Professional Documents
Culture Documents
Systematic Literature Review of Cyberwarfare
Systematic Literature Review of Cyberwarfare
Systematic Literature Review of Cyberwarfare
kkhoyani@uoguelph.ca
A BSTRACT
It is expected that the creation of next-generation wireless networks would result in the availability
of high-speed and low-latency connectivity for every part of our life. As a result, it is important that
the network is secure. The network’s security environment has grown more complicated as a
result of the growing number of devices and the diversity of services that 5G will provide. This is
why it is important that the development of effective security solutions is carried out early. Our
findings of this review have revealed the various directions that will be pursued in the development
of next-generation wireless networks. Some of these include the use of Artificial Intelligence and
Software Defined Mobile Networks. The threat environment for 5G networks, security weaknesses
in the new technology paradigms that 5G will embrace, and provided solutions presented in the
key studies in the field of 5G cyber security are all described in this systematic literature review for
prospective researchers. Future research directions to protect wireless networks beyond 5G are
also covered.
Index Terms—cyberwarfare, cyber forces, hacked, cyber security, Information warfare, cyberattack.
Primary Key Qualitative & Quantita- Theme Primary Key Qualitative & Quantita- Theme
Study tive Data Reported Study tive Data Reported
[17] Cyberwarfare is the use of denial-of- [23] Cybersecurity for vital infras- Cyber secu-
viral assaults or denial-of- service tructure and services through- rity
service (DOS) attacks by any out the world is changing as a
international body to target result of the hybrid conflict in
and make attempts to destroy Ukraine. For a very long time
the systems, infrastructure, or after the battle is resolved,
data management of another the events will continue to al-
country. ter cybersecurity practices all
[18] Recent cyberattacks have hacking across the world.
blurred the distinction [24] Cyberwarfare is the term used cyberwarfare
between real combatants to describe politically inspired
and political hackers. hacking for destruction and
This essay examines the espionage. It is a sort of cy-
implications of cybermilitias berwarfare that is occasion-
and the potential advantages ally contrasted with tradi-
and disadvantages of tional warfare.
cyberconflict. [25] Cyberwarfare entails opera- cyberwarfare
[19] The conventional tendency of cyberattack tions that have a military or
cyber attacks against physical political purpose. Second, it
computer systems is toward entails using cyberspace to de-
controlling and command of liver straight or compound-
the physical infrastructure. ing kinetic impacts that pro-
[20] Human skills and capaci- cyberwarfare duce outcomes equivalent to
ties, including the capacity to those of conventional military
guard, protect, assault, and forces.Third, it produces out-
win battles, must be tailored comes that either lead to a ma-
to the demands of cyberwar- jor threat to a country’s secu-
fare itself. A cyber unit must rity, or that are taken in reac-
do all of these tasks in a va- tion to such a threat.
riety of ways and in coopera- [26] They can anticipate prolonged cyberwarfare
tion with critical institutions. periods of low-intensity,global
These abilities represent the cyberwarfare, a Digital Cold
collective competency of a cy- War, while a play balance is
ber troop. pursued, and that cyberwar-
[21] Because cyberwarfare differs cyberwarfare fare is not subject to control by
from traditional kinetic war- international agreements.
fare, it is important to examine
TABLE 4. Main findings and themes of the primary studies
fundamental warfare concepts
in order to distinguish it from
traditional armed conflict.
[22] In order to examine the me- Cyber secu-
chanics and ramifications of rity
offensive and defense cy-
berwarfare operations, Offen-
sive and Protective Software
Technologies is designed to
bring along technical and non-
technical cyberwarfare spe-
cialists, academics, and practi-
tioners in relevant domains.
a proportion of 24.5% , cyber security is the second most the United States. Following several cyberattacks, the nation
widely discussed subject. With 11.8% of the total themes, has not implemented the required security to ensure against
hacking is the third most prevalent and is largely concerned modern-day crime: cyberwarfare [31].
with how crucial political or financial information might be
stolen by hackers. 4.0.1 RQ1: What is cyberwarfare?
The fourth most frequent subject, with a 6.6% share, is It is crucial to emphasize that the systematic literature
cyberattacks.Cyberspace makes up 3.5% of primary study evaluation under consideration will only concentrate on
themes, whereas Critical Infrastructure makes up 5.6%. cyberattacks and warfare. In light of this, it should be
mentioned that the researchers discovered a large number of
4 D ISCUSSION papers on terrorism and conflict during the attrition process
used to choose the primary studies. But the selection process
Initial search terms reveal that there are several papers gave special attention to research that have cyberwarfare at
that discuss cyberwarfare. Most of the chosen main stud- their core.
ies are experimental hypotheses or notions with limited The term ”cyber warfare,” which is widely used in the
quantitative information and few real-world implications establishment media, has a wide variety of connotations.
for challenges of today [27].”Cyberwar” and ”cyberwarfare” Cyberwarfare, according to Alford’s definition from 2001, is
are two different concepts. Cyberwarfare is the term used to ”any help to improve the overall to compel an adversary to
describe the tactics, methods, and procedures that may be carry out our national will, performed against the program
deployed in a cyberwar. The term ”war” refers to a large- controlling functions inside an adversary’s system.” [32]
scale struggle that frequently lasts a long period and may
This description from Alford represents the idea that
include objectives including the use of force or the intention
nations would use cyberwarfare to further a national ob-
to kill.
jective. However, it may be argued that modern combat
Richard A. Clarke, who served as US President George
does not necessarily strive to further such a cause. Possibly,
W. Bush’s chief cyber security advisor, described cyber war
the objective of modern warfare is to spread non-national
as ”activities by a nation state to infiltrate another nation’s
philosophies and religious convictions. Therefore, it is im-
systems and networks for the objective of causing injury or
prudent to limit a definition of cyberwarfare to having that
damage” (Knake and Clarke, 2010) [28].
goal as its primary objective.
According to the definition of cyberwar provided by the
”Cyber warfare is the science and art of battling without
Oxford English Dictionary, it is only ”another name for cy-
fighting; of conquering an opponent without sacrificing
berwar.” Cyber war, as described by the Oxford Dictionary
their blood,” says Jeffrey Carr in another explanation of
(2013) [29], is ”the use of digital technology to hamper a state
the term [33]. Unlike Alford’s (2001), this term does not try
or institution’s functioning, notably the deliberate attack of
to explain why the opposing sides are fighting. The idea
communications infrastructure by some other country or
that cyberwarfare won’t result in casualties, however, has
organization.” Like the other definitions under discussion,
to be called into doubt. Losses of life might happen from
this one may be viewed as having issues.Like any activity
a cyberattack on vital national infrastructure, including the
that has the potential to hurt, cyberwarfare raises ethical
electrical system.
issues. Particularly nations must comprehend if cyberwar-
fare is morally permissible and how to conduct it morally
4.0.2 RQ2: Is cyberwarfare ethical?
[30].All cyberattacks are currently orchestrated and planned
by people. These tasks are projected to be created and Like any act that has the potential to do harm, cyberwarfare
performed in the future by artificial intelligence. Artificial poses ethical issues. Nations must precisely comprehend
intelligence (AI) technologies will be quicker than humans when and how to conduct such combat in cyberspace in
in analyzing and breaching security measures. They will accordance with moral principles. According to Taddeo, the
have considerably greater ability to disrupt systems than Just War Theory, a set of precisely outlined criteria that
they had in the past. One of the best methods to defend define when a country is ethically justified in starting a war
against cyberattacks will be blockchain. Systems can be kept and how to act decently while at war, governs conventional
safe, and data can be shielded from hackers. battles. Taddeo argues that these ideas are difficult to ap-
Cyberwarfare is the useing of viral attacks or denial-of- ply to cyber warfare and that these difficulties necessitate
service attacks by any international organization to target further research [34].
and try to destroy the computers, infrastructure, or data Taddeo proposes three criteria that make up a ”Just Cy-
management of another country. Cyberwarfare is the use of ber War” in an effort to solve the problem of cyber warfare
pcs, IoTs, and networking in a conflict area or as a compo- ethics. These guidelines are connected to the concept of a
nent of covert warfare. It involves aggressive and sceptical ”infosphere.” This is described by Taddeo as ”the setting in
actions in respect to the risk of cyberattacks, monitoring, which informational things, both alive and lifeless, digital
and collateral/other harm. Whether or not these actions and analog, are ethically judged.”
fall within the definition of ”war” is up for discussion. 1) Only entities that threaten or interfere with the infos-
Transnational cyber-security is still a problem for major phere’s stability should be targeted by cyberwarfare.
national and international entities.Current experts lack the 2) To protect the health of the infosphere, cyberwar should
means to deal with the ongoing change in the cybersecurity be fought.
field since they lack in-depth knowledge of the issue. Both 3) Fighting a cyberwar shouldn’t be done to protect the
the culprit and the victim of these cyberattacks are mostly infosphere.
7
Point 1 stands for the idea that using cyberwar is ac- [2] Y. Dinstein, “”the principle of distinction and cyber war in inter-
ceptable to get rid of threats to the atmosphere’s wellbeing. national armed conflicts”,” Journal of Conflict and Security Law, vol.
vol. 17, no. 2, pp. 261–277, 2012.
The next two arguments represent the idea that cyberwar [3] R. R. Dipert, “”the ethics of cyberwarfare”,” Journal of Military
should never be utilized to improve the well-being of the Ethics, vol. vol. 9, no. 4, pp. 384–410, 2010.
Infosphere beyond its natural condition, but rather solely [4] R. E. Indrajit, Marsetio, R. Gultom, and P. Widodo, “Cyber troops:
to restore it to a status quo following a detrimental effect. Developing collective abilities to face cyberwarfare challenges,”
in 2021 International Conference on Advanced Computer Science and
Together, these arguments argue that cyberwar is morally Information Systems (ICACSIS), 2021, pp. 1–6.
acceptable so long as it helps to preserve the infosphere. [5] D. Kuelh, “”from cyberspace to cyberpower”,” Potomac Books,
2009.
4.0.3 RQ3: What kind of infrastructure is required to cope [6] H. Shelton, “Joint doctrine for information operations,” JOINT
CHIEFS OF STAFF WASHINGTON DC, Tech. Rep., 1998.
with cyberwarfare?
[7] D. Serpanos and T. Komninos, “The cyberwarfare in ukraine,”
Attacks by hackers on communication networks, govern- Computer, vol. 55, no. 07, pp. 88–91, jul 2022.
ments, or power grids may bring entire civilizations to a [8] A. Yazdinejad, R. M. Parizi, A. Bohlooli, A. Dehghantanha, and
standstill.As the battle in Ukraine shows, this makes them K.-K. R. Choo, “A high-performance framework for a network
programmable packet processor using p4 and fpga,” Journal of
an effective military tool.The actions that can be taken to Network and Computer Applications, vol. 156, p. 102564, 2020.
defend crucial infrastructure against cyberattacks: [9] A. Yazdinejad, B. Zolfaghari, A. Dehghantanha, H. Karimipour,
Security Information and Event Management G. Srivastava, and R. M. Parizi, “Accurate threat hunting in
(SIEM):safeguards against dangerous software and keeps industrial internet of things edge devices,” Digital Communications
and Networks, 2022.
track of network activities and access [10] B. A. Kitchenham and S. Charters, “Guidelines for performing
Firewall:Inbound communication between computer systematic literature reviews in software engineering,” Keele
operations and the outside world is examined, evaluated, University and Durham University Joint Report, Tech. Rep. EBSE
2007-001, 07 2007. [Online]. Available: https://www.elsevier.
and filtered by a digital firewall. com/ data/promis misc/525444systematicreviewsguide.pdf
Trust Zones: Your internal network has extra firewalls [11] S. Hosseini, B. Turhan, and D. Gunarathna, “A systematic litera-
created to safeguard sensitive information requiring in- ture review and meta-analysis on cross project defect prediction,”
creased protection. IEEE Transactions on Software Engineering, vol. 45, pp. 111–147,
2019.
Data Encryption: Secure connections and data on per-
[12] S. Kim, J. Kang, H. Oh, D. Shin, and D. Shin, “Operation frame-
sonal devices are crucial for Iot network like smart metering work including cyber warfare execution process and operational
and smart meters. concepts,” IEEE Access, vol. 8, pp. 109 168–109 176, 2020.
Multi-Factor Authentication:requires staff to access a [13] Ms.Nikita, “Study on cyber warfare during 2001-2019,” INTER-
NATIONAL JOURNAL OF ENGINEERING RESEARCH & TECH-
system or network using more than just a password NOLOGY (IJERT), vol. 8, 2020.
[14] A. V. Vu, D. R. Thomas, B. Collier, A. Hutchings, R. Clayton, and
R. Anderson, “Getting bored of cyberwar: Exploring the role of
5 C ONCLUSION AND FUTURE STUDY the cybercrime underground in the russia-ukraine conflict,” 2022.
This essay has offered an overview of current ideas about [Online]. Available: https://arxiv.org/abs/2208.10629
[15] D. J. Swicegood, “State-sponsored intrusion and cyber-terrorism,”
the difficulties posed by cyberwarfare. It started off by june 2004.
examining the terms cyberwar and cyberwarfare as they [16] M. Gazula, “Cyber warfare conflict analysis and case studies,”
are now used. The United States should get ready for three Ph.D. dissertation, 01 2017.
crucial things, according to James Miller, a former assistant [17] S. Mukherjee, “Cyberwarfare and implications,” 07 2019.
secretary of state of security for policy [35]. [18] S. Applegate, “Cybermilitias and political hackers: Use of irregular
forces in cyberwarfare,” IEEE Security & Privacy, vol. 9, pp. 16–22,
1) Give strength for nuclear attack systems and for far-off 09 2011.
conventional stages top priority, and invest in it. [19] R. Loui and W. Hope, “Information warfare amplified by cyber-
2) Make a concerted effort to project the nation’s vital warfare and hacking the national knowledge infrastructure,” in
2017 IEEE 15th Intl Conf on Dependable, Autonomic and Secure Com-
infrastructure and maintain a safety margin so that puting, 15th Intl Conf on Pervasive Intelligence and Computing, 3rd Intl
terrorist organizations are unable to put the nation at Conf on Big Data Intelligence and Computing and Cyber Science and
danger through cyberattacks. Technology Congress (DASC/PiCom/DataCom/CyberSciTech). IEEE,
2017, pp. 280–283.
3) Create a type of script in advance and use it to direct
[20] R. E. Indrajit, R. Gultom, P. Widodo et al., “Cyber troops: De-
and manage how you will react to a sizable cyberattack. veloping collective abilities to face cyberwarfare challenges,” in
The most important finding is that there is no one field 2021 International Conference on Advanced Computer Science and
Information Systems (ICACSIS). IEEE, 2021, pp. 1–6.
that can adequately address all of the problems brought by
[21] R. C. Parks and D. P. Duggan, “Principles of cyberwarfare,” IEEE
cyberwarfare. For instance, attribution and cyber defense Security & Privacy, vol. 9, no. 5, pp. 30–35, 2011.
are undoubtedly technological concerns, but effective reso- [22] B. Hay and S. LaFountain, “Introduction to cyberwarfare: Offen-
lution of these and other problems need political, legal, and sive and defensive software technologies minitrack,” in 2015 48th
Hawaii International Conference on System Sciences. IEEE, 2015, pp.
societal participation. Similar to this, developing a set of
5211–5211.
rules for cyber warfare calls for input from the technical and [23] D. Serpanos and T. Komninos, “The cyberwarfare in ukraine,”
military on what would be possible to enforce in addition to Computer, vol. 55, no. 7, pp. 88–91, 2022.
legal experts. [24] A.-D. Qusai and S. B. Sadkhan, “Cyberwarfare techniques: Status,
challenges and future trends,” in 2021 7th International Conference
on Contemporary Information Technology and Mathematics (ICCITM).
R EFERENCES IEEE, 2021, pp. 124–129.
[25] V. A. Almeida, D. Doneda, and J. de Souza Abreu, “Cyberwarfare
[1] M. T. Kwon, “”a study on the defense cyber warfare exercise”,” J. and digital governance,” IEEE Internet Computing, vol. 21, no. 2,
Inf. Secur., vol. vol. 9, no. 4, pp. 43–53, 2009. pp. 68–71, 2017.
8