Think! Evidence

The Proliferation of Weapons in Cyberspace

Show simple item record

dc.creator Aviv Rotbart
dc.creator Daniel Cohen
dc.date 2013-05-01T00:00:00Z
dc.date.accessioned 2015-07-20T20:08:08Z
dc.date.available 2015-07-20T20:08:08Z
dc.identifier 2307-793X
dc.identifier 2307-8634
dc.identifier https://doaj.org/article/dfe774bca45d4af1a233ac53d0a43846
dc.identifier.uri http://evidence.thinkportal.org/handle/123456789/8000
dc.identifier.uri https://doaj.org/article/dfe774bca45d4af1a233ac53d0a43846
dc.description Non-state actors in cyberspace, particularly criminal and terrorist organizations, can make use of, or already have made use of, variations of existing malicious codes and convert them so as to serve the organization’s purposes. The greater the accessibility of A unique aspect of cyberspace not found in other arenas of combat is the ability to defend against viruses or other malicious codes; that have already been used in the past and discovered by security bodies. Ostensibly, cyber weapons can be used only once, as they become useless the moment they are identified and signed. That said, do all the man-years invested in developing sophisticated malicious codes go down the drain as soon as an attack is discovered and signed? This article shows that they do not. As cyber attacks increase, cyber tools and capabilities proliferate around the world. One of the main reasons for this is that cyber weapons, for example, malicious code used in one attack can be used for other attacks as well after they are converted. In a term borrowed from the world of biology, this is called “mutated code.” Such code has functional characteristics similar to the original code from which it was created (and can even be totally identical). The difference between the original code and the mutated code is syntactical (structural) only and not semantic, where it is intended to evade the radar of software that identifies attackers.From this we can conclude that if malicious code falls into the hands of an adversary with motivation and capability, it provides the attacked party with a weapon which, if it arms itself appropriately while executing complex actions such as reverse engineering, can be exploited for repeated use. In addition, an attacker who understands the weapon can use it effectively and change it according to his needs to carry out further attacks.
dc.language English
dc.publisher Institute for National Security Studies
dc.relation http://d26e8pvoto2x3r.cloudfront.net/uploadimages/systemfiles/masa5-1eng4_cohen%20and%20rotbart.pdf
dc.relation https://doaj.org/toc/2307-793X
dc.relation https://doaj.org/toc/2307-8634
dc.rights CC BY
dc.source Military and Strategic Affairs, Vol 5, Iss 1, Pp 59-80 (2013)
dc.subject cyber
dc.subject mutated code
dc.subject malicious code
dc.subject attacks
dc.subject code
dc.subject cyberspace
dc.subject Proliferation
dc.subject weapons
dc.subject Military Science
dc.subject U
dc.subject DOAJ:Military Science
dc.subject DOAJ:Technology and Engineering
dc.subject Military Science
dc.subject U
dc.subject DOAJ:Military Science
dc.subject DOAJ:Technology and Engineering
dc.subject Military Science
dc.subject U
dc.subject Military Science
dc.subject U
dc.subject Military Science
dc.subject U
dc.title The Proliferation of Weapons in Cyberspace
dc.type Article


Files in this item

Files Size Format View

There are no files associated with this item.

This item appears in the following Collection(s)

Show simple item record

Search Think! Evidence


Browse

My Account