Cyber warfare dalam Konflik Modern: Analisis Serangan Stuxnet pada Fasilitas Nuklir Iran

Authors

  • Arianto Arianto Universitas Hasanuddin

DOI:

https://doi.org/10.62383/dialogika.v1i3.372

Keywords:

Cyber warfare, Stuxnet, modern conflict, cyberspace

Abstract

Stuxnet is one of the first politically motivated cyberattacks in history. This attack targeted Iran's nuclear facility in Natanz, causing significant setbacks in the country's nuclear program. Iran accused the West, particularly NATO, of orchestrating the attack. Many believe that the United States and Israel were behind it. This paper aims to analyze how Stuxnet impacted Iran and the international community, as well as how cyber warfare has emerged as a new domain of conflict. The method used in this paper is qualitative descriptive through library research. The data used in this study are sourced from books, journals, news articles, and credible, relevant websites. The findings indicate that Stuxnet had a severe impact on Iran and the geopolitical situation at the time. It also highlighted the vulnerabilities of the digital world and their real-world consequences. Furthermore, Stuxnet demonstrated how cyber warfare has emerged as a new domain in modern conflict.

Downloads

Download data is not yet available.

References

Baezner, M., & Robin, P. (2017). Hotspot analysis: Stuxnet (No. 4). ETH Zurich.

Black, I. (2008, August 5). 'Freeze-for-freeze' package ignored as Iran stalls for time on nuclear demands. The Guardian. https://www.theguardian.com/world/2008/aug/06/iran.nuclear

Borah, C. K. (2015). Cyber war: The next threat to national security and what to do about it? by Richard A. Clarke and Robert K. Knake [Review of the book Cyber War, by R. A. Clarke & R. K. Knake].

Brown, L. (2025, May 29). Britain will increase cyberattacks against Russia and China. The Times. https://www.thetimes.co.uk/article/britain-increase-cyberattacks-russia-china-zg5jrn3hv

Chen, T. M., & Abu-Nimeh, S. (2011). Lessons from Stuxnet. Computer, 44(4), 91–93.

Deibert, R. J. (2013). Black code: Surveillance, privacy, and the dark side of the Internet. Signal.

Fourkas, V. (2004). What is cyberspace? Media Development, 3, 6–7.

Green, J. A. (2015). Cyber warfare. Taylor & Francis.

Kramer, F. D., Starr, S. H., & Wentz, L. K. (Eds.). (2009). Cyberpower and national security. Potomac Books, Inc.

Kushner, D. (2013, February 26). The real story of Stuxnet. IEEE Spectrum. https://spectrum.ieee.org/the-real-story-of-stuxnet

Libicki, M. C. (2007). Conquest in cyberspace: National security and information warfare. Cambridge University Press.

Lindsay, J. R. (2013). Stuxnet and the limits of cyber warfare. Security Studies, 22(3), 365–404.

Mohn, E. (2023). Stuxnet. EBSCO Research Starters. https://www.ebsco.com/research-starters/computer-science/stuxnet

Musakhanov, D. (2023). The international consequences of cyber warfare: A study of the "Stuxnet" case. Acta of Turin Polytechnic University in Tashkent, 13(3), 47–50.

Pandrekar, I. S. M., & Moore, T. (n.d.). The story of Stuxnet. [Publisher information not provided].

Rahimi, N., & Jones, H. (2024). Cyber warfare: Strategies, impacts, and future directions. Scientific Research Publishing.

Richard, A., & Clarke, A. (2010). Cyber war: The next threat to national security and what to do about it. Ecco.

Schmitt, M. N. (2013). Stuxnet, Schmitt analysis, and the cyber 'use-of-force' debate. Joint Force Quarterly, 67, 40–48.

Shakarian, P., Shakarian, J., & Ruef, A. (2013). Introduction to cyber-warfare: A multidisciplinary approach. Newnes.

Zed, M. (2008). Metode penelitian kepustakaan. Yayasan Obor Indonesia.

Zhuk, A. (2023). Cyberwarfare and the rule of law: Exploring the Stuxnet worm attack from a human rights perspective (1st ed.). ElivaPress.

Downloads

Published

2025-06-09

How to Cite

Arianto Arianto. (2025). Cyber warfare dalam Konflik Modern: Analisis Serangan Stuxnet pada Fasilitas Nuklir Iran. Dialogika : Jurnal Penelitian Komunikasi Dan Sosialisasi, 1(3), 41–52. https://doi.org/10.62383/dialogika.v1i3.372

Similar Articles

You may also start an advanced similarity search for this article.