Staring Down the Digital Fulda Gap Path Dependency as a Cyber Defense
Vulnerability
- URL: http://arxiv.org/abs/2112.02773v1
- Date: Mon, 6 Dec 2021 04:05:48 GMT
- Title: Staring Down the Digital Fulda Gap Path Dependency as a Cyber Defense
Vulnerability
- Authors: Jan Kallberg
- Abstract summary: The U.S. reaction to Sept. 11, and any attack on U.S. soil, hint to an adversary that attacking critical infrastructure to create hardship for the population could work contrary to the intended softening of the will to resist foreign influence.
We cannot rule out attacks that affect the general population, but there are not enough adversarial offensive capabilities to attack all 16 critical infrastructure sectors and gain strategic momentum.
- Score: 0.0
- License: http://creativecommons.org/licenses/by/4.0/
- Abstract: Academia, homeland security, defense, and media have accepted the perception
that critical infrastructure in a future cyber war cyber conflict is the main
gateway for a massive cyber assault on the U.S. The question is not if the
assumption is correct or not, the question is instead of how did we arrive at
that assumption. The cyber paradigm considers critical infrastructure the
primary attack vector for future cyber conflicts. The national vulnerability
embedded in critical infrastructure is given a position in the cyber discourse
as close to an unquestionable truth as a natural law.
The American reaction to Sept. 11, and any attack on U.S. soil, hint to an
adversary that attacking critical infrastructure to create hardship for the
population could work contrary to the intended softening of the will to resist
foreign influence. It is more likely that attacks that affect the general
population instead strengthen the will to resist and fight, similar to the
British reaction to the German bombing campaign Blitzen in 1940. We cannot rule
out attacks that affect the general population, but there are not enough
adversarial offensive capabilities to attack all 16 critical infrastructure
sectors and gain strategic momentum. An adversary has limited cyberattack
capabilities and needs to prioritize cyber targets that are aligned with the
overall strategy. Logically, an adversary will focus their OCO on operations
that has national security implications and support their military operations
by denying, degrading, and confusing the U.S. information environment and U.S.
cyber assets.
Related papers
- An In-depth Analysis of a Nation-Sponsored Attack: Case Study and Cybersecurity Insights [0.0]
Nation-sponsored cyberattacks pose a significant threat to national security.
One of the most impactful cyber threats affecting South Korea's banking sector and infrastructure was the Dark Seoul cyberattack.
Believed to have been orchestrated by North Korean state-sponsored hackers, the attack caused widespread disruption.
arXiv Detail & Related papers (2024-09-28T00:47:38Z) - Handling Pandemic-Scale Cyber Threats: Lessons from COVID-19 [1.2354076490479515]
We analyze six critical lessons from COVID-19, outlining key considerations for successful preparedness.
We emphasize the need for developing similar doctrine and skill sets for cyber threats.
arXiv Detail & Related papers (2024-08-15T20:59:23Z) - Physical Adversarial Attack meets Computer Vision: A Decade Survey [57.46379460600939]
This paper presents a comprehensive overview of physical adversarial attacks.
We take the first step to systematically evaluate the performance of physical adversarial attacks.
Our proposed evaluation metric, hiPAA, comprises six perspectives.
arXiv Detail & Related papers (2022-09-30T01:59:53Z) - Fixed Points in Cyber Space: Rethinking Optimal Evasion Attacks in the
Age of AI-NIDS [70.60975663021952]
We study blackbox adversarial attacks on network classifiers.
We argue that attacker-defender fixed points are themselves general-sum games with complex phase transitions.
We show that a continual learning approach is required to study attacker-defender dynamics.
arXiv Detail & Related papers (2021-11-23T23:42:16Z) - The Feasibility and Inevitability of Stealth Attacks [63.14766152741211]
We study new adversarial perturbations that enable an attacker to gain control over decisions in generic Artificial Intelligence systems.
In contrast to adversarial data modification, the attack mechanism we consider here involves alterations to the AI system itself.
arXiv Detail & Related papers (2021-06-26T10:50:07Z) - A Review on Cyber Crimes on the Internet of Things [4.207621961895129]
The global cybercrime damages predicted to cost up to 6 trillion dollars annually on the global economy by cyber crime.
The reasons for cyber-attacks can be Countries having week cyber securities, Cybercriminals use new technologies to attack.
MSP (Managed Service Providers) face different difficulties in fighting with Cyber-crime.
arXiv Detail & Related papers (2020-09-12T02:56:59Z) - Measurement-driven Security Analysis of Imperceptible Impersonation
Attacks [54.727945432381716]
We study the exploitability of Deep Neural Network-based Face Recognition systems.
We show that factors such as skin color, gender, and age, impact the ability to carry out an attack on a specific target victim.
We also study the feasibility of constructing universal attacks that are robust to different poses or views of the attacker's face.
arXiv Detail & Related papers (2020-08-26T19:27:27Z) - Revisiting Strategic Cyberwar Theory Reaching Decisive Strategic Outcome [0.0]
This article will present a theory, strategic cyberwar theory, that states that the utility of strategic cyberwar is tied to the likelihood of institutional instability in the targeted nation.
In an ideal scenario, the cyber attacks are systematically attacking the targeted adversary institutions triggering the dormant entropy embedded in a nation with weak institutions.
The current alternative to strategic cyberwar theory is to unsystematically attack the adversary with cyber attacks where exploitation opportunities occur, which is likely to degrade parts of the information infrastructure, but it will not reach any strategic goals.
arXiv Detail & Related papers (2020-07-16T20:44:43Z) - Adversarial Machine Learning Attacks and Defense Methods in the Cyber
Security Domain [58.30296637276011]
This paper summarizes the latest research on adversarial attacks against security solutions based on machine learning techniques.
It is the first to discuss the unique challenges of implementing end-to-end adversarial attacks in the cyber security domain.
arXiv Detail & Related papers (2020-07-05T18:22:40Z) - Cyber Security in the Age of COVID-19: A Timeline and Analysis of
Cyber-Crime and Cyber-Attacks during the Pandemic [2.9555437538581053]
This paper analyses the COVID-19 pandemic from a cyber-crime perspective.
It highlights the range of cyber-attacks experienced globally during the pandemic.
arXiv Detail & Related papers (2020-06-21T22:53:47Z) - Deflecting Adversarial Attacks [94.85315681223702]
We present a new approach towards ending this cycle where we "deflect" adversarial attacks by causing the attacker to produce an input that resembles the attack's target class.
We first propose a stronger defense based on Capsule Networks that combines three detection mechanisms to achieve state-of-the-art detection performance.
arXiv Detail & Related papers (2020-02-18T06:59:13Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.