Tytuł artykułu
Treść / Zawartość
Pełne teksty:
Identyfikatory
DOI
Warianty tytułu
Języki publikacji
Abstrakty
This research paper investigates the cyber warfare between Russia and Ukraine, an essential aspect of the ongoing conflict since 2014. It examines the historical context, emphasizing the increase in cyberattacks following the annexation of Crimea. The paper provides a detailed analysis of significant cyber incidents, including the attack on Ukraine's power grid in 2015 and the Petya. A ransomware attack in 2017, exploring their methods, targets, and impacts. It also looks into the strategies and techniques used by Russian hacker groups, such as phishing, malware, DDoS attacks, and advanced persistent threats (APT). The research underscores the importance of comprehensive defense strategies, international cooperation, and the adoption of advanced technologies to mitigate cyber threats and protect national security.
Wydawca
Czasopismo
Rocznik
Tom
Strony
1--18
Opis fizyczny
Bibliogr. 34 poz., rys.
Twórcy
autor
- Department of Complex Systems, Rzeszow University of Technology, 35-959 Rzeszow, Poland
autor
- Department of Complex Systems, Rzeszow University of Technology, 35-959 Rzeszow, Poland
autor
- Department of Complex Systems, Rzeszow University of Technology, 35-959 Rzeszow, Poland
autor
- Department of Complex Systems, Rzeszow University of Technology, 35-959 Rzeszow, Poland
Bibliografia
- 1. Appiah, G., Amankwah-Amoah, J., & Liu, Y. L. (2020). Organizational architecture, resilience, and cyberattacks. IEEE Transactions on Engineering Management, 69(5), 2218-2233.
- 2. Qamar, A., Karim, A., & Chang, V. (2019). Mobile malware attacks: Review, taxonomy & future directions. Future Generation Computer Systems, 97, 887-909.
- 3. Alkhalil, Z., Hewage, C., Nawaf, L., & Khan, I. (2021). Phishing attacks: A recent comprehensive study and a new anatomy. Frontiers in Computer Science, 3, 563060.
- 4. Yan, Q., Yu, F. R., Gong, Q., & Li, J. (2015). Software-defined networking (SDN) and distributed denial of service (DDoS) attacks in cloud computing environments: A survey, some research issues, and challenges. IEEE communications surveys & tutorials, 18(1), 602-622.
- 5. Conti, M., Dragoni, N., & Lesyk, V. (2016). A survey of man in the middle attacks. IEEE communications surveys & tutorials, 18(3), 2027-2051.
- 6. Halfond, W. G., Viegas, J., & Orso, A. (2006, March). A Classification of SQL Injection Attacks and Countermeasures. In ISSSE.
- 7. Bilge, L., & Dumitraş, T. (2012, October). Before we knew it: an empirical study of zero-day attacks in the real world. In Proceedings of the 2012 ACM conference on Computer and communications security (pp. 833-844).
- 8. Kharraz, A., Robertson, W., Balzarotti, D., Bilge, L., & Kirda, E. (2015). Cutting the gordian knot: A look under the hood of ransomware attacks. In Detection of Intrusions and Malware, and Vulnerability Assessment: 12th International Conference, DIMVA 2015, Milan, Italy, July 9-10, 2015, Proceedings 12 (pp. 3-24). Springer International Publishing.
- 9. Krombholz, K., Hobel, H., Huber, M., & Weippl, E. (2015). Advanced social engineering attacks. Journal of Information Security and applications, 22, 113-122.
- 10. Alshamrani, A., Myneni, S., Chowdhary, A., & Huang, D. (2019). A survey on advanced persistent threats: Techniques, solutions, challenges, and research opportunities. IEEE Communications Surveys & Tutorials, 21(2), 1851-1877.
- 11. Falcone, R. (2016). Shamoon 2: Return of the disttrack wiper. Paloalto Networks.
- 12. Krasznay, C. (2020). Case study: The notpetya campaign. Információés kiberbiztonság, 485-499.
- 13. Rascagneres, P., & Lee, M. (2018). Who wasn’t responsible for Olympic Destroyer. Talos Intelligence: Talos.
- 14. Cimpanu, C. (2017). Ordinypt ransomware intentionally destroys files, currently targeting Germany. BleepingComputer.
- 15. National Cybersecurity Authority, “Destructive Attack “ DUSTMAN ” Technical Report,” 2019
- 16. Zarefsky, J. (2020, January 9). Iran's new wiper malware targets Middle East oil companies. ThreatPost.
- 17. Nicho, M., Yadav, R., & Singh, D. (2023). Analyzing WhisperGate and BlackCat Malware: Methodology and Threat Perspective. International Journal of Advanced Computer Science and Applications, 14(4).
- 18. Guerrero-Saade, J. A. (2022). Hermeticwiper—new destructive malware used in cyber attacks on ukraine. Sentinel Labs.
- 19. Muir, J. (2022, March 1). IsaacWiper and HermeticWiper: New wiper worms targeting Ukraine. WeLiveSecurity.
- 20. Muir, J. (2022, March 15). CaddyWiper: New wiper malware discovered targeting Ukraine. WeLiveSecurity.
- 21. Acronis. (2022, March 9). DoubleZero: A data wiper deployed against Ukraine. Acronis Cyber Protection Center.
- 22. Guerrero-Saade. (2022, March 24). AcidRain: A modem wiper rains down on Europe. SentinelOne.
- 23. Revay, G. (2022) The increasing wiper malware threat. Fortinet.
- 24. Ukrinform. (2017, June 27). Україна стала персоною ціллю принципово нового віду кібератаки.
- 25. CERT-UA. (2017). Details about the Petya ransomware attack on 27.06.2017.
- 26. TSN. (2017, July 3). SBU заявила про причетність спецслужб РФ до атаки вірусу-вимагача Petya.A.
- 27. Case, D. U. (2016). Analysis of the cyber attack on the Ukrainian power grid. Electricity Information Sharing and Analysis Center (E-ISAC), 388(1-29), 3.
- 28. Whitehead, D. E., Owens, K., Gammel, D., & Smith, J. (2017, April). Ukraine cyber-induced power outage: Analysis and practical mitigation strategies. In 2017 70th Annual conference for protective relay engineers (CPRE) (pp. 1-8). IEEE.
- 29. Ansaria, A. (2024). Analysis of Ukraine power grid cyber-attack 2015. World Journal of Advanced Engineering Technology and Sciences, 11(1), 410-412.
- 30. Porteconomics Management. (n.d.). Petya ransomware cyber attack on Maersk. InfoTranSec. (2021, March 4). The impacts of NotPetya ransomware: What you need to know.
- 31. Горичева, Ю. (2022, 11 квітня). Хто такі кіберсолдати України і як вони діють проти Росії. Радіо Свобода.
- 32. Криськов, А., & Шаповалов, В. (н.д.). КІБЕР ФРОНТ У ГІБРИДНІЙ ВІЙНІ росії ПРОТИ УКРАЇНИ. Тернопільський національний технічний університет імені Івана Пулюя.
- 33. IT ARMY OF UKRAINE, https://itarmy.com.ua/?lang=ua
- 34. Telegram, https://telegram.org
Typ dokumentu
Bibliografia
Identyfikator YADDA
bwmeta1.element.baztech-78efb78f-0382-4881-83a3-d1c32105c4c0
JavaScript jest wyłączony w Twojej przeglądarce internetowej. Włącz go, a następnie odśwież stronę, aby móc w pełni z niej korzystać.