Pearl Harbor 2.0: When Cyber-Acts Lead to the Battlefield
Abstract
America is under constant attack in cyberspace. Which of these attacks equate to a Pearl Harbor or the terrorists' acts on September 11? Despite an ever increasing number of attacks, no international policy has adequately established a characterization for what acts constitute an "act of war." Many issues are left unaddressed that need to begin with a classification of cyber attacks. We present a method of classification and a broad taxonomy using an effects-based approach to examine malevolent cyber-activities that may evoke counteractions. We aim to spur discussions under our framework for more granular international level discussions.
AUTHORS
Air Force Institute of Technology Wright-Patterson AFB,
USA
Wayne “Chris” Henry attends the Air Force Institute of Technology (AFIT), Wright-Patterson AFB, OH studying for his Master’s in Computer Engineering. He graduated from Penn State University with a Bachelor’s in Computer Engineering in 2004. His research interests include Network Attribution Techniques, Cyber Attack Tactics, and Malware Reverse Engineering.
Air Force Institute of Technology Wright-Patterson AFB,
USA
Jacob Stange attends the Air Force Institute of Technology (AFIT), Wright-Patterson AFB, OH studying for his Master’s in Cyber Operations. He graduated from the College of Mount St. Joseph with a Bachelor’s in Computer Science in 2009. His research interests include Artificial Intelligence in Crowds, Cyber Attack Tactics, and Attacking Wireless Sensor Networks.
Air Force Institute of Technology Wright-Patterson AFB,
USA
Eric D. Trias, Ph.D. is an Assistant Professor of Computer Science at the Air Force Institute of Technology (AFIT), Wright Patterson AFB, OH. His research interest includes Knowledge Discovery and Data Mining, Information Systems Security, Digital Forensics, Cyberspace Operations, and Information Theory.
Published In
Keywords
Journal of Information Warfare
The definitive publication for the best and latest research and analysis on information warfare, information operations, and cyber crime. Available in traditional hard copy or online.
Quick Links
Archive