Stuxnet and the Limits of Cyber Warfare

被引:186
作者
Lindsay, Jon R. [1 ]
机构
[1] Univ Calif, Inst Global Conflict & Cooperat IGCC, Uc San Diego, CA USA
关键词
INFORMATION WARFARE; OFFENSE; DEFENSE; CAPABILITIES;
D O I
10.1080/09636412.2013.816122
中图分类号
D81 [国际关系];
学科分类号
030207 ;
摘要
Stuxnet, the computer worm which disrupted Iranian nuclear enrichment in 2010, is the first instance of a computer network attack known to cause physical damage across international boundaries. Some have described Stuxnet as the harbinger of a new form of warfare that threatens even the strongest military powers. The influential but largely untested Cyber Revolution thesis holds that the internet gives militarily weaker actors asymmetric advantages, that offense is becoming easier while defense is growing harder, and that the attacker's anonymity undermines deterrence. However, the empirical facts of Stuxnet support an opposite interpretation; cyber capabilities can marginally enhance the power of stronger over weaker actors, the complexity of weaponization makes cyber offense less easy and defense more feasible than generally appreciated, and cyber options are most attractive when deterrence is intact. Stuxnet suggests that considerable social and technical uncertainties associated with cyber operations may significantly blunt their revolutionary potential.
引用
收藏
页码:365 / 404
页数:40
相关论文
共 143 条
[71]  
Kollberg Dirk, 2012, THE KOOBFACE MALWARE
[72]  
Langill Joel, 2011, TOFINO SECURITY WHIT
[73]  
Langner Ralph, 2012, PRESENTATION AT DIGI
[74]  
Langner Ralph, 2011, NPR MORNING EDITION
[75]  
Lawson Sean, 2012, JOURNAL OF INFORMATI, V10, P86
[76]   Click Trajectories: End-to-End Analysis of the Spam Value Chain [J].
Levchenko, Kirill ;
Pitsillidis, Andreas ;
Chachra, Neha ;
Enright, Brandon ;
Felegyhazi, Mark ;
Grier, Chris ;
Halvorson, Tristan ;
Kanich, Chris ;
Kreibich, Christian ;
Liu, He ;
McCoy, Damon ;
Weaver, Nicholas ;
Paxson, Vern ;
Voelker, Geoffrey M. ;
Savage, Stefan .
2011 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP 2011), 2011, :431-446
[77]  
Lewis James A., 2011, CYBERSECURITY AND CY
[78]  
Libicki Martin C., 2009, CYBERDETERRENCE AND
[79]  
Libicki MC, 2007, CONQUEST IN CYBERSPACE: NATIONAL SECURITY AND INFORMATION WARFARE, P1, DOI 10.1017/CBO9780511804250
[80]  
Lieber Keir A, 2011, PAPER PRESENTED AT T