• Title/Summary/Keyword: cyber warfare

Search Result 94, Processing Time 0.019 seconds

A Study on the Generation and Transmission of Drone Jamming Signals Based on the MAVLink Protocol (MAVLink 프로토콜 기반 드론 교란 신호 생성 및 송출에 관한 연구)

  • Woojin Lee;Changhan Lim;Jaeyeon Lee
    • Convergence Security Journal
    • /
    • v.23 no.2
    • /
    • pp.75-84
    • /
    • 2023
  • Recently, as the use of drones for military purposes is increasing, such as the Russia-Ukraine War, North Korea's reconnaissance against South Korea, and Army Tiger 4.0's dronebot system, anti-drone technology is developing a lot in each country. However, traditional anti-drone technologies in the form of using conventional weapons or electronic warfare weapons have the disadvantage of being expensive, so anti-drone technologies that can be performed at low cost are currently being newly researched. Therfore, in response to these anti-drone technologies, many efforts are being made to increase the survivability of our allies. In line with this trend, this study assumes a virtual anti-drone system applied with cyber domain and electronic warfare domain technologies that can be performed at low cost, rather than a technique using expensive conventional weapons or electronic warfare weapons among various anti-drone technologies. In response to this, we would like to present a plan to increase the survivability of friendly drones.

The Changes in the Future War Patterns and ROK's Response (미래 전쟁양상의 변화와 한국의 대응)

  • Kim, Kang-nyeong
    • Korea and Global Affairs
    • /
    • v.1 no.1
    • /
    • pp.115-152
    • /
    • 2017
  • This paper is to analyse the changes in the future war patterns and ROK's response. To this end the paper is composed of 5 chapters titled instruction; concept, characteristics, types, and evolution of war; changes in the war patterns of the future; Korea's response strategies for the future war. Truth can be immutable, but everything else changes. War has begun with human history, and today there are still wars in places all over the world. As ages change from agricultural society to industrial society to knowledge and information society, aspects(patterns) of war have also changed. Future warfare includes the 5th dimensional war(in the ground, the sea, the air, the universe, the cyber), the network-centric, the precision strike, the rapid maneuver, the non-gunpowder, the non-lethal, the unmanned robot, the informational & cyber, the asymmetric, the non-linear, and the parallel etc. In response to these changes in the pattern of wars, the ROK military should seek (1)to build a future-oriented military force, (2)to continuously develop military innovation and preparedness, and (3)to develop and establish a paradigm for acquiring the power of technology. A Roman strategist, Vegetius said, "If you wish peace, prepare for war." This is a universally accepted maxim in international society today. We must never forget that peace we desire is given when we have the will and ability to keep.

A Study on Cyber Operational Elements Classification and COA Evaluation Method for Cyber Command & Control Decision Making Support (사이버 지휘통제 의사결정 지원을 위한 사이버 작전요소 분류 및 방책 평가 방안 연구)

  • Lee, Dong-hwan;Yoon, Suk-joon;Kim, Kook-jin;Oh, Haeng-rok;Han, In-sung;Shin, Dong-kyoo
    • Journal of Internet Computing and Services
    • /
    • v.22 no.6
    • /
    • pp.99-113
    • /
    • 2021
  • In these days, as cyberspace has been recognized as the fifth battlefield area following the land, sea, air, and space, attention has been focused on activities that view cyberspace as an operational and mission domain in earnest. Also, in the 21st century, cyber operations based on cyberspace are being developed as a 4th generation warfare method. In such an environment, the success of the operation is determined by the commander's decision. Therefore, in order to increase the rationality and objectivity of such decision-making, it is necessary to systematically establish and select a course of action (COA). In this study, COA is established by using the method of classifying operational elements necessary for cyber operation, and it is intended to suggest a direction for quantitative evaluation of COA. To this end, we propose a method of composing the COES (Cyber Operational Elements Set), which becomes the COA of operation, and classifying the cyber operational elements identified in the target development process based on the 5W1H Method. In addition, by applying the proposed classification method to the cyber operation elements used in the STUXNET attack case, the COES is formed to establish the attack COAs. Finally, after prioritizing the established COA, quantitative evaluation of the policy was performed to select the optimal COA.

A Security Monitoring System for Security Information Sharing and Cooperative Countermeasure (협력대응기반 전역네트워크 보안정보공유 시스템)

  • Kim, Ki-Young;Lee, Sung-Won;Kim, Jong-Hyun
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.50 no.2
    • /
    • pp.60-69
    • /
    • 2013
  • Highlighted by recent security breaches including Google, Western Energy Company, and the Stuxnet infiltration of Iranian nuclear sites, Cyber warfare attacks pose a threat to national and global security. In particular, targeted attacks such as APT exploiting a high degree of stealthiness over a long period, has extended their victims from PCs and enterprise servers to government organizations and critical national infrastructure whereas the existing security measures exhibited limited capabilities in detecting and countermeasuring them. As a solution to fight against such attacks, we designed and implemented a security monitoring system, which shares security information and helps cooperative countermeasure. The proposed security monitoring system collects security event logs from heterogeneous security devices, analyses them, and visualizes the security status using 3D technology. The capability of the proposed system was evaluated and demonstrated throughly by deploying it under real network in a ISP for a week.

Cost-Effective, Real-Time Web Application Software Security Vulnerability Test Based on Risk Management (위험관리 기반의 비용 효율적인 실시간 웹 애플리케이션 소프트웨어 보안취약점 테스팅)

  • Kumi, Sandra;Lim, ChaeHo;Lee, SangGon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.1
    • /
    • pp.59-74
    • /
    • 2020
  • The web space where web applications run is the cyber information warfare of attackers and defenders due to the open HTML. In the cyber attack space, about 84% of worldwide attacks exploit vulnerabilities in web applications and software. It is very difficult to detect web vulnerability attacks with security products such as web firewalls, and high labor costs are required for security verification and assurance of web applications. Therefore, rapid vulnerability detection and response in web space by automated software is a key and effective cyber attack defense strategy. In this paper, we establish a security risk management model by intensively analyzing security threats against web applications and software, and propose a method to effectively diagnose web and application vulnerabilities. The testing results on the commercial service are analyzed to prove that our approach is more effective than the other existing methods.

A Study on the Assessment Method of Battle Damage in Cyberspace by Cyberattacks (사이버공격에 의한 사이버공간 전투피해평가 방안 연구)

  • Jang, Won-gu;Lee, Kyung-ho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.6
    • /
    • pp.1447-1461
    • /
    • 2019
  • Evaluating battle damage after conducting an attack on selected targets during warfare is essential. However, regarding the assessment of battle damage caused by cyber-attacks, some methods available under limited circumstances have been suggested so far. Accordingly, this paper suggests a militarily applicable, comprehensive, and specific method of battle damage assessment from battle damage assessment methods in combat assessment theories from the understanding of cyberspace. By using cyberspace components, this paper classifies cyber targets, suggests the assessment methods of data damage, social cognitive damage, derived damage, and the existing battle damage assessment methods such as physical damage, functional damage, and target systems, and provides an example to demonstrate that this method is applicable to the actual past cyberattack cases.

Implementation and Performance Analysis of Partition-based Secure Real-Time Operating System (파티션 기반 보안 실시간 운영체제의 구현 및 성능 분석)

  • Kyungdeok Seo;Woojin Lee;Byeongmin Chae;Hoonkyu Kim;Sanghoon Lee
    • Convergence Security Journal
    • /
    • v.22 no.1
    • /
    • pp.99-111
    • /
    • 2022
  • With current battlefield environment relying heavily on Network Centric Warfare(NCW), existing weaponary systems are evolving into a new concept that converges IT technology. Majority of the weaponary systems are implemented with numerous embedded softwares which makes such softwares a key factor influencing the performance of such systems. Furthermore, due to the advancements in both IoT technoogies and embedded softwares cyber threats are targeting various embedded systems as their scope of application expands in the real world. Weaponary systems have been developed in various forms from single systems to interlocking networks. hence, system level cyber security is more favorable compared to application level cyber security. In this paper, a secure real-time operating system has been designed, implemented and measured to protect embedded softwares used in weaponary systems from unknown cyber threats at the operating system level.

The Diagnosis and Prescription for Cybersecurity in Korea: Focusing on Policy and System

  • Park, Sangdon;Kim, Il Hwan;Kim, Jaehyoun;Lee, Kyung Lyul
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.2
    • /
    • pp.843-859
    • /
    • 2018
  • Cybersecurity has emerged as a serious problem in Korea and there have been relevant movements to improve domestic cybersecurity policy and system. However, discussions have yet to result in actual progress and the legislation for improvement of cybersecurity policy and system have been stagnant until now. As evidenced by the introduction of primary government legislation bill for national cybersecurity in 2017, the preparations for improvements to the policy and system are still in progress. However, we cannot be positive about the possibility of implementing these improvements during the process. Recognition of the importance of cybersecutiry has gradually risen and is more prevalent than in years past, however, in-depth discussions are not being made. In principle, misunderstandings about cybersecurity itself and insufficient understandings of the relevant legislation seem to cause such problems. Therefore, it is necessary to review key issues related to the improvement of cybersecurity policy and system and reconsider tasks for the future. Such issues include the relationship between cybersecurity and fundamental rights, establishing responsibility and capability of each of entities for cybersecurity, and the role of the military in cybersecurity. This type of in-depth discussion will be helpful for finding ways to improve upon cybersecurity policy and system. Moreover, this study aims to key issues with questionnaire survey and political and normative inquiry.

Innovation in how to combat the Army's military strategy for future combat victory (미래전 승리를 위한 육군의 군사전략과 싸우는 방법 혁신)

  • Jung, Min-Sub;NamKung, Seung-Pil;Park, Sang-Hyuk
    • The Journal of the Convergence on Culture Technology
    • /
    • v.6 no.3
    • /
    • pp.105-109
    • /
    • 2020
  • The Future Army in 2050 should prepare for various future threats and effectively utilize its superintelligence and hyper-connected weapons systems to develop ways of fighting new concepts to dominate multi-regional battlefields and achieve victory. First, the establishment of active and offensive military strategies based on ability. Second, the battle of central strike for enemy combat will paralysis. Third, the battle of simultaneous integrated mosaic using multidisciplinary areas. Fourth, cyber warfare based on artificial intelligence that transcends time and space. Fifth, Combined Platform War. After all, future wars will be won or lost by invisible wars on cyber space.

A study on the Application of Effects-based Operation in Cyberspace (사이버공간에서의 효과중심작전 적용방안 연구)

  • Jang, Won-gu;Lee, Kyun-ho
    • Journal of Internet Computing and Services
    • /
    • v.21 no.1
    • /
    • pp.221-230
    • /
    • 2020
  • The effects-based operation, which would reduce unnecessary efforts and meaningless sacrifices incurred during a war and simultaneously reach the will of the enemy leadership by strategic attacks, was discarded for the reason that it was difficult to apply it to military power except for airpower. However, cyberspace, which can be thoroughly logical and calculated, can be suitable for conducting effects-based operations. This study examined a way to carry out effects-based operations in such cyberspaces. It laid the foundation for overcoming the limitations of effects-based operations revealed in previous battle cases and executing the operations in cyber battlespace where the boundary between physical and cyberspaces gradually disappeared. Futhermore, it demonstrated that effects-based operations could be carried out in cyberspace by establishing a military strategy, which could conduct the operations through an analysis of previous cyber-attack cases.