Abstract
Neutrality has long played a central role in the political and strategic stances of many small states. The impact of neutrality on matters of national security and sovereignty have thus been subject to significant academic interest. With the recent emergence of cyber as a fifth dimension of interstate competition, the impact of permanent state neutrality in this domain has not yet been well characterized.
We examine the reality of this concept using countries with a long-standing history and tradition of neutrality in matters of warfare and foreign policy. A theoretical analysis of the complexities of neutrality and cyber-crime is used to motivate a novel data-driven experimental assessment of real-world outcomes for neutral states.
This experimental study leverages low-interaction honeypots distributed across 13 countries. Delving into more than 1.5 billion network sessions made from these honeypots over an 80-day period reveals more than one million malicious attacks originating from information systems in 177 different countries. Through statistical analysis of these attacks, we find little evidence that low-sophistication adversaries target their attacks with consideration of victim location or state neutrality. Beyond the immediate implications of these findings, we believe the method presented in this paper represents a unique data-driven approach to comparative international study of cyber-neutrality and the global dynamics of cyber-security more broadly.
M. Strohmeier and J. Pavur—Both authors contributed equally to this work.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Agius, C., Devine, K.: ‘Neutrality: a really dead concept?’ A reprise. Coop. Conflict 46(3), 265–284 (2011)
Arkime: Arkime, April 2021. https://github.com/arkime/arkime
Bothe, M.: Neutrality, concept and general rules. Max Planck Encyclopedia of Public International Law (2011). http://opil.ouplaw.com/view/10.1093/law: epil/9780199231690/law-9780199231690-e349
Bradley, S.: Swiss back extradition with assurances. Swissinfo, January 2008. https://www.swissinfo.ch/eng/swiss-back-extradition-with-assurances/6376598
Brantly, A.F.: The cyber deterrence problem. In: 2018 10th International Conference on Cyber Conflict (CyCon), pp. 31–54. IEEE (2018)
Dalsjö, R.: 5 Sweden and its deterrence deficit. In: Deterring Russia in Europe: Defence Strategies for Neighbouring States, p. 2010 (2018)
Federal Department of Defence, Civil Protection and Sport: Strategie cyber VBS (2021). https://www.vbs.admin.ch/de/verteidigung/schutz-vor-cyber-angriffen.html
Dobler, M.: Interpellation 18.3335: cyberespace et droit international, March 2019. https://www.parlament.ch/en/ratsbetrieb/suche-curia-vista/geschaeft?AffairId=20183335
Open Information Security Foundation: Suricata, April 2021. https://suricata-ids.org
Glaus, D., Vidino, L.: Swiss foreign fighters active in Syria. CTC Sentinel 7(7), 8–11 (2014)
Green, T.: Tgreen/hunting ruleset, April 2021. https://github.com/travisbgreen/hunting-rules
Guo, Y., Woo, J.J.: Singapore and Switzerland: Secrets to Small State Success. World Scientific, Singapore (2016)
Halford, M.: Prince, April 2021. https://github.com/MaxHalford/prince
Healey, J.: When “not my problem” isn’t enough: political neutrality and national responsibility in cyber conflict. In: 2012 4th International Conference on Cyber Conflict (CYCON 2012), pp. 1–13. IEEE (2012)
Inkster, N.: The Huawei affair and China’s technology ambitions. Survival 61(1), 105–111 (2019)
Jensen, E.T.: Sovereignty and neutrality in cyber conflict. Fordham Int. Law J. 35, 815 (2011)
Jesse, N.G.: Choosing to go it alone: Irish neutrality in theoretical and comparative perspective. Int. Polit. Sci. Rev. 27(1), 7–28 (2006)
Kaat, C.: Mr. cyber sagt, warum die schweiz mehr security-start-ups braucht. Netzwoche, October 2019. https://www.netzwoche.ch/storys/2019-10-14/mr-cyber-sagt-warum-die-schweiz-mehr-security-start-ups-braucht
Kallberg, J.: A right to cybercounter strikes: the risks of legalizing hack backs. IT Prof. 17(1), 30–35 (2015)
Karsh, E.: Neutrality and Small States. Routledge, London (2012)
Kesan, J.P., Hayes, C.M.: Mitigative counterstriking: self-defense and deterrence in cyberspace. Harv. J. Law Technol. 25, 429 (2011)
Krebs, B.: Is ‘REvil’ the New GandCrab Ransomware? July 2019. https://krebsonsecurity.com/2019/07/is-revil-the-new-gandcrab-ransomware/
Krebs, B.: Try This One Weird Trick Russian Hackers Hate, May 2021. https://krebsonsecurity.com/2021/05/try-this-one-weird-trick-russian-hackers-hate/
Lloydd, M.: Retrieving neutrality law to consider ‘other’ foreign fighters under international law. In: European Society of International Law (ESIL) 2017 Research Forum (Granada) (2017)
McLaughlin, K.L.: Cyber attack! Is a counter attack warranted? Inf. Secur. J. Glob. Perspect. 20(1), 58–64 (2011)
Nilsson, M., Wyss, M.: The armed neutrality paradox: Sweden and Switzerland in us cold war armaments policy. J. Contemp. Hist. 51(2), 335–363 (2016)
Nünlist, C.: Neutrality for peace: Switzerland’s independent foreign policy. In: Engaged Neutrality: An Evolved Approach to the Cold War, pp. 161–187. Lexington Books (2017)
Nuspliger, N.: Die bedeutung von neutralität wandelt sich. Neue Zürcher Zeitung, February 2017. https://www.nzz.ch/schweiz/nato-generalsekretaer-stoltenberg-besucht-die-schweiz-die-bedeutung-von-neutralitaet-wandelt-sich-ld.148152?reduced=true
Perloff-Giles, A.: Transnational cyber offenses: overcoming jurisdictional challenges. Yale J. Int. Law 43, 191 (2018)
PT Research: Suricata PT open ruleset, April 2021. https://github.com/ptresearch/AttackDetection
Reuters: Ex-soldier is convicted of violating swiss neutrality by fighting ISIS. The New York Times, February 2019. https://www.nytimes.com/2019/02/24/world/europe/switzerland-soldier-isis.html
Rickenbacher, F.: Der bund will eine deutlich aktivere rolle übernehmen. Netzwoche, October 2019. https://www.netzwoche.ch/news/2019-10-16/der-bund-will-eine-deutlich-aktivere-rolle-uebernehmen
Ryan, N.: Five kinds of cyber deterrence. Philos. Technol. 31(3), 331–338 (2018)
Schmitt, M.N.: Tallinn Manual 2.0 on the International Law Applicable to Cyber Operations. Cambridge University Press, Cambridge (2017)
Sourial, N., et al.: Correspondence analysis is a useful tool to uncover the relationships among categorical variables. J. Clin. Epidemiol. 63(6), 638–646 (2010)
Stolz, M.: On neutrality and cyber defence. In: European Conference on Cyber Warfare and Security, pp. 484–XIX. Academic Conferences International Limited (2019)
Suter, A.: Neutralität. praxis, prinzip und geschichtsbewusstsein. In: Hettling, M., Schaffner, M., König, M., Suter, A., Jakob, T. (eds.) Eine kleine Geschichte der Schweiz. Suhrkamp, Berlin (1998)
Attorney General of Switzerland: Coordinated operation in a cybercrime case, July 2019. https://www.nytimes.com/2019/02/24/world/europe/switzerland-soldier-isis.html
Federal Council of Switzerland: National strategy for the protection of Switzerland against cyber risks (NCS) 2018–2022 (2018). https://www.swissinfo.ch/eng/swiss-back-extradition-with-assurances/6376598
Federal Council of Switzerland: Teilnahme der Schweiz am “cooperative cyber defence centre of excellence”, May 2019. https://www.admin.ch/gov/de/start/dokumentation/medienmitteilungen.msg-id-75145.html
Proofpoint Inc.: Emerging threats open ruleset, April 2021. https://rules.emergingthreats.net/
Turns, D.: Cyber war and the law of neutrality. In: Research Handbook on International Law and Cyberspace. Edward Elgar Publishing (2015)
Vidino, L.: Jihadist radicalization in Switzerland. Technical report, ETH Zurich (2013)
Wylie, N.: ‘The importance of being honest’: Switzerland, neutrality and the problems of intelligence collection and liaison. Intell. Natl. Secur. 21(5), 782–808 (2006)
Acknowledgments
The authors want to thank Dr. Luca Gambazzi for his invaluable support.
The views and opinions expressed in this article are those of the authors and do not necessarily reflect the official policy or position of any agency of the Swiss government.
Author information
Authors and Affiliations
Corresponding authors
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2021 Springer Nature Switzerland AG
About this paper
Cite this paper
Strohmeier, M., Pavur, J., Martinovic, I., Lenders, V. (2021). Studying Neutrality in Cyber-Space: a Comparative Geographical Analysis of Honeypot Responses. In: Percia David, D., Mermoud, A., Maillart, T. (eds) Critical Information Infrastructures Security. CRITIS 2021. Lecture Notes in Computer Science(), vol 13139. Springer, Cham. https://doi.org/10.1007/978-3-030-93200-8_11
Download citation
DOI: https://doi.org/10.1007/978-3-030-93200-8_11
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-93199-5
Online ISBN: 978-3-030-93200-8
eBook Packages: Computer ScienceComputer Science (R0)