2526272829303128 of 38
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • apa.csl
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
Expanding the view on Offensive Cyber Operations
Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013). Försvarshögskolan. (PriSec)ORCID iD: 0009-0008-2442-4058
2025 (English)Licentiate thesis, comprehensive summary (Other academic)
Abstract [en]

Society relies upon the internet, a globally interconnected collection of networked information systems. These systems are imperfectly designed and implemented with critical flaws and vulnerabilities. Criminal hackers attack these shortcomings for financial gains, but there are also compelling reasons for states and state-sponsored groups to act in and through cyberspace. While state-sponsored cyberattacks can be both permissible and effective, they commonly have unintended effects: cyber collateral damage. 

Most offensive cyber operations are conducted below the threshold of force recognized in international law and do not qualify for a military response. This means that they can be used both for clandestine sabotage, for intelligence gathering, and to implant vulnerabilities in preparation for larger-scale attacks in the future. These activities have caused considerable harm beyond their intended targets. Such collateral effects have been seen in some of the most infamous and costly cyberattacks, such as the 2010 Stuxnet attack, the 2017 NotPetya attack, and the 2022 attack on ViaSat as part of the invasion of Ukraine.

An under-investigated metric when analyzing the impact of cyber op-erations is their economic cost, both in terms of production and (es-pecially) in their collateral cost to society. The economic cost is also subject to considerable externalization in the planning of cyber operations. This thesis thus investigates the balance between the op-erational effects of cyber operations and their collateral costs; the cost/benefit dilemma of offensive cyber operations. It does so by con-sidering the potential benefit of high-impact cyberattacks, e.g. supply chain vulnerability implantation against hardened targets, and by us-ing econometric methods to calculate the cost of collateral damage engendered when cyberspace is used as a domain of warfare. In doing so, it provides the first quantitative comparison of military utility to civilian harm in a cyber context. Although cyberattacks have long been considered a central component in asymmetric warfare, the the-sis presents a bottom-up analysis which shows that the economic damage caused by cyberattacks in the Russo-Ukrainian conflict 2014-2021 is an insignificant part of the Ukrainian GDP.

Finally, the thesis argues that the full cost of attacks should be meas-ured and included in models for collateral damage estimation. Such estimates should be included into national cyber doctrines to mini-mize unintended effects and ensure efficient and appropriate use of cyber capabilities.

Abstract [en]

Society relies upon the internet, a globally interconnected collection of networked information systems. These systems often contain critical vulnerabilities, giving states and state-sponsored groups compelling reasons to act in and through cyberspace. While state-sponsored cyberattacks can be both permissible and effective, they commonly have unintended effects: cyber collateral damage.  This thesis investigates the balance between the operational effects of cyber operations and their collateral costs; the cost/benefit dilemma of offensive cyber operations. It does so by considering the potential benefit of high-impact cyberattacks, e.g. supply chain vulnerability implantation, and by using econometric methods to calculate the cost of collateral damage engendered when cyberspace is used as a domain of warfare. The thesis further presents a bottom-up analysis which shows that the economic damage caused by cyberattacks in the Russo-Ukrainian conflict 2014-2021 to be an insignificant part of the Ukrainian GDP. Finally, the thesis argues that the full cost of attacks should be measured and included in models for collateral damage estimation. Such estimates should be included into national cyber doctrines to minimize unintended effects and ensure efficient and appropriate use of cyber capabilities.

Place, publisher, year, edition, pages
Karlstad: Karlstads universitet, 2025. , p. 35
Series
Karlstad University Studies, ISSN 1403-8099 ; 2025:20
Keywords [en]
Cybersecurity, cyber warfare, collateral damage, structured literature review, applied econometrics
National Category
Computer and Information Sciences
Research subject
Computer Science
Identifiers
URN: urn:nbn:se:kau:diva-103876DOI: 10.59217/bdrf5749ISBN: 978-91-7867-572-2 (print)ISBN: 978-91-7867-573-9 (electronic)OAI: oai:DiVA.org:kau-103876DiVA, id: diva2:1950579
Presentation
2025-06-02, Sjöström 1E309, Universitetsvägen 2, Karlstad, 13:00 (English)
Opponent
Supervisors
Funder
Knowledge Foundation, 20220129-H-01Available from: 2025-04-30 Created: 2025-04-08 Last updated: 2025-04-30Bibliographically approved
List of papers
1. Collateral Damage from Offensive Cyber Operations – a Systematic Literature Review
Open this publication in new window or tab >>Collateral Damage from Offensive Cyber Operations – a Systematic Literature Review
(English)Manuscript (preprint) (Other academic)
National Category
Computer and Information Sciences
Identifiers
urn:nbn:se:kau:diva-103866 (URN)
Available from: 2025-04-07 Created: 2025-04-07 Last updated: 2025-04-08
2. Determining the Utility of Cyber Vulnerability Implantation: The Heartbleed Bug as a Cyber Operation
Open this publication in new window or tab >>Determining the Utility of Cyber Vulnerability Implantation: The Heartbleed Bug as a Cyber Operation
2014 (English)In: Military Communications Conference (MILCOM), 2014 IEEE, IEEE conference proceedings , 2014, p. 110-116Conference paper, Published paper (Refereed)
Abstract [en]

Flaws in computer software or hardware that are as yet unknown to the public, known as zero-day vulnerabilities, are an increasingly sought-after resource by actors conducting cyber operations. While the objective pursued is commonly defensive, as in protecting own systems and networks, cyber operations may also involve exploiting identified vulnerabilities for intelligence collection or to produce military effects. The weapon zing and stockpiling of such vulnerabilities by various actors, or even the intentional implantation into cyberspace infrastructure, is a trend that currently resembles an arms race. An open question is how to measure the utility that access to these exploitable vulnerabilities provides for military purposes, and how to contrast and compare this to the possible adverse societal consequences that withholding disclosure of them may result in, such as loss of privacy or impeded freedom of the press. This paper presents a case study focusing on the Heart bleed bug, used as a tool in an offensive cyber operation. We introduce a model to estimate the adoption rate of an implanted flaw in Open SSL, derived by fitting collected real-world data. Our calculations show that reaching a global adoption of at least 50 % would take approximately three years from the time of release, given that the vulnerability remains undiscovered, while surpassing 75 % adoption would take an estimated four years. The paper concludes that while exploiting zero-day vulnerabilities may indeed be of significant military utility, such operations take time. They may also incur non-negligible risks of collateral damage and other societal costs.

Place, publisher, year, edition, pages
IEEE conference proceedings, 2014
Series
MILCOM IEEE Military Communications Conference, ISSN 2155-7578 ; 6-8 Oct. 2014
National Category
Vehicle and Aerospace Engineering
Research subject
Systems science for defence and security
Identifiers
urn:nbn:se:kau:diva-103870 (URN)10.1109/MILCOM.2014.25 (DOI)000369851400018 ()2-s2.0-84912564090 (Scopus ID)
Conference
Military Communications Conference (MILCOM), 2014 IEEE, Baltimore, MD, USA, 6-8 October 2014
Available from: 2014-11-27 Created: 2025-04-07 Last updated: 2025-04-08
3. Papering Over the Cracks: The Effects of Introducing Best Practices on the Web Security Ecosystem
Open this publication in new window or tab >>Papering Over the Cracks: The Effects of Introducing Best Practices on the Web Security Ecosystem
2016 (English)In: The 30th International Conference on Information Networking: ICOIN 2016, IEEE , 2016, p. 1-6, article id 15837791Conference paper, Published paper (Refereed)
Abstract [en]

Hypertext Transfer Protocol Secure (HTTPS) is the de facto standard for secure end-to-end web communication. However, numerous flaws discovered during recent years, such as Apple’s “goto fail” bug, and cryptographic weaknesses as illustrated by the Poodlebleed vulnerability, have brought the efficiency of the mostly self-regulated web security market into question. In this cross-disciplinary paper, the authors survey some 160.000 HTTPS-enabled servers among popular web sites over a time period of three years. The research question is what effect the introduction of best practices and vulnerability publication have on web server security in the form of protocol support. Main findings include that (i) insecure configurations, although well known, can remain widespread for over a decade, (ii) the introduction of best practices affect the decline of insecure configurations only moderately, whereas highly publicized security flaws have a significant impact, and (iii) economic incentives for website owners to provide secure services are weak, motivating such other levers of influence as legislation or blocking of noncompliant sites.

Place, publisher, year, edition, pages
IEEE, 2016
Series
International Conference on Information Networking, ISSN 1976-7684
Keywords
Internet governance, network security, security economics, HTTPS
National Category
Information Systems
Research subject
Systems science for defence and security
Identifiers
urn:nbn:se:kau:diva-103867 (URN)10.1109/ICOIN.2016.7427064 (DOI)2-s2.0-84963973909 (Scopus ID)9781509017256 (ISBN)9781509017249 (ISBN)
Conference
30th International Conference on Information Networking (ICOIN), Kota Kinabalu, Malaysia, January 13-15, 2016
Available from: 2017-04-24 Created: 2025-04-07 Last updated: 2025-04-08
4. Cyber Vulnerability Implantation Revisited
Open this publication in new window or tab >>Cyber Vulnerability Implantation Revisited
2021 (English)In: 2021 IEEE Military Communications Conference (MILCOM), San Diego, November 29-December 2, 2021., Institute of Electrical and Electronics Engineers (IEEE) , 2021, p. 464-469Conference paper, Published paper (Refereed)
Abstract [en]

In this paper we revisit a study presented at MILCOM 2014. Our goal then was to determine the utility of implanting a vulnerability into a cybersecurity software protocol to an actor planning to execute an offensive cyber operation. Based on a case study describing the then recently discovered Heartbleed bug as an offensive cyber operation, a model was devised to estimate the adoption rate of an implanted flaw in OpenSSL. Using the adoption rate of the cryptographic protocol Transport Layer Security version 1.2 as a proxy, we predicted that the global adoption of the vulnerability of at least 50% would take approximately three years, while surpassing 75% adoption would take four years. Compared to subsequently collected real-world data, these forecasts turned out to be surprisingly accurate. An evaluation of our proposed model shows that it yields results with a root-mean-square error of only 1.2% over the forecasting period. Thus, it has a significant degree of predictive power. Although the model may not be generalizable to describe the adoption of any software protocol, the finding helps validate our previously drawn conclusion that exploiting implanted cyber vulnerabilities, in a scenario like the one presented, requires a planning horizon of multiple years. However, as society becomes further dependent on the cyber domain, the utility of intentional vulnerability implantation is likely an exercise in diminishing returns. For a defender, however, our model development process could be useful to forecast the time required for flawed protocols to be phased out.

Place, publisher, year, edition, pages
Institute of Electrical and Electronics Engineers (IEEE), 2021
Series
MILCOM IEEE Military Communications Conference, ISSN 2155-7578, E-ISSN 2155-7586
Keywords
cyber operations, cybercrime, vulnerabilities, exploitation, intelligence, cyber insurance
National Category
Information Systems
Research subject
Systems science for defence and security
Identifiers
urn:nbn:se:kau:diva-103869 (URN)10.1109/MILCOM52596.2021.9652921 (DOI)000819479500075 ()2-s2.0-85124164120 (Scopus ID)978-1-6654-3972-5 (ISBN)978-1-6654-3956-5 (ISBN)
Conference
2021 IEEE Military Communications Conference (MILCOM)
Available from: 2022-01-03 Created: 2025-04-07 Last updated: 2025-04-08
5. Towards econometric estimation of the cost of cyber conflict
Open this publication in new window or tab >>Towards econometric estimation of the cost of cyber conflict
2024 (English)In: Procedia Computer Science, E-ISSN 1877-0509, Vol. 246, p. 2635-2644Article in journal (Refereed) Published
Abstract [en]

In the modern era, understanding the costs and implications of conflict extends beyond traditional kinetic boundaries into the cyber realm. While economic analysis has historically been concerned primarily with the state’s ability to sustain and engage in physical warfare, recent research has begun to quantify the additional societal and collateral costs. To shed light on the total costs of the use of cyber weapons and capabilities, we argue that a comprehensive analysis must be done using econometric tools. This paper describes two important tools in this toolkit, counterfactual analysis and bottom-up accounting, in the context of cyber conflict. It discusses how significant collateral costs manifest in the inadvertent aftermath of vulnerability stockpiling for use in cyber weapons, coupled with the losses and thefts of these resources. Such incidents represent not only a direct financial burden but also erode the trust and goodwill of nations who do not disclose the discovered vulnerabilities. Finally, multiple data sources and bottom-up accounting techniques are used to conduct a case study estimating the aggregate societal cost of cyber conflict in the Ukrainian war between late 2013 and 2020. The aggregate cost of the 76 recorded cyberattacks is estimated to be approximately $160M. Finally, counterfactual analysis is concluded to face significant data availability challenges preventing high quality synthesis of the two methods described.

Place, publisher, year, edition, pages
Elsevier, 2024
Keywords
cyber security, cyber conflict, cyber collateral damage, applied econometrics, offensive cyber operations
National Category
Information Systems
Research subject
Computer Science
Identifiers
urn:nbn:se:kau:diva-103625 (URN)10.1016/j.procs.2024.09.434 (DOI)2-s2.0-85213379173 (Scopus ID)
Conference
28th International Conference on Knowledge Based and Intelligent information and Engineering Systems (KES 2024), Seville, September 11-13, 2024
Available from: 2024-11-29 Created: 2025-03-24 Last updated: 2025-04-08Bibliographically approved

Open Access in DiVA

fulltext_KAPPAN(1058 kB)528 downloads
File information
File name FULLTEXT02.pdfFile size 1058 kBChecksum SHA-512
93be6ab369337ec3c676830b95d8fffcf2345a7f7bb7645e305efcfc633a311b3bc107ecc3854e88e4ad1ec9d5d995eb89ea7b0f00157866b3c2e0dae8305f4a
Type fulltextMimetype application/pdf

Other links

Publisher's full text

Authority records

Larsson, Emil

Search in DiVA

By author/editor
Larsson, Emil
By organisation
Department of Mathematics and Computer Science (from 2013)
Computer and Information Sciences

Search outside of DiVA

GoogleGoogle Scholar
Total: 530 downloads
The number of downloads is the sum of all downloads of full texts. It may include eg previous versions that are now no longer available

doi
isbn
urn-nbn

Altmetric score

doi
isbn
urn-nbn
Total: 768 hits
2526272829303128 of 38
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • apa.csl
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf