DOI QR코드

DOI QR Code

Cyber Weapon Model for the National Cybersecurity

국가사이버안보를 위한 사이버무기 모델 연구

  • Bae, Si-Hyun (Department of Convergence Science and Technology, Hoseo Graduate School of Venture at Hoseo University) ;
  • Park, Dae-Woo (Department of Convergence Science and Technology, Hoseo Graduate School of Venture at Hoseo University)
  • Received : 2018.09.21
  • Accepted : 2018.11.02
  • Published : 2019.02.28

Abstract

Recently, the United States has been trying to strengthen its cybersecurity by upgrading its position as an Unified Combatant Command that focuses on the Cyber Command in the United States, strengthening operations in cyberspace, and actively responding to cyber threats. Other major powers are also working to strengthen cyber capabilities, and they are working to strengthen their organization and power. The world demands economic power for its own interests rather than its own borders. But Cyber World is a world without borders and no defense. Therefore, a cyber weapon system is necessary for superiority in cyberspace (defense, attack) for national cybersecurity. In this paper, we analyze operational procedures for cyber weapons operation. And we design cyber weapons to analyze and develop the best cyber weapons to lead victory in cyberwarfare. It also conducts cyber weapons research to solve the confrontation between Cyber World.

최근 미국은 미국의 사이버사령부를 사이버 작전에 주력하는 통합전투사령부로 지위를 격상하고, 사이버공간에서의 작전을 강화하고 통합 관리함으로써 사이버 위협에 적극적으로 대응하겠다고 밝히는 등 사이버안보 강화를 위해 노력하고 있다. 또한 다른 강대국들도 사이버역량 강화를 위해 노력하고 있으며, 그들은 조직과 전력강화를 위해 힘쓰고 있다. 세계는 자국의 국경보다 자국의 이익을 위한 경제적 힘을 요구한다. 하지만 Cyber World에서는 국경이 없고 국방도 보이지 않는 세계이다. 따라서 국가사이버안보를 위한 사이버공간에서의 우세(방어, 공격)를 위해서는 사이버 무기체계가 필요하다. 본 논문에서는 사이버무기 운영을 위한 작전절차를 분석한다. 그리고 사이버전쟁에서 승리를 이끌기 위한 최고의 사이버무기를 분석하고 개발하기 위한 사이버무기를 설계한다. 또한 남북과 동서양 대립을 해결하기 위한 사이버무기에 대한 모델을 연구한다.

HOJBC0_2019_v23n2_223_f0001.png 이미지

Fig. 1 Cyber Kill Chain Model

HOJBC0_2019_v23n2_223_f0002.png 이미지

Fig. 2 Joint force commander objectives

Table. 1 Target management requirement ability

HOJBC0_2019_v23n2_223_t0001.png 이미지

Table. 2 Operation enforcement procedure

HOJBC0_2019_v23n2_223_t0002.png 이미지

Table. 3 CIPOE Procedure

HOJBC0_2019_v23n2_223_t0003.png 이미지

References

  1. Department of Defense. Cyber Strategy. [Internet]. Available : https://media.defense.gov/2018/Sep/18/2002041658/-1/-1/1/CYBER_STRATEGY_SUMMARY_FINAL.PDF. 2018.
  2. E. M. Hutchins, L. Martin, "Intelligence-Driven Computer Network Defense Informed by Analysis of Adversary Campaigns and Intrusion Kill Chains," 2011.
  3. J. W. Yoo, and D. W. Park, "Cyber kill chain strategy for hitting attacker origin," Journal of the Korea Institute of Information and Communication Engineering, vol. 21, no. 11, pp. 3, Nov. 2017.
  4. Department of Defense. (2015). Cybersecurity Test and Evaluation Guidebook. Version 1.0, 2015.
  5. U.S. Joint Chief of Staff. Cyberspace Operations. (JP 3-12). 2018.
  6. U.S. ARMY, CYBER OPERATIONS OFFICER, CAREERS & JOBS [Internet]. Available : https://www.goarmy.com/careers-and-jobs/browse-career-and-job-categories/computers-and-technology/cyber-operations-officer.html. 2017.
  7. U.S. Army. Operations. (FM 3-0). 2017.
  8. Headquaters, Department of the Army. Cyberspace and Electronic Warfare Operations (FM 3-12) [Internet]. Available : https://fas.org/irp/doddir/army/fm3-12.pdf. 2017.