Abstract
As the Russian government is revealed that it had intervened in the US presidential election by hacking, the social confusion caused by cyber attacks increased. This incident has led to the impeachment of the president by the dismissal of FBI director James Comey. In the French presidential election held in 2017, the social confusion created because of fake news during the period of election silence. The past cyber attacks were used as deception tactics, like the Georgian war. Nowadays, these attacks are concentrated in the period of social issues. In other words, these recent changes in cyber attacks have begun to have an adverse effect on systems in the real world, such as hybrid battlefields. This attack is called cyber influence attacks. This paper identifies the weaknesses of the basic democratic election system and classifies it against cyber influence attacks. In addition, we analyze the cyber influence attacks in Russia during the US presidential election in 2016 as a case study.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Willis, M.: WannaCry: the ransomware attack on the NHS and what we can learn from it, June 2016. http://blogs.lse.ac.uk/politicsandpolicy/wannacry-the-ransomware-attack-on-the-nhs-and-what-we-can-learn-from-it/
Entous, A., Nakashima, E.: FBI in agreement with CIA that Russia aimed to help Trump win White House, The Washington Post (2016). https://www.washingtonpost.com/politics/clinton-blames-putins-personal-grudge-against-her-for-election-interference/2016/12/16/12f36250-c3be-11e6-8422-eac61c0ef74d_story.html?utm_term=.381f14d62e3d
Clauss, K.S.: FBI director James Comey to speak at Boston college, March 2017. http://www.bostonmagazine.com/news/blog/2017/03/02/fbi-director-james-comey-boston-college-cybersecurity/
Spring, T.: DHS chairman paints bleak US cyber security picture, February 2017. https://threatpost.com/dhs-chairman-paints-bleak-us-cybersecurity-picture/123739/
WikiLeaks: Vault 7: CIA Hacking Tools Revealed (2017). https://wikileaks.org/ciav7p1/
Cyberspace Operation JP 3-12R, vol. 3-12R. Joint Chiefs of Staff. Department of Defence (2013)
Clark, D.: Characterizing cyberspace: past, present and future. MIT CSAIL, Version 1, 2016–2028 (2010)
Barford, P., et al.: Cyber SA: situational awareness for cyber defense. In: Jajodia, S., Liu, P., Swarup, V., Wang, C. (eds.) Cyber Situational Awareness. ADIS, vol. 46, pp. 3–13. Springer, Boston (2010). https://doi.org/10.1007/978-1-4419-0140-8_1
Philip, R.: Enabling distributed security in cyberspace. Departament of Homeland Security (2011)
Herrick, D.: The social side of ‘cyber power’? Social media and cyber operations. In: 2016 8th International Conference on Cyber Conflict (CyCon), pp. 99–111. IEEE, May 2016
Golan, G.J., Lim, J.S.: Third-person effect of ISIS’s recruitment propaganda: online political self-efficacy and social media activism. Int. J. Commun. 10, 21 (2016)
Weimann, G.: The emerging role of social media in the recruitment of foreign fighters. In: de Guttry, A., Capone, F., Paulussen, C. (eds.) Foreign Fighters under International Law and Beyond, pp. 77–95. T.M.C. Asser Press, The Hague (2016). https://doi.org/10.1007/978-94-6265-099-2_6
Amato, F., Cozzolino, G., Mazzeo, A., Romano, S.: Detecting anomalies in Twitter stream for public security issues. In: 2016 IEEE 2nd International Forum on Research and Technologies for Society and Industry Leveraging a Better Tomorrow (RTSI), pp. 1–4. IEEE, September 2016
Schumpeter, J.A.: Capitalism Socialism and Democracy. Routledge, Abingdon (2013)
Pateman, C.: Participation and Democratic Theory. Cambridge University Press, Cambridge (1970)
Deacon, R.E., Firebaugh, F.M.: Family Resource Management: Principles and Applications. Allyn and Bacon, Boston (1981)
Doyle, J.: Rational decision making. In: MIT Encyclopedia of the Cognitive Sciences, pp. 701–703 (1999)
Marchette, D.J.: Common network attacks
Hansman, S., Hunt, R.: A taxonomy of network and computer attacks. Comput. Secur. 24(1), 31–43 (2005)
Pak, A., Paroubek, P.: Twitter as a corpus for sentiment analysis and opinion mining. In: LREc, vol. 10, no. 2010, May 2010
Muflikhah, L., Baharudin, B.: Document clustering using concept space and cosine similarity measurement. In: 2009 International Conference on Computer Technology and Development, ICCTD 2009, vol. 1, pp. 58–62. IEEE, November 2009
Kopan, T.: Wikileaks Reveals Hillary-World Vexed by ‘Bill Clinton Inc.’. CNN (2016). http://edition.cnn.com/2016/10/27/politics/bill-clinton-inc-foundation-wikileaks-emails/
Acknowledgment
This work was supported by Defense Acquisition Program Administration and Agency for Defense Development under the contract (UD060048AD).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer International Publishing AG, part of Springer Nature
About this paper
Cite this paper
Park, M., Park, M., Lee, K. (2018). Cyber Influence Attack: Changes in Cyber Threats Seen in the Russian Hacking Incident. In: Kang, B., Kim, T. (eds) Information Security Applications. WISA 2017. Lecture Notes in Computer Science(), vol 10763. Springer, Cham. https://doi.org/10.1007/978-3-319-93563-8_19
Download citation
DOI: https://doi.org/10.1007/978-3-319-93563-8_19
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-93562-1
Online ISBN: 978-3-319-93563-8
eBook Packages: Computer ScienceComputer Science (R0)