Publication detail

Fighting the 'Good' Internet War

CVRČEK, D. DANEZIS, G.

Original Title

Fighting the 'Good' Internet War

English Title

Fighting the 'Good' Internet War

Type

conference paper

Language

en

Original Abstract

We review the current strategies to counter Internet threats under the light of the classic strategy literature. The literature often advocates proactive action, and dominance of the (virtual, in our case) battlefield, which is the opposite from what we see defenders deploy today. Their actions are instead reactive and exclusively defensive. We propose strategies for defenders to regain the initiative and push security solutions far beyond the reach of current security tools -- yet those strategies start mirroring the actions and technologies of the bad guys, and confront us with important technical, legal and moral dilemmas.

English abstract

We review the current strategies to counter Internet threats under the light of the classic strategy literature. The literature often advocates proactive action, and dominance of the (virtual, in our case) battlefield, which is the opposite from what we see defenders deploy today. Their actions are instead reactive and exclusively defensive. We propose strategies for defenders to regain the initiative and push security solutions far beyond the reach of current security tools -- yet those strategies start mirroring the actions and technologies of the bad guys, and confront us with important technical, legal and moral dilemmas.

Keywords

Internet, security, war-driving, spam, malware, war, defence

RIV year

2008

Released

15.02.2008

Publisher

University of Hertfordshire

Location

Hertfodshire

Pages from

1

Pages to

6

Pages count

6

Documents

BibTex


@inproceedings{BUT32583,
  author="Daniel {Cvrček} and George {Danezis}",
  title="Fighting the 'Good' Internet War",
  annote="We review the current strategies to counter Internet threats under the light of
the classic strategy literature. The literature often advocates proactive action,
and dominance of the (virtual, in our case) battlefield, which is the opposite
from what we see defenders deploy today. Their actions are instead reactive and
exclusively defensive. We propose strategies for defenders to regain the
initiative and push security solutions far beyond the reach of current security
tools -- yet those strategies start mirroring the actions and technologies of the
bad guys, and confront us with important technical, legal and moral dilemmas.",
  address="University of Hertfordshire",
  booktitle="Remodelling the Attacker",
  chapter="32583",
  edition="NEUVEDEN",
  howpublished="print",
  institution="University of Hertfordshire",
  year="2008",
  month="february",
  pages="1--6",
  publisher="University of Hertfordshire",
  type="conference paper"
}