DocumentCode :
624829
Title :
A control measure framework to limit collateral damage and propagation of cyber weapons
Author :
Raymond, David ; Conti, Gregory ; Cross, Tom ; Fanelli, Robert
Author_Institution :
United States Mil. Acad., West Point, NY, USA
fYear :
2013
fDate :
4-7 June 2013
Firstpage :
1
Lastpage :
16
Abstract :
With the recognition of cyberspace as a warfighting domain by the U.S. Department of Defense, we anticipate increased use of malicious software as weapons during hostilities between nation-states. Such conflict could occur solely on computer networks, but increasingly will be used in conjunction with traditional kinetic attack, or even to eliminate the need for kinetic attack. In either context, precise targeting and effective limiting of collateral damage from cyber weaponry are desired goals of any nation seeking to comply with the law of war. Since at least the Morris Worm, malicious software found in the wild has frequently contained mechanisms to target effectively, limit propagation, allow self-destruction, and minimize consumption of host resources to prevent detection and damage. This paper surveys major variants of malicious software from 1982 to present and synthesizes the control measures they contain that might limit collateral damage in future cyber weapons. As part of this work, we provide a framework for critical analysis of such measures. Our results indicate that a compelling framework for critical analysis emerges by studying these measures allowing classification of new forms of malware and providing insight into future novel technical mechanisms for limiting collateral damage.
Keywords :
computer network security; invasive software; military computing; weapons; Morris worm; collateral damage; computer network; control measure framework; cyber weapon propagation; cyber weaponry; damage prevention; detection prevention; kinetic attack; malicious software; warfighting domain; weapons; Cyberspace; Grippers; Malware; Military computing; Software; Weapons; collateral damage; cyber operations; law of armed conflict; malware controls;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Cyber Conflict (CyCon), 2013 5th International Conference on
Conference_Location :
Tallinn
ISSN :
2325-5366
Print_ISBN :
978-1-4799-0450-1
Type :
conf
Filename :
6568377
Link To Document :
بازگشت