Please use this identifier to cite or link to this item: https://hdl.handle.net/11147/5130
Full metadata record
DC FieldValueLanguage
dc.contributor.authorAslanoğlu, Rabia-
dc.contributor.authorTekir, Selma-
dc.date.accessioned2017-03-23T08:47:26Z
dc.date.available2017-03-23T08:47:26Z
dc.date.issued2012
dc.identifier.citationAslanoğlu, R., and Tekir, S. (2012). Recent cyberwar spectrum and its analysis. Paper presented at the 11th European Conference on Information Warfare and Security 2012 (ECIW 2012) Laval, France, July 5-6 (pp.45-52). Red Hook, NY: Curran.en_US
dc.identifier.isbn9781622765379
dc.identifier.urihttp://hdl.handle.net/11147/5130
dc.description11th European Conference on Information Warfare and Security 2012, ECIW 2012; Laval; France; 5 July 2012 through 6 July 2012en_US
dc.description.abstractWar is an organized, armed, and often prolonged conflict that is carried on between states, nations or other parties. Every war instance includes some basic components like rising conditions, battlespace, weapons, strategy, tactics, and consequences. Recent developments in the information and communication technologies have brought about changes on the nature of war. As a consequence of this change, cyberwar became the new form of war. In this new form, the new battlespace is cyber space and the contemporary weapons are constantly being renovated viruses, worms, trojans, denial-of-service, botnets, and advanced persistent threat. In this work, we present recent cyberwar spectrum along with its analysis. The spectrum is composed of the Estonia Attack, Georgia Attack, Operation Aurora, and Stuxnet Worm cases. The methodology for analysis is to identify reasons, timeline, effects, responses, and evaluation of each individual case. Moreover, we try to enumerate the fundamental war components for each incident. The analysis results put evidences to the evolution of the weapons into some new forms such as advanced persistent threat. Another outcome of the analysis is that when approaching to the end, confidentiality and integrity attributes of information are being compromised in addition to the availability. Another important observation is that in the last two cases, the responsive actions were not possible due to the lack of the identities of the offending parties. Thus, attribution appears as a significant concern for the modern warfare. The current sophistication level of the cyber weapons poses critical threats to society. Particularly developed countries that have high dependence on information and communication technologies are potential targets since the safety of the critical infrastructures like; healthcare, oil and gas production, water supply, transportation and telecommunication count on the safety of the computer networks. Being aware of this fact, every nation should attach high priorities to cyber security in his agenda and thus behave proactively.en_US
dc.language.isoenen_US
dc.publisherCurran Associatesen_US
dc.relation.ispartof11th European Conference on Information Warfare and Security 2012, ECIW 2012en_US
dc.rightsinfo:eu-repo/semantics/openAccessen_US
dc.subjectCyberwaren_US
dc.subjectEstonia attacken_US
dc.subjectGeorgia attacken_US
dc.subjectOperation auroraen_US
dc.subjectStuxnet wormen_US
dc.subjectSpectrum analysisen_US
dc.titleRecent cyberwar spectrum and its analysisen_US
dc.typeConference Objecten_US
dc.typeSubmitted Versionen_US
dc.authoridTR114496en_US
dc.departmentIzmir Institute of Technology. Computer Engineeringen_US
dc.identifier.startpage45en_US
dc.identifier.endpage52en_US
dc.identifier.wosWOS:000308223300006
dc.identifier.scopusSCOPUS:2-s2.0-84873194968
dc.relation.publicationcategoryKonferans Öğesi - Uluslararası - Kurum Öğretim Elemanıen_US
item.fulltextWith Fulltext-
item.openairecristypehttp://purl.org/coar/resource_type/c_18cf-
item.openairecristypehttp://purl.org/coar/resource_type/c_18cf-
item.openairetypeConference Object-
item.openairetypeSubmitted Version-
item.languageiso639-1en-
item.cerifentitytypePublications-
item.cerifentitytypePublications-
item.grantfulltextopen-
crisitem.author.deptDepartment of Computer Engineering-
Appears in Collections:Computer Engineering / Bilgisayar Mühendisliği
Scopus İndeksli Yayınlar Koleksiyonu / Scopus Indexed Publications Collection
WoS İndeksli Yayınlar Koleksiyonu / WoS Indexed Publications Collection
Files in This Item:
File Description SizeFormat 
5130.pdfConference Paper278.02 kBAdobe PDFThumbnail
View/Open
Show simple item record

CORE Recommender

Page view(s)

34
checked on Oct 23, 2021

Download(s)

64
checked on Oct 23, 2021

Google ScholarTM

Check

Altmetric


Items in GCRIS Repository are protected by copyright, with all rights reserved, unless otherwise indicated.