Challenges in Monitoring Cyberarms Compliance

被引:1
|
作者
Rowe, Neil C. [1 ]
Garfinkel, Simson L. [1 ]
Beverly, Robert [1 ]
Yannakogeorgos, Panayotis [2 ]
机构
[1] US Naval Postgrad Sch, Monterey, CA 93943 USA
[2] AF Res Inst, Wright Patterson AFB, AL USA
关键词
Cyberarms Agreements; Cyberattacks; Cyberweapons; Forensics; Monitoring; Reversibility;
D O I
10.4018/ijcwt.2011040104
中图分类号
D0 [政治学、政治理论];
学科分类号
0302 ; 030201 ;
摘要
A cyberweapon can be as dangerous as any weapon. Fortunately, recent technology now provides some tools for cyberweapons control. Digital forensics can be done on computers seized during or after hostilities. Cyberweapons differ significantly from other software, especially during development, and recent advances in summarizing the contents of storage media can locate possible cyberweapons quickly. Use of cyberweapons can be distinguished in the usual malicious Internet traffic by being aimed at targets associated with political, social, and cultural issues that are often known in advance, and those targets can then be monitored. Cyberweapons are relatively unreliable compared to other kinds of weapons because they are susceptible to flaws in software; therefore, cyberweapons require considerable testing, preferably against live targets. Thus, international "cyberarms agreements" could provide for forensics on cyberweapons and usage monitoring. Agreements also encourage more responsible cyberweapons use by stipulating attribution and reversibility. The authors discuss the kinds of international agreements that are desirable, and examine the recent interest of the U.S. government in such agreements.
引用
收藏
页码:35 / 48
页数:14
相关论文
共 50 条
  • [21] ANALYTICAL ISSUES IN COMPLIANCE MONITORING
    RICE, JK
    ENVIRONMENTAL SCIENCE & TECHNOLOGY, 1980, 14 (12) : 1455 - 1457
  • [22] Reproductive records: Monitoring and compliance
    Nebel, Ray L.
    DeJarnette, J. Mel
    PROCEEDINGS OF THE FORTIETH ANNUAL CONFERENCE AMERICAN ASSOCIATION OF BOVINE PRACTITIONERS, 2007, : 50 - 56
  • [23] Multiobjective Monitoring for SLA Compliance
    Sommers, Joel
    Barford, Paul
    Duffield, Nick
    Ron, Amos
    IEEE-ACM TRANSACTIONS ON NETWORKING, 2010, 18 (02) : 652 - 665
  • [24] Monitoring of compliance risk in the bank
    Losiewicz-Dniestrzanska, Ewa
    4TH WORLD CONFERENCE ON BUSINESS, ECONOMICS AND MANAGEMENT (WCBEM-2015), 2015, 26 : 800 - 805
  • [25] Use of Technology in Compliance Monitoring
    Funk, J.
    Heuer, K.
    Kozlowski, M.
    Mireles, P.
    JOURNAL OF THE AMERICAN ASSOCIATION FOR LABORATORY ANIMAL SCIENCE, 2012, 51 (05): : 678 - 678
  • [26] Monitoring compliance of a behavioural intervention
    Weston, J
    Hodnett, E
    CONTROLLED CLINICAL TRIALS, 2003, 24 : 136S - 136S
  • [27] ELECTRONIC MONITORING OF PATIENT COMPLIANCE
    HAIGH, S
    JEFFCOAT, MK
    REDDY, MS
    JOURNAL OF DENTAL RESEARCH, 1994, 73 : 163 - 163
  • [28] MONITORING COMPLIANCE WITH PILOCARPINE THERAPY
    NORELL, SE
    AMERICAN JOURNAL OF OPHTHALMOLOGY, 1981, 92 (05) : 727 - 731
  • [29] AIR CONTAMINANT MONITORING FOR COMPLIANCE
    WILKENS, PE
    ABSTRACTS OF PAPERS OF THE AMERICAN CHEMICAL SOCIETY, 1969, (SEP): : IN43 - &
  • [30] MONITORING FOR COMPLIANCE WITH DECOMMISSIONING CRITERIA
    HOLOWAY, CF
    DICKSON, HW
    LANTZ, PM
    WRIGHT, T
    HEALTH PHYSICS, 1980, 39 (06): : 1011 - 1011