Challenges in Monitoring Cyberarms Compliance

被引:1
|
作者
Rowe, Neil C. [1 ]
Garfinkel, Simson L. [1 ]
Beverly, Robert [1 ]
Yannakogeorgos, Panayotis [2 ]
机构
[1] US Naval Postgrad Sch, Monterey, CA 93943 USA
[2] AF Res Inst, Wright Patterson AFB, AL USA
关键词
Cyberarms Agreements; Cyberattacks; Cyberweapons; Forensics; Monitoring; Reversibility;
D O I
10.4018/ijcwt.2011040104
中图分类号
D0 [政治学、政治理论];
学科分类号
0302 ; 030201 ;
摘要
A cyberweapon can be as dangerous as any weapon. Fortunately, recent technology now provides some tools for cyberweapons control. Digital forensics can be done on computers seized during or after hostilities. Cyberweapons differ significantly from other software, especially during development, and recent advances in summarizing the contents of storage media can locate possible cyberweapons quickly. Use of cyberweapons can be distinguished in the usual malicious Internet traffic by being aimed at targets associated with political, social, and cultural issues that are often known in advance, and those targets can then be monitored. Cyberweapons are relatively unreliable compared to other kinds of weapons because they are susceptible to flaws in software; therefore, cyberweapons require considerable testing, preferably against live targets. Thus, international "cyberarms agreements" could provide for forensics on cyberweapons and usage monitoring. Agreements also encourage more responsible cyberweapons use by stipulating attribution and reversibility. The authors discuss the kinds of international agreements that are desirable, and examine the recent interest of the U.S. government in such agreements.
引用
收藏
页码:35 / 48
页数:14
相关论文
共 50 条
  • [31] THE EFFECTS OF MONITORING AND FEEDBACK ON COMPLIANCE
    ELIXHAUSER, A
    EISEN, SA
    ROMEIS, JC
    HOMAN, SM
    MEDICAL CARE, 1990, 28 (10) : 882 - 893
  • [32] COMPLIANCE MONITORING IN AMBLYOPIA THERAPY
    FIELDER, AR
    AULD, R
    IRWIN, M
    COCKER, KD
    JONES, HS
    MOSELEY, MJ
    LANCET, 1994, 343 (8896): : 547 - 547
  • [33] Update on Compliance Assurance Monitoring
    Freeman, LE
    ACID RAIN & ELECTRIC UTILITIES II, 1997, : 1007 - 1011
  • [34] Can Software Licenses Contribute to Cyberarms Control?
    Dierker, Steve
    Roth, Volker
    NSPW '18: PROCEEDINGS OF THE NEW SECURITY PARADIGMS WORKSHOP, 2018, : 41 - 51
  • [35] Monitoring Sanctions Compliance at Sea
    Kilpatrick, Richard L., Jr.
    NORTHWESTERN JOURNAL OF INTERNATIONAL LAW & BUSINESS, 2022, 42 (02): : 221 - 251
  • [36] MATERNAL COMPLIANCE WITH CARDIORESPIRATORY MONITORING
    CARBONE, T
    OSTFELD, BM
    KWIATKOWSKI, D
    HIATT, M
    HEGYI, T
    PEDIATRIC RESEARCH, 1995, 37 (04) : A199 - A199
  • [37] Monitoring Business Process Compliance Using Compliance Rule Graphs
    Linh Thao Ly
    Rinderle-Ma, Stefanie
    Knuplesch, David
    Dadam, Peter
    ON THE MOVE TO MEANINGFUL INTERNET SYSTEMS: OTM 2011, PT I, 2011, 7044 : 82 - +
  • [38] Continuous Compliance: Experiences, Challenges, and Opportunities
    Filepp, Robert
    Adam, Constantin
    Hernandez, Milton
    Vukovic, Maja
    Anerousis, Nikos
    Zhang, Guan Qun
    2018 IEEE WORLD CONGRESS ON SERVICES (IEEE SERVICES 2018), 2018, : 31 - 32
  • [39] Challenges extend from simulation to compliance
    Nelson, Rick
    EE: Evaluation Engineering, 2015, 54 (07): : 12 - 15
  • [40] Challenges in Maritime Cybersecurity Training and Compliance
    Chupkemi, Divine C.
    Mersinas, Konstantinos
    JOURNAL OF MARINE SCIENCE AND ENGINEERING, 2024, 12 (10)