Cyberwar Strategy and Tactics: An Analysis of Cyber Goals, Strategies, Tactics, and Techniques
- URL: http://arxiv.org/abs/2406.00496v1
- Date: Sat, 1 Jun 2024 16:52:37 GMT
- Title: Cyberwar Strategy and Tactics: An Analysis of Cyber Goals, Strategies, Tactics, and Techniques
- Authors: Laura S. Tinnel, O. Sami Saydjari, Dave Farrell,
- Abstract summary: A Cyberwar Playbook is an encoding of knowledge on how to effectively handle a variety of cyberwar situations.
It takes a troubleshooting approach and defines the cyber tactics, techniques and procedures one may employ to counter or avert cyber-based attacks.
- Score: 0.0
- License: http://creativecommons.org/licenses/by-sa/4.0/
- Abstract: Cyberwar strategy and tactics today are primitive and ad-hoc, resulting in an ineffective and reactive cyber fighting force. A Cyberwar Playbook is an encoding of knowledge on how to effectively handle a variety of cyberwar situations. It takes a troubleshooting approach and defines the cyber tactics, techniques and procedures one may employ to counter or avert cyber-based attacks. It provides focus and clarity in time of chaos allowing a clear path of response to be chosen.
Related papers
- Towards Type Agnostic Cyber Defense Agents [0.0]
Cyber threats have continued to grow, leading to labor shortages and a skills gap in cybersecurity.
Many cybersecurity product vendors and security organizations have looked to artificial intelligence to shore up their defenses.
This work considers how to characterize attackers and defenders in one approach to the automation of cyber defense.
arXiv Detail & Related papers (2024-12-02T14:32:18Z) - Countering Autonomous Cyber Threats [40.00865970939829]
Foundation Models present dual-use concerns broadly and within the cyber domain specifically.
Recent research has shown the potential for these advanced models to inform or independently execute offensive cyberspace operations.
This work evaluates several state-of-the-art FMs on their ability to compromise machines in an isolated network and investigates defensive mechanisms to defeat such AI-powered attacks.
arXiv Detail & Related papers (2024-10-23T22:46:44Z) - Analysing India's Cyber Warfare Readiness and Developing a Defence Strategy [0.0]
The demand for strong cyber defence measures grows, especially in countries such as India.
The literature review reveals significant shortcomings in India's cyber defence readiness.
The study proposes an educational framework for training cyber professionals.
arXiv Detail & Related papers (2024-06-18T12:55:07Z) - Use of Graph Neural Networks in Aiding Defensive Cyber Operations [2.1874189959020427]
Graph Neural Networks have emerged as a promising approach for enhancing the effectiveness of defensive measures.
We look into the application of GNNs in aiding to break each stage of one of the most renowned attack life cycles, the Lockheed Martin Cyber Kill Chain.
arXiv Detail & Related papers (2024-01-11T05:56:29Z) - A Serious Game for Simulating Cyberattacks to Teach Cybersecurity [0.3149883354098941]
Traditional training methods have proven to be less effective over time.
In this paper we suggest an alternative approach -- a serious game.
Our game explains the intention of each attack and shows the consequences of a successful attack.
arXiv Detail & Related papers (2023-05-04T08:04:24Z) - Graph Mining for Cybersecurity: A Survey [61.505995908021525]
The explosive growth of cyber attacks nowadays, such as malware, spam, and intrusions, caused severe consequences on society.
Traditional Machine Learning (ML) based methods are extensively used in detecting cyber threats, but they hardly model the correlations between real-world cyber entities.
With the proliferation of graph mining techniques, many researchers investigated these techniques for capturing correlations between cyber entities and achieving high performance.
arXiv Detail & Related papers (2023-04-02T08:43:03Z) - Towards Automated Classification of Attackers' TTPs by combining NLP
with ML Techniques [77.34726150561087]
We evaluate and compare different Natural Language Processing (NLP) and machine learning techniques used for security information extraction in research.
Based on our investigations we propose a data processing pipeline that automatically classifies unstructured text according to attackers' tactics and techniques.
arXiv Detail & Related papers (2022-07-18T09:59:21Z) - Proceedings of the Artificial Intelligence for Cyber Security (AICS)
Workshop at AAAI 2022 [55.573187938617636]
The workshop will focus on the application of AI to problems in cyber security.
Cyber systems generate large volumes of data, utilizing this effectively is beyond human capabilities.
arXiv Detail & Related papers (2022-02-28T18:27:41Z) - Fixed Points in Cyber Space: Rethinking Optimal Evasion Attacks in the
Age of AI-NIDS [70.60975663021952]
We study blackbox adversarial attacks on network classifiers.
We argue that attacker-defender fixed points are themselves general-sum games with complex phase transitions.
We show that a continual learning approach is required to study attacker-defender dynamics.
arXiv Detail & Related papers (2021-11-23T23:42:16Z) - Revisiting Strategic Cyberwar Theory Reaching Decisive Strategic Outcome [0.0]
This article will present a theory, strategic cyberwar theory, that states that the utility of strategic cyberwar is tied to the likelihood of institutional instability in the targeted nation.
In an ideal scenario, the cyber attacks are systematically attacking the targeted adversary institutions triggering the dormant entropy embedded in a nation with weak institutions.
The current alternative to strategic cyberwar theory is to unsystematically attack the adversary with cyber attacks where exploitation opportunities occur, which is likely to degrade parts of the information infrastructure, but it will not reach any strategic goals.
arXiv Detail & Related papers (2020-07-16T20:44:43Z) - Adversarial Machine Learning Attacks and Defense Methods in the Cyber
Security Domain [58.30296637276011]
This paper summarizes the latest research on adversarial attacks against security solutions based on machine learning techniques.
It is the first to discuss the unique challenges of implementing end-to-end adversarial attacks in the cyber security domain.
arXiv Detail & Related papers (2020-07-05T18:22:40Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.