Art05-瞄准技术,绘制军事进攻网络作战地图

ID:23696

大小:1.98 MB

页数:20页

时间:2022-11-29

金币:15

上传者:战必胜
89
Targeting Technology:
Mapping Military Oensive
Network Operations
Abstract: State-sponsored network intrusions are publicly and frequently exposed
but assessing how militaries conduct offensive network operations remains difcult.
Data can be transmitted near-instantaneously, yet cyber-attacks can take months or
even years to mature, complicating attempts to integrate them into joint operations.
What challenges, risks, opportunities and advantages are associated with attacking
networks? This paper argues that military offensive network operations can be usefully
cast into a two-part taxonomy: event-based attacks and presence-based attacks. These
are then applied to practical use-cases drawn from existing strategies, case studies
and current military platforms. Event-based operations include all instances in which
the target is directly and in real time attacked by compromise of its software and may
appear roughly analogous to physical weapons. Presence-based operations include
all network intrusions in which the attackers traverse compromised networks until
targets are located, assessed, and weaponized for later activation, more analogous to
a clandestine sabotage operation. Distinguishing between these two types is crucial;
they offer different solutions, encompass varying risks, and may require different
resources to accomplish. Event-based attacks can offer a tactical advantage against
a single adversary platform or network. A successful presence-based operation may
result in a strategic advantage against a stronger force. Each of the two operation types
is broken into phases as dened by the US Department of Defense Common Cyber
Threat Framework. The model envisions four steps in the network operation life-
cycle: preparation, engagement, presence and effect. By anchoring the assessment
using the framework, the unique characteristics of both operation types become easier
to analyze.
Keywords: cyber warfare, network operations, cyber attacks, offensive cyber
Daniel Moore
Department of War Studies
King’s College London
London, United Kingdom
daniel.d.moore@kcl.ac.uk
2018 10th International Conference on Cyber Conict
CyCon X: Maximising Eects
T. Minárik, R. Jakschis, L. Lindström (Eds.)
2018 © NATO CCD COE Publications, Tallinn
Permission to make digital or hard copies of this publication for internal
use within NATO and for personal or educational use when for non-prot or
non-commercial purposes is granted providing that copies bear this notice
and a full citation on the rst page. Any other reproduction or transmission
requires prior written permission by NATO CCD COE.
资源描述:

当前文档最多预览五页,下载文档查看全文

此文档下载收益归作者所有

当前文档最多预览五页,下载文档查看全文
温馨提示:
1. 部分包含数学公式或PPT动画的文件,查看预览时可能会显示错乱或异常,文件下载后无此问题,请放心下载。
2. 本文档由用户上传,版权归属用户,天天文库负责整理代发布。如果您对本文档版权有争议请及时联系客服。
3. 下载前请仔细阅读文档内容,确认文档内容符合您的需求后进行下载,若出现内容与标题不符可向本站投诉处理。
4. 下载文档时可能由于网络波动等原因无法下载或下载错误,付费完成后未能成功下载的用户请联系客服处理。
关闭