Art06-从网络间谍活动中得出推论

ID:23703

大小:1.93 MB

页数:14页

时间:2022-11-29

金币:15

上传者:战必胜
109
Drawing Inferences from
Cyber Espionage
Abstract: To survive a confrontation, it helps to understand other side’s capabilities
and intensions. Estimates of opposing capabilities rest on an empirical basis but
understanding the other side’s intentions is inferred from words and deeds.
Therein lies a dilemma common across all military domains: acts to alter the balance
of a confrontation can also shape the inferences that the other side draws about one’s
intentions. The dilemma also operates in cyberspace, but in unique ways.
First, efforts by one side to acquire information on the other can be read by the other
side as preparations for a cyber attack prefatory to a military attack.
Second, others may draw inferences from the fact of cyber espionage alone, even
though the basis for believing in a cyber security dilemma is weak.
Third, there are ways of carrying out cyber espionage that can mitigate inferences
that others draw about the imminence of cyber attack by, for example, limiting which
components within a network are targeted for eavesdropping or by using penetration
methods that do not leave arbitrary code behind.
Fourth, defenders themselves can also modulate their reactions in ways that limit
drawing unnecessary inferences.
Fifth, expectations of how well modulating cyber espionage can convey peaceful
intentions should be very modest.
All these are complicated by difculties in the target’s ascertaining a penetration’s
date, characterization, and authorship. We conclude with a call for those who would
penetrate military-related systems to think about the inferences that the other side may
draw if such penetrations are discovered.
Keywords: cyber espionage, cyber attack, signaling
Martin C. Libicki
Center for Cyber Security Studies
U.S. Naval Academy
Annapolis, MD, United States
libicki@usna.edu; libmazo@gmail.com
2018 10th International Conference on Cyber Conict
CyCon X: Maximising Eects
T. Minárik, R. Jakschis, L. Lindström (Eds.)
2018 © NATO CCD COE Publications, Tallinn
Permission to make digital or hard copies of this publication for internal
use within NATO and for personal or educational use when for non-prot or
non-commercial purposes is granted providing that copies bear this notice
and a full citation on the rst page. Any other reproduction or transmission
requires prior written permission by NATO CCD COE.
资源描述:

当前文档最多预览五页,下载文档查看全文

此文档下载收益归作者所有

当前文档最多预览五页,下载文档查看全文
温馨提示:
1. 部分包含数学公式或PPT动画的文件,查看预览时可能会显示错乱或异常,文件下载后无此问题,请放心下载。
2. 本文档由用户上传,版权归属用户,天天文库负责整理代发布。如果您对本文档版权有争议请及时联系客服。
3. 下载前请仔细阅读文档内容,确认文档内容符合您的需求后进行下载,若出现内容与标题不符可向本站投诉处理。
4. 下载文档时可能由于网络波动等原因无法下载或下载错误,付费完成后未能成功下载的用户请联系客服处理。
关闭