网络对反介入和区域拒止计数器的影响

M. Assante
{"title":"网络对反介入和区域拒止计数器的影响","authors":"M. Assante","doi":"10.1109/CYCONUS.2016.7836611","DOIUrl":null,"url":null,"abstract":"The purpose of this paper is to discuss the implications and application of anti-access and area-denial (A2/AD) strategies to cyber warfare and the approaches needed to defend against such strategies. Traditional A2/AD strategies are used to deny or restrict a military opponent’s access to strategic battle areas. By employing similar methodology to cyber warfare, adversaries can seize control of cyber-dependent platforms, which are then used to negatively affect physical assets and resources. Actively defending against Cyber A2/AD campaigns is especially critical since cyber attacks often occur without the typical warnings and escalation of traditional warfare. Protecting the U.S. against Cyber A2/AD requires a unified cyber defense effort that shares information and resources among intelligence and military teams and civilian infrastructure owners and operators. This paper explores possible approaches and challenges to integrating U.S. cyber defenses, including a deliberation on balancing military assistance against civil liberties and governance concerns. The ability to defend against Cyber A2/AD is dependent on comprehensive preparation. This paper provides a detailed list of actions that the U.S. needs to take in order to successfully prepare itself for a strategic cyber war. The discussion on cyber preparation also includes a summary of geographical areas where Cyber A2/AD activity is anticipated, and lists potential impacts and existing concerns in these areas. A key component to countering Cyber A2/AD is to actively look for threats and react immediately to disrupt the attacks. This can only happen if the cyber defenders are as skilled and as practiced as the attacker. Thus cyber defense training must include exercises, scenarios, and tests that will provide ‘real world’ experiences for trainees. The final section of this paper provides a model scenario that illustrates the stages of a Cyber A2/AD attack and can be used to facilitate further discussion on countering cyber threats.","PeriodicalId":358914,"journal":{"name":"2016 International Conference on Cyber Conflict (CyCon U.S.)","volume":"164 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Implications of cyber in anti-access and area-denial counters\",\"authors\":\"M. Assante\",\"doi\":\"10.1109/CYCONUS.2016.7836611\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The purpose of this paper is to discuss the implications and application of anti-access and area-denial (A2/AD) strategies to cyber warfare and the approaches needed to defend against such strategies. Traditional A2/AD strategies are used to deny or restrict a military opponent’s access to strategic battle areas. By employing similar methodology to cyber warfare, adversaries can seize control of cyber-dependent platforms, which are then used to negatively affect physical assets and resources. Actively defending against Cyber A2/AD campaigns is especially critical since cyber attacks often occur without the typical warnings and escalation of traditional warfare. Protecting the U.S. against Cyber A2/AD requires a unified cyber defense effort that shares information and resources among intelligence and military teams and civilian infrastructure owners and operators. This paper explores possible approaches and challenges to integrating U.S. cyber defenses, including a deliberation on balancing military assistance against civil liberties and governance concerns. The ability to defend against Cyber A2/AD is dependent on comprehensive preparation. This paper provides a detailed list of actions that the U.S. needs to take in order to successfully prepare itself for a strategic cyber war. The discussion on cyber preparation also includes a summary of geographical areas where Cyber A2/AD activity is anticipated, and lists potential impacts and existing concerns in these areas. A key component to countering Cyber A2/AD is to actively look for threats and react immediately to disrupt the attacks. This can only happen if the cyber defenders are as skilled and as practiced as the attacker. Thus cyber defense training must include exercises, scenarios, and tests that will provide ‘real world’ experiences for trainees. The final section of this paper provides a model scenario that illustrates the stages of a Cyber A2/AD attack and can be used to facilitate further discussion on countering cyber threats.\",\"PeriodicalId\":358914,\"journal\":{\"name\":\"2016 International Conference on Cyber Conflict (CyCon U.S.)\",\"volume\":\"164 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2016-10-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2016 International Conference on Cyber Conflict (CyCon U.S.)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/CYCONUS.2016.7836611\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2016 International Conference on Cyber Conflict (CyCon U.S.)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CYCONUS.2016.7836611","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

摘要

本文的目的是讨论反介入和区域拒止(A2/AD)战略对网络战的影响和应用,以及防御此类战略所需的方法。传统的A2/AD战略被用来拒绝或限制军事对手进入战略战区。通过采用与网络战类似的方法,对手可以控制依赖网络的平台,然后利用这些平台对实体资产和资源产生负面影响。积极防御网络A2/AD战役尤其重要,因为网络攻击通常在没有传统战争的典型警告和升级的情况下发生。保护美国免受网络A2/AD攻击需要统一的网络防御努力,在情报和军事团队以及民用基础设施所有者和运营商之间共享信息和资源。本文探讨了整合美国网络防御的可能方法和挑战,包括对平衡军事援助与公民自由和治理问题的审议。防御网络A2/AD的能力依赖于全面的准备。本文提供了美国需要采取的行动的详细清单,以便成功地为战略网络战做好准备。关于网络准备的讨论还包括对预计进行网络A2/AD活动的地理区域的总结,并列出了这些区域的潜在影响和现有问题。对抗网络A2/AD的一个关键组成部分是积极寻找威胁并立即做出反应以破坏攻击。这只有在网络防御者和攻击者一样熟练和熟练的情况下才会发生。因此,网络防御训练必须包括演习、场景和测试,为受训者提供“真实世界”的体验。本文的最后一部分提供了一个模型场景,说明了网络A2/AD攻击的各个阶段,可用于促进对应对网络威胁的进一步讨论。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Implications of cyber in anti-access and area-denial counters
The purpose of this paper is to discuss the implications and application of anti-access and area-denial (A2/AD) strategies to cyber warfare and the approaches needed to defend against such strategies. Traditional A2/AD strategies are used to deny or restrict a military opponent’s access to strategic battle areas. By employing similar methodology to cyber warfare, adversaries can seize control of cyber-dependent platforms, which are then used to negatively affect physical assets and resources. Actively defending against Cyber A2/AD campaigns is especially critical since cyber attacks often occur without the typical warnings and escalation of traditional warfare. Protecting the U.S. against Cyber A2/AD requires a unified cyber defense effort that shares information and resources among intelligence and military teams and civilian infrastructure owners and operators. This paper explores possible approaches and challenges to integrating U.S. cyber defenses, including a deliberation on balancing military assistance against civil liberties and governance concerns. The ability to defend against Cyber A2/AD is dependent on comprehensive preparation. This paper provides a detailed list of actions that the U.S. needs to take in order to successfully prepare itself for a strategic cyber war. The discussion on cyber preparation also includes a summary of geographical areas where Cyber A2/AD activity is anticipated, and lists potential impacts and existing concerns in these areas. A key component to countering Cyber A2/AD is to actively look for threats and react immediately to disrupt the attacks. This can only happen if the cyber defenders are as skilled and as practiced as the attacker. Thus cyber defense training must include exercises, scenarios, and tests that will provide ‘real world’ experiences for trainees. The final section of this paper provides a model scenario that illustrates the stages of a Cyber A2/AD attack and can be used to facilitate further discussion on countering cyber threats.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信