SlideShare a Scribd company logo
2
Most read
3
Most read
20
Most read
Chapter 14:
Cyber Warfare an Architecture of
Deterrence
Bikrant Gautam, Ang Sherpa,
Savanth Chintoju
Saint Cloud State University
IA612-MSIA-Fall
Objective of cyber deterrence
● Prevent an enemy from conducting future attacks.
● Deny enemies “freedom of action in cyberspace”
● Use the internet space for counter-attack.
Cyber Deterrence and
Cyber warfare
“The goal of Cyber deterrence is to deny enemies
“freedom of action in cyberspace”.“
- Alexander, 2007
“Cyberwarfare has been defined as "actions by a nation-
state to penetrate another nation's computers or
networks for the purposes of causing damage or
disruption”
- Wiki, 2015
Cyber Deterrence Challenges
● Assigning attribution
● Unpredictability of cyber attack
impacts
● Potential damage due to counter
retaliation
● No legal framework exists
Cyber Deterrence
Strategy
● Useful to understand how cyber deterrence
strategies and policies would operate in practice
● Libicki developed policy and strategy analysis
under the sponsorship of USAF, which were
influential
● A key goal of cyber deterrence is changing the
potential attackers mindset, forcing them to
reconsider the benefits and consequences of
conducting an attack.
There are several steps in Libicki’s concept
● Situational Awareness (Surveillance)
● Identify if it is a real attack
● Analyse if the attack motive is connected to state actor
● Determine the level of public awareness
● Assess state or non-state attribution
● Strength of the case for public attribution is assessed
● Methods of retaliation are considered
● Explicit Deterrence
Counter attack policy is disclosed to attacker,
possibly by public announcement
● Implicit Deterrence
No public or direct disclosure to the attacker
about
counter attack
● ‘Risky’ factor has both implicit and explicit values to
signify the risk of counterattack.
● Libicki suggests Implicit deterrence is best option.
“We need to develop an early-warning system to
monitor cyberspace, identify intrusions, and locate the
source of attacks with a trail of evidence that can
support diplomatic, military and legal options – and we
must be able to do this in milliseconds.” (McConnell,
2010)
Reference Model
Surveillance Capabilities
● ensures that defenders are aware of potential cyber
attacks
Penetration Capabilities
● understand potential/actual hackers, investigate
attribution
Integration Capabilities
● to build an understanding of CNE
● populate knowledge base about attackers
Advanced Capabilities
● management of military botnets and parallel
scanning
Solution Architecture
● What is the solution for cyber deterrence?
● BOTNETs!!!
● Military botnets developed with bot script deployed
in each government computer.
● Effective as large number of computers controlled
by single organization.
● Useful on mass hacking or distributed scanning
Attack Model of Botnet
Defense/attribution Model
Architectural Prototypes
● Prototypes for multithreaded and botnet-like distributed
scanning.
● Botnet performance benchmarking
Threaded Scanning
● Serial scanning in linux
● Then implemented as multi threaded scanning.
● Performance increased.
● Practically feasible for pen testing.
Botnet for Distributed
Scanning
● Distributed botnet for parallel scans.
● Performed ping sweeps and nmap scans.
● contained the bot-command server architect with different
controlling scripts.
● First the script on target machine was run.
● Then this script connected with the machine running
command script.
Performance Benchmarking
● Scripts for both methods were run using python code.
● Threaded scan are faster than botnets.
Benchmarking continued...
Deterministic Models of
Performance
● Serial Scan
● Parallel (Threaded) Scan
● Distributed serial Scan
● Distributed Parallel (Threaded) Scan
Projection for Military
Botnets
Thanks,
Any Questions?

More Related Content

PPTX
aatharv ppt rani lakshmi bai.pptx
PPTX
The Great Artistic Mughal Ruler - Shahjahan
PPSX
Liberation war history of bangaldesh
PPTX
Natural Hazards and Disaster In Bangladesh
PPTX
Landslide disaster management
PPTX
Tipu sultan
PDF
Внутренняя кухня информационных вбросов. Детектив по мотивам access_log (Анто...
PPTX
Penetration Testing and Intrusion Detection System
aatharv ppt rani lakshmi bai.pptx
The Great Artistic Mughal Ruler - Shahjahan
Liberation war history of bangaldesh
Natural Hazards and Disaster In Bangladesh
Landslide disaster management
Tipu sultan
Внутренняя кухня информационных вбросов. Детектив по мотивам access_log (Анто...
Penetration Testing and Intrusion Detection System

Viewers also liked (16)

PDF
EU: Polycarbonates (in Primary Forms) – Market Report. Analysis and Forecast ...
PDF
EU: Railway or Tramway Coaches (Self-Propelled) – Market Report. Analysis and...
PDF
10 Reasons Why People Don't Buy From You
PDF
Select Sys Services
PDF
2º Webinar Sisloc - Importação XML de Compra
PPTX
Management issues related 2ecommerce
PDF
Workshop projectmanagement 2.0 tenzing 12 april 2012
PPTX
спам
PPT
Social engineering
PPTX
All you need to know about Bloom Energy
PDF
Bloom Engergy
PDF
Чем опасны USB носители (Торгаев Айдын [righthearted])
PPTX
Curso de Importação Grátis - Aula5. alfândega
PPTX
Curso de Importação Grátis - Aula3. formas de pagamento
PDF
SQL Transactions - What they are good for and how they work
PPTX
Cyber War ( World War 3 )
EU: Polycarbonates (in Primary Forms) – Market Report. Analysis and Forecast ...
EU: Railway or Tramway Coaches (Self-Propelled) – Market Report. Analysis and...
10 Reasons Why People Don't Buy From You
Select Sys Services
2º Webinar Sisloc - Importação XML de Compra
Management issues related 2ecommerce
Workshop projectmanagement 2.0 tenzing 12 april 2012
спам
Social engineering
All you need to know about Bloom Energy
Bloom Engergy
Чем опасны USB носители (Торгаев Айдын [righthearted])
Curso de Importação Grátis - Aula5. alfândega
Curso de Importação Grátis - Aula3. formas de pagamento
SQL Transactions - What they are good for and how they work
Cyber War ( World War 3 )
Ad

Similar to Cyber warfare an architecture for deterrence (20)

PDF
Cyber weapons 1632578286
PDF
Case studies in cybersecurity strategies
PDF
USSTRATCOM Cyber & Space 2011 Herbert Lin
PDF
A Mitigation Technique For Internet Security Threat of Toolkits Attack
PDF
Clickjacking Attack: Hijacking User’s Click
PPT
30ITSecurityThreatsVulnerabilitiesandCountermeasuresV1.ppt
DOCX
International Cybersecurity Threat MatrixCountryCyb.docx
PPTX
Cybersecurity environment in malaysia and the function of internal auditor
PPTX
SKY SHIELD A SKETCH BASED DEFENSE SYSTEM AGAINST APPLICATION LAYER DDOS ATTA...
PDF
Cyber Attack Analysis : Part I DDoS
PDF
Cyber Attack Analysis
DOCX
Global Cybersecurity Environment ReportAbstractCMP 620
PDF
Airport security 2013 john mc carthy
PDF
DevSecCon Asia 2017 Pishu Mahtani: Adversarial Modelling
PPT
30 it securitythreatsvulnerabilitiesandcountermeasuresv1_2
PPTX
Cyber Space Operation- Offensive Cyber Space Operation
PDF
In cyber, the generals should lead from behind - College of Air Warfare - Puk...
PDF
Francesca Bosco, Le nuove sfide della cyber security
PDF
Cyber Defense: three fundamental steps
PPTX
BGF-UNESCO-at-UCLA conference - Madness - The dynamics of International Cyber...
Cyber weapons 1632578286
Case studies in cybersecurity strategies
USSTRATCOM Cyber & Space 2011 Herbert Lin
A Mitigation Technique For Internet Security Threat of Toolkits Attack
Clickjacking Attack: Hijacking User’s Click
30ITSecurityThreatsVulnerabilitiesandCountermeasuresV1.ppt
International Cybersecurity Threat MatrixCountryCyb.docx
Cybersecurity environment in malaysia and the function of internal auditor
SKY SHIELD A SKETCH BASED DEFENSE SYSTEM AGAINST APPLICATION LAYER DDOS ATTA...
Cyber Attack Analysis : Part I DDoS
Cyber Attack Analysis
Global Cybersecurity Environment ReportAbstractCMP 620
Airport security 2013 john mc carthy
DevSecCon Asia 2017 Pishu Mahtani: Adversarial Modelling
30 it securitythreatsvulnerabilitiesandcountermeasuresv1_2
Cyber Space Operation- Offensive Cyber Space Operation
In cyber, the generals should lead from behind - College of Air Warfare - Puk...
Francesca Bosco, Le nuove sfide della cyber security
Cyber Defense: three fundamental steps
BGF-UNESCO-at-UCLA conference - Madness - The dynamics of International Cyber...
Ad

Recently uploaded (20)

PPTX
Engineering Ethics, Safety and Environment [Autosaved] (1).pptx
DOCX
ASol_English-Language-Literature-Set-1-27-02-2023-converted.docx
PDF
BMEC211 - INTRODUCTION TO MECHATRONICS-1.pdf
PPTX
Foundation to blockchain - A guide to Blockchain Tech
PPTX
UNIT-1 - COAL BASED THERMAL POWER PLANTS
PPTX
Sustainable Sites - Green Building Construction
PDF
keyrequirementskkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkk
PPTX
Lecture Notes Electrical Wiring System Components
PPTX
M Tech Sem 1 Civil Engineering Environmental Sciences.pptx
PPTX
Infosys Presentation by1.Riyan Bagwan 2.Samadhan Naiknavare 3.Gaurav Shinde 4...
PDF
Automation-in-Manufacturing-Chapter-Introduction.pdf
DOCX
573137875-Attendance-Management-System-original
PDF
PRIZ Academy - 9 Windows Thinking Where to Invest Today to Win Tomorrow.pdf
PPTX
web development for engineering and engineering
PPTX
additive manufacturing of ss316l using mig welding
PPTX
Recipes for Real Time Voice AI WebRTC, SLMs and Open Source Software.pptx
PDF
Model Code of Practice - Construction Work - 21102022 .pdf
PPTX
MCN 401 KTU-2019-PPE KITS-MODULE 2.pptx
PPTX
Welding lecture in detail for understanding
PPTX
CH1 Production IntroductoryConcepts.pptx
Engineering Ethics, Safety and Environment [Autosaved] (1).pptx
ASol_English-Language-Literature-Set-1-27-02-2023-converted.docx
BMEC211 - INTRODUCTION TO MECHATRONICS-1.pdf
Foundation to blockchain - A guide to Blockchain Tech
UNIT-1 - COAL BASED THERMAL POWER PLANTS
Sustainable Sites - Green Building Construction
keyrequirementskkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkk
Lecture Notes Electrical Wiring System Components
M Tech Sem 1 Civil Engineering Environmental Sciences.pptx
Infosys Presentation by1.Riyan Bagwan 2.Samadhan Naiknavare 3.Gaurav Shinde 4...
Automation-in-Manufacturing-Chapter-Introduction.pdf
573137875-Attendance-Management-System-original
PRIZ Academy - 9 Windows Thinking Where to Invest Today to Win Tomorrow.pdf
web development for engineering and engineering
additive manufacturing of ss316l using mig welding
Recipes for Real Time Voice AI WebRTC, SLMs and Open Source Software.pptx
Model Code of Practice - Construction Work - 21102022 .pdf
MCN 401 KTU-2019-PPE KITS-MODULE 2.pptx
Welding lecture in detail for understanding
CH1 Production IntroductoryConcepts.pptx

Cyber warfare an architecture for deterrence

  • 1. Chapter 14: Cyber Warfare an Architecture of Deterrence Bikrant Gautam, Ang Sherpa, Savanth Chintoju Saint Cloud State University IA612-MSIA-Fall
  • 2. Objective of cyber deterrence ● Prevent an enemy from conducting future attacks. ● Deny enemies “freedom of action in cyberspace” ● Use the internet space for counter-attack.
  • 3. Cyber Deterrence and Cyber warfare “The goal of Cyber deterrence is to deny enemies “freedom of action in cyberspace”.“ - Alexander, 2007 “Cyberwarfare has been defined as "actions by a nation- state to penetrate another nation's computers or networks for the purposes of causing damage or disruption” - Wiki, 2015
  • 4. Cyber Deterrence Challenges ● Assigning attribution ● Unpredictability of cyber attack impacts ● Potential damage due to counter retaliation ● No legal framework exists
  • 5. Cyber Deterrence Strategy ● Useful to understand how cyber deterrence strategies and policies would operate in practice ● Libicki developed policy and strategy analysis under the sponsorship of USAF, which were influential ● A key goal of cyber deterrence is changing the potential attackers mindset, forcing them to reconsider the benefits and consequences of conducting an attack.
  • 6. There are several steps in Libicki’s concept ● Situational Awareness (Surveillance) ● Identify if it is a real attack ● Analyse if the attack motive is connected to state actor ● Determine the level of public awareness ● Assess state or non-state attribution ● Strength of the case for public attribution is assessed ● Methods of retaliation are considered
  • 7. ● Explicit Deterrence Counter attack policy is disclosed to attacker, possibly by public announcement ● Implicit Deterrence No public or direct disclosure to the attacker about counter attack ● ‘Risky’ factor has both implicit and explicit values to signify the risk of counterattack. ● Libicki suggests Implicit deterrence is best option.
  • 8. “We need to develop an early-warning system to monitor cyberspace, identify intrusions, and locate the source of attacks with a trail of evidence that can support diplomatic, military and legal options – and we must be able to do this in milliseconds.” (McConnell, 2010)
  • 10. Surveillance Capabilities ● ensures that defenders are aware of potential cyber attacks Penetration Capabilities ● understand potential/actual hackers, investigate attribution Integration Capabilities ● to build an understanding of CNE ● populate knowledge base about attackers Advanced Capabilities ● management of military botnets and parallel scanning
  • 11. Solution Architecture ● What is the solution for cyber deterrence? ● BOTNETs!!! ● Military botnets developed with bot script deployed in each government computer. ● Effective as large number of computers controlled by single organization. ● Useful on mass hacking or distributed scanning
  • 12. Attack Model of Botnet
  • 14. Architectural Prototypes ● Prototypes for multithreaded and botnet-like distributed scanning. ● Botnet performance benchmarking
  • 15. Threaded Scanning ● Serial scanning in linux ● Then implemented as multi threaded scanning. ● Performance increased. ● Practically feasible for pen testing. Botnet for Distributed Scanning ● Distributed botnet for parallel scans. ● Performed ping sweeps and nmap scans. ● contained the bot-command server architect with different controlling scripts. ● First the script on target machine was run. ● Then this script connected with the machine running command script.
  • 16. Performance Benchmarking ● Scripts for both methods were run using python code. ● Threaded scan are faster than botnets.
  • 18. Deterministic Models of Performance ● Serial Scan ● Parallel (Threaded) Scan ● Distributed serial Scan ● Distributed Parallel (Threaded) Scan