Towards Reversible Cyberattacks
Rowe, Neil C.
MetadataShow full item record
Warfare without damage has always been a dream of military planners. Traditional warfare usually leaves persistent side effects in the form of dead and injured people and damaged infrastructure. An appealing feature of cyberwarfare is that it could be more ethical than traditional warfare because its damage could be less and more easily repairable. Damage to data and programs (albeit not physical hardware) can be repaired by rewriting over damaged bits with correct data. However, there are practical difficulties in ensuring that cyberattacks minimize unreversible collateral damage while still being easily repairable by the attacker and not by the victim. We discuss four techniques by which cyberattacks can be potentially reversible. One technique is reversible cryptography, where the attacker encrypts data or programs to prevent their use, then decrypts them after hostilities have ceased. A second technique is to obfuscate the victim's computer systems in a reversible way. A third technique to withhold key data from the victim, while caching it to enable quick restoration on cessation of hostilities. A fourth technique is to deceive the victim so that think they mistakenly think they are being hurt, then reveal the deception at the conclusion of hostilities. We also discuss incentives to use reversible attacks such as legality, better proportionality, lower reparations, and easier ability to use third parties. As an example, we discuss aspects of the recent cyberattacks on Georgia.
This paper appeared in the Proceedings of the 9th European Conference on Information Warfare and Security, July 2010, Thessaloniki, Greece.
Showing items related by title, author, creator and subject.
Evans, Paul James (Monterey, California: Naval Postgraduate School, 2014-06);We consider a game played between a state sponsor of international terrorism, a terrorist organization and the victim of a terrorist attack. The state sponsor wishes to inflict as much damage to the victim as possible ...
Naval Postgraduate School Physics (2015);Magnetic Force on a current carrying wire Hi. I’m Dr. Bruce Denardo here in the Physics Department of the Naval Postgraduate School in Monterey, California. In another video, we demonstrated the fundamental magnetic force ...
Tien, Too Huseh (Monterey, California: Naval Postgraduate School, 2012-09);The increasingly important role of Long Term Evolution (LTE) has increased security concerns among the service provider and end users and made security of the network even more indispensable. In this thesis, the LTE ...