Requirements for a Future EWS - Cyber Defence in the Internet of the Future

The emergence of new technologies and services as well as trillions of devices and petabytes of data to be processed and transferred in the Internet of the Future mean that we have to deal with new threats and vulnerabilities, in addition to handle the remaining old ones. Together with the rise of Cyber Warfare and the resulting impact on the environment means that we have to bring intelligence back to the network. Consequently, effective Cyber Defence will be more and more important. In this paper we will show that the proposed requirements for an Early Warning System are a main part of future Cyber Defence. Special attention is given on the challenges associated to the generation of early warning systems for future attacks on the Internet of the Future. The term Cyber War is used frequently but unfortunately with different intends. Therefore, we start with a definition of the term Cyber War focusing on security aspects related to the Internet of the Future, followed by an exemplification of a Cyber War, of its implications and the challenges associated to it. Then we proceed with an analysis of state of the art recent work that has been proposed on the topic. Additionally the weaknesses of these analyzed systems and approaches are presented. Finally we propose guidelines and requirements for future work which will be needed to implement a next generation early warning system for securing the Internet of the Future.

[1]  Peeter Laud,et al.  Handling Encryption in an Analysis for Secure Information Flow , 2003, ESOP.

[2]  Martin C. Libicki Cyberdeterrence and Cyberwar , 2009 .

[3]  John Arquilla,et al.  Cyberwar is coming , 1993 .

[4]  Farrukh Aslam Khan,et al.  Intrusion Detection Systems for Wireless Sensor Networks: A Survey , 2009, FGIT-FGCN.

[5]  Kevin Knight,et al.  Toward Distributed Use of Large-Scale Ontologies t , 1997 .

[6]  Friedemann Mattern,et al.  Vom Internet der Computer zum Internet der Dinge , 2010, Informatik-Spektrum.

[7]  Mica R. Endsley,et al.  Toward a Theory of Situation Awareness in Dynamic Systems , 1995, Hum. Factors.

[8]  John W. Lockwood,et al.  Deep packet inspection using parallel Bloom filters , 2003, 11th Symposium on High Performance Interconnects, 2003. Proceedings..

[9]  Seyed A Shahrestani Employing artificial immunology and approximate reasoning models for enhanced network intrusion detection , 2009 .

[10]  Richard A. Clarke,et al.  Cyber War: The Next Threat to National Security and What to Do About It , 2010 .

[11]  Sahin Albayrak,et al.  Intelligent Network-Based Early Warning Systems , 2006, CRITIS.

[12]  N. John Castellan,et al.  Individual and group decision making : current issues , 2013 .

[13]  Peter Sewell,et al.  Passive-attack analysis for connection-based anonymity systems , 2004, International Journal of Information Security.

[14]  Kai Hwang,et al.  Cloud Security with Virtualized Defense and Reputation-Based Trust Mangement , 2009, 2009 Eighth IEEE International Conference on Dependable, Autonomic and Secure Computing.

[15]  Michael E. Lesk,et al.  The New Front Line: Estonia under Cyberassault , 2007, IEEE Security & Privacy.

[16]  Ray Bert,et al.  Cyber War: The Next Threat to National Security and What to Do About It , by Richard A. Clarke and Robert K. Knake. New York: HarperCollins, 2010. , 2010 .

[17]  Salvatore J. Stolfo,et al.  Anomalous Payload-Based Network Intrusion Detection , 2004, RAID.

[18]  Tony Guo,et al.  Shaping Preventive Policy in “Cyber War” and Cyber Security: A Pragmatic Approach , 2012 .

[19]  Gerald G. Brown,et al.  Defending Critical Infrastructure , 2006, Interfaces.