{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,4,22]],"date-time":"2024-04-22T21:40:26Z","timestamp":1713822026858},"reference-count":44,"publisher":"IGI Global","issue":"2","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011,4,1]]},"abstract":"<p>A cyberweapon can be as dangerous as any weapon. Fortunately, recent technology now provides some tools for cyberweapons control. Digital forensics can be done on computers seized during or after hostilities. Cyberweapons differ significantly from other software, especially during development, and recent advances in summarizing the contents of storage media can locate possible cyberweapons quickly. Use of cyberweapons can be distinguished in the usual malicious Internet traffic by being aimed at targets associated with political, social, and cultural issues that are often known in advance, and those targets can then be monitored. Cyberweapons are relatively unreliable compared to other kinds of weapons because they are susceptible to flaws in software; therefore, cyberweapons require considerable testing, preferably against live targets. Thus, international \u201ccyberarms agreements\u201d could provide for forensics on cyberweapons and usage monitoring. Agreements also encourage more responsible cyberweapons use by stipulating attribution and reversibility. The authors discuss the kinds of international agreements that are desirable, and examine the recent interest of the U.S. government in such agreements.<\/p>","DOI":"10.4018\/ijcwt.2011040104","type":"journal-article","created":{"date-parts":[[2012,4,5]],"date-time":"2012-04-05T13:05:05Z","timestamp":1333631105000},"page":"35-48","source":"Crossref","is-referenced-by-count":1,"title":["Challenges in Monitoring Cyberarms Compliance"],"prefix":"10.4018","volume":"1","author":[{"given":"Neil C.","family":"Rowe","sequence":"first","affiliation":[{"name":"U.S. Naval Postgraduate School, USA"}]},{"given":"Simson L.","family":"Garfinkel","sequence":"additional","affiliation":[{"name":"U.S. Naval Postgraduate School, USA"}]},{"given":"Robert","family":"Beverly","sequence":"additional","affiliation":[{"name":"U.S. Naval Postgraduate School, USA"}]},{"given":"Panayotis","family":"Yannakogeorgos","sequence":"additional","affiliation":[{"name":"Air Force Research Institute, USA"}]}],"member":"2432","reference":[{"key":"ijcwt.2011040104-0","unstructured":"Areddy, J. (2010, February 20). China\u2019s unique hacker culture. Wall Street Journal, A1."},{"key":"ijcwt.2011040104-1","unstructured":"Baron, K. (2011, July 14). U.S. cyber defenses 'way too predictable' says Cartwright. Stripes Central - Stars and Stripes. Retrieved July 15, 2011, from http:\/\/www.strips.com\/blogs\/stripes-central\/stripes-central-1.8040"},{"key":"ijcwt.2011040104-2","doi-asserted-by":"publisher","DOI":"10.2307\/3312952"},{"key":"ijcwt.2011040104-3","doi-asserted-by":"crossref","unstructured":"Beverly, R., Garfinkel, S., & Cardwell, G. (2011). Forensic carving of network packets and associated data structures. In Proceedings of the 11th Digital Forensics Conference, New Orleans, LA (pp. 78-89).","DOI":"10.1016\/j.diin.2011.05.010"},{"key":"ijcwt.2011040104-4","unstructured":"Beverly, R., & Sollins, K. (2008). An Internet Protocol address clustering algorithm. Paper presented at the 3rd Workshop on Tackling Computer Systems Problems with Machine Learning Techniques, Berkeley, CA."},{"key":"ijcwt.2011040104-5","doi-asserted-by":"crossref","DOI":"10.5040\/9798400636554","author":"S.Brenner","year":"2010","journal-title":"Cybercrime: criminal threats from cyberspace"},{"key":"ijcwt.2011040104-6","author":"R.Clarke","year":"2010","journal-title":"Cyberwar: the next threat to national security and what to do about it"},{"key":"ijcwt.2011040104-7","author":"S.Croft","year":"1996","journal-title":"Strategies of arms control: a history and typology"},{"key":"ijcwt.2011040104-8","doi-asserted-by":"publisher","DOI":"10.1201\/9781439833032.ch123"},{"key":"ijcwt.2011040104-9","author":"R.Erbschloe","year":"2001","journal-title":"Information warfare: how to survive cyber attacks"},{"key":"ijcwt.2011040104-10","unstructured":"Gady, F.-S. (2010, March 24). Africa's Cyber WMD. Foreign Policy."},{"key":"ijcwt.2011040104-11","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511494178"},{"key":"ijcwt.2011040104-12","doi-asserted-by":"publisher","DOI":"10.1016\/j.diin.2006.06.007"},{"key":"ijcwt.2011040104-13","doi-asserted-by":"crossref","unstructured":"Garfinkel, S., Roussev, V., Nelson, A., & White, D. (2010). Using purpose-built functions and block hashes to enable small block and sub-file forensics. In Proceedings of the Digital Forensics Research Conference, Ithaca, NY.","DOI":"10.1016\/j.diin.2010.05.003"},{"key":"ijcwt.2011040104-14","doi-asserted-by":"crossref","unstructured":"Ghernouti-Helie, S. (2010). A national strategy for an effective cybersecurity approach and culture. In Proceedings of the 2010 International Conference on Availability Reliability and Security, Krakow, Poland (pp. 370-373).","DOI":"10.1109\/ARES.2010.119"},{"key":"ijcwt.2011040104-15","unstructured":"Hvistendahl, M. (2010, March 3). China's hacker army. Foreign Policy."},{"key":"ijcwt.2011040104-16","first-page":"439","article-title":"Is it time for a treaty on information warfare?","volume":"Vol. 76","author":"P.Johnson","year":"2002","journal-title":"Computer Network Attack and International Law"},{"key":"ijcwt.2011040104-17","unstructured":"Kornbluh, K., & Weitzner, D. (2011, July 14). 21st century statecraft: foreign policy of the Internet. The Washington Post."},{"key":"ijcwt.2011040104-18","doi-asserted-by":"crossref","DOI":"10.1017\/CBO9780511804250","author":"M.Libicki","year":"2007","journal-title":"Conquest in cyberspace: national security and information warfare"},{"key":"ijcwt.2011040104-19","unstructured":"Lynn, W. (2010). Defending a new domain: the Pentagon's cyberstrategy. Foreign Affairs."},{"key":"ijcwt.2011040104-20","author":"C.Malin","year":"2008","journal-title":"Malware forensics: investigating and analyzing malicious code"},{"key":"ijcwt.2011040104-21","unstructured":"Markoff, J. (2010, September 26). A silent attack, but not a subtle one. New York Times, A6."},{"key":"ijcwt.2011040104-22","author":"H.Mel","year":"2000","journal-title":"Cryptography decrypted"},{"key":"ijcwt.2011040104-23","doi-asserted-by":"crossref","unstructured":"Munz, G., & Carle, G. (2007, May). Real-time analysis of flow data for network attack detection. In Proceedings of the 10th IFIP\/IEEE International Symposium on Integrated Network Management (pp. 100-108).","DOI":"10.1109\/INM.2007.374774"},{"key":"ijcwt.2011040104-24","unstructured":"O'Neill, P. (2010). Verification in an age of insecurity: the future of arms control compliance. New York, NY: Oxford."},{"key":"ijcwt.2011040104-25","author":"R.Price","year":"1997","journal-title":"The chemical weapons taboo"},{"key":"ijcwt.2011040104-26","unstructured":"Rooney, B. (2011, February 4). Calls for Geneva Convention in cyberspace. Wall Street Journal."},{"key":"ijcwt.2011040104-27","doi-asserted-by":"publisher","DOI":"10.4018\/jte.2010081002"},{"key":"ijcwt.2011040104-28","first-page":"145","article-title":"Towards reversible cyberattacks","volume":"Vol. 1","author":"N.Rowe","year":"2011","journal-title":"Leading Issues in Information Warfare and Security Research"},{"key":"ijcwt.2011040104-29","doi-asserted-by":"crossref","unstructured":"Rowe, N., & Garfinkel, S. (2011). Finding anomalous and suspicious files from directory metadata on a large corpus. In Proceedings of the 3rd International ICST Conference on Digital Forensics and Cyber Crime, Dublin, Ireland.","DOI":"10.1007\/978-3-642-35515-8_10"},{"key":"ijcwt.2011040104-30","doi-asserted-by":"crossref","unstructured":"Rowe, N., & Goh, H. (2007, June). Thwarting cyber-attack reconnaissance with inconsistency and deception. In Proceedings of the 8th IEEE Information Assurance Workshop (pp. 151-158).","DOI":"10.1109\/IAW.2007.381927"},{"key":"ijcwt.2011040104-31","first-page":"939","article-title":"Discrimination in the laws of information warfare.","volume":"37","author":"M.Shulman","year":"1999","journal-title":"Columbia Journal of Transnational Law"},{"key":"ijcwt.2011040104-32","doi-asserted-by":"crossref","unstructured":"Sommer, R., & Paxon, V. (2010). Outside the closed world: on using machine learning for network intrusion detection. In Proceedings of the IEEE Symposium on Security and Privacy (pp. 305-316).","DOI":"10.1109\/SP.2010.25"},{"key":"ijcwt.2011040104-33","author":"J.Torpey","year":"2006","journal-title":"Making whole what has been smashed: on reparations politics"},{"key":"ijcwt.2011040104-34","author":"R.Trost","year":"2010","journal-title":"Practical intrusion analysis"},{"key":"ijcwt.2011040104-35","year":"1991","journal-title":"Final document: third review conference of the parties to the convention on the prohibition of the development, production, and stockpiling of bacteriological (biological) and toxin weapons and on their destruction"},{"key":"ijcwt.2011040104-36","unstructured":"U.S. Cyber Consequences Unit (USCCU). (2009). US-CCU special report: Overview by the US-CCU of the cyber campaign against Georgia in August of 2008. Retrieved November 3, 2010, from http:\/\/www.usccu.us"},{"key":"ijcwt.2011040104-37","unstructured":"U.S. Department of Defense (USDOD). (2011a). National military strategy. Retrieved September 11, 2011, from https:\/\/hsdl.org.\/hslog\/?q-node\/5994"},{"key":"ijcwt.2011040104-38","doi-asserted-by":"crossref","unstructured":"U.S. Department of Defense (USDOD). (2011b). Strategy for operating in cyberspace. Retrieved September 11, 2011, from http:\/\/www.defense.gov\/news\/ d20110714cyber.pdf","DOI":"10.21236\/ADA545385"},{"key":"ijcwt.2011040104-39","year":"2010","journal-title":"Cybersecurity: progress made but challenges remain in defining and coordinating the comprehensive national initiative"},{"key":"ijcwt.2011040104-40","author":"P.Wayner","year":"2002","journal-title":"Disappearing cryptography: information hiding: steganography and watermarking"},{"key":"ijcwt.2011040104-41","first-page":"525","article-title":"International law and information operations","author":"T.Wingfield","year":"2009","journal-title":"Cyberpower and National Security"},{"key":"ijcwt.2011040104-42","article-title":"Cyberspace, the new frontier - and the same old multilateralism","author":"P.Yannakogeorgos","year":"2010","journal-title":"Global Norms, American Sponsorship and the Emerging Patterns of World Politics"},{"key":"ijcwt.2011040104-43","author":"P.Yannakogeorgos","year":"2011","journal-title":"Promises and pitfalls of the U.S. national strategy to secure cyberspace"}],"container-title":["International Journal of Cyber Warfare and Terrorism"],"original-title":[],"language":"ng","link":[{"URL":"https:\/\/www.igi-global.com\/viewtitle.aspx?TitleId=64312","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,4,22]],"date-time":"2024-04-22T21:23:18Z","timestamp":1713820998000},"score":1,"resource":{"primary":{"URL":"https:\/\/services.igi-global.com\/resolvedoi\/resolve.aspx?doi=10.4018\/ijcwt.2011040104"}},"subtitle":[""],"short-title":[],"issued":{"date-parts":[[2011,4,1]]},"references-count":44,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2011,4]]}},"URL":"https:\/\/doi.org\/10.4018\/ijcwt.2011040104","relation":{},"ISSN":["1947-3435","1947-3443"],"issn-type":[{"value":"1947-3435","type":"print"},{"value":"1947-3443","type":"electronic"}],"subject":[],"published":{"date-parts":[[2011,4,1]]}}}