By Topic

2011 3rd International Conference on Cyber Conflict

7-10 June 2011

Filter Results

Displaying Results 1 - 22 of 22
  • [Title page]

    Publication Year: 2011, Page(s): 1
    IEEE is not the copyright holder of this material | PDF file iconPDF (66 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2011, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (260 KB)
    Freely Available from IEEE
  • Foreword

    Publication Year: 2011, Page(s):1 - 2
    IEEE is not the copyright holder of this material | PDF file iconPDF (143 KB)
    Freely Available from IEEE
  • ICCC 2011 list of papers

    Publication Year: 2011, Page(s):1 - 2
    IEEE is not the copyright holder of this material | PDF file iconPDF (387 KB)
    Freely Available from IEEE
  • About the NATO CCD COE

    Publication Year: 2011, Page(s): 1
    IEEE is not the copyright holder of this material | PDF file iconPDF (95 KB)
    Freely Available from IEEE
  • ICCC 2011 programme committee

    Publication Year: 2011, Page(s):1 - 2
    IEEE is not the copyright holder of this material | PDF file iconPDF (260 KB)
    Freely Available from IEEE
  • 3rd international conference on cyber conflict sponsors

    Publication Year: 2011, Page(s): 1
    IEEE is not the copyright holder of this material | PDF file iconPDF (150 KB)
    Freely Available from IEEE
  • Biographies of contributors

    Publication Year: 2011, Page(s):1 - 5
    IEEE is not the copyright holder of this material | PDF file iconPDF (209 KB)
    Freely Available from IEEE
  • Conscription and cyber conflict: Legal issues

    Publication Year: 2011, Page(s):1 - 12
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (398 KB) | HTML iconHTML

    This paper examines legal issues that could arise from utilizing a civilian cyber defense corps to defend a nation-state and its assets from cyber attacks. We use Estonia's Cyber Defense League as an analytical device, and we examine issues that may arise under the CDL as it is currently configured and as it might be configured. Our analysis focuses on ten specific issues. We argue that the nature... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Cyber security on military deployed networks

    Publication Year: 2011, Page(s):1 - 15
    Cited by:  Papers (1)
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (506 KB) | HTML iconHTML

    This paper reports on real information leakage occurred in a multinational mission. To investigate the nature of the leakage, we performed a survey among the military operators which showed that technical and cultural problems were key elements of the security shortfall. We also show that military deployed networks present some peculiarities with respect to infrastructure homeland networks. Theref... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Developing an international cooperation on cyber defense and deterrence against Cyber terrorism

    Publication Year: 2011, Page(s):1 - 15
    Cited by:  Papers (4)
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (449 KB) | HTML iconHTML

    Information Technology (IT) security is a growing concern for governments around the world. Cyber terrorism poses a direct threat to the security of the nations' critical infrastructures and ITs as a low-cost asymmetric warfare element. Most of these nations are aware of the vulnerability of the information technologies and the significance of protecting critical infrastructures. To counteract the... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • “Information Troops” - A Russian Cyber Command?

    Publication Year: 2011, Page(s):1 - 16
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (531 KB) | HTML iconHTML

    Appraisals of Russian military performance during the armed conflict with Georgia in August 2008 noted, among other deficiencies, poor performance in Information Warfare (IW). This led to calls in informed commentary for the creation of dedicated "Information Troops" within the Russian armed forces, whose duties would include what we would define as cyber operations. This stemmed from a perception... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Is the Swedish Territorial Defence Ordinance applicable on the fourth arena?

    Publication Year: 2011, Page(s):1 - 9
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (463 KB) | HTML iconHTML

    Like other modern societies, Sweden is highly dependent on its digital infrastructure in order to run vital functions such as electricity, water purification, information and communications. Even though this infrastructure is characterized by transboundary features, it is clearly a part of the Swedish state. In peacetime, the Swedish armed forces are tasked to protect and defend the geographic ter... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Rationale and blueprint for a cyber Red Team Within NATO: An essential component of the alliance's cyber forces

    Publication Year: 2011, Page(s):1 - 16
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (796 KB) | HTML iconHTML

    This paper provides the rationale and blueprint for a “cyber red team”, a dedicated military capability whose objective is to improve the cyber defence of the Alliance through the controlled execution of cyber attacks. These cyber attacks would be specifically designed to achieve three goals. The first goal is to assess the effectiveness of the existing security measures in providing... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Towards establishment of cyberspace deterrence strategy

    Publication Year: 2011, Page(s):1 - 8
    Cited by:  Papers (2)
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (262 KB) | HTML iconHTML

    The question of whether strategic deterrence in cyberspace is achievable given the challenges of detection, attribution and credible retaliation is a topic of contention among military and civilian defense strategists. This paper examines the traditional strategic deterrence theory and its application to deterrence in cyberspace (the newly defined 5th battlespace domain, following land, air, sea a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Artificial intelligence in cyber defense

    Publication Year: 2011, Page(s):1 - 11
    Cited by:  Papers (1)
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (467 KB) | HTML iconHTML

    The speed of processes and the amount of data to be used in defending the cyber space cannot be handled by humans without considerable automation. However, it is difficult to develop software with conventional fixed algorithms (hard-wired logic on decision making level) for effectively defending against the dynamically evolving attacks in networks. This situation can be handled by applying methods... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On the arms race around botnets - Setting up and taking down botnets

    Publication Year: 2011, Page(s):1 - 14
    Cited by:  Papers (1)
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (416 KB) | HTML iconHTML

    Botnets are a well-recognized and persistent threat to all users of the Internet. Since the first specimens were seen two decades ago, botnets have developed form a subject of curiosity to highly sophisticated instruments for illegally earning money. In parallel, an underground economy has developed which creates hundreds of millions of euros per year in revenue with spamming, information theft, b... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Preserving organizational privacy in intrusion detection log sharing

    Publication Year: 2011, Page(s):1 - 14
    Cited by:  Papers (1)
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (753 KB) | HTML iconHTML

    This paper presents a privacy-preserving framework for organizations that need to share their logs of intrusion detection systems with a centralized intrusion log management center. This centralized center may be an outsourced company that provides an intrusion detection management service to organizations or a system of the National Computer Emergency Response Team that probes the attacks targeti... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Requirements for a future EWS - Cyber Defence in the internet of the future

    Publication Year: 2011, Page(s):1 - 16
    Cited by:  Papers (5)
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (1411 KB) | HTML iconHTML

    The emergence of new technologies and services as well as trillions of devices and petabytes of data to be processed and transferred in the Internet of the Future mean that we have to deal with new threats and vulnerabilities, in addition to handle the remaining old ones. Together with the rise of Cyber Warfare and the resulting impact on the environment means that we have to bring intelligence ba... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Towards next-generation Intrusion Detection

    Publication Year: 2011, Page(s):1 - 18
    Cited by:  Papers (2)
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (668 KB) | HTML iconHTML

    Today, Intrusion Detection Systems (IDS) are integral components of larger networks. Even so, security incidents are on a day-to-day basis: Numerous data leakage scandals arouse public interest in the recent past and also other attacks like Stuxnet are discussed in the general public. On the one side, the commercial success of the Internet and the possibilities to carry out attacks from a relative... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Using a novel behavioral stimuli-response framework to Defend against Adversarial Cyberspace Participants

    Publication Year: 2011, Page(s):1 - 16
    Cited by:  Papers (1)
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (916 KB) | HTML iconHTML

    Autonomous Baiting, Control and Deception of Adversarial Cyberspace Participants (ABCD-ACP) is an experimental defensive framework against potentially adversarial cyberspace participants, such as malicious software and subversive insiders. By deploying fake targets (called baits/stimuli) onto a virtualized environment, the framework seeks to probabilistically identify suspicious participants throu... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • List of authors

    Publication Year: 2011, Page(s): 1
    IEEE is not the copyright holder of this material | PDF file iconPDF (295 KB)
    Freely Available from IEEE