Research Article
BibTex RIS Cite
Year 2023, Volume: 12 Issue: 1, 40 - 57, 30.10.2023

Abstract

References

  • Alladi, T., Chamola, V., Sikdar, B., & Choo, K. K. R. (2020). Consumer IoT: Security vulnerability case studies and solutions. IEEE Consumer Electronics Magazine, 9(2), 17-25.
  • Andress, J., & Winterfeld, S. (2013). Cyber warfare: techniques, tactics and tools for security practitioners. Elsevier. Bamford, J. (2016). A Death in Athens: The Inherent Vulnerability of Lawful Intercept.
  • Betz, D. J. (2017). Cyberspace and the State: Towards a Strategy for Cyber-power. Routledge.
  • Brundage, M., Avin, S., Clark, J., Toner, H., Eckersley, P., Garfinkel, B., ... & Amodei, D. (2018). The malicious use of artificial intelligence: Forecasting, prevention, and mitigation. arXiv preprint arXiv:1802.07228.
  • Buchanan, B. (2016). The cybersecurity dilemma: Hacking, trust, and fear between nations. Oxford University Press. Carr, J. (2012). Inside cyber warfare: Mapping the cyber underworld. “ O’Reilly Media, Inc.”.
  • Chakkaravarthy, S. S., Sangeetha, D., & Vaidehi, V. (2019). A survey on malware analysis and mitigation techniques. Computer Science Review, 32, 1-23.
  • Chen, Z., Liu, J., Shen, Y., Simsek, M., Kantarci, B., Mouftah, H. T., & Djukic, P. (2022). Machine learning-enabled iot security: Open issues and challenges under advanced persistent threats. ACM Computing Surveys, 55(5), 1-37.
  • Chevalier, R., Villatel, M., Plaquin, D., & Hiet, G. (2017, December). Co-processor-based behavior monitoring: Application to the detection of attacks against the system management mode. In Proceedings of the 33rd Annual Computer Security Applications Conference (pp. 399-411).
  • Desouza, K. C., Ahmad, A., Naseer, H., & Sharma, M. (2020). Weaponizing information systems for political disruption: The actor, lever, effects, and response taxonomy (ALERT). Computers & Security, 88, 101606.
  • Dunn Cavelty, M. (2014). Breaking the cyber-security dilemma: Aligning security needs and removing vulnerabilities. Science and engineering ethics, 20, 701-715.
  • Fan, W., Kevin, L., & Rong, R. (2017). Social engineering: IE based model of human weakness for attack and defense investigations. IJ Computer Network and Information Security, 9(1), 1-11.
  • Gartzke, E., & Lindsay, J. R. (2015). Weaving tangled webs: offense, defense, and deception in cyberspace. Security Studies, 24(2), 316-348.
  • Gross, O. (2015). Cyber Responsibility to Protect: Legal Obligations of States Directly Affected by Cyber-Incidents. Cornell Int’l LJ, 48, 481.
  • Healey, J., & Jervis, R. (2020). The Escalation Inversion and Other Oddities of Situational Cyber Stability (Fall 2020). Texas National Security Review.Hutchins, E. M., Cloppert, M. J., & Amin, R. M. (2011). Intelligence-driven computer network defense informed by analysis of adversary campaigns and intrusion kill chains. Leading Issues in Information Warfare & Security Research, 1(1), 80.
  • Jasper, S. (2017). Strategic cyber deterrence: The active cyber defense option. Rowman & Littlefield.
  • Kello, L. (2013). The meaning of the cyber revolution: Perils to theory and statecraft. International Security, 38(2), 7-40.
  • Kennedy, D., O’gorman, J., Kearns, D., & Aharoni, M. (2011). Metasploit: the penetration tester’s guide. No Starch Press.
  • Libicki, M. C. (2012). Crisis and escalation in cyberspace. Rand Corporation.
  • Lindsay, J. R. (2013). Stuxnet and the limits of cyber warfare. Security Studies, 22(3), 365-404.
  • Lindsay, J. R. (2014). The impact of China on cybersecurity: Fiction and friction. International Security, 39(3), 7-47.
  • Lucas, G. R. (2017). Ethics and cyber warfare: the quest for responsible security in the age of digital warfare. Oxford University Press.
  • Makhdoom, I., Abolhasan, M., Lipman, J., Liu, R. P., & Ni, W. (2018). Anatomy of threats to the internet of things. IEEE communications surveys & tutorials, 21(2), 1636-1675.
  • Mauro, A. (2022). Hacking in the Humanities: Cybersecurity, Speculative Fiction, and Navigating a Digital Future. Bloomsbury Publishing.
  • Moore, D. (2022). Offensive Cyber Operations: Understanding Intangible Warfare. Hurst Publishers.
  • Nordstrom, C., & Carlson, L. (2014). Cyber shadows: Power, crime, and hacking everyone. ACTA Publications.
  • Omolara, A. E., Alabdulatif, A., Abiodun, O. I., Alawida, M., Alabdulatif, A., & Arshad, H. (2022). The internet of things security: A survey encompassing unexplored areas and new insights. Computers & Security, 112, 102494.
  • ROOM, B. (2021). The United States, joined by allies and partners, attributes malicious cyber activity and irresponsible state behavior to the People’s Republic of China.
  • Sanger, D. E. (2018). The perfect weapon: War, sabotage, and fear in the cyber age. Crown.
  • Sharma, A. (2010). Cyber wars: A paradigm shift from means to ends. Strategic Analysis, 34(1), 62-73.
  • Sigholm, J. (2013). Non-state actors in cyberspace operations. Journal of Military Studies, 4(1), 1-37.
  • Skopik, F., & Pahi, T. (2020). Under false flag: using technical artifacts for cyber attack attribution. Cybersecurity, 3, 1-20.
  • Soesanto, S., & Smeets, M. (2021). Cyber deterrence: the past, present, and future.
  • Hutchins, E. M., Cloppert, M. J., & Amin, R. M. (2011). Intelligence-driven computer network defense informed by analysis of adversary campaigns and intrusion kill chains. Leading Issues in Information Warfare & Security Research, 1(1), 80.
  • Jasper, S. (2017). Strategic cyber deterrence: The active cyber defense option. Rowman & Littlefield.
  • Kello, L. (2013). The meaning of the cyber revolution: Perils to theory and statecraft. International Security, 38(2), 7-40.
  • Kennedy, D., O’gorman, J., Kearns, D., & Aharoni, M. (2011). Metasploit: the penetration tester’s guide. No Starch Press.
  • Libicki, M. C. (2012). Crisis and escalation in cyberspace. Rand Corporation.
  • Lindsay, J. R. (2013). Stuxnet and the limits of cyber warfare. Security Studies, 22(3), 365-404.
  • Lindsay, J. R. (2014). The impact of China on cybersecurity: Fiction and friction. International Security, 39(3), 7-47.
  • Lucas, G. R. (2017). Ethics and cyber warfare: the quest for responsible security in the age of digital warfare. Oxford University Press.
  • Makhdoom, I., Abolhasan, M., Lipman, J., Liu, R. P., & Ni, W. (2018). Anatomy of threats to the internet of things. IEEE communications surveys & tutorials, 21(2), 1636-1675.
  • Mauro, A. (2022). Hacking in the Humanities: Cybersecurity, Speculative Fiction, and Navigating a Digital Future. Bloomsbury Publishing.
  • Moore, D. (2022). Offensive Cyber Operations: Understanding Intangible Warfare. Hurst Publishers.
  • Nordstrom, C., & Carlson, L. (2014). Cyber shadows: Power, crime, and hacking everyone. ACTA Publications.
  • Omolara, A. E., Alabdulatif, A., Abiodun, O. I., Alawida, M., Alabdulatif, A., & Arshad, H. (2022). The internet of things security: A survey encompassing unexplored areas and new insights. Computers & Security, 112, 102494.
  • ROOM, B. (2021). The United States, joined by allies and partners, attributes malicious cyber activity and irresponsible state behavior to the People’s Republic of China.
  • Sanger, D. E. (2018). The perfect weapon: War, sabotage, and fear in the cyber age. Crown.
  • Sharma, A. (2010). Cyber wars: A paradigm shift from means to ends. Strategic Analysis, 34(1), 62-73.
  • Sigholm, J. (2013). Non-state actors in cyberspace operations. Journal of Military Studies, 4(1), 1-37.
  • Skopik, F., & Pahi, T. (2020). Under false flag: using technical artifacts for cyber attack attribution. Cybersecurity, 3, 1-20.
  • Soesanto, S., & Smeets, M. (2021). Cyber deterrence: the past, present, and future. NL ARMS Netherlands Annual Review of Military Studies 2020: Deterrence in the 21st Century—Insights from Theory and Practice, 385-400.
  • Taddeo, M. (2012). Information warfare: A philosophical perspective. Philosophy & Technology, 25, 105-120.
  • Valeriano, B., & Maness, R. C. (2015). Cyber war versus cyber realities: Cyber conflict in the international system. Oxford University Press, USA.
  • Wardle, M. (2021). Offensive Cyber Operations: An Examination of Their Revolutionary Capabilities.

THROUGH THE EYES OF ATTACKERS: A COMPREHENSIVE ANALYSIS OF CYBERSECURITY STRATEGIES IN INTERNATIONAL RELATIONS

Year 2023, Volume: 12 Issue: 1, 40 - 57, 30.10.2023

Abstract

In this interconnected global landscape, where technology forms the foundation of diplomatic interactions, understanding the complicated methodologies of cyber attackers has become of utmost importance. This study delves into the core of worldwide cybersecurity, introducing a unique viewpoint that involves an exploration of offensive tactics from the vantage point of those orchestrating attacks. Employing an interdisciplinary methodology, the research amalgamates case studies, expert publications, and the analysis of threat intelligence to decode the incentives, strategies, and aspirations of these digital assailants. By closely examining historical events like the Stuxnet incident, the investigation reveals the evolution of offensive cyber activities and their consequences in the international relations field. Through a comprehensive assessment of attack avenues, techniques, and the motivations driving attackers, this analysis brings to light the complicated interaction between cybersecurity, global politics, and the stability of nations. By anticipating emerging trends in cyber threats and delving into regional perspectives, this study offers a forward-focused outlook on the challenges and possibilities that lie on the horizon. the preservation of the future landscape of international relations.

References

  • Alladi, T., Chamola, V., Sikdar, B., & Choo, K. K. R. (2020). Consumer IoT: Security vulnerability case studies and solutions. IEEE Consumer Electronics Magazine, 9(2), 17-25.
  • Andress, J., & Winterfeld, S. (2013). Cyber warfare: techniques, tactics and tools for security practitioners. Elsevier. Bamford, J. (2016). A Death in Athens: The Inherent Vulnerability of Lawful Intercept.
  • Betz, D. J. (2017). Cyberspace and the State: Towards a Strategy for Cyber-power. Routledge.
  • Brundage, M., Avin, S., Clark, J., Toner, H., Eckersley, P., Garfinkel, B., ... & Amodei, D. (2018). The malicious use of artificial intelligence: Forecasting, prevention, and mitigation. arXiv preprint arXiv:1802.07228.
  • Buchanan, B. (2016). The cybersecurity dilemma: Hacking, trust, and fear between nations. Oxford University Press. Carr, J. (2012). Inside cyber warfare: Mapping the cyber underworld. “ O’Reilly Media, Inc.”.
  • Chakkaravarthy, S. S., Sangeetha, D., & Vaidehi, V. (2019). A survey on malware analysis and mitigation techniques. Computer Science Review, 32, 1-23.
  • Chen, Z., Liu, J., Shen, Y., Simsek, M., Kantarci, B., Mouftah, H. T., & Djukic, P. (2022). Machine learning-enabled iot security: Open issues and challenges under advanced persistent threats. ACM Computing Surveys, 55(5), 1-37.
  • Chevalier, R., Villatel, M., Plaquin, D., & Hiet, G. (2017, December). Co-processor-based behavior monitoring: Application to the detection of attacks against the system management mode. In Proceedings of the 33rd Annual Computer Security Applications Conference (pp. 399-411).
  • Desouza, K. C., Ahmad, A., Naseer, H., & Sharma, M. (2020). Weaponizing information systems for political disruption: The actor, lever, effects, and response taxonomy (ALERT). Computers & Security, 88, 101606.
  • Dunn Cavelty, M. (2014). Breaking the cyber-security dilemma: Aligning security needs and removing vulnerabilities. Science and engineering ethics, 20, 701-715.
  • Fan, W., Kevin, L., & Rong, R. (2017). Social engineering: IE based model of human weakness for attack and defense investigations. IJ Computer Network and Information Security, 9(1), 1-11.
  • Gartzke, E., & Lindsay, J. R. (2015). Weaving tangled webs: offense, defense, and deception in cyberspace. Security Studies, 24(2), 316-348.
  • Gross, O. (2015). Cyber Responsibility to Protect: Legal Obligations of States Directly Affected by Cyber-Incidents. Cornell Int’l LJ, 48, 481.
  • Healey, J., & Jervis, R. (2020). The Escalation Inversion and Other Oddities of Situational Cyber Stability (Fall 2020). Texas National Security Review.Hutchins, E. M., Cloppert, M. J., & Amin, R. M. (2011). Intelligence-driven computer network defense informed by analysis of adversary campaigns and intrusion kill chains. Leading Issues in Information Warfare & Security Research, 1(1), 80.
  • Jasper, S. (2017). Strategic cyber deterrence: The active cyber defense option. Rowman & Littlefield.
  • Kello, L. (2013). The meaning of the cyber revolution: Perils to theory and statecraft. International Security, 38(2), 7-40.
  • Kennedy, D., O’gorman, J., Kearns, D., & Aharoni, M. (2011). Metasploit: the penetration tester’s guide. No Starch Press.
  • Libicki, M. C. (2012). Crisis and escalation in cyberspace. Rand Corporation.
  • Lindsay, J. R. (2013). Stuxnet and the limits of cyber warfare. Security Studies, 22(3), 365-404.
  • Lindsay, J. R. (2014). The impact of China on cybersecurity: Fiction and friction. International Security, 39(3), 7-47.
  • Lucas, G. R. (2017). Ethics and cyber warfare: the quest for responsible security in the age of digital warfare. Oxford University Press.
  • Makhdoom, I., Abolhasan, M., Lipman, J., Liu, R. P., & Ni, W. (2018). Anatomy of threats to the internet of things. IEEE communications surveys & tutorials, 21(2), 1636-1675.
  • Mauro, A. (2022). Hacking in the Humanities: Cybersecurity, Speculative Fiction, and Navigating a Digital Future. Bloomsbury Publishing.
  • Moore, D. (2022). Offensive Cyber Operations: Understanding Intangible Warfare. Hurst Publishers.
  • Nordstrom, C., & Carlson, L. (2014). Cyber shadows: Power, crime, and hacking everyone. ACTA Publications.
  • Omolara, A. E., Alabdulatif, A., Abiodun, O. I., Alawida, M., Alabdulatif, A., & Arshad, H. (2022). The internet of things security: A survey encompassing unexplored areas and new insights. Computers & Security, 112, 102494.
  • ROOM, B. (2021). The United States, joined by allies and partners, attributes malicious cyber activity and irresponsible state behavior to the People’s Republic of China.
  • Sanger, D. E. (2018). The perfect weapon: War, sabotage, and fear in the cyber age. Crown.
  • Sharma, A. (2010). Cyber wars: A paradigm shift from means to ends. Strategic Analysis, 34(1), 62-73.
  • Sigholm, J. (2013). Non-state actors in cyberspace operations. Journal of Military Studies, 4(1), 1-37.
  • Skopik, F., & Pahi, T. (2020). Under false flag: using technical artifacts for cyber attack attribution. Cybersecurity, 3, 1-20.
  • Soesanto, S., & Smeets, M. (2021). Cyber deterrence: the past, present, and future.
  • Hutchins, E. M., Cloppert, M. J., & Amin, R. M. (2011). Intelligence-driven computer network defense informed by analysis of adversary campaigns and intrusion kill chains. Leading Issues in Information Warfare & Security Research, 1(1), 80.
  • Jasper, S. (2017). Strategic cyber deterrence: The active cyber defense option. Rowman & Littlefield.
  • Kello, L. (2013). The meaning of the cyber revolution: Perils to theory and statecraft. International Security, 38(2), 7-40.
  • Kennedy, D., O’gorman, J., Kearns, D., & Aharoni, M. (2011). Metasploit: the penetration tester’s guide. No Starch Press.
  • Libicki, M. C. (2012). Crisis and escalation in cyberspace. Rand Corporation.
  • Lindsay, J. R. (2013). Stuxnet and the limits of cyber warfare. Security Studies, 22(3), 365-404.
  • Lindsay, J. R. (2014). The impact of China on cybersecurity: Fiction and friction. International Security, 39(3), 7-47.
  • Lucas, G. R. (2017). Ethics and cyber warfare: the quest for responsible security in the age of digital warfare. Oxford University Press.
  • Makhdoom, I., Abolhasan, M., Lipman, J., Liu, R. P., & Ni, W. (2018). Anatomy of threats to the internet of things. IEEE communications surveys & tutorials, 21(2), 1636-1675.
  • Mauro, A. (2022). Hacking in the Humanities: Cybersecurity, Speculative Fiction, and Navigating a Digital Future. Bloomsbury Publishing.
  • Moore, D. (2022). Offensive Cyber Operations: Understanding Intangible Warfare. Hurst Publishers.
  • Nordstrom, C., & Carlson, L. (2014). Cyber shadows: Power, crime, and hacking everyone. ACTA Publications.
  • Omolara, A. E., Alabdulatif, A., Abiodun, O. I., Alawida, M., Alabdulatif, A., & Arshad, H. (2022). The internet of things security: A survey encompassing unexplored areas and new insights. Computers & Security, 112, 102494.
  • ROOM, B. (2021). The United States, joined by allies and partners, attributes malicious cyber activity and irresponsible state behavior to the People’s Republic of China.
  • Sanger, D. E. (2018). The perfect weapon: War, sabotage, and fear in the cyber age. Crown.
  • Sharma, A. (2010). Cyber wars: A paradigm shift from means to ends. Strategic Analysis, 34(1), 62-73.
  • Sigholm, J. (2013). Non-state actors in cyberspace operations. Journal of Military Studies, 4(1), 1-37.
  • Skopik, F., & Pahi, T. (2020). Under false flag: using technical artifacts for cyber attack attribution. Cybersecurity, 3, 1-20.
  • Soesanto, S., & Smeets, M. (2021). Cyber deterrence: the past, present, and future. NL ARMS Netherlands Annual Review of Military Studies 2020: Deterrence in the 21st Century—Insights from Theory and Practice, 385-400.
  • Taddeo, M. (2012). Information warfare: A philosophical perspective. Philosophy & Technology, 25, 105-120.
  • Valeriano, B., & Maness, R. C. (2015). Cyber war versus cyber realities: Cyber conflict in the international system. Oxford University Press, USA.
  • Wardle, M. (2021). Offensive Cyber Operations: An Examination of Their Revolutionary Capabilities.
There are 54 citations in total.

Details

Primary Language English
Subjects Regional Studies
Journal Section Articles
Authors

Juma Mdimu Rugina

Publication Date October 30, 2023
Published in Issue Year 2023 Volume: 12 Issue: 1

Cite

APA Rugina, J. M. (2023). THROUGH THE EYES OF ATTACKERS: A COMPREHENSIVE ANALYSIS OF CYBERSECURITY STRATEGIES IN INTERNATIONAL RELATIONS. Afro Eurasian Studies, 12(1), 40-57.

14123 1412425662