SlideShare a Scribd company logo
1 of 20
Chapter 14:
Cyber Warfare an Architecture of
Deterrence
Bikrant Gautam, Ang Sherpa,
Savanth Chintoju
Saint Cloud State University
IA612-MSIA-Fall
Objective of cyber deterrence
● Prevent an enemy from conducting future attacks.
● Deny enemies “freedom of action in cyberspace”
● Use the internet space for counter-attack.
Cyber Deterrence and
Cyber warfare
“The goal of Cyber deterrence is to deny enemies
“freedom of action in cyberspace”.“
- Alexander, 2007
“Cyberwarfare has been defined as "actions by a nation-
state to penetrate another nation's computers or
networks for the purposes of causing damage or
disruption”
- Wiki, 2015
Cyber Deterrence Challenges
● Assigning attribution
● Unpredictability of cyber attack
impacts
● Potential damage due to counter
retaliation
● No legal framework exists
Cyber Deterrence
Strategy
● Useful to understand how cyber deterrence
strategies and policies would operate in practice
● Libicki developed policy and strategy analysis
under the sponsorship of USAF, which were
influential
● A key goal of cyber deterrence is changing the
potential attackers mindset, forcing them to
reconsider the benefits and consequences of
conducting an attack.
There are several steps in Libicki’s concept
● Situational Awareness (Surveillance)
● Identify if it is a real attack
● Analyse if the attack motive is connected to state actor
● Determine the level of public awareness
● Assess state or non-state attribution
● Strength of the case for public attribution is assessed
● Methods of retaliation are considered
● Explicit Deterrence
Counter attack policy is disclosed to attacker,
possibly by public announcement
● Implicit Deterrence
No public or direct disclosure to the attacker
about
counter attack
● ‘Risky’ factor has both implicit and explicit values to
signify the risk of counterattack.
● Libicki suggests Implicit deterrence is best option.
“We need to develop an early-warning system to
monitor cyberspace, identify intrusions, and locate the
source of attacks with a trail of evidence that can
support diplomatic, military and legal options – and we
must be able to do this in milliseconds.” (McConnell,
2010)
Reference Model
Surveillance Capabilities
● ensures that defenders are aware of potential cyber
attacks
Penetration Capabilities
● understand potential/actual hackers, investigate
attribution
Integration Capabilities
● to build an understanding of CNE
● populate knowledge base about attackers
Advanced Capabilities
● management of military botnets and parallel
scanning
Solution Architecture
● What is the solution for cyber deterrence?
● BOTNETs!!!
● Military botnets developed with bot script deployed
in each government computer.
● Effective as large number of computers controlled
by single organization.
● Useful on mass hacking or distributed scanning
Attack Model of Botnet
Defense/attribution Model
Architectural Prototypes
● Prototypes for multithreaded and botnet-like distributed
scanning.
● Botnet performance benchmarking
Threaded Scanning
● Serial scanning in linux
● Then implemented as multi threaded scanning.
● Performance increased.
● Practically feasible for pen testing.
Botnet for Distributed
Scanning
● Distributed botnet for parallel scans.
● Performed ping sweeps and nmap scans.
● contained the bot-command server architect with different
controlling scripts.
● First the script on target machine was run.
● Then this script connected with the machine running
command script.
Performance Benchmarking
● Scripts for both methods were run using python code.
● Threaded scan are faster than botnets.
Benchmarking continued...
Deterministic Models of
Performance
● Serial Scan
● Parallel (Threaded) Scan
● Distributed serial Scan
● Distributed Parallel (Threaded) Scan
Projection for Military
Botnets
Thanks,
Any Questions?

More Related Content

What's hot

Lecture no. 10 foreign policy, models of decision making, and domestic influ...
Lecture no. 10  foreign policy, models of decision making, and domestic influ...Lecture no. 10  foreign policy, models of decision making, and domestic influ...
Lecture no. 10 foreign policy, models of decision making, and domestic influ...Dildar Ali
 
01 basic concepts in international relations
01 basic concepts in international relations01 basic concepts in international relations
01 basic concepts in international relationsfatima d
 
Global Terrorism Challenges & Response
Global Terrorism Challenges & ResponseGlobal Terrorism Challenges & Response
Global Terrorism Challenges & ResponseShahid Hussain Raja
 
Role of bureaucracy in formulation of foreign policy.
Role of bureaucracy in formulation of foreign policy.Role of bureaucracy in formulation of foreign policy.
Role of bureaucracy in formulation of foreign policy.Tahir Farooq
 
The concept of interdependence
The concept of interdependenceThe concept of interdependence
The concept of interdependencemayor24
 
What is Russia doing to Ukraine?
What is Russia doing to Ukraine?What is Russia doing to Ukraine?
What is Russia doing to Ukraine?Nazar Bartosik
 
Foreign Policy of Pakistan - Pakistan
Foreign Policy of Pakistan - PakistanForeign Policy of Pakistan - Pakistan
Foreign Policy of Pakistan - PakistanFaHaD .H. NooR
 
Pakistan environmental protection act, 1997
Pakistan environmental protection act, 1997Pakistan environmental protection act, 1997
Pakistan environmental protection act, 1997Ayesha Akhtar
 
international law is weak law ppt.pptx
international law is weak law ppt.pptxinternational law is weak law ppt.pptx
international law is weak law ppt.pptxAshaDevi611493
 
Theories of International Relations
Theories of International RelationsTheories of International Relations
Theories of International RelationsZoya79
 
Global Issues - International Security
Global  Issues - International  SecurityGlobal  Issues - International  Security
Global Issues - International Securityguest2f82ae
 
Foreign Policy and National Defense
Foreign Policy and National DefenseForeign Policy and National Defense
Foreign Policy and National DefenseChris Thomas
 
Classical realism in International Relations
Classical realism in International RelationsClassical realism in International Relations
Classical realism in International RelationsAdnan Munir
 

What's hot (20)

Lecture no. 10 foreign policy, models of decision making, and domestic influ...
Lecture no. 10  foreign policy, models of decision making, and domestic influ...Lecture no. 10  foreign policy, models of decision making, and domestic influ...
Lecture no. 10 foreign policy, models of decision making, and domestic influ...
 
01 basic concepts in international relations
01 basic concepts in international relations01 basic concepts in international relations
01 basic concepts in international relations
 
DIPLOMACY
DIPLOMACYDIPLOMACY
DIPLOMACY
 
Counter Guerrilla Warfare
Counter Guerrilla WarfareCounter Guerrilla Warfare
Counter Guerrilla Warfare
 
What is Security?
What is Security?What is Security?
What is Security?
 
Global Terrorism Challenges & Response
Global Terrorism Challenges & ResponseGlobal Terrorism Challenges & Response
Global Terrorism Challenges & Response
 
Role of bureaucracy in formulation of foreign policy.
Role of bureaucracy in formulation of foreign policy.Role of bureaucracy in formulation of foreign policy.
Role of bureaucracy in formulation of foreign policy.
 
Types of diplomacy
Types of diplomacyTypes of diplomacy
Types of diplomacy
 
The concept of interdependence
The concept of interdependenceThe concept of interdependence
The concept of interdependence
 
What is Russia doing to Ukraine?
What is Russia doing to Ukraine?What is Russia doing to Ukraine?
What is Russia doing to Ukraine?
 
Foreign Policy of Pakistan - Pakistan
Foreign Policy of Pakistan - PakistanForeign Policy of Pakistan - Pakistan
Foreign Policy of Pakistan - Pakistan
 
Pakistan environmental protection act, 1997
Pakistan environmental protection act, 1997Pakistan environmental protection act, 1997
Pakistan environmental protection act, 1997
 
international law is weak law ppt.pptx
international law is weak law ppt.pptxinternational law is weak law ppt.pptx
international law is weak law ppt.pptx
 
Theories of International Relations
Theories of International RelationsTheories of International Relations
Theories of International Relations
 
state responsibility
state responsibilitystate responsibility
state responsibility
 
Global Issues - International Security
Global  Issues - International  SecurityGlobal  Issues - International  Security
Global Issues - International Security
 
Foreign Policy and National Defense
Foreign Policy and National DefenseForeign Policy and National Defense
Foreign Policy and National Defense
 
Role of-un-peacekeeping
Role of-un-peacekeepingRole of-un-peacekeeping
Role of-un-peacekeeping
 
C9 - Diplomacy
C9 - DiplomacyC9 - Diplomacy
C9 - Diplomacy
 
Classical realism in International Relations
Classical realism in International RelationsClassical realism in International Relations
Classical realism in International Relations
 

Viewers also liked

Внутренняя кухня информационных вбросов. Детектив по мотивам access_log (Анто...
Внутренняя кухня информационных вбросов. Детектив по мотивам access_log (Анто...Внутренняя кухня информационных вбросов. Детектив по мотивам access_log (Анто...
Внутренняя кухня информационных вбросов. Детектив по мотивам access_log (Анто...Kristina Pomozova
 
Penetration Testing and Intrusion Detection System
Penetration Testing and Intrusion Detection SystemPenetration Testing and Intrusion Detection System
Penetration Testing and Intrusion Detection SystemBikrant Gautam
 
EU: Polycarbonates (in Primary Forms) – Market Report. Analysis and Forecast ...
EU: Polycarbonates (in Primary Forms) – Market Report. Analysis and Forecast ...EU: Polycarbonates (in Primary Forms) – Market Report. Analysis and Forecast ...
EU: Polycarbonates (in Primary Forms) – Market Report. Analysis and Forecast ...IndexBox Marketing
 
EU: Railway or Tramway Coaches (Self-Propelled) – Market Report. Analysis and...
EU: Railway or Tramway Coaches (Self-Propelled) – Market Report. Analysis and...EU: Railway or Tramway Coaches (Self-Propelled) – Market Report. Analysis and...
EU: Railway or Tramway Coaches (Self-Propelled) – Market Report. Analysis and...IndexBox Marketing
 
Select Sys Services
Select Sys ServicesSelect Sys Services
Select Sys ServicesAnas
 
2º Webinar Sisloc - Importação XML de Compra
2º Webinar Sisloc - Importação XML de Compra2º Webinar Sisloc - Importação XML de Compra
2º Webinar Sisloc - Importação XML de CompraSisloc
 
Management issues related 2ecommerce
Management issues related 2ecommerceManagement issues related 2ecommerce
Management issues related 2ecommerceParag Gautam
 
Workshop projectmanagement 2.0 tenzing 12 april 2012
Workshop projectmanagement 2.0 tenzing 12 april 2012Workshop projectmanagement 2.0 tenzing 12 april 2012
Workshop projectmanagement 2.0 tenzing 12 april 2012Marcel Mars
 
Social engineering
Social engineeringSocial engineering
Social engineeringcnpo
 
All you need to know about Bloom Energy
All you need to know about Bloom EnergyAll you need to know about Bloom Energy
All you need to know about Bloom EnergyJoshua Miranda
 
Чем опасны USB носители (Торгаев Айдын [righthearted])
Чем опасны USB носители (Торгаев Айдын [righthearted])Чем опасны USB носители (Торгаев Айдын [righthearted])
Чем опасны USB носители (Торгаев Айдын [righthearted])Kristina Pomozova
 
Curso de Importação Grátis - Aula5. alfândega
Curso de Importação Grátis - Aula5. alfândegaCurso de Importação Grátis - Aula5. alfândega
Curso de Importação Grátis - Aula5. alfândegaPedro Rialto
 
Curso de Importação Grátis - Aula3. formas de pagamento
Curso de Importação Grátis - Aula3. formas de pagamentoCurso de Importação Grátis - Aula3. formas de pagamento
Curso de Importação Grátis - Aula3. formas de pagamentoPedro Rialto
 
SQL Transactions - What they are good for and how they work
SQL Transactions - What they are good for and how they workSQL Transactions - What they are good for and how they work
SQL Transactions - What they are good for and how they workMarkus Winand
 
Cyber War ( World War 3 )
Cyber War ( World War 3 )Cyber War ( World War 3 )
Cyber War ( World War 3 )Sameer Paradia
 

Viewers also liked (18)

Внутренняя кухня информационных вбросов. Детектив по мотивам access_log (Анто...
Внутренняя кухня информационных вбросов. Детектив по мотивам access_log (Анто...Внутренняя кухня информационных вбросов. Детектив по мотивам access_log (Анто...
Внутренняя кухня информационных вбросов. Детектив по мотивам access_log (Анто...
 
Penetration Testing and Intrusion Detection System
Penetration Testing and Intrusion Detection SystemPenetration Testing and Intrusion Detection System
Penetration Testing and Intrusion Detection System
 
EU: Polycarbonates (in Primary Forms) – Market Report. Analysis and Forecast ...
EU: Polycarbonates (in Primary Forms) – Market Report. Analysis and Forecast ...EU: Polycarbonates (in Primary Forms) – Market Report. Analysis and Forecast ...
EU: Polycarbonates (in Primary Forms) – Market Report. Analysis and Forecast ...
 
EU: Railway or Tramway Coaches (Self-Propelled) – Market Report. Analysis and...
EU: Railway or Tramway Coaches (Self-Propelled) – Market Report. Analysis and...EU: Railway or Tramway Coaches (Self-Propelled) – Market Report. Analysis and...
EU: Railway or Tramway Coaches (Self-Propelled) – Market Report. Analysis and...
 
10 Reasons Why People Don't Buy From You
10 Reasons Why People Don't Buy From You10 Reasons Why People Don't Buy From You
10 Reasons Why People Don't Buy From You
 
Select Sys Services
Select Sys ServicesSelect Sys Services
Select Sys Services
 
2º Webinar Sisloc - Importação XML de Compra
2º Webinar Sisloc - Importação XML de Compra2º Webinar Sisloc - Importação XML de Compra
2º Webinar Sisloc - Importação XML de Compra
 
Management issues related 2ecommerce
Management issues related 2ecommerceManagement issues related 2ecommerce
Management issues related 2ecommerce
 
Workshop projectmanagement 2.0 tenzing 12 april 2012
Workshop projectmanagement 2.0 tenzing 12 april 2012Workshop projectmanagement 2.0 tenzing 12 april 2012
Workshop projectmanagement 2.0 tenzing 12 april 2012
 
спам
спамспам
спам
 
Social engineering
Social engineeringSocial engineering
Social engineering
 
All you need to know about Bloom Energy
All you need to know about Bloom EnergyAll you need to know about Bloom Energy
All you need to know about Bloom Energy
 
Bloom Engergy
Bloom EngergyBloom Engergy
Bloom Engergy
 
Чем опасны USB носители (Торгаев Айдын [righthearted])
Чем опасны USB носители (Торгаев Айдын [righthearted])Чем опасны USB носители (Торгаев Айдын [righthearted])
Чем опасны USB носители (Торгаев Айдын [righthearted])
 
Curso de Importação Grátis - Aula5. alfândega
Curso de Importação Grátis - Aula5. alfândegaCurso de Importação Grátis - Aula5. alfândega
Curso de Importação Grátis - Aula5. alfândega
 
Curso de Importação Grátis - Aula3. formas de pagamento
Curso de Importação Grátis - Aula3. formas de pagamentoCurso de Importação Grátis - Aula3. formas de pagamento
Curso de Importação Grátis - Aula3. formas de pagamento
 
SQL Transactions - What they are good for and how they work
SQL Transactions - What they are good for and how they workSQL Transactions - What they are good for and how they work
SQL Transactions - What they are good for and how they work
 
Cyber War ( World War 3 )
Cyber War ( World War 3 )Cyber War ( World War 3 )
Cyber War ( World War 3 )
 

Similar to Cyber warfare an architecture for deterrence

Cyber weapons 1632578286
Cyber weapons 1632578286Cyber weapons 1632578286
Cyber weapons 1632578286Udaysharma3
 
Case studies in cybersecurity strategies
Case studies in cybersecurity strategiesCase studies in cybersecurity strategies
Case studies in cybersecurity strategiesEyesOpen Association
 
USSTRATCOM Cyber & Space 2011 Herbert Lin
USSTRATCOM Cyber & Space 2011 Herbert LinUSSTRATCOM Cyber & Space 2011 Herbert Lin
USSTRATCOM Cyber & Space 2011 Herbert LinAFCEA International
 
A Mitigation Technique For Internet Security Threat of Toolkits Attack
A Mitigation Technique For Internet Security Threat of Toolkits AttackA Mitigation Technique For Internet Security Threat of Toolkits Attack
A Mitigation Technique For Internet Security Threat of Toolkits AttackCSCJournals
 
Clickjacking Attack: Hijacking User’s Click
Clickjacking Attack: Hijacking User’s ClickClickjacking Attack: Hijacking User’s Click
Clickjacking Attack: Hijacking User’s ClickEswar Publications
 
30ITSecurityThreatsVulnerabilitiesandCountermeasuresV1.ppt
30ITSecurityThreatsVulnerabilitiesandCountermeasuresV1.ppt30ITSecurityThreatsVulnerabilitiesandCountermeasuresV1.ppt
30ITSecurityThreatsVulnerabilitiesandCountermeasuresV1.pptKaukau9
 
International Cybersecurity Threat MatrixCountryCyb.docx
International Cybersecurity Threat MatrixCountryCyb.docxInternational Cybersecurity Threat MatrixCountryCyb.docx
International Cybersecurity Threat MatrixCountryCyb.docxvrickens
 
Cybersecurity environment in malaysia and the function of internal auditor
Cybersecurity environment in malaysia and the function of internal auditorCybersecurity environment in malaysia and the function of internal auditor
Cybersecurity environment in malaysia and the function of internal auditorKhalizan Halid
 
Cyber Attack Analysis : Part I DDoS
Cyber Attack Analysis : Part I DDoSCyber Attack Analysis : Part I DDoS
Cyber Attack Analysis : Part I DDoSKenny Huang Ph.D.
 
Global Cybersecurity Environment ReportAbstractCMP 620
Global Cybersecurity Environment ReportAbstractCMP 620Global Cybersecurity Environment ReportAbstractCMP 620
Global Cybersecurity Environment ReportAbstractCMP 620MatthewTennant613
 
Airport security 2013 john mc carthy
Airport security 2013   john mc carthyAirport security 2013   john mc carthy
Airport security 2013 john mc carthyRussell Publishing
 
DevSecCon Asia 2017 Pishu Mahtani: Adversarial Modelling
DevSecCon Asia 2017 Pishu Mahtani: Adversarial ModellingDevSecCon Asia 2017 Pishu Mahtani: Adversarial Modelling
DevSecCon Asia 2017 Pishu Mahtani: Adversarial ModellingDevSecCon
 
30 it securitythreatsvulnerabilitiesandcountermeasuresv1_2
30 it securitythreatsvulnerabilitiesandcountermeasuresv1_230 it securitythreatsvulnerabilitiesandcountermeasuresv1_2
30 it securitythreatsvulnerabilitiesandcountermeasuresv1_2Gaurav Srivastav
 
Cyber Space Operation- Offensive Cyber Space Operation
Cyber Space Operation- Offensive Cyber Space OperationCyber Space Operation- Offensive Cyber Space Operation
Cyber Space Operation- Offensive Cyber Space OperationRubal Sagwal
 
In cyber, the generals should lead from behind - College of Air Warfare - Puk...
In cyber, the generals should lead from behind - College of Air Warfare - Puk...In cyber, the generals should lead from behind - College of Air Warfare - Puk...
In cyber, the generals should lead from behind - College of Air Warfare - Puk...Pukhraj Singh
 
Francesca Bosco, Le nuove sfide della cyber security
Francesca Bosco, Le nuove sfide della cyber securityFrancesca Bosco, Le nuove sfide della cyber security
Francesca Bosco, Le nuove sfide della cyber securityAndrea Rossetti
 
Cyber Defense: three fundamental steps
Cyber Defense: three fundamental stepsCyber Defense: three fundamental steps
Cyber Defense: three fundamental stepsLeonardo
 
BGF-UNESCO-at-UCLA conference - Madness - The dynamics of International Cyber...
BGF-UNESCO-at-UCLA conference - Madness - The dynamics of International Cyber...BGF-UNESCO-at-UCLA conference - Madness - The dynamics of International Cyber...
BGF-UNESCO-at-UCLA conference - Madness - The dynamics of International Cyber...Boston Global Forum
 
The Library of Sparta
The Library of SpartaThe Library of Sparta
The Library of SpartaLancope, Inc.
 

Similar to Cyber warfare an architecture for deterrence (20)

Cyber weapons 1632578286
Cyber weapons 1632578286Cyber weapons 1632578286
Cyber weapons 1632578286
 
Case studies in cybersecurity strategies
Case studies in cybersecurity strategiesCase studies in cybersecurity strategies
Case studies in cybersecurity strategies
 
USSTRATCOM Cyber & Space 2011 Herbert Lin
USSTRATCOM Cyber & Space 2011 Herbert LinUSSTRATCOM Cyber & Space 2011 Herbert Lin
USSTRATCOM Cyber & Space 2011 Herbert Lin
 
A Mitigation Technique For Internet Security Threat of Toolkits Attack
A Mitigation Technique For Internet Security Threat of Toolkits AttackA Mitigation Technique For Internet Security Threat of Toolkits Attack
A Mitigation Technique For Internet Security Threat of Toolkits Attack
 
Clickjacking Attack: Hijacking User’s Click
Clickjacking Attack: Hijacking User’s ClickClickjacking Attack: Hijacking User’s Click
Clickjacking Attack: Hijacking User’s Click
 
30ITSecurityThreatsVulnerabilitiesandCountermeasuresV1.ppt
30ITSecurityThreatsVulnerabilitiesandCountermeasuresV1.ppt30ITSecurityThreatsVulnerabilitiesandCountermeasuresV1.ppt
30ITSecurityThreatsVulnerabilitiesandCountermeasuresV1.ppt
 
International Cybersecurity Threat MatrixCountryCyb.docx
International Cybersecurity Threat MatrixCountryCyb.docxInternational Cybersecurity Threat MatrixCountryCyb.docx
International Cybersecurity Threat MatrixCountryCyb.docx
 
Cybersecurity environment in malaysia and the function of internal auditor
Cybersecurity environment in malaysia and the function of internal auditorCybersecurity environment in malaysia and the function of internal auditor
Cybersecurity environment in malaysia and the function of internal auditor
 
Cyber Attack Analysis : Part I DDoS
Cyber Attack Analysis : Part I DDoSCyber Attack Analysis : Part I DDoS
Cyber Attack Analysis : Part I DDoS
 
Cyber Attack Analysis
Cyber Attack AnalysisCyber Attack Analysis
Cyber Attack Analysis
 
Global Cybersecurity Environment ReportAbstractCMP 620
Global Cybersecurity Environment ReportAbstractCMP 620Global Cybersecurity Environment ReportAbstractCMP 620
Global Cybersecurity Environment ReportAbstractCMP 620
 
Airport security 2013 john mc carthy
Airport security 2013   john mc carthyAirport security 2013   john mc carthy
Airport security 2013 john mc carthy
 
DevSecCon Asia 2017 Pishu Mahtani: Adversarial Modelling
DevSecCon Asia 2017 Pishu Mahtani: Adversarial ModellingDevSecCon Asia 2017 Pishu Mahtani: Adversarial Modelling
DevSecCon Asia 2017 Pishu Mahtani: Adversarial Modelling
 
30 it securitythreatsvulnerabilitiesandcountermeasuresv1_2
30 it securitythreatsvulnerabilitiesandcountermeasuresv1_230 it securitythreatsvulnerabilitiesandcountermeasuresv1_2
30 it securitythreatsvulnerabilitiesandcountermeasuresv1_2
 
Cyber Space Operation- Offensive Cyber Space Operation
Cyber Space Operation- Offensive Cyber Space OperationCyber Space Operation- Offensive Cyber Space Operation
Cyber Space Operation- Offensive Cyber Space Operation
 
In cyber, the generals should lead from behind - College of Air Warfare - Puk...
In cyber, the generals should lead from behind - College of Air Warfare - Puk...In cyber, the generals should lead from behind - College of Air Warfare - Puk...
In cyber, the generals should lead from behind - College of Air Warfare - Puk...
 
Francesca Bosco, Le nuove sfide della cyber security
Francesca Bosco, Le nuove sfide della cyber securityFrancesca Bosco, Le nuove sfide della cyber security
Francesca Bosco, Le nuove sfide della cyber security
 
Cyber Defense: three fundamental steps
Cyber Defense: three fundamental stepsCyber Defense: three fundamental steps
Cyber Defense: three fundamental steps
 
BGF-UNESCO-at-UCLA conference - Madness - The dynamics of International Cyber...
BGF-UNESCO-at-UCLA conference - Madness - The dynamics of International Cyber...BGF-UNESCO-at-UCLA conference - Madness - The dynamics of International Cyber...
BGF-UNESCO-at-UCLA conference - Madness - The dynamics of International Cyber...
 
The Library of Sparta
The Library of SpartaThe Library of Sparta
The Library of Sparta
 

Recently uploaded

NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...Amil baba
 
Moment Distribution Method For Btech Civil
Moment Distribution Method For Btech CivilMoment Distribution Method For Btech Civil
Moment Distribution Method For Btech CivilVinayVitekari
 
DeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakesDeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakesMayuraD1
 
Hospital management system project report.pdf
Hospital management system project report.pdfHospital management system project report.pdf
Hospital management system project report.pdfKamal Acharya
 
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXssuser89054b
 
DC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equationDC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equationBhangaleSonal
 
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments""Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"mphochane1998
 
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...Call Girls Mumbai
 
AIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech studentsAIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech studentsvanyagupta248
 
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
COST-EFFETIVE  and Energy Efficient BUILDINGS ptxCOST-EFFETIVE  and Energy Efficient BUILDINGS ptx
COST-EFFETIVE and Energy Efficient BUILDINGS ptxJIT KUMAR GUPTA
 
Thermal Engineering Unit - I & II . ppt
Thermal Engineering  Unit - I & II . pptThermal Engineering  Unit - I & II . ppt
Thermal Engineering Unit - I & II . pptDineshKumar4165
 
Thermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptThermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptDineshKumar4165
 
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptx
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptxA CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptx
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptxmaisarahman1
 
GEAR TRAIN- BASIC CONCEPTS AND WORKING PRINCIPLE
GEAR TRAIN- BASIC CONCEPTS AND WORKING PRINCIPLEGEAR TRAIN- BASIC CONCEPTS AND WORKING PRINCIPLE
GEAR TRAIN- BASIC CONCEPTS AND WORKING PRINCIPLEselvakumar948
 
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptxS1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptxSCMS School of Architecture
 
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKARHAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKARKOUSTAV SARKAR
 
Wadi Rum luxhotel lodge Analysis case study.pptx
Wadi Rum luxhotel lodge Analysis case study.pptxWadi Rum luxhotel lodge Analysis case study.pptx
Wadi Rum luxhotel lodge Analysis case study.pptxNadaHaitham1
 
PE 459 LECTURE 2- natural gas basic concepts and properties
PE 459 LECTURE 2- natural gas basic concepts and propertiesPE 459 LECTURE 2- natural gas basic concepts and properties
PE 459 LECTURE 2- natural gas basic concepts and propertiessarkmank1
 

Recently uploaded (20)

NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
 
Moment Distribution Method For Btech Civil
Moment Distribution Method For Btech CivilMoment Distribution Method For Btech Civil
Moment Distribution Method For Btech Civil
 
DeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakesDeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakes
 
Hospital management system project report.pdf
Hospital management system project report.pdfHospital management system project report.pdf
Hospital management system project report.pdf
 
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
 
DC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equationDC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equation
 
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments""Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
 
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
 
AIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech studentsAIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech students
 
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
COST-EFFETIVE  and Energy Efficient BUILDINGS ptxCOST-EFFETIVE  and Energy Efficient BUILDINGS ptx
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
 
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
 
Thermal Engineering Unit - I & II . ppt
Thermal Engineering  Unit - I & II . pptThermal Engineering  Unit - I & II . ppt
Thermal Engineering Unit - I & II . ppt
 
Thermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptThermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.ppt
 
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptx
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptxA CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptx
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptx
 
GEAR TRAIN- BASIC CONCEPTS AND WORKING PRINCIPLE
GEAR TRAIN- BASIC CONCEPTS AND WORKING PRINCIPLEGEAR TRAIN- BASIC CONCEPTS AND WORKING PRINCIPLE
GEAR TRAIN- BASIC CONCEPTS AND WORKING PRINCIPLE
 
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptxS1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
 
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKARHAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
 
Wadi Rum luxhotel lodge Analysis case study.pptx
Wadi Rum luxhotel lodge Analysis case study.pptxWadi Rum luxhotel lodge Analysis case study.pptx
Wadi Rum luxhotel lodge Analysis case study.pptx
 
PE 459 LECTURE 2- natural gas basic concepts and properties
PE 459 LECTURE 2- natural gas basic concepts and propertiesPE 459 LECTURE 2- natural gas basic concepts and properties
PE 459 LECTURE 2- natural gas basic concepts and properties
 
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced LoadsFEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
 

Cyber warfare an architecture for deterrence

  • 1. Chapter 14: Cyber Warfare an Architecture of Deterrence Bikrant Gautam, Ang Sherpa, Savanth Chintoju Saint Cloud State University IA612-MSIA-Fall
  • 2. Objective of cyber deterrence ● Prevent an enemy from conducting future attacks. ● Deny enemies “freedom of action in cyberspace” ● Use the internet space for counter-attack.
  • 3. Cyber Deterrence and Cyber warfare “The goal of Cyber deterrence is to deny enemies “freedom of action in cyberspace”.“ - Alexander, 2007 “Cyberwarfare has been defined as "actions by a nation- state to penetrate another nation's computers or networks for the purposes of causing damage or disruption” - Wiki, 2015
  • 4. Cyber Deterrence Challenges ● Assigning attribution ● Unpredictability of cyber attack impacts ● Potential damage due to counter retaliation ● No legal framework exists
  • 5. Cyber Deterrence Strategy ● Useful to understand how cyber deterrence strategies and policies would operate in practice ● Libicki developed policy and strategy analysis under the sponsorship of USAF, which were influential ● A key goal of cyber deterrence is changing the potential attackers mindset, forcing them to reconsider the benefits and consequences of conducting an attack.
  • 6. There are several steps in Libicki’s concept ● Situational Awareness (Surveillance) ● Identify if it is a real attack ● Analyse if the attack motive is connected to state actor ● Determine the level of public awareness ● Assess state or non-state attribution ● Strength of the case for public attribution is assessed ● Methods of retaliation are considered
  • 7. ● Explicit Deterrence Counter attack policy is disclosed to attacker, possibly by public announcement ● Implicit Deterrence No public or direct disclosure to the attacker about counter attack ● ‘Risky’ factor has both implicit and explicit values to signify the risk of counterattack. ● Libicki suggests Implicit deterrence is best option.
  • 8. “We need to develop an early-warning system to monitor cyberspace, identify intrusions, and locate the source of attacks with a trail of evidence that can support diplomatic, military and legal options – and we must be able to do this in milliseconds.” (McConnell, 2010)
  • 10. Surveillance Capabilities ● ensures that defenders are aware of potential cyber attacks Penetration Capabilities ● understand potential/actual hackers, investigate attribution Integration Capabilities ● to build an understanding of CNE ● populate knowledge base about attackers Advanced Capabilities ● management of military botnets and parallel scanning
  • 11. Solution Architecture ● What is the solution for cyber deterrence? ● BOTNETs!!! ● Military botnets developed with bot script deployed in each government computer. ● Effective as large number of computers controlled by single organization. ● Useful on mass hacking or distributed scanning
  • 12. Attack Model of Botnet
  • 14. Architectural Prototypes ● Prototypes for multithreaded and botnet-like distributed scanning. ● Botnet performance benchmarking
  • 15. Threaded Scanning ● Serial scanning in linux ● Then implemented as multi threaded scanning. ● Performance increased. ● Practically feasible for pen testing. Botnet for Distributed Scanning ● Distributed botnet for parallel scans. ● Performed ping sweeps and nmap scans. ● contained the bot-command server architect with different controlling scripts. ● First the script on target machine was run. ● Then this script connected with the machine running command script.
  • 16. Performance Benchmarking ● Scripts for both methods were run using python code. ● Threaded scan are faster than botnets.
  • 18. Deterministic Models of Performance ● Serial Scan ● Parallel (Threaded) Scan ● Distributed serial Scan ● Distributed Parallel (Threaded) Scan