Cyberwarfare

14,000,000 Leading Edge Experts on the ideXlab platform

Scan Science and Technology

Contact Leading Edge Experts & Companies

Scan Science and Technology

Contact Leading Edge Experts & Companies

The Experts below are selected from a list of 933 Experts worldwide ranked by ideXlab platform

Steven Lafountain - One of the best experts on this subject based on the ideXlab platform.

  • introduction to Cyberwarfare offensive and defensive software technologies minitrack
    Hawaii International Conference on System Sciences, 2015
    Co-Authors: Brian Hay, Steven Lafountain
    Abstract:

    This new Minitrack, Cyberwarfare:  Offensive and Defensive Software Technologies, is intended to bring together technical and non-technical Cyberwarfare researchers, academics, and practitioners in related fields to discuss the mechanics and implications of offensive and defensive Cyberwarfare activities.  While the breadth of this field is extensive, the focus topics for the inaugural offering of this minitrack include offensive and defensive technologies and capabilities, impacts of Cyberwarfare, information warfare, collateral damage from related activities, as well as educational, legal, policy and ethical issues associated with the controversial topic.

  • HICSS - Introduction to Cyberwarfare: Offensive and Defensive Software Technologies Minitrack
    2015 48th Hawaii International Conference on System Sciences, 2015
    Co-Authors: Brian Hay, Steven Lafountain
    Abstract:

    This new Minitrack, Cyberwarfare:  Offensive and Defensive Software Technologies, is intended to bring together technical and non-technical Cyberwarfare researchers, academics, and practitioners in related fields to discuss the mechanics and implications of offensive and defensive Cyberwarfare activities.  While the breadth of this field is extensive, the focus topics for the inaugural offering of this minitrack include offensive and defensive technologies and capabilities, impacts of Cyberwarfare, information warfare, collateral damage from related activities, as well as educational, legal, policy and ethical issues associated with the controversial topic.

Brian Hay - One of the best experts on this subject based on the ideXlab platform.

  • introduction to Cyberwarfare offensive and defensive software technologies minitrack
    Hawaii International Conference on System Sciences, 2015
    Co-Authors: Brian Hay, Steven Lafountain
    Abstract:

    This new Minitrack, Cyberwarfare:  Offensive and Defensive Software Technologies, is intended to bring together technical and non-technical Cyberwarfare researchers, academics, and practitioners in related fields to discuss the mechanics and implications of offensive and defensive Cyberwarfare activities.  While the breadth of this field is extensive, the focus topics for the inaugural offering of this minitrack include offensive and defensive technologies and capabilities, impacts of Cyberwarfare, information warfare, collateral damage from related activities, as well as educational, legal, policy and ethical issues associated with the controversial topic.

  • HICSS - Introduction to Cyberwarfare: Offensive and Defensive Software Technologies Minitrack
    2015 48th Hawaii International Conference on System Sciences, 2015
    Co-Authors: Brian Hay, Steven Lafountain
    Abstract:

    This new Minitrack, Cyberwarfare:  Offensive and Defensive Software Technologies, is intended to bring together technical and non-technical Cyberwarfare researchers, academics, and practitioners in related fields to discuss the mechanics and implications of offensive and defensive Cyberwarfare activities.  While the breadth of this field is extensive, the focus topics for the inaugural offering of this minitrack include offensive and defensive technologies and capabilities, impacts of Cyberwarfare, information warfare, collateral damage from related activities, as well as educational, legal, policy and ethical issues associated with the controversial topic.

Enrico Cambiaso - One of the best experts on this subject based on the ideXlab platform.

  • SOCO-CISIS-ICEUTE - SlowReq: A Weapon for Cyberwarfare Operations. Characteristics, Limits, Performance, Remediations
    Advances in Intelligent Systems and Computing, 2014
    Co-Authors: Maurizio Aiello, Gianluca Papaleo, Enrico Cambiaso
    Abstract:

    In the last years, with the advent of the Internet, Cyberwarfare operations moved from the battlefield to the cyberspace, locally or remotely executing sabotage or espionage operations in order to weaken the enemy. Among the technologies and methods used during Cyberwarfare actions, Denial of Service attacks are executed to reduce the availability of a particular service on a network. In this paper we present a Denial of Service tool that belongs to the Slow DoS Attacks category. We describe in detail the attack functioning and we compare the proposed threat with a similar one known as slowloris, showing the enhancements provided by the proposed tool.

  • slowreq a weapon for Cyberwarfare operations characteristics limits performance remediations
    SOCO-CISIS-ICEUTE, 2014
    Co-Authors: Maurizio Aiello, Gianluca Papaleo, Enrico Cambiaso
    Abstract:

    In the last years, with the advent of the Internet, Cyberwarfare operations moved from the battlefield to the cyberspace, locally or remotely executing sabotage or espionage operations in order to weaken the enemy. Among the technologies and methods used during Cyberwarfare actions, Denial of Service attacks are executed to reduce the availability of a particular service on a network. In this paper we present a Denial of Service tool that belongs to the Slow DoS Attacks category. We describe in detail the attack functioning and we compare the proposed threat with a similar one known as slowloris, showing the enhancements provided by the proposed tool.

Randall R. Dipert - One of the best experts on this subject based on the ideXlab platform.

  • The Future Impact of a Long Period of Limited Cyberwarfare on the Ethics of Warfare
    The Ethics of Information Warfare, 2014
    Co-Authors: Randall R. Dipert
    Abstract:

    In this essay, I will first summarize some of the main and most controversial published claims in my recent work on ethical considerations in Cyberwarfare (The Ethics of Cyberwarfare, Journal of Military Ethics). I will then expand and critique some of these claims. Finally, I will turn to discuss some of the ways in which information systems, the internet, and even international relations may change because of a coming era of Cyberwarfare.

  • The Ethics of Cyberwarfare
    Journal of Military Ethics, 2010
    Co-Authors: Randall R. Dipert
    Abstract:

    Abstract The paper addresses several issues in the morality of cyberwar and Cyberwarfare, defined as one nation's attacks on the governmental or civilian information systems of another nation. It sketches the diverse technical ways in which an attack may occur, including denial-of-service attacks and the insertion of various forms of malware. It argues that existing international law and widely discussed principles of Just War Theory do not straightforwardly apply to Cyberwarfare, and many forms of Cyberwarfare differ from previous forms of warfare in neither injuring nor killing human beings, nor causing lasting physical damage – but can nevertheless cause serious harm to a nation's vital interests. Another dissimilarity with traditional warfare is in the degree of knowledge of the identity of an attacker (the ‘attribution problem’). The paper argues that Cyberwarfare is not amenable to regulation by international pacts and that we can expect long periods of low-level, multilateral Cyberwarfare, a Cyber ...

Maurizio Aiello - One of the best experts on this subject based on the ideXlab platform.

  • SOCO-CISIS-ICEUTE - SlowReq: A Weapon for Cyberwarfare Operations. Characteristics, Limits, Performance, Remediations
    Advances in Intelligent Systems and Computing, 2014
    Co-Authors: Maurizio Aiello, Gianluca Papaleo, Enrico Cambiaso
    Abstract:

    In the last years, with the advent of the Internet, Cyberwarfare operations moved from the battlefield to the cyberspace, locally or remotely executing sabotage or espionage operations in order to weaken the enemy. Among the technologies and methods used during Cyberwarfare actions, Denial of Service attacks are executed to reduce the availability of a particular service on a network. In this paper we present a Denial of Service tool that belongs to the Slow DoS Attacks category. We describe in detail the attack functioning and we compare the proposed threat with a similar one known as slowloris, showing the enhancements provided by the proposed tool.

  • slowreq a weapon for Cyberwarfare operations characteristics limits performance remediations
    SOCO-CISIS-ICEUTE, 2014
    Co-Authors: Maurizio Aiello, Gianluca Papaleo, Enrico Cambiaso
    Abstract:

    In the last years, with the advent of the Internet, Cyberwarfare operations moved from the battlefield to the cyberspace, locally or remotely executing sabotage or espionage operations in order to weaken the enemy. Among the technologies and methods used during Cyberwarfare actions, Denial of Service attacks are executed to reduce the availability of a particular service on a network. In this paper we present a Denial of Service tool that belongs to the Slow DoS Attacks category. We describe in detail the attack functioning and we compare the proposed threat with a similar one known as slowloris, showing the enhancements provided by the proposed tool.