MILITARY MANAGEMENT QUARTERLY

MILITARY MANAGEMENT QUARTERLY

Providing a Conceptual Model of Cyber Weapons

Document Type : Research Paper

Authors
1 Dependence of humans on information technology has emerged a new form of war called cyber war. In the era of information and communication, cyber weapons are considered as the main pillars of cyber war and strategic issues of governments. The ability to produce, develop and use these weapons will increase the defense power of the nations in the cyber space and consequently in national power. The possibility of using cyber weapons against the important infrastructure has caused the masters of the defense field enter to this new field by using the latest technological achievements and realize the cyber deterrence increasingly. In this mixed approach (quantitative and qualitative) and content analysis method research, related literature was studied and cyber weapons at a strategic level were investigated, meantime; 79 commanders, managers and experts in strategic, operational and tactical levels of cyber defense of the country have presented the conceptual model of cyber weapons in an exploratory manner. In this study, three concepts of efficiency, intelligence and anonymity of cyber weapons have been identified as strategic dimensions of the model through in-depth interview; and then dimensions, components and indicators have been determined. Finally, by data analysis the conceptual model of cyber weapons in three dimensions, nine components and forty-four indicators are presented.
2 Assistant Professor, Supreme National Defense University (SNDU), Tehran, Iran
10.22034/iamu.2022.537404.2630
Abstract
Dependence of humans on information technology has emerged a new form of war called cyber war. In the era of information and communication, cyber weapons are considered as the main pillars of cyber war and strategic issues of governments. The ability to produce, develop and use these weapons will increase the defense power of the nations in the cyber space and consequently in national power. The possibility of using cyber weapons against the important infrastructure has caused the masters of the defense field enter to this new field by using the latest technological achievements and realize the cyber deterrence increasingly. In this mixed approach (quantitative and qualitative) and content analysis method research, related literature was studied and cyber weapons at a strategic level were investigated, meantime; 79 commanders, managers and experts in strategic, operational and tactical levels of cyber defense of the country have presented the conceptual model of cyber weapons in an exploratory manner. In this study, three concepts of efficiency, intelligence and anonymity of cyber weapons have been identified as strategic dimensions of the model through in-depth interview; and then dimensions, components and indicators have been determined. Finally, by data analysis the conceptual model of cyber weapons in three dimensions, nine components and forty-four indicators are presented.
Keywords

  1. بارانی، ف. & سبزه کار، م. (1396). بررسی انواع روش های تشخیص بدافزارها و استراتژی های بدافزارها در مقابل آنها. چهارمین کنفرانس بین المللی یافته های نوین علوم و تکنولوژی. 710813https://civilica.com/doc/

    رحیم اف، ه. & موحدی صفت، م. ر. (1399). ارائه یک الگوی بومی برای امنیت فرماندهی و کنترل عملیات انکار سرویس توزیع شده. دوازدهمین کنفرانس ملی فرماندهی و کنترل ایران. 1243721https://civilica.com/doc/

    علی نژاد، میقانی، احمد، بوالحسنی، & رضایت. (1399). مقاله پژوهشی: طراحی الگوی آرایه‌های پدافند زمین به هوا در مقابله با تهدیدات علیه مراکز حیاتی و حساس در افق چشم‌انداز 1404 مطالعات دفاعی استراتژیک، 18(80), 57–82.

    فریدون، ع. (1394). چگونگی بهره گیری از اصول (اختفا، فریب و استتار) در راستای دفاع در برابر سنجنده های دشمن. کنگره پیشگامان پیشرفت. 56495http://fa.seminars.sid.ir/ViewPaper.aspx?ID=

    مرکز آپا دانشگاه امیرکبیر. (1395). شفافیت گواهی، مدلی برای کشف گواهی‌های دیجیتال جعلی. 764Online. https://apa.aut.ac.ir/?p=

    مقام معظم رهبری. (1394). حکم انتصاب دوره دوم اعضای شورای عالی فضای مجازی. https://farsi.khamenei.ir/message-content?id=

     

    ALMAIAH, A. & ALMOMANI, O. (2020). An investigation of digital forensics for shamoon attack behaviour in FOG computing and threat intelligence for incident response. Journal of Theoretical and Applied Information Technology, 98(07).

    Bakić, B. Milić, M. Antović, I. Savić, D. & Stojanović, T. (2021). 10 years since Stuxnet: What have we learned from this mysterious computer software worm? 2021 25th International Conference on Information Technology (IT), 1–4.

    Bates, N. (2020). Comparing Cyber Weapons to Traditional Weapons Through the Lens of Business Strategy Frameworks.

    Bellovin, S. M. Landau, S. & Lin, H. S. (2017). Limiting the undesired impact of cyber weapons: technical requirements and policy implications. Journal of Cybersecurity, 3(1), 59–68.

    Buchan, R. & Tsagourias, N. (2020). Autonomous Cyber Weapons and Command Responsibility. International Law Studies, 96(1), 21.

    Buchanan, B. (2020). The Hacker and the State: Cyber Attacks and the New Normal of Geopolitics. Harvard University Press.

    Enisa. (2020). Main incidents in the EU and worldwide.

    Godwin III, J. B. Kulpim, A. Rauscher, K. F. & Yaschenko, V. (2014). Critical terminology foundations 2. Russia-US Bilateral on Cybersecurity. Policy Report, 2, 2014.

    Hore, S. & Raychaudhuri, K. (2021). Cyber Espionage-An Ethical Analysis. In M. K. Sharma, V. S. Dhaka, T. Perumal, N. Dey, & J. M. R. S. Tavares (Eds.), Innovations in Computational Intelligence and Computer Vision (pp. 34–40). Springer Singapore.

    Kaloudi, N. & Li, J. (2020). The ai-based cyber threat landscape: A survey. ACM Computing Surveys (CSUR), 53(1), 1–34.

    1. Ablon and A. Bogart. (2017). Zero Days, Thousands of Nights The Life and Times of Zero-Day Vulnerabilities and Their Exploits. https://www.rand.org/pubs/research_reports/RR1751.html

    Leavitt, N. (2011). Internet Security under Attack: The Undermining of Digital Certificates. Computer, 44(12), 17–20. https://doi.org/10.1109/MC.2011.367

    Leuprecht, C. Szeman, J. & Skillicorn, D. B. (2019). The Damoclean sword of offensive cyber: Policy uncertainty and collective insecurity. Contemporary Security Policy, 40(3), 382–407.

    Lin, H. & Zegart, A. (2017). Introduction to the special issue on strategic dimensions of offensive cyber operations. Journal of Cybersecurity, 3(1), 1–5.

    Lin, H. & Zegart, A. (2019). Bytes, bombs, and spies: The strategic dimensions of offensive cyber operations. Brookings Institution Press.

    1. Hypponen. (2019). Responding to a Cyber Attack with Missiles. https://www.conferencecast.tv/talk-20213-responding-to-a-cyberattack-with-missiles

    Maathuis, C. Pieters, W. & Van Den Berg, J. (2016). Cyber weapons: a profiling framework. 2016 International Conference on Cyber Conflict (CyCon US), 1–8.

    Mezzour, G. Carley, K. M. & Carley, L. R. (2018). Remote assessment of countries’ cyber weapon capabilities. Social Network Analysis and Mining, 8(1), 1–15.

    Oxford University Press. (2021). Oxford Dictionary. https://www.oxfordlearnersdictionaries.com/definition/english/oxford-university-press

    Rid, T. & McBurney, P. (2012). Cyber-weapons. The RUSI Journal, 157(1), 6–13.

    Schmitt, M. N. (2013). Tallinn manual on the international law applicable to cyber warfare. Cambridge University Press.

    Shoaib, M. (2020). AI-Enabled Cyber Weapons and Implications for Cybersecurity. Journal of Strategic Affairs.

    Smeets, M. (2018). A matter of time: On the transitory nature of cyberweapons. Journal of Strategic Studies, 41(1–2), 6–32.

    Zion Market Research. (2021). The global Cyber Weapon market. https://www.zionmarketresearch.com/news/cyber-weapon-market