Art08-网络战背景下的网络中立

ID:23705

大小:1.94 MB

页数:20页

时间:2022-11-29

金币:15

上传者:战必胜
139
Net Neutrality in the
Context of Cyber Warfare
Abstract: Real or potential connections between infrastructure of different security
levels, from relatively unprotected individual users up to interfaces with critical
national infrastructure, have made cyberspace a highly contested and congested
domain. But operating conditions within this domain strongly favour malicious
actors over legitimate operators seeking to provide security and protect systems and
information. Technical capabilities to establish dominance and cause damage in this
domain are widely distributed, but legal and ethical constraints prevent legitimate
actors from using them to their full potential.
Within this context, net neutrality presents a limiting factor on the capability of legitimate
actors to respond to harmful activity in cyberspace whose common aim is to install and
uphold a technical imbalance. Under the principle of net neutrality, each data packet
must be transmitted with equal priority, irrespective of its source, destination, content
or purpose. This is disadvantageous to cyber defence. Comparisons to jungle or arctic
warfare, where operating conditions are neutral and degrade the performance of each
combatant side equally, are invalid, as malicious operators are capable of technically
manipulating data trafc to their favour. While both malicious and legitimate actors
may have comparable capabilities, legitimate actors are bound to legal and political
restrictions, making them immobile in several cyber warfare scenarios. Transferring
the principles of net neutrality to real life scenarios corresponds to depriving military,
police and emergency operators from any privilege that allows them to respond to an
incident – in effect, depriving them of their blue lights and emergency powers even in
severe incidents targeting critical infrastructure that may threaten civilian lives.
This paper investigates the potential opportunities and challenges of an adjustment
to the principle of net neutrality to facilitate defensive action by legitimate actors;
how this adjustment could contribute to regaining control in congested cyber domains
Kim Hartmann
Conict Studies Research Centre
Oxford, United Kingdom
kim.hartmann@conictstudies.org.uk
Keir Giles
Conict Studies Research Centre
Oxford, United Kingdom
keir.giles@conictstudies.org.uk
2018 10th International Conference on Cyber Conict
CyCon X: Maximising Eects
T. Minárik, R. Jakschis, L. Lindström (Eds.)
2018 © NATO CCD COE Publications, Tallinn
Permission to make digital or hard copies of this publication for internal
use within NATO and for personal or educational use when for non-prot or
non-commercial purposes is granted providing that copies bear this notice
and a full citation on the rst page. Any other reproduction or transmission
requires prior written permission by NATO CCD COE.
资源描述:

当前文档最多预览五页,下载文档查看全文

此文档下载收益归作者所有

当前文档最多预览五页,下载文档查看全文
温馨提示:
1. 部分包含数学公式或PPT动画的文件,查看预览时可能会显示错乱或异常,文件下载后无此问题,请放心下载。
2. 本文档由用户上传,版权归属用户,天天文库负责整理代发布。如果您对本文档版权有争议请及时联系客服。
3. 下载前请仔细阅读文档内容,确认文档内容符合您的需求后进行下载,若出现内容与标题不符可向本站投诉处理。
4. 下载文档时可能由于网络波动等原因无法下载或下载错误,付费完成后未能成功下载的用户请联系客服处理。
关闭