scispace - formally typeset
Open AccessBook

Capability of the People's Republic of China to Conduct Cyber Warfare and Computer Network Exploitation

Bryan Krekel
Reads0
Chats0
TLDR
In this paper, the authors present a comprehensive open source assessment of China's capability to conduct computer network operations (CNO) both during peacetime and periods of conflict by examining the PLA's strategy for computer network operation at the campaign and strategic level to understand how China integrates this capability into overall planning efforts and operationalizing it among its field units.
Abstract
: This paper presents a comprehensive open source assessment of China's capability to conduct computer network operations (CNO) both during peacetime and periods of conflict. The result will hopefully serve as useful reference to policymakers, China specialists, and information operations professionals. The research for this project encompassed five broad categories to show how the People's Republic of China (PRC) is pursuing computer network operations (CNO) and the extent to which it is being implemented by examining: a) The PLA's strategy for computer network operations at the campaign and strategic level to understand how China is integrating this capability into overall planning efforts and operationalizing it among its field units; b) Who are the principal institutional and individual "actors" in Chinese CNO and what linkages may exist between the civilian and military operators; c) Possible targets of Chinese CNO against the US during a conflict to understand how the PLA might attempt to seize information control over the US or similar technologically advanced military during a conflict; d) The characteristics of ongoing network exploitation activities targeting the US Government and private sector that are frequently attributed to China; e) A timeline of alleged Chinese intrusions into US government and industry networks to provide broader context for these activities. The basis for this work was a close review of authoritative open source PLA writings, interviews with Western PLA and information warfare analysts, reviews of Western scholarship on these subjects, and forensic analysis of intrusions into US networks assessed to have Chinese origins. The research draws heavily from journals and articles published by the Chinese National Defense University and the Academy of Military Sciences, the military's highest authority for issues of doctrine, strategy, and force modernization.

read more

Content maybe subject to copyright    Report

Citations
More filters
Journal ArticleDOI

The evaluation of Network Anomaly Detection Systems: Statistical analysis of the UNSW-NB15 data set and the comparison with the KDD99 data set

TL;DR: The experimental results show that UNSW-NB15 is more complex than KDD99 and is considered as a new benchmark data set for evaluating NIDSs.
Journal ArticleDOI

Cloud-Trust—a Security Assessment Model for Infrastructure as a Service (IaaS) Clouds

TL;DR: A cloud architecture reference model that incorporates a wide range of security controls and best practices, and a cloud security assessment model that estimates high level security metrics to quantify the degree of confidentiality and integrity offered by a CCS or cloud service provider (CSP).
Journal ArticleDOI

Cyberwar: A New ‘Absolute Weapon’? The Proliferation of Cyberwarfare Capabilities and Interstate War

TL;DR: The size of the effect of the proliferation of cyberwarfare capabilities on the frequency of war will probably be relatively small and the use of computer network attack as a brute force weapon will probably become increasingly frequent.
Proceedings ArticleDOI

A Context-Based Detection Framework for Advanced Persistent Threats

Paul Giura, +1 more
- 14 Dec 2012 - 
TL;DR: This paper proposes a model of the APT detection problem as well as a methodology to implement it on a generic organization network and is the first to address the problem of modeling an APT and to provide a possible detection framework.
Book

The U.S.-China Military Scorecard: Forces, Geography, and the Evolving Balance of Power, 1996–2017

TL;DR: The authors analyzed Chinese and U.S. military capabilities in two scenarios (Taiwan and the Spratly Islands) from 1996 to 2017, finding that trends in most, but not all, areas run strongly against the United States.
References
More filters
BookDOI

A New Direction for China's Defense Industry

TL;DR: In this article, the U.S. Air Force assesses institutional changes in the operations of defense-industry enterprises in four sectors: missiles, shipbuilding, military aviation, and information technology/defense electronics.
Journal ArticleDOI

China's Militarized Interstate Dispute Behaviour 1949–1992: A First Cut at the Data

TL;DR: For example, the authors showed that coercive diplomacy led to an increase in voter support for Beijing's nemesis, Lee Teng-hui, and increased worries among surrounding states about how China might handle bilateral disputes with them; but it also showed how seriously the Chinese regime takes threats to the related interests of territorial integrity and domestic legitimacy.
Book

Right Sizing The People's Liberation Army: Exploring The Contours Of China's Military

TL;DR: In terms of China's national security strategy, regional and global requirements and expectations, and domestic drivers, what might an armed force consistent with Beijing's legitimate self-defense requirements be composed of and how large would it be? The PLA Conference, by exploring the right size for PLA missions, functions, and organization, provided insight into future Chinese defense planning, strategic intentions, and potential PLA missions.
Book

China's Strategic Modernization: Implications for the United States

TL;DR: In this paper, Major Mark A. Stokes, assistant air attache' in Beijing from 1992-1995, offers an alternative perspective, arguing that the revolutionary modernization of the People's Republic of China (PRC) People's Liberation Army (PLA) could enable the PLA to gain information dominance in future armed conflicts around its periphery.