DOI QR코드

DOI QR Code

A situation-Flexible and Action-Oriented Cyber Response Mechanism against Intelligent Cyber Attack

지능형 사이버공격 대비 상황 탄력적 / 실행 중심의 사이버 대응 메커니즘

  • Received : 2020.08.27
  • Accepted : 2020.09.09
  • Published : 2020.09.30

Abstract

The In the 4th industrial revolution, cyber space will evolve into hyper-connectivity, super-convergence, and super-intelligence due to the development of advanced information and communication technologies, which will connect the nation's core infrastructure into a single network. As applying the 4th industrial revolution technology to the cyber attack technique, it is evolving in an intelligent and sophisticate method. In order to response intelligent cyber attacks, it is difficult to guarantee self-defense in cyberspace by policy-oriented, preplanned-centric and hierarchical cyber response strategies. Therefore, this research aims to propose a situation-flexible & action-oriented cyber response mechanism that can respond flexibly by selecting the most optimal smart security solution according to changes in the cyber attack steps. The proposed cyber response mechanism operates the smart security solutions according to the action-oriented detailed strategies. In addition, artificial intelligence-based decision-making systems are used to select the smart security technology with the best responsiveness.

Keywords

References

  1. Shin, H.G. and Eom, J.H., "Establishment of Cyber Security Strategy according to the change of cyberspace environment," Journal of Security Engineering, Vol.14, No.4, 2017, pp.251-262. https://doi.org/10.14257/jse.2017.08.04
  2. Kim, S.G., Cheon, S.P., and Eom, J.H., "A leading cyber warfare strategy according to the evo-lution of cyber technology after the fourth industrial revolution," International Journal of Advanced Computer Research, Vol 9(40), 2018, pp.72-80. https://doi.org/10.19101/IJACR.SOC6
  3. Hur, C.H., Kim, S.P., Kim Y.S., and Eom, J.H., "Changes of Cyber-Attacks Techniques and Patterns after the Fourth Industrial Revolution," The 5th International Conference on Future Inter-net of Things and Cloud Workshops 2017, pp.69-74.
  4. Eom, J.H., "Modeling of Cyber Attack Intentions Analysis reflecting Domestic / International Situations," International Journal of Grid and Distributed Computing Vol.11, No.1, 2018, pp.13-16. https://doi.org/10.14257/ijgdc.2018.11.1.02
  5. Eom, J.H, Kim, N.U., and Chung, T.M., Introduction on cyber war in the 4th industrial revolution era, Hongneung, Seoul, 2020, p.81-94.
  6. 7 cyber attacks in 2020, https://www.boho.or.kr/data/reportView.do?bulletin_writing_sequence=35227
  7. Lee, D.S, "The Trends of Next Generation Cyber Security Technology," Weekly Technology Trends, No.1916, 2019, pp.2-15.
  8. Kook, K.H. and Kong, B.C., "The Trend of Security technology development using artificial intelligence," Weekly Technology Trends, No.1913, 2019, pp.2-15.
  9. ETRI, Promotes network self-defense technology development, http://www.koit.co.kr/news/articleView.html?idxno=68307
  10. Chang, N.S., "Cybersecurity Threats, Counter Strategies and South Korea's Cyber Strategy," Journal of National Security and Strategy Vo.19, No.2, 2019, pp.1-33.
  11. Kim, K.S. and Shin, J.H., "Concept of operating unmanned ground combat system according to the aspect of future war," Defense & Technology, No.479, 2019, pp.62-75.
  12. Herbert C. Kemp., "Left of Launch: Countering Theater Ballistic Missiles," Atlantic Council, Washington, 2017.
  13. Scott D. Applegate., "the principle of maneuver in cyber operations," the 4th International Conference on Cyber Conflict 2012, IEEE, 2012, pp.1-13.
  14. Kim, N.U. and Eom, J.H., "Attack Path and Intention Recognition System for detecting APT Attack," Journal of the Korea Society of Digital Industry and Information Management, Vol.16, No.1, 2020, pp.69-80.
  15. Eom, J.H., Park, S.H., and Chung, T.M., "A Study on an Extended Cyber Attack Tree for an Analysis of Network Vulnerability," Journal of the Korea Society of Digital Industry and Information Management, Vol.6, No.3, 2010, pp.49-57. https://doi.org/10.17662/KSDIM.2010.6.3.049