File Download
There are no files associated with this item.
Links for fulltext
(May Require Subscription)
- Publisher Website: 10.1007/978-3-319-26567-4_2
- Scopus: eid_2-s2.0-84951870098
- WOS: WOS:000369166300002
- Find via
Supplementary
- Citations:
- Appears in Collections:
Conference Paper: Cyber attacks and political events: the case of the Occupy Central Campaign
Title | Cyber attacks and political events: the case of the Occupy Central Campaign |
---|---|
Authors | |
Keywords | Political events Cyber attacks Occupy Central campaign |
Issue Date | 2015 |
Publisher | Springer New York LLC. The Journal's web site is located at http://www.springer.com/series/6102 |
Citation | The 9th IFIP 11.10 International Conference (ICCIP 2015), Arlington, VA., 16-18 March 2015, In IFIP Advances in Information and Communication Technology, 2015, v. 466, p. 17-27 How to Cite? |
Abstract | Occupy Central was a Hong Kong civil disobedience campaign that began in September 2014 with the goal of forcing Mainland China to allow Hong Kong to implement genuine universal suffrage as demanded by Hong Kong residents. The campaign initially encouraged citizens to block the Central District, Hong Kong’s financial center. However, as the campaign evolved, large protests were organized all over Hong Kong.
While vigorous clashes occurred between Occupy Central protesters and police officers on the streets of Hong Kong, cyber attacks were launched quietly by supporters of both sides against each other’s assets. The cyber weapons included mobile applications with malware for surveillance, tools for launching distributed denial-of-service (DDoS) attacks and sophisticated phishing emails with advanced persistent threat functionality. This chapter presents information about cyber attacks related to the Occupy Central campaign and classifies the attacks based on their purpose, techniques, targets and propagation. Based on the attack classification and timeline, a framework is provided that helps predict attack patterns and behavior in order to prevent or mitigate attacks launched during similar political events. |
Description | This series vol. entitled: Critical Infrastructure Protection IX: 9th IFIP 11.10 International Conference, ICCIP 2015, Arlington, VA, USA, March 16-18, 2015, Revised Selected Papers |
Persistent Identifier | http://hdl.handle.net/10722/219236 |
ISBN | |
ISSN | 2023 SCImago Journal Rankings: 0.242 |
ISI Accession Number ID |
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Chow, KP | - |
dc.contributor.author | Yau, KKK | - |
dc.contributor.author | Li, FKF | - |
dc.date.accessioned | 2015-09-18T07:18:28Z | - |
dc.date.available | 2015-09-18T07:18:28Z | - |
dc.date.issued | 2015 | - |
dc.identifier.citation | The 9th IFIP 11.10 International Conference (ICCIP 2015), Arlington, VA., 16-18 March 2015, In IFIP Advances in Information and Communication Technology, 2015, v. 466, p. 17-27 | - |
dc.identifier.isbn | 978-3-319-26566-7 | - |
dc.identifier.issn | 1868-4238 | - |
dc.identifier.uri | http://hdl.handle.net/10722/219236 | - |
dc.description | This series vol. entitled: Critical Infrastructure Protection IX: 9th IFIP 11.10 International Conference, ICCIP 2015, Arlington, VA, USA, March 16-18, 2015, Revised Selected Papers | - |
dc.description.abstract | Occupy Central was a Hong Kong civil disobedience campaign that began in September 2014 with the goal of forcing Mainland China to allow Hong Kong to implement genuine universal suffrage as demanded by Hong Kong residents. The campaign initially encouraged citizens to block the Central District, Hong Kong’s financial center. However, as the campaign evolved, large protests were organized all over Hong Kong. While vigorous clashes occurred between Occupy Central protesters and police officers on the streets of Hong Kong, cyber attacks were launched quietly by supporters of both sides against each other’s assets. The cyber weapons included mobile applications with malware for surveillance, tools for launching distributed denial-of-service (DDoS) attacks and sophisticated phishing emails with advanced persistent threat functionality. This chapter presents information about cyber attacks related to the Occupy Central campaign and classifies the attacks based on their purpose, techniques, targets and propagation. Based on the attack classification and timeline, a framework is provided that helps predict attack patterns and behavior in order to prevent or mitigate attacks launched during similar political events. | - |
dc.language | eng | - |
dc.publisher | Springer New York LLC. The Journal's web site is located at http://www.springer.com/series/6102 | - |
dc.relation.ispartof | IFIP Advances in Information and Communication Technology | - |
dc.rights | The final publication is available at Springer via http://dx.doi.org/10.1007/978-3-319-26567-4_2 | - |
dc.subject | Political events | - |
dc.subject | Cyber attacks | - |
dc.subject | Occupy Central campaign | - |
dc.title | Cyber attacks and political events: the case of the Occupy Central Campaign | - |
dc.type | Conference_Paper | - |
dc.identifier.email | Chow, KP: kpchow@hkucc.hku.hk | - |
dc.identifier.email | Yau, KKK: kenyaukk@hku.hk | - |
dc.identifier.email | Li, FKF: fkfli@hku.hk | - |
dc.identifier.authority | Chow, KP=rp00111 | - |
dc.identifier.doi | 10.1007/978-3-319-26567-4_2 | - |
dc.identifier.scopus | eid_2-s2.0-84951870098 | - |
dc.identifier.hkuros | 254955 | - |
dc.identifier.volume | 466 | - |
dc.identifier.spage | 17 | - |
dc.identifier.epage | 27 | - |
dc.identifier.isi | WOS:000369166300002 | - |
dc.publisher.place | United States | - |
dc.customcontrol.immutable | sml 151127 | - |
dc.identifier.issnl | 1868-4238 | - |