DOI QR코드

DOI QR Code

사이버 레인지 운용 방안 연구

A Study of Administration of Cyber Range

  • 투고 : 2017.03.05
  • 심사 : 2017.09.01
  • 발행 : 2017.10.31

초록

전 세계를 활동영역으로 하는 현대 사회의 사이버전의 공격 기술은 날로 보다 정교해지고 새로운 공격의 출현 주기가 점점 짧아지고 있으며 이를 해결할 방어 기술 및 전문 인력은 매우 부족한 실정이다. 이러한 문제를 해결하기 위한 노력 중의 하나로 세계 각국은 사이버전을 대비하는 테스트 베드로써 사이버 레인지를 고려하고 있다. 본 논문은 사이버 레인지의 해외사례 및 유사 체계를 조사하면서 각종 요소를 수집 및 분석하였으며 시스템 엔지니어링 과정을 통하여 이를 체계적으로 분류하였다. 그 과정 중에 유도되는 임무 및 운영 개념을 아키텍처 프레임워크에 맞게 설정하였으며 사이버 레인지의 논리적 아키텍처를 작성하였다. 작성된 아키텍처를 활용하여 방어 기술 및 전문 인력 확보란 두 가지 목표를 달성하는 동시에 효율성 및 지속성을 확보하는 운용 방안을 제시하였다.

In the whole world the Attack Technologies of cyber warfare in modern society are growing faster and complicated. The frequency of the new attacks is shorter than before day by day. The defense technologies and experts against these attacks are very few. One of answers to solve these problems is the cyber range as a test-bed to prepare the cyber warfare considered by many countries. This paper examines the foreign cases and similar systems, collects and analyzes various attributes for cyber range. Finally it refines them through system engineering processes. In these processes missions and concepts for administration are set with architecture framework. The logical architecture is designed. Based on designed architecture two goals, defense technologies and procurement of experts, are established. And it shows effective and persistent administration of cyber range.

키워드

참고문헌

  1. Joint-Pub 3-12(R), Cyberspace Operations, U.S.- Military, National Information Security Strategy, 2013.
  2. https://www.whitehouse.gov/files/documents/cyber/ DARPA%20-%20NationalCyberRange_FactSheet.pdf, DARPA NCR Fact Sheet, 2012.
  3. https://www.acq.osd.mil/dte-trmc/docs/20150224_ NCR%20Overview_DistA.pdf, National Cyber Range Overview, Feb. 24, 2015.
  4. DISA-JITC/JTG1, DoD Information Assurance Range: A Venue for Test and Evaluation In Cyberspace, Aug., 2011.
  5. M. P. Lindgreen, Roadmap for the MoD Cyber Test Range, Master Thesis, Defence Materiel Organisation, Delft TopTech, Sept 10, 2012
  6. Terry Benzel, The Science of Cyber Security Experimentation: The DETER Project, In Proceedings of the Annual Computer Security Applications Conference (ACSAC '11), Orlando, Florida, December 2011.
  7. Whitepaper, 915-6729-01 Rev. A, Cyber Range: Improving Network Defense and Security Readiness : Real-World Attack Scenarios for Cyber Security Training, IXIA co., Aug., 2014
  8. Whitepaper, Rev A. Operational Impact of Cyber Range Elements, Simulations and Realism, Spirent co., Aug., 2014.
  9. Jason Kick, Cyber Exercise Playbook, MITRE, Nov. 2014.
  10. David Robinson, DARPA Initiatives in the Cyber Experimentation Domain National Cyber Range, Experimental Security Panoramas Workshop, July 14, 2011.
  11. Daesik Kim, et al., "A Study of an Conceptual Architecture for Cyber Range", Proceedings of KIMST Fall Conference, pp. 791-792, 2015.
  12. DoD Architecture Framework Version 2.0, U.S. Department of Defense, 28 May 2009.
  13. Daesik Kim and Yonghyun Kim, "A Study of Operational Concept for Cyber Range", Proceedings of KIMST Spring Conference, pp. 1192-1193, 2016.
  14. William C. Liu and Kevin M. McNeill, Overview of Cyber Experimentation & Test Ranges, BAE Systems, ICOTE Sept. 25, 2012.