A Review of Layered Models of Cyberspace and and Proposal of a New Model

Document Type : Review article

Author

Master of Information Technology Engineering - Information Security, Malek Ashtar University of Technology, Tehran

Abstract

In today's world, cyberspace has become an integral part of human life, fulfilling many of humanity's needs through the various capabilities provided by this technology. This technological transformation, while offering advantages such as speed, simplicity, and accuracy in delivering diverse services to users, has also posed challenges for governments. One of the most critical requirements for effective management of cyberspace is the understanding of its various components and how they interconnect. This understanding can only be achieved by simplifying and constraining cyberspace within a model. A layered model typically represents the constituent components in a vertical structure as interdependent layers. The aim of this paper is to provide a narrative review of the layered models proposed for cyberspace in order to identify a comprehensive and easily understandable model for managing and governing cyberspace. For this purpose, a search of reputable online databases yielded 57 papers or books, which were studied, and 19 unique layered models were identified. The identified layered models were categorized into four groups, and the models have been compared based on the coverage of cyberspace components and the level of overlap between the layers of different models. The results of this research indicate that the existing layered models are not sufficiently comprehensive to provide effective management of cyberspace, and the proposed new model could fill this gap.

Keywords

Main Subjects


Benkler, Y. (2000). "From Consumers to Users: Shifting the Deeper Structures of Regulation Toward Sustainable Commons and User Access." Federal Communications Law Journal, 25(3), 561–579.
Binxing, F., Peng, Z., and Shibing, Z. (2016). "Research on Cyberspace Sovereignty." Strategic Study of Chinese Academy of Engineering Description, 18(6).
Blane, J. V. (2001). Cyberwarfare: Terror at a Click. Nova Science Pub Inc.
Bush, J. E. (2021). Cyberspace for the Operational Artist: Every Planner has the Tools to Understand the Cyber Domain.
Choucri, N., and Clark, D. D. (2012). "Integrating Cyberspace and International Relations: The Co-Evolution Dilemma." ECIR Working Paper No. 2012-3.
Clark, D. (2010). Characterizing Cyberspace: Past, Present, and Future (ECIR Working Paper No. 2010-3). MIT Political Science Department.
Fanelli, R., and Conti, G. (2012). "A Methodology for Cyber Operations Targeting and Control of Collateral Damage in the Context of Lawful Armed Conflict." 4th International Conference on Cyber Conflict (CYCON 2012), 319–331.
Gleason, D. H., and Friedman, L. (2005). "Proposal for an Accessible Conception of Cyberspace." Journal of Information, Communication and Ethics in Society, 3(1), 15–23.
 
Grant, T. (2014). "On the Military Geography of Cyberspace." 9th International Conference on Cyber Warfare and Security (ICCWS 2014), 66–76.
Kademi, A., and Koltuksuz, A. (2017). "Formal Characterization of Cyberspace for Cyber Lexicon Development." ECCWS 2017 16th European Conference on Cyber Warfare and Security.
Karimi Ghohroudi M.R, Moeinazad, Sh., and Karimi Ghohroudi E. (2023). "Typology of the Concept and Main Elements of Cyberspace in National Cyber Security Strategy of Selected Countries". National Security, 13(47), 9-36. {In Persian}
Lehto, M. (2015). "Phenomena in the Cyber World. In Martti Lehto and Pekka Neittaanmäki." Cyber Security: Analytics, Technology and Automation (pp. 3–29). Springer.
Libicki, M. C. (2007). Conquest in Cyberspace: National Security and Information Warfare. Cambridge University Press.
Limonier, K., Douzet, F., Pétiniaud, L., Salamatian, L., and Salamatian, K. (2021). "Mapping the routes of the Internet for geopolitics: The case of Eastern Ukraine." First Monday, 26(5).
Ning, H. (2022). A Brief History of Cyberspace. CRC Press (Auerbach Publications).
Raymond, D., Conti, G., Cross, T., and Fanelli, R. (2013). "A Control Measure Framework to Limit Collateral Damage and Propagation of Cyber Weapons." 5th International Conference on Cyber Conflict (CYCON 2013), 1–16.
Raymond, D., Conti, G., Cross, T., and Nowatkowski, M. (2014). "Key Terrain in Cyberspace: Seeking the High Ground." 6th International Conference on Cyber Conflict (CyCon 2014), 287–300.
Riley, S. (2014, October 7). Cyber Terrain: A Model for Increased Understanding of Cyber Activity [Blogspot Article]. http://cyber-analysis.blogspot.com/2014/10/cyber-terrain-model-for-increased.html
Ruth, I. (2017). "Multi-dimensional structural data integration for proactive cyber-defence." International Conference on Cyber Situational Awareness, Data Analytics and Assessment (Cyber SA), 1–9.
Sheldon, J. B. (2011). "Deciphering Cyberpower: Strategic Purpose in Peace and War." Strategic Studies Quarterly, 5(2), 95–112.
U.S. Joint Chiefs of Staff. (2013). Cyberspace Operations (Joint Publication (JP) 3-12(R)).
Van den Berg, J., van Zoggel, J., Snels, M., van Leeuwen, M., Boekee, S., van de Koppen, L., van der Lubbe, J., van den Berg, B., and de Bos, T. (2014). "On (The Emergence of) Cyber Security Science and Its Challenges for Cyber Security Education." Proceedings of the NATO IST-122 Cyber Security Science and Engineering Symposium.
Venables, A. (2021). "Modelling Cyberspace to Determine Cybersecurity Training Requirements." Frontiers in Education, 6(768037).
Venables, A., Shaikh, S. A., and Shuttleworth, J. (2015a). "A Model for Characterizing Cyberpower." 9th International Conference on Critical Infrastructure Protection (ICCIP), 3–16.
Venables, A., Shaikh, S. A., and Shuttleworth, J. (2015b). "The projection and measurement of cyberpower." Security Journal, 30(3), 1000–1011.
Ventre, D. (2012). Cyber Conflict: Competing National Perspectives. Wiley-ISTE.
Waltz, E. (1998). Information Warfare Principles and Operations. Artech House.
Zimet, E., and Skoudis, E. (2009). "A Graphical Introduction to the Structural Elements of Cyberspace". In Kramer, F. D., Starr, S. H. and Wentz, L. K., Cyberpower and National Security (pp. 91–112). University of Nebraska Press, Potomac Books.
Zimmermann, H. (1980). "OSI Reference Model—The ISO Model of Architecture for Open Systems Interconnection." IEEE Transactions on Communications, 28(4), 425–432.