Skip to main content

Cyber Influence Attack: Changes in Cyber Threats Seen in the Russian Hacking Incident

  • Conference paper
  • First Online:
Information Security Applications (WISA 2017)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 10763))

Included in the following conference series:

  • 1209 Accesses

Abstract

As the Russian government is revealed that it had intervened in the US presidential election by hacking, the social confusion caused by cyber attacks increased. This incident has led to the impeachment of the president by the dismissal of FBI director James Comey. In the French presidential election held in 2017, the social confusion created because of fake news during the period of election silence. The past cyber attacks were used as deception tactics, like the Georgian war. Nowadays, these attacks are concentrated in the period of social issues. In other words, these recent changes in cyber attacks have begun to have an adverse effect on systems in the real world, such as hybrid battlefields. This attack is called cyber influence attacks. This paper identifies the weaknesses of the basic democratic election system and classifies it against cyber influence attacks. In addition, we analyze the cyber influence attacks in Russia during the US presidential election in 2016 as a case study.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Willis, M.: WannaCry: the ransomware attack on the NHS and what we can learn from it, June 2016. http://blogs.lse.ac.uk/politicsandpolicy/wannacry-the-ransomware-attack-on-the-nhs-and-what-we-can-learn-from-it/

  2. Entous, A., Nakashima, E.: FBI in agreement with CIA that Russia aimed to help Trump win White House, The Washington Post (2016). https://www.washingtonpost.com/politics/clinton-blames-putins-personal-grudge-against-her-for-election-interference/2016/12/16/12f36250-c3be-11e6-8422-eac61c0ef74d_story.html?utm_term=.381f14d62e3d

  3. Clauss, K.S.: FBI director James Comey to speak at Boston college, March 2017. http://www.bostonmagazine.com/news/blog/2017/03/02/fbi-director-james-comey-boston-college-cybersecurity/

  4. Spring, T.: DHS chairman paints bleak US cyber security picture, February 2017. https://threatpost.com/dhs-chairman-paints-bleak-us-cybersecurity-picture/123739/

  5. WikiLeaks: Vault 7: CIA Hacking Tools Revealed (2017). https://wikileaks.org/ciav7p1/

  6. Cyberspace Operation JP 3-12R, vol. 3-12R. Joint Chiefs of Staff. Department of Defence (2013)

    Google Scholar 

  7. Clark, D.: Characterizing cyberspace: past, present and future. MIT CSAIL, Version 1, 2016–2028 (2010)

    Google Scholar 

  8. Barford, P., et al.: Cyber SA: situational awareness for cyber defense. In: Jajodia, S., Liu, P., Swarup, V., Wang, C. (eds.) Cyber Situational Awareness. ADIS, vol. 46, pp. 3–13. Springer, Boston (2010). https://doi.org/10.1007/978-1-4419-0140-8_1

    Chapter  Google Scholar 

  9. Philip, R.: Enabling distributed security in cyberspace. Departament of Homeland Security (2011)

    Google Scholar 

  10. Herrick, D.: The social side of ‘cyber power’? Social media and cyber operations. In: 2016 8th International Conference on Cyber Conflict (CyCon), pp. 99–111. IEEE, May 2016

    Google Scholar 

  11. Golan, G.J., Lim, J.S.: Third-person effect of ISIS’s recruitment propaganda: online political self-efficacy and social media activism. Int. J. Commun. 10, 21 (2016)

    Article  Google Scholar 

  12. Weimann, G.: The emerging role of social media in the recruitment of foreign fighters. In: de Guttry, A., Capone, F., Paulussen, C. (eds.) Foreign Fighters under International Law and Beyond, pp. 77–95. T.M.C. Asser Press, The Hague (2016). https://doi.org/10.1007/978-94-6265-099-2_6

    Chapter  Google Scholar 

  13. Amato, F., Cozzolino, G., Mazzeo, A., Romano, S.: Detecting anomalies in Twitter stream for public security issues. In: 2016 IEEE 2nd International Forum on Research and Technologies for Society and Industry Leveraging a Better Tomorrow (RTSI), pp. 1–4. IEEE, September 2016

    Google Scholar 

  14. Schumpeter, J.A.: Capitalism Socialism and Democracy. Routledge, Abingdon (2013)

    Google Scholar 

  15. Pateman, C.: Participation and Democratic Theory. Cambridge University Press, Cambridge (1970)

    Book  Google Scholar 

  16. Deacon, R.E., Firebaugh, F.M.: Family Resource Management: Principles and Applications. Allyn and Bacon, Boston (1981)

    Google Scholar 

  17. Doyle, J.: Rational decision making. In: MIT Encyclopedia of the Cognitive Sciences, pp. 701–703 (1999)

    Google Scholar 

  18. Marchette, D.J.: Common network attacks

    Google Scholar 

  19. Hansman, S., Hunt, R.: A taxonomy of network and computer attacks. Comput. Secur. 24(1), 31–43 (2005)

    Article  Google Scholar 

  20. Pak, A., Paroubek, P.: Twitter as a corpus for sentiment analysis and opinion mining. In: LREc, vol. 10, no. 2010, May 2010

    Google Scholar 

  21. Muflikhah, L., Baharudin, B.: Document clustering using concept space and cosine similarity measurement. In: 2009 International Conference on Computer Technology and Development, ICCTD 2009, vol. 1, pp. 58–62. IEEE, November 2009

    Google Scholar 

  22. Kopan, T.: Wikileaks Reveals Hillary-World Vexed by ‘Bill Clinton Inc.’. CNN (2016). http://edition.cnn.com/2016/10/27/politics/bill-clinton-inc-foundation-wikileaks-emails/

Download references

Acknowledgment

This work was supported by Defense Acquisition Program Administration and Agency for Defense Development under the contract (UD060048AD).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Kyungho Lee .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer International Publishing AG, part of Springer Nature

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Park, M., Park, M., Lee, K. (2018). Cyber Influence Attack: Changes in Cyber Threats Seen in the Russian Hacking Incident. In: Kang, B., Kim, T. (eds) Information Security Applications. WISA 2017. Lecture Notes in Computer Science(), vol 10763. Springer, Cham. https://doi.org/10.1007/978-3-319-93563-8_19

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-93563-8_19

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-93562-1

  • Online ISBN: 978-3-319-93563-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics