叙利亚冲突中的网络空间行动分析
李硕,吴明阁
摘要(Abstract):
对叙利亚冲突中的网络空间行动进行了简要分析,描述了参与叙利亚网络空间冲突的各方力量,提供了冲突期间在网络空间中使用的工具和技术的详细信息。在此基础上,分析了叙利亚冲突网络空间行动的特点,并提出了几点启示和建议。
关键词(KeyWords): 网络空间;网络攻击;恶意软件
基金项目(Foundation):
作者(Author): 李硕,吴明阁
DOI: 10.16338/j.issn.1009-1319.20190181
参考文献(References):
- [1] Syrian network for human rights. Syrian Security Branches and Persons in Charge,2013
- [2] Lee B. The impact of cyber capabilities in the Syrian civil war. Small Wars J,2016(1)
- [3] Zaluski R. Syria’s cyberwar. cent. strateg. cyberspace secur. sci. URL. http://cscss. org/CS/2016/08/20/syrias-cyberwar/,2016
- [4] Open Net initiative,info War monitor. Syrian electronic army:disruptive attacks and hyped targets. Open Net Initiat. URL https://opennet. net/syrian-electronic-armydisruptive-attacks-and-hyped-targets,2011
- [5] Kobrak M. Syrian electronic army highly likely disbanded in 2016. Intell. Obs. URL https://intelligenceobserver.com/2017/02/26/syrian-electronic-army-highly-likelydisbanded-in-201
- [6] Wilhoit K,Haq T. Connecting the dots:Syrian malware team uses blackworm for attacks. Fire Eye. URL https://www. fireeye. com/blog/threat-research/2014/08/connecting-the-dots-syrian-malware-team-uses-blackworm-forattacks. html,2014
- [7] Lund A. Who are the pro-assad militias? Carnegie Middle East Cent. URL http://carnegie-mec. org/diwan/59215,2015
- [8] Sec Dev Foundation,2013a. Flash note Syria:Syria’s national defence forces take the battle to cyberspace.
- [9] Regalado D,Villeneuve N,Scott Railton J. Behind the Syrian conflict’s digital front lines,special report. FireEye Inc.,Milpitas,CA,2015
- [10] Booth R,Mahmood M,Harding L. Exclusive:secret assad emails lift lid on life of leader’s inner circle. The Guardian. URL https://www. theguardian. com/world/2012/mar/14/assad-emails-lift-lid-inner-circle,2012
- [11] Ahmad M,Al Makki. How I hacked assad’s E-mail.Al-Monit. URL http://www. al-monitor. com/pulse/politics/2012/09/how-i-hacked-assads-emails. html,2012
- [12] Graham Harrison E. Could Isis’s“cyber caliphate”unleash a deadly attack on key targets? The Guardian.URL https://www. theguardian. com/world/2015/apr/12/isis-cyber-caliphate-hacking-technology-arms-race,2015
- [13] Zerofox Team. ISIS:terror has gone social. Zerofox.URL https://www. zerofox. com/blog/islamic-state-isisterror-has-gone-social-infographic,2015
- [14] Sec Dev foundation flash note Syria:Syrian hacker wars.2013
- [15] Zelin A Y,Lister C. The crowning of the Syrian islamic front. Foreign Policy. URL http://foreignpolicy. com/2013/06/24/the-crowning-of-the-syrian-islamic-front/
- [16] Gurcan M. Is the islamic state planning a cyber-caliphate? Al-Monit. URL http://www. al-monitor. com/pulse/originals/2016/07/turkey-syria-isis-cyber-spaceturkish-content. html,2016
- [17] Murgia M. Could cyberattack on Turkey be a Russian retaliation. The Telegraph. URL http://www. telegraph. co. uk/technology/internet-security/12057478/Could-cyberattack-on-Turkey-be-a-Russian-retaliation.html,2015