann.org/en/committees/security/dns-ddos-advisory-31mar06.pdf. Accessed 4 Feb 2011.

  48. DNSSEC@ICANN 2008. Signing the root zone: A way forward toward operational readiness. http://icann.org/en/announcements/dnssec-paper-15jul08-en.pdf. Accessed 4 Feb 2011.

  49. Intel plans to tackle cosmic ray threat. 2008. http://news.bbc.co.uk/2/hi/technology/7335322.stm. Accessed 9 Jan 2011.

  50. The Information Technology (Amendment) Act, 2008. 2008. http://www.mit.gov.in/sites/upload_files/dit/files/downloads/itact2000/it_amendment_act2008.pdf. Accessed 4 Feb 2011.

  51. Changing landscape of DDos threats and protection. 2009. http://verisigninc.com/assets/whitepaper-ddos-threats-protection-forrester.pdf. Accessed 23 Feb 2011, March 2009.

  52. United Nations Handbook: 2009–2010: An Annual Guide for those Working with and within the United Nations. United Nations Publications, 308–314.

    Google Scholar 

  53. G with Integrated ADSL2 + Modem DVG834NH. 2010. http://www.netgear.com.au/au/product/routers-and-gateways/3gfemtocells/dvg834nh?gclid=CKuP9OzpzKYCFQHVbgod8VV-Gw. Accessed 18 Jan 2011.

  54. Corporate plan, 2011–2013. 2010. http://www.nbnco.com.au/. Accessed 9 Jan 2011.

  55. (2010, Dec). Critical ICT Infrastructure Protection in India. 2010. cyberlawsindia.blogspot.com/2010/12/critical-ict-infrastructure-protection.html. Accessed 2 Feb 2011. http://cyberlawsinindia.blogspot.com/2011/01/critical-infrastructureprotection-in.html. Cited at 11 Jan 2011.

  56. ICANN’s First DNSSEC Key Ceremony for the Root Zone. 2010. http://www.icann.org/en/announcements/announcement-2-07jun10-en.htm. Accessed 4 Feb 2011.

  57. icode to commence 1 December 2010. http://www.iia.net.au/. Accessed 22 Dec 2010, Oct. 27 10:14 2010.

  58. NEC rewrites the rules for 3G rollout in India. 2010. http://www.nec.com.au/News-Media/Media-Centre/Media-Releases/NEC-rewrites-the-rules-for-3G-rollout-in-India.html. Accessed 4 Jan 2011.

  59. Saraswat: “DRDO working on India’s own computer operating system”. The Hindu, 9 Oct 2010. http://www.thehindu.com/sci-tech/science/article821933.ece. Accessed 25 Feb 2011.

  60. The eighth apec ministerial meeting on the telecommunications and information industry (telmin 8). 2010. http://www.soumu.go.jp/main_content/000087132.pdf. Accessed 23 Feb 2010.

  61. A New Year wish: more digital visionaries. The Australian, 01 Jan 2011. http://www.theaustralian.com.au/news/a-new-year-wish-more-digital-visionaries/story-e6frg6n6-1225979630797. Accessed 1 Jan 2011.

  62. Mondaq IT & Telecoms. 2011. http://www.mondaq.in. Accessed 25 Feb 2011.

  63. Solar energy use in cell towers can reduce co2 emission: Study. 2011. http://www.businessstandard.com/india/news/solar-energy-use-in-cell-towers-can-reduce-co2-emissionstudy/122349/on. Accessed 16 Jan 2011.

  64. The Internet Engineering Task Force. 2011. http://www.ietf.org. Accessed 11 Jan. 2011.

  65. Ahmed, M. 2011. Driving the engine of success. The Australian, 26, 08 Jan 2011.

    Google Scholar 

  66. Alvestrand, H. 2004. A mission statement for the IETF: RFC 3935. Technical report, IETF Network Working Group.

    Google Scholar 

  67. Andreessen, M. 2011. Mosaic – The first global web browser. http://www.livinginternet.com/w/wi_mosaic.htm. Accessed 9 Jan 2011.

  68. APEC Secretariat. 2010. APEC at a glance. "http://publications.apec.org/file-download.php?filename=211_sec_APECatAGlance_F.pdfid=1077. Accessed 23 Feb 2011.

  69. Australian Government. 2006. Denial of service/distributed denial of service MANAGING DoS ATTACKS. http://www.dbcde.gov.au/__data/assets/pdf_file/0011/41312/DoS_Report.pdf. Accessed 23 Feb 2011.

  70. Ball, D. 2008. Australia and cyber-warfare, Chap. 6: An Australian Cyber-warfare Centre, 119–148. ANU, Canberra.

  71. Ballmer, S. 2011. Remarks by Microsoft CEO Steve Ballmer at 2011 International CES Las Vegas, 5 Jan 2011. http://www.microsoft.com/presspass/exec/steve/2011/01-05CES.mspx. Accessed 7 Jan 2011.

  72. Beckstrom, R. 2010. The new internet nation state. Internet Corporation for Assigned Names and Numbers (ICANN) As Prepared for delivery to the United Nations, Department of Economic and Social Affairs, Multi-stakeholder Consultation on Enhanced Cooperation New York. http://www.icann.org/en/presentations/beckstrom-speech-united-nations-14dec10-en.pdf. Accessed 9 Jan 2011.

  73. Broad, W., J. Markoff, and D. Sanger. 2011. Israeli test on worm called crucial in Iran nuclear delay. New York Times. http://www.nytimes.com/2011/01/16/world/middleeast/16stuxnet.html. Accessed 18 Jan. 2011.

  74. BSNL. 2011. Calcutta telephones. http://www.calcutta.bsnl.co.in/history_ctd.shtml. Accessed 25 Feb 2011.

  75. Caelli, W. 2010. Towards the digital city: Information assurance and resilience policy. In Proceedings of the Hong Kong Institute of Engineers (HKIE) Conference “The Way to the Digital City – Sustainable Public Services and Solutions”, Hong Kong – SAR, PRC, 1–2 Nov 2010.

    Google Scholar 

  76. Carpenter, B. 2009. The IETF process: An informal guide. http://www.ietf.org/about/process-docs.html. Accessed 9 Jan 2011, Oct 29 2009.

  77. Carr, J. 2010. Inside cyber warfare: Mapping the cyber underworld. Sebastopol: O’Reilly.

    Google Scholar 

  78. Carr, N. 2009. The big switch: Rewiring the world, from Edison to Google. New York: W.W. Norton & Co.

    Google Scholar 

  79. CCRA. 2011. Common criteria. http://www.commoncriteriaportal.org/. Accessed 23 Feb 2011.

  80. Chabrow, E. 2011. 5 obstacles to infosec reform in 2011 : Some players have changed, but the issues remain the same. GovInfo Security, 7 Jan 2011. http://blogs.govinfosecurity.com/posts.php?postID=844rf=2011-01-10-eg. Accessed 9 Jan 2011.

  81. Christensen, S., W. Caelli, W. Duncan, and E. Georgiades. 2010. An Achilles heel: Denial of service on Australian critical information infrastructure. Information and Communications Technology Law 19(1): 61–85.

    Google Scholar 

  82. CISCO. 2004. Distributed denial of service threats: Risks, mitigation, and best practices. Cisco Systems white paper. https://www.info-point-security.com/open_downloads/alt/cisco_wp_ddos.pdf. Accessed 23 Feb 2011.

  83. Clarke, R. and R.K. Knake. 2010. Cyber war: The next threat to national security and what to do about it. New York: HarperCollins.

    Google Scholar 

  84. CNN. 1998. Heading off an electronic Pearl Harbor. CNN Tech. http://articles.cnn.com/1998-04-06/tech/9804_06_computer.security_1_hackers-national-security-cybercrime?_s=PM:TECH. Accessed 2 Jan 2010.

  85. Creedy, S. and F. Foo. 2010. Virgin brand feeling a bit blue after computer glitch. The Australian, 25, 9 OCtober 2010.

    Google Scholar 

  86. de Villiers, M. 2007. Distributed denial of service: Law technology and policy. Sydney: University of New South Wales, School of Law.

    Google Scholar 

  87. Dudgeon, I. 2008. Australia and cyber-warfare, chapter 4: Targeting Information Infrastructures, 59–83. Canberra: ANU.

    Google Scholar 

  88. Dyer, J.G., M. Lindemann, R. Perez, L. van Doorn, S.W. Smith, and S. Weingart. 2001. Building the IBM 4758 secure coprocessor. IEEE Computer, 57–66, Oct 2001.

    Google Scholar 

  89. Dyson, E. 1997. Release 2.0: A design for living in the digital age. Viking/Penguin.

    Google Scholar 

  90. Evers, J. 2007. New shield foiled Internet backbone attack. http://news.cnet.com/2100-7349_3-6166107.html. Accessed 4 Feb 2011.

  91. Fitzgibbon, J. 2009. Defending Australia in the Asia-Pacific century: Force 2030. Defence white paper. http://www.defence.gov.au/whitepaper/. Accessed 10 Jan. 2011.

  92. Garamone, J. 2010. Cybercom chief details cyberspace defense. http://www.defense.gov/news/newsarticle.aspx?id=60987. Accessed 13 Jan 2011.

  93. Georgiades, E. Crisis on impact: Responding to cyber attacks on critical information infrastructures. In preparation.

    Google Scholar 

  94. Graham, W.R., J.S. Jr. Foster, E. Gjelde, R.J. Hermann, H.M. Kluepfel, R.L. Lawson, G.K. Soper, L.L. Jr. Wood, and J.B. Woodard. 2004. Report of the commission to assess the threat to the United States from electromagnetic pulse (EMP) attack : Volume 1: Executive report. Technical report. http://empcommission.org/docs/empc_exec_rpt.pdf. Accessed 2 Feb 2011.

  95. Hall, E. 2010. Former White House security advisor warns of cyber war. The World Today, ABC Radio National http://www.abc.net.au/worldtoday/content/2010/s3086792.htm. Accessed 7 Dec 2010.

  96. Handley, M. and E. Rescorla. 2006. Internet denial-of-service considerations: RFC 4732. http://tools.ietf.org/html/rfc4732. Accessed 22 Nov 2010.

  97. Harvey, N. 2011. 2010/11/09 – Meeting the cyber challenge. http://www.mod.uk/DefenceInternet/AboutDefence/People/Speeches/MinAF/20101109MeetingTheCyberChallenge.htm. Accessed 4 Jan 2011.

  98. Hilvert, J. 2010. Cybercrime response a win for self-regulation. http://www.itnews.com.au. Accessed 20 Dec 2010.

  99. Hopewell, L. 2011. NBN batteries pose disaster issue: Experts. http://www.zdnet.com.au/nbn-batteries-pose-disaster-issue-experts-339308546.htm. Accessed 13 Jan 2011.

  100. ICANN. 2011. DNSSEC @ ICANN Signing the root zone: A way forward toward operational readiness. http://www.icann.org/en/announcements/dnssec-paper-15jul08-en.pdf. Accessed 23 Feb 2011.

  101. ICT-India. 2011 ICT regulation toolkit. http://www.ictregulationtoolkit.org/en/PracticeNote.1222.html. Accessed 25 Feb 2011.

  102. IndianetZone. 2008. History of Indian telecommunications. http://www.indianetzone.com/42/history_indian_telecommunications.htm. Accessed 25 Feb 2011.

  103. ISO. 2011. Information technology – security techniques – evaluation criteria for it security – part 1: Introduction and general model. http://www.iso.org/iso/iso_catalogue/catalogue_ics/catalogue_detail_ics.htm?csnumber=50341. Cited at 5 Jan 2011.

  104. Jingfei, S. 2009. Solution–Mitigating interference between LTE and 2G/3G networks. Technical report.

    Google Scholar 

  105. Kahn, R. and V. Cerf. 2000. Al Gore and the Internet. http://amsterdam.nettime.org/Lists-Archives/nettime-l-0009/msg00311.html. Accessed 5 Jan 2011.

  106. Kitney, D. 2011. The web whirlwind. The Weekend Australian, 1, 8 Jan 2011.

    Google Scholar 

  107. Koch, C. 1995. Mutable markets. CIO Magazine 9(5): 68–76.

    Google Scholar 

  108. Kramer, F.D., S.H. Starr, and L.K. Wentz, eds. 2009. Cyberpower and national security. Washington, DC: Center for Technology and National Security Policy.

    Google Scholar 

  109. Lemos, R. 2002. Security czar: Button up or get hacked. CNET News. http://news.cnet.com/2100-1001-840335.html. Accessed 31 Dec 2010.

  110. Libicki, M. 2007. Conquest in cyberspace: National security and information warfare. Cambridge: Cambridge University Press.

    Google Scholar 

  111. Loscocco, P. and S. Smalley. 2001. Integrating flexible support for security policies into the Linux operating system. In 2001 USENIX Annual Technical Conference Boston, 25–30 Jun 2001. USENIX.

    Google Scholar 

  112. Lowensohn, J. 2011. Hotmail’s recent message loss hiccup explained. CNET News. http://news.cnet.com/8301-17939_109-20027726-2.html?tag=nl.e776. Accessed 8 Jan 2011. http://news.cnet.com/8301-17939_109-20027726-2.html?tag=nl.e776. Cited at 8 Jan 2011.

  113. Maheshwari, V. 2011. Legal service India.com. http://www.legalserviceindia.com/articles/art222.htm. Accessed 25 Feb 2011.

  114. Mallet, P. (2010, Nov 18). NATO mobilises for cyber warfare. http://www.physorg.com/news/2010-11-nato-mobilises-cyber-warfare.html: Accessed 10 Jan 2011.

  115. Marsh, R.T. 1997. Critical foundations: Protecting America’s infrastructures – The report of the President’s Commission on Critical Infrastructure Protection. Technical report, The White House, Washington, DC. http://www.fas.org/sgp/library/pccip.pdf. Accessed 4 Jan 2011.

  116. Australian War Memorial. 2011. 462 squadron raaf. Australian War Memorial. http://www.awm.gov.au/units/unit_11167.asp. Cited at 5 Jan 2011.

  117. Ohlden, A. 2011. Northrop Grumman opens UK cyber security test range For evaluation of threats on large scale networks. http://www.science20.com/newswire/northrop_grumman_opens_uk_cyber_security_test_range_evaluation_threats_large_scale_networks. Accessed 26 Jan 2011.

  118. Pauli, D. 2010. 2015, the year of cyberwar: Gartner. http://www.zdnet.com.au/2015-the-year-of-cyberwar-gartner-339307693.htm. Accessed 6 Dec 2010.

  119. Perset, K. and S. Paltridge. 2008. The future of the internet economy. Policy brief, OECD. http://www.oecd.org/dataoecd/20/41/40789235.pdf. Accessed 4 Feb 2011.

  120. Preimesberger, C. 2010. 2010 saw the dawn of nation-state cyber wars: Citrix CTO. eWeek. http://www.eweek.com/c/a/Cloud-Computing/2010-Saw-the-Dawn-of-NationState-Cyberwars-Citrix-CTO-430619. Accessed 31 Dec 2010.

  121. Raichaudhuri, R. 2011. “INDIA CALLING” – The rise of the Indian telecommunications industry. http://www.indialawjournal.com/volume2/issue_3/article_by_rohan.html. Accessed 25 Feb 2011.

  122. Rajesh. 2010. India faces disrupted internet service due to undersea cable issue. http://www.tech-exclusive.com/india-faces-disrupted-internet-service-due-to-undersea-cable-issue/. Accessed 22 Feb 2011.

  123. Rattray, G. 2001. Strategic warfare in cyberspace. Cambridge: The MIT Press.

    Google Scholar 

  124. Rudd, K. 2008. Address to Heads of Agencies and members of senior executive service. http://www.apsc.gov.au/media/rudd300408.htm. Accessed 2 Feb 2011.

  125. Rudd, K. and S.M. Krishna. 2011. Australia-India foreign ministers’ framework dialogue. foreignminister.gov.au/releases/2011/kr_mr_110120.html. Accessed 20 Jan 2011.

  126. Rudd, K., S. Smith, W. Hague, and L. Fox. 2011 Australia-United Kingdom ministerial consultations: Joint communiqué; Sydney, 18 Jan. 2011. http://foreignminister.gov.au/releases/2011/kr_mr_110118a.html. Accessed 19 Jan 2011.

  127. Schwartau, W. 1996. Information warfare, 2nd edn. New York: Thunder’s Mouth Press.

    Google Scholar 

  128. Singh, H., A. Soni, and R. Kathuria. 2003. Telecom policy reform in India, chapter 4. World Bank and Oxford University Press.

    Google Scholar 

  129. Stanley, P. 2002. Remembering 1942: The bombing of Darwin, 19 February 1942. Australian War Memorial presentation. http://www.awm.gov.au/atwar/remembering1942/darwin/transcript.asp. Accessed 3 Feb 2011.

  130. Thompson, R. 2010. The sun in action. http://www.ips.gov.au/Educational/2/1/1. Accessed 9 Jan 2011.

  131. TRAI. 2011. Telecom Regulatory Authority of India. http://www.trai.gov.in/Default.asp. Accessed 25 Feb 2011.

  132. TRAI. 1999. New telecom policy 1999. http://www.trai.gov.in/TelecomPolicy_ntp99.asp. Accessed 25 Feb 2011.

  133. Vixie, P. 2002. Securing the edge. http://www.icann.org/en/committees/security/sac004.txt. Accessed 4 Feb 2011.

  134. Waters, G., D. Ball, and I. Dudgeon. 2008. Australia and cyber-warfare. Canberra: ANU Press.

    Google Scholar 

  135. Westervelt, R. 2011. IBM predicts rising mobile threats, critical infrastructure attacks in 2011. http://searchsecurity.techtarget.com/news/article/0,289142,sid14_gci1525624,00.html?track=NL-102ad=806829asrc=EM_NLN_13112830uid=5074973. Accessed 4 Jan 2011.

  136. Wikipedia. 2011. Public call office. http://en.wikipedia.org/wiki/Public_call_office. Accessed 25 Feb 2011.

  137. Wikipedia. 2011. Tandem Computers Inc. Wikipedia. http://en.wikipedia.org/wiki/Tandem_Computers. Cited at 5 Jan 2011.

  138. Wingfield, T. 2009. Cyberpower and national security, Chapter 22: International law and information operations. National Defense University Press.

    Google Scholar 

  139. Zakaria, F. 2008. The post American world. New York: W.W. Norton & Company.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to W. J. Caelli .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer India Pvt. Ltd.

About this chapter

Cite this chapter

Caelli, W.J., Raghavan, S.V., Bhaskar, S.M., Georgiades, J. (2011). Policy and Law: Denial of Service Threat. In: Raghavan, S., Dawson, E. (eds) An Investigation into the Detection and Mitigation of Denial of Service (DoS) Attacks. Springer, India. https://doi.org/10.1007/978-81-322-0277-6_3

Download citation

  • DOI: https://doi.org/10.1007/978-81-322-0277-6_3

  • Published:

  • Publisher Name: Springer, India

  • Print ISBN: 978-81-322-0276-9

  • Online ISBN: 978-81-322-0277-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics