- Volume 21 Issue 2
DOI QR Code
A Study on the Operation Concept of Cyber Warfare Execution Procedures
사이버전 수행절차 운영개념에 관한 연구
- Kim, Sung-Joong (Department of Computer Engineering, Sejong University) ;
- Yoo, JiHoon (Department of Computer Engineering, Sejong University) ;
- Oh, HaengRok (Agency for Defense Development) ;
- Shin, Dongil (Department of Computer Engineering, Sejong University) ;
- Shin, DongKyoo (Department of Computer Engineering, Sejong University)
- Received : 2019.11.14
- Accepted : 2019.12.10
- Published : 2020.04.30
Due to the expansion of cyber space, war patterns are also changing from traditional warfare to cyber warfare. Cyber warfare is the use of computer technology to disrupt the activities of nations and organizations, especially in the defense sector. However, the defense against effective cyber threat environment is inadequate. To complement this, a new cyber warfare operation concept is needed. In this paper, we study the concepts of cyber intelligence surveillance reconnaissance, active defense and response, combat damage assessment, and command control in order to carry out cyber operations effectively. In addition, this paper proposes the concept of cyber warfare operation that can achieve a continuous strategic advantage in cyber battlefield.
- Park, Chan-soo and Park, Yongsuk, "A Study on the Improvement of Capability Assessment and the Plan for Enhancing Cyber Warfare Capability of Korea," JKIICE vol. 19, no. 5, pp. 1251-1258, May 2015. https://doi.org/10.6109/jkiice.2015.19.5.1251
- Kaiser, R., "The Birth of Cyberwar," Political Geography 46,pp.11-20, 2015. https://doi.org/10.1016/j.polgeo.2014.10.001 https://doi.org/10.1016/j.polgeo.2014.10.001
- James P. Farewell and Rafal Ronhozinski, "Stuxnet and the Future of Cyber War," Survival 53, no.1, pp.23-40, February-March 2011. http://dx.doi.org/10.1080/00396338.2011.555586 https://doi.org/10.1080/00396338.2011.555586
- Robinson, M., Jones, K., & Janicke, H., "Cyber warfare: Issues and challenges." Computers & security 49, pp.70-94, 2015. https://doi.org/10.1016/j.cose.2014.11.007 https://doi.org/10.1016/j.cose.2014.11.007
- Secretary of Defense. DoD Publications. http://www.dod.gov/pubs/foi/ojcs/07-F-2105doc1.pdf [accessed 17.08.10].
- Hildreth, Steven A. "Cyberwarfare." LIBRARY OF CONGRESS WASHINGTON DC CONGRESSIONAL RESEARCH SERVICE, 2001.
- Lionel D. Alford Jr., "Cyber Warfare : A New Doctrine and Taxonomy," The Journal of Defense Software Engineering 14, no.4, pp.27-30, April 2001.
- Jeffrey Carr, Inside Cyber Warfare 2nd edition, Sebastropol, CA : O'Reilly, 2012.
- Colarik, A., & Janczewski, L., "Establishing cyber warfare doctrine," Current and Emerging Trends in Cyber Operations, pp. 37-50, Palgrave Macmillan, London, 2015. http://dx.doi.org/10.5038/1944-04220.127.116.11
- Lindsay, Jon R. "Stuxnet and the limits of cyber warfare." Security Studies 22.3, pp.365-404, 2013. https://doi.org/10.1080/09636412.2013.816122 https://doi.org/10.1080/09636412.2013.816122
- Hutchins, Eric M., Michael J. Cloppert, and Rohan M. Amin. "Intelligence-driven computer network defense informed by analysis of adversary campaigns and intrusion kill chains." Leading Issues in Information Warfare & Security Research 1.1, 80, 2011.
- Department of Defense, "Cybersecurity Test and Evaluation Guidebook. Version 2.0", 2018.
- Ramon Krikken, Anton Chuvakin. "Selecting Security Monitoring Approaches by Using the Attack Chain Model," Research ID G00264714. Gartner., 2014.
- Hewlett Packard Enterprise. "HPE Attack Life Cycle Use Case Methodology," Technical White Paper, 2016.
- Yoo, Jae-won, and Dea-woo Park. "Cyber kill chain strategy for hitting attacker origin." Journal of the Korea Institute of Information and Communication Engineering 21.11, 2199-2205, 2017. https://doi.org/10.6109/jkiice.2017.21.11.2199
- Department of Defense, "ARCYBER The NEXT Battlefield", 2013.12.10.
- Park, JinHo, et al. "Design and Implementation of Simulation Tool for Cyber Battle Damage Assessment Using MOCE (Measure of Cyber Effectiveness)." Journal of the Korea Institute of Information Security and Cryptology, 29.2, 465-472, 2019. https://doi.org/10.13089/JKIISC.2019.29.2.465