Logo: to the web site of the Swedish Defence University

fhs.se
Planned maintenance
A system upgrade is planned for 10/12-2024, at 12:00-13:00. During this time DiVA will be unavailable.
Change search
Link to record
Permanent link

Direct link
Publications (10 of 30) Show all publications
Larsson, E. & Sigholm, J. (2024). Towards econometric estimation of the cost of cyber conflict. Paper presented at 28th International Conference on Knowledge Based and Intelligent information and Engineering Systems (KES 2024), Seville, September 11-13, 2024. Procedia Computer Science, 246, 2635-2644
Open this publication in new window or tab >>Towards econometric estimation of the cost of cyber conflict
2024 (English)In: Procedia Computer Science, E-ISSN 1877-0509, Vol. 246, p. 2635-2644Article in journal (Refereed) Published
Abstract [en]

In the modern era, understanding the costs and implications of conflict extends beyond traditional kinetic boundaries into the cyber realm. While economic analysis has historically been concerned primarily with the state’s ability to sustain and engage in physical warfare, recent research has begun to quantify the additional societal and collateral costs. To shed light on the total costs of the use of cyber weapons and capabilities, we argue that a comprehensive analysis must be done using econometric tools. This paper describes two important tools in this toolkit, counterfactual analysis and bottom-up accounting, in the context of cyber conflict. It discusses how significant collateral costs manifest in the inadvertent aftermath of vulnerability stockpiling for use in cyber weapons, coupled with the losses and thefts of these resources. Such incidents represent not only a direct financial burden but also erode the trust and goodwill of nations who do not disclose the discovered vulnerabilities. Finally, multiple data sources and bottom-up accounting techniques are used to conduct a case study estimating the aggregate societal cost of cyber conflict in the Ukrainian war between late 2013 and 2020. The aggregate cost of the 76 recorded cyberattacks is estimated to be approximately $160M. Finally, counterfactual analysis is concluded to face significant data availability challenges preventing high quality synthesis of the two methods described.

Place, publisher, year, edition, pages
Amsterdam: Elsevier, 2024
Keywords
cyber security, cyber conflict, cyber collateral damage, applied econometrics, offensive cyber operations
National Category
Information Systems
Research subject
Systems science for defence and security
Identifiers
urn:nbn:se:fhs:diva-13263 (URN)10.1016/j.procs.2024.09.434 (DOI)
Conference
28th International Conference on Knowledge Based and Intelligent information and Engineering Systems (KES 2024), Seville, September 11-13, 2024
Available from: 2024-11-29 Created: 2024-11-29 Last updated: 2024-11-29Bibliographically approved
Boschetti, N., Sigholm, J., Wallén, M. & Falco, G. (2023). A Hybrid Space Architecture for Robust and Resilient Satellite Services. In: 2023 IEEE International Conference on Space Mission Challenges for Information Technology (SMC-IT): . Paper presented at 9th IEEE International Conference on Space Mission Challenges for Information Technology, Pasadena, CA, USA, July 18-21, 2023, s. 114 - 122 (pp. 114-122). Institute of Electrical and Electronics Engineers (IEEE)
Open this publication in new window or tab >>A Hybrid Space Architecture for Robust and Resilient Satellite Services
2023 (English)In: 2023 IEEE International Conference on Space Mission Challenges for Information Technology (SMC-IT), Institute of Electrical and Electronics Engineers (IEEE) , 2023, p. 114-122Conference paper, Published paper (Refereed)
Abstract [en]

A 'hybrid space architecture' has been proposed to facilitate robust and resilient satellite data downlink, integration and analysis; however, the technical details for what may comprise a hybrid space architecture are severely lacking. Thus far, 'hybrid' principally entails the diversity of commercial providers. While diverse suppliers can contribute to hybrid space architectures, we argue that robustness and resilience will only be achieved through heterogeneous network and asset architectures. A connected satellite services ecosystem composed of the union of different networks with different characteristics would limit single points of failure, thereby generating high levels of redundancy, resilience and scalability. This research outlines parameters of a hybrid space architecture, documents satellite service reference architectures and provides a comparative analysis of the features for each architecture. Further, through a case study of existing satellite service providers, we propose how a hybrid space architecture could be piloted in Northern Europe and the High North.

Place, publisher, year, edition, pages
Institute of Electrical and Electronics Engineers (IEEE), 2023
Series
IEEE International Conference on Space Mission Challenges for Information Technology, ISSN 2836-4163, E-ISSN 2836-4171
Keywords
Hybrid Space Architecture, Hybrid Satellite Network, Ground Station as a Service, Satellite Communications, System of Systems, Cybersecurity, Military Satellite Communications, Commercial Space Sector, New Space
National Category
Information Systems
Research subject
Systems science for defence and security
Identifiers
urn:nbn:se:fhs:diva-11521 (URN)10.1109/SMC-IT56444.2023.00021 (DOI)979-8-3503-4138-6 (ISBN)979-8-3503-4137-9 (ISBN)
Conference
9th IEEE International Conference on Space Mission Challenges for Information Technology, Pasadena, CA, USA, July 18-21, 2023, s. 114 - 122
Available from: 2023-04-24 Created: 2023-04-24 Last updated: 2023-10-25Bibliographically approved
Boschetti, N., Smethurst, C., Epiphaniou, G., Maple, C., Sigholm, J. & Falco, G. (2023). Ground Station as a Service Reference Architectures and Cyber Security Attack Tree Analysis. In: 2023 IEEE Aerospace Conference: . Paper presented at 44th IEEE Aerospace Conference, Big Sky, Montana, USA, March 4-11, 2023.. Institute of Electrical and Electronics Engineers (IEEE)
Open this publication in new window or tab >>Ground Station as a Service Reference Architectures and Cyber Security Attack Tree Analysis
Show others...
2023 (English)In: 2023 IEEE Aerospace Conference, Institute of Electrical and Electronics Engineers (IEEE), 2023Conference paper, Published paper (Refereed)
Abstract [en]

As the Ground Station as a Service (GSaaS) paradigm transforms space infrastructure operations, new attack surface emerges for malicious actors. While the space community generally refers to GSaaS as a singular model, there are several flavors of these systems. After a description of the general GSaaS network's basic structure, this paper presents an analysis of four reference architectures of GSaaS. On the basis of this systems engineering analysis, a cybersecurity analysis of the critical nodes will be carried out through the attack tree method. Later the cybersecurity implication both of technical and strategic characteristic of GSaaS networks will be discussed and put in relation with the current state of space cyberwarfare landscape.

Place, publisher, year, edition, pages
Institute of Electrical and Electronics Engineers (IEEE), 2023
Series
IEEE Aerospace Conference proceedings, ISSN 1095-323X
National Category
Information Systems
Research subject
Systems science for defence and security
Identifiers
urn:nbn:se:fhs:diva-11520 (URN)10.1109/AERO55745.2023.10115903 (DOI)978-1-6654-9032-0 (ISBN)
Conference
44th IEEE Aerospace Conference, Big Sky, Montana, USA, March 4-11, 2023.
Available from: 2023-04-24 Created: 2023-04-24 Last updated: 2023-06-12Bibliographically approved
Boschetti, N., Gordon, N., Sigholm, J. & Falco, G. (2022). Commercial Space Risk Framework Assessing the Satellite Ground Station Security Landscape for NATO in the Arctic and High North. In: 40th IEEE Military Communications Conference, Rockville, MD, USA, November 28 - December 2, 2022.: . Paper presented at 2022 IEEE Military Communications Conference (MILCOM) (pp. 679-686). IEEE
Open this publication in new window or tab >>Commercial Space Risk Framework Assessing the Satellite Ground Station Security Landscape for NATO in the Arctic and High North
2022 (English)In: 40th IEEE Military Communications Conference, Rockville, MD, USA, November 28 - December 2, 2022., IEEE , 2022, p. 679-686Conference paper, Published paper (Refereed)
Abstract [en]

Satellite ground stations in the Arctic and High North are of strategic importance to NATO, given their ability to collect intelligence from space assets in polar Earth orbit. Commercial space infrastructure such as ground systems are increasingly dual-use, employed for both civilian and defense purposes. Their dual-use could cause them to become military targets. As such, commercial operators must strategically consider ground station placement to optimize for utility, while accounting for their security risk. This research presents a frame-work to assess the commercial satellite ground station security landscape by outlining security and performance tradeoffs given geographic location, including proximity to potential adversaries, and designates eight separate risk regions. Particularly, Sweden's and Finland's space infrastructure is of focus given their recent application to join NATO in the wake of Russian aggression. The paper concludes that, to secure ground stations and the assets and services that they enable, a comprehensive risk evaluation including positioning of ground stations is critical.

Place, publisher, year, edition, pages
IEEE, 2022
Series
MILCOM IEEE Military Communications Conference, ISSN 2155-7578, E-ISSN 2155-7586
Keywords
Space Security, Satellite Communications, Ground Station Security, Space Cybersecurity, NATO, Space Infrastructure, Commercial Ground Stations, Dual-Use, Ground Station as a Service
National Category
Information Systems
Research subject
Systems science for defence and security
Identifiers
urn:nbn:se:fhs:diva-11401 (URN)10.1109/MILCOM55135.2022.10017538 (DOI)978-1-6654-8535-7 (ISBN)978-1-6654-8534-0 (ISBN)
Conference
2022 IEEE Military Communications Conference (MILCOM)
Available from: 2023-01-31 Created: 2023-01-31 Last updated: 2023-06-16Bibliographically approved
Wiktorin, J. (Ed.). (2022). Cyberförsvaret: en introduktion. Kungl Krigsvetenskapsakademien
Open this publication in new window or tab >>Cyberförsvaret: en introduktion
Show others...
2022 (Swedish)Collection (editor) (Other academic)
Place, publisher, year, edition, pages
Kungl Krigsvetenskapsakademien, 2022. p. 197
National Category
Law
Research subject
International law
Identifiers
urn:nbn:se:fhs:diva-11102 (URN)978-91-88581-33-4 (ISBN)978-91-88581-34-1 (ISBN)
Available from: 2022-10-14 Created: 2022-10-14 Last updated: 2022-10-14Bibliographically approved
Sigholm, J. & Larsson, E. (2021). Cyber Vulnerability Implantation Revisited. In: 2021 IEEE Military Communications Conference (MILCOM), San Diego, November 29-December 2, 2021.: . Paper presented at 2021 IEEE Military Communications Conference (MILCOM) (pp. 464-469). Institute of Electrical and Electronics Engineers (IEEE)
Open this publication in new window or tab >>Cyber Vulnerability Implantation Revisited
2021 (English)In: 2021 IEEE Military Communications Conference (MILCOM), San Diego, November 29-December 2, 2021., Institute of Electrical and Electronics Engineers (IEEE), 2021, p. 464-469Conference paper, Published paper (Refereed)
Abstract [en]

In this paper we revisit a study presented at MILCOM 2014. Our goal then was to determine the utility of implanting a vulnerability into a cybersecurity software protocol to an actor planning to execute an offensive cyber operation. Based on a case study describing the then recently discovered Heartbleed bug as an offensive cyber operation, a model was devised to estimate the adoption rate of an implanted flaw in OpenSSL. Using the adoption rate of the cryptographic protocol Transport Layer Security version 1.2 as a proxy, we predicted that the global adoption of the vulnerability of at least 50% would take approximately three years, while surpassing 75% adoption would take four years. Compared to subsequently collected real-world data, these forecasts turned out to be surprisingly accurate. An evaluation of our proposed model shows that it yields results with a root-mean-square error of only 1.2% over the forecasting period. Thus, it has a significant degree of predictive power. Although the model may not be generalizable to describe the adoption of any software protocol, the finding helps validate our previously drawn conclusion that exploiting implanted cyber vulnerabilities, in a scenario like the one presented, requires a planning horizon of multiple years. However, as society becomes further dependent on the cyber domain, the utility of intentional vulnerability implantation is likely an exercise in diminishing returns. For a defender, however, our model development process could be useful to forecast the time required for flawed protocols to be phased out.

Place, publisher, year, edition, pages
Institute of Electrical and Electronics Engineers (IEEE), 2021
Series
MILCOM IEEE Military Communications Conference, ISSN 2155-7578, E-ISSN 2155-7586
Keywords
cyber operations, cybercrime, vulnerabilities, exploitation, intelligence, cyber insurance
National Category
Information Systems
Research subject
Systems science for defence and security
Identifiers
urn:nbn:se:fhs:diva-10554 (URN)10.1109/MILCOM52596.2021.9652921 (DOI)978-1-6654-3972-5 (ISBN)978-1-6654-3956-5 (ISBN)
Conference
2021 IEEE Military Communications Conference (MILCOM)
Available from: 2022-01-03 Created: 2022-01-03 Last updated: 2022-01-05Bibliographically approved
Sigholm, J., Falco, G. & Viswanathan, A. (2019). Enhancing Cybersecurity Education through High-Fidelity Live Exercises (HiFLiX). In: Proceedings of the 52nd Hawaii International Conference on System Sciences: . Paper presented at 52nd Hawaii International Conference on System Sciences, January 8-11, 2019, Grand Wailea, Maui, USA (pp. 7553-7562). IEEE conference proceedings
Open this publication in new window or tab >>Enhancing Cybersecurity Education through High-Fidelity Live Exercises (HiFLiX)
2019 (English)In: Proceedings of the 52nd Hawaii International Conference on System Sciences, IEEE conference proceedings, 2019, p. 7553-7562Conference paper, Published paper (Refereed)
Abstract [en]

The people responsible for building the IT products and infrastructure of tomorrow – today’s students of the computing disciplines – oftentimes do not have the opportunity or proper motivation to develop cybersecurity skills meeting the needs of the job market. This paper introduces High Fidelity Live eXercises (HiFLiX) a teaching/learning activity designed to expose students to cybersecurity challenges resembling those they could face in a future work environment. We describe a HiFLiX prototype study, conducted as a collaboration between the Massachusetts Institute of Technology’s CyberSecurity@CSAIL research group and NASA’s Jet Propulsion Laboratory. Our analysis indicates that the proposed delivery method met the stipulated cybersecurity educational outcomes and increased the motivation for future cybersecurity studies in the majority of participants. Two previously unknown software flaws were also discovered.

Place, publisher, year, edition, pages
IEEE conference proceedings, 2019
Series
Proceedings of the Annual Hawaii International Conference on System Sciences (HICSS), ISSN 1530-1605, E-ISSN 2572-6862
Keywords
communication, cooperation, curriculum development, cybersecurity, education, industry academia cooperation, training
National Category
Computer and Information Sciences
Research subject
Systems science for defence and security
Identifiers
urn:nbn:se:fhs:diva-8310 (URN)10.24251/HICSS.2019.911 (DOI)978-0-9981331-2-6 (ISBN)
Conference
52nd Hawaii International Conference on System Sciences, January 8-11, 2019, Grand Wailea, Maui, USA
Available from: 2019-01-10 Created: 2019-01-10 Last updated: 2022-02-14Bibliographically approved
Franke, U., Cohen, M. & Sigholm, J. (2018). What can we learn from enterprise architecture models?: An experiment comparing models and documents for capability development. Software and Systems Modeling, 17(2), 695-711
Open this publication in new window or tab >>What can we learn from enterprise architecture models?: An experiment comparing models and documents for capability development
2018 (English)In: Software and Systems Modeling, ISSN 1619-1366, E-ISSN 1619-1374, Vol. 17, no 2, p. 695-711Article in journal (Refereed) Published
Abstract [en]

Enterprise architecture (EA) has been established as a discipline to cope with the complex interactions of business operations and technology. Models, i.e., formal descriptions in terms of diagrams and views, are at the heart of the approach. Though it is widely thought that such architecture models can contribute to improved understanding and decision making, this proposition has not rigorously been tested. This article describes an experiment conducted with a real EA model and corresponding real traditional documents, investigating whether the model or the documents lead to better and faster understanding. Understanding is interesting to study, as it is a prerequisite to other EA uses. The subjects (N = 98) were officer cadets, and the experiment was carried out using a comprehensive description of military Close Air Support capability either (1) in the form of a MODAF model or (2) in the form of traditional documents. Based on the results, the model seems to lead to better, though not faster, understanding.

Place, publisher, year, edition, pages
Springer, 2018
Keywords
enterprise architecture, MODAF, model-based capability development, experiment, models versus documents
National Category
Information Systems
Research subject
Military Technology
Identifiers
urn:nbn:se:fhs:diva-6145 (URN)10.1007/s10270-016-0535-z (DOI)000430548300017 ()
Available from: 2016-06-02 Created: 2016-06-02 Last updated: 2024-01-17Bibliographically approved
Silfverskiöld, S., Liwång, H., Hult, G., Sivertun, Å., Bull, P., Sigholm, J., . . . Sturesson, P. (2017). Technology Forecast 2017 - Military Utility of Future Technologies: A Report from Seminars at the Swedish Defence University’s (SEDU) Military-Technology Division. Stockholm: Försvarshögskolan (FHS)
Open this publication in new window or tab >>Technology Forecast 2017 - Military Utility of Future Technologies: A Report from Seminars at the Swedish Defence University’s (SEDU) Military-Technology Division
Show others...
2017 (English)Report (Other academic)
Abstract [en]

Two technology forecast reports from the Fraunhofer Institute, three reports from the Swedish Defence Research Institute (FOI) and two publications from the Massachusetts Institute of Technology (MIT) have been reviewed by staff at the Military-Technology Division at the Swedish Defence University (SEDU). The task given by the Defence Material Administration (FMV) was to assess the military utility of the given technologies in a time frame to up 2040, from a Swedish Armed Forces (SwAF) perspective.

In the review we assessed the military utility of certain technologies as possible contributions to the operational capabilities of the SwAF, based on identified and relevant scenarios. Because a new capability catalogue is under development at the SwAF Headquarters, this report only presents general assessments of the capability impact of the technologies studied.

The technologies were grouped into four classes: potentially significant, moderate, negligible, or uncertain military utility.

The classification uncertain military utility was given to technologies that are difficult to put in the other three classes, it was not because the technology readiness level (TRL) will not bereached by 2040.

The following technologies were assessed to have the potential for significant military utility:

- Nanocarbons for photonic applications

The following technologies were assessed to have a potential for moderate military utility;

- Internet of things (IoT)

- Materials and technologies for protection against chemical agents

The following technologies were assessed to have uncertain military utility;

- Post-quantum cryptography

- New applications for hyperspectral image analysis for chemical and biological agents

No technology was found to have negligible military utility.

The method used in this technology forecast report was to assign each report to one reviewer in the working group. Firstly, each forecast report was summarized. The Fraunhofer assessment of technical readiness level (TRL) in the time period was held to be correct. Each technology was then put into one or more scenarios that were assessed to be suitable for assessing the military utility as well as indicating any possibilities and drawbacks. Based on a SWOTanalysis, the assessed contributions to the fundamental capabilities, and to the factors DOTMPLFI (Doctrine, Organization, Training, Materiel, Leadership, Personnel, Facilities and Interoperability), were listed. Furthermore, the expected SwAF R&D requirements, to facilitate the introduction of the technology are given. The Military utility was assessed using a model developed by the Military-Technology Division. Finally, conclusions and an overall rating of the potential military utility of each technology were presented.

The chosen definition of military utility clearly affects the result of the study. The definition used here (“the military utility of a certain technology is its contribution to the operational capabilities of the SwAF, within identified relevant scenarios”) has been used in our Technology Forecasts since 2013.

Our evaluation of the method used shows that there is a risk that assessments can be biased by the participating experts’ presumptions and experience from their own field of research. It should also be stressed that the seven technologies’ potential military utility was assessed within the specific presented scenarios and their possible contribution to operational capabilities within those specific scenarios, not in general. When additional results have been found in the analysis, this is mentioned.

The greatest value of the method used is its simplicity, cost effectiveness and that it promotes learning within the working group. The composition of the working group and the methodology used are believed to provide a broad and balanced coverage of the technologies being studied. This report should be seen as an executive summary of the research reports and the intention is to help the SwAF Headquarters to evaluate the military utility of emerging technologies within identified relevant scenarios.

Overall, the research reports are considered to be balanced and of high quality in terms of their level of critical analysis regarding technology development. These reports are in line with our task to evaluate the military utility of the emerging technologies.

Place, publisher, year, edition, pages
Stockholm: Försvarshögskolan (FHS), 2017. p. 27
Keywords
Nanocarbons, Photonic Applications, Post Quantum Cryptography, Internet of things, Materials and technologies for protection against chemical agents, Hyperspektral bildanalys
National Category
Other Social Sciences not elsewhere specified Other Engineering and Technologies not elsewhere specified
Research subject
Systems science for defence and security
Identifiers
urn:nbn:se:fhs:diva-7034 (URN)
Projects
Teknisk prognos
Available from: 2017-09-19 Created: 2017-09-19 Last updated: 2020-01-23Bibliographically approved
Larsson, E. & Sigholm, J. (2016). Papering Over the Cracks: The Effects of Introducing Best Practices on the Web Security Ecosystem. In: The 30th International Conference on Information Networking: ICOIN 2016. Paper presented at 30th International Conference on Information Networking (ICOIN), Kota Kinabalu, Malaysia, January 13-15, 2016 (pp. 1-6). IEEE, Article ID 15837791.
Open this publication in new window or tab >>Papering Over the Cracks: The Effects of Introducing Best Practices on the Web Security Ecosystem
2016 (English)In: The 30th International Conference on Information Networking: ICOIN 2016, IEEE, 2016, p. 1-6, article id 15837791Conference paper, Published paper (Refereed)
Abstract [en]

Hypertext Transfer Protocol Secure (HTTPS) is the de facto standard for secure end-to-end web communication. However, numerous flaws discovered during recent years, such as Apple’s “goto fail” bug, and cryptographic weaknesses as illustrated by the Poodlebleed vulnerability, have brought the efficiency of the mostly self-regulated web security market into question. In this cross-disciplinary paper, the authors survey some 160.000 HTTPS-enabled servers among popular web sites over a time period of three years. The research question is what effect the introduction of best practices and vulnerability publication have on web server security in the form of protocol support. Main findings include that (i) insecure configurations, although well known, can remain widespread for over a decade, (ii) the introduction of best practices affect the decline of insecure configurations only moderately, whereas highly publicized security flaws have a significant impact, and (iii) economic incentives for website owners to provide secure services are weak, motivating such other levers of influence as legislation or blocking of noncompliant sites.

Place, publisher, year, edition, pages
IEEE, 2016
Series
International Conference on Information Networking, ISSN 1976-7684
Keywords
Internet governance, network security, security economics, HTTPS
National Category
Information Systems
Research subject
Military Technology
Identifiers
urn:nbn:se:fhs:diva-6685 (URN)10.1109/ICOIN.2016.7427064 (DOI)9781509017256 (ISBN)9781509017249 (ISBN)
Conference
30th International Conference on Information Networking (ICOIN), Kota Kinabalu, Malaysia, January 13-15, 2016
Available from: 2017-04-24 Created: 2017-04-24 Last updated: 2019-08-26Bibliographically approved
Organisations
Identifiers
ORCID iD: ORCID iD iconorcid.org/0000-0002-4376-9800

Search in DiVA

Show all publications