DOI QR코드

DOI QR Code

A Study on the Model for Preemptive Intrusion Response in the era of the Fourth Industrial Revolution

4차 산업혁명 시대의 선제적 위협 대응 모델 연구

  • 최향창 (대전대학교 안보군사연구원)
  • Received : 2022.05.31
  • Accepted : 2022.06.29
  • Published : 2022.06.30

Abstract

In the era of the Fourth Industrial Revolution, digital transformation to increase the effectiveness of industry is becoming more important to achieving the goal of industrial innovation. The digital new deal and smart defense are required for digital transformation and utilize artificial intelligence, big data analysis technology, and the Internet of Things. These changes can innovate the industrial fields of national defense, society, and health with new intelligent services by continuously expanding cyberspace. As a result, work productivity, efficiency, convenience, and industrial safety will be strengthened. However, the threat of cyber-attack will also continue to increase due to expansion of the new domain of digital transformation. This paper presents the risk scenarios of cyber-attack threats in the Fourth Industrial Revolution. Further, we propose a preemptive intrusion response model to bolster the complex security environment of the future, which is one of the fundamental alternatives to solving problems relating to cyber-attack. The proposed model can be used as prior research on cyber security strategy and technology development for preemptive response to cyber threats in the future society.

4차 산업혁명 시대에는 산업혁신이라는 목표를 달성하기 위해 기존 산업의 생산성을 높일 수 있는 디지털 전환이 더욱 중요해지고 있다. 디지털 전환에는 디지털 뉴딜과 스마트 국방 등이 있으며, 이들은 인공지능과 빅데이터 분석기술, 사물인터넷을 이용한다. 이러한 변화는 사이버공간을 지속해서 확장함으로써 국가의 국방, 사회, 보건 등의 산업화 영역을 더 지능적인 새로운 서비스들로 혁신하고 있다. 하지만 이로 인해 업무 생산성, 효율성, 편리성, 산업 안전성 등은 강화되겠지만, 디지털 전환영역의 확대로 사이버공격에 따른 위험성 또한 지속해서 증가할 것이다. 본 고의 목표는 이러한 위협에 선제적으로 대응하기 위해 미래의 변화로 나타날 수 있는 위협시나리오를 고찰하고, 이를 해결할 근본적인 대안 중의 하나인 미래의 복합안보 상황에서 요구되는 4차 산업혁명 시대의 선제적 위협 대응 모델을 제안한다. 본고는 향후 미래 사회에서 사이버 위협에 능동적으로 대응할 사이버안보 전략과 기술 개발의 선행 연구로 활용할 수 있을 것이다.

Keywords

Acknowledgement

이 논문은 2019년 대한민국 교육부와 한국연구재단의 지원을 받아 수행된 연구임 (NRF-2019S1A5C2A03082827)

References

  1. Pedoro Soto-Acosta, "COVID-19 Pandemic: Shifting Digital Transformation to a High-Speed Gear," Information Systems Management, vol. 37, no. 4, pp. 260-266, 2020.  https://doi.org/10.1080/10580530.2020.1814461
  2. Sandra Grabowska, "SMART FACTORIES IN THE AGE OF INDUSTRY 4.0 ," Management Systems in Production Engineering, vol. 28, no. 2, pp. 90-96, 2020.  https://doi.org/10.2478/mspe-2020-0014
  3. Gabrielli do Livramento Goncalves, Walter Leal Filho, Samara da Silva Neiva et al., "The Impacts of the Fourth Industrial Revolution on Smart and Sustainable Cities," Sustainability, 2021. 
  4. Erik Feyen, Jon Frost, Leonardo Gambacorta et al., "Fintech and the digital transformation of financial services: implications for market structure and public policy," Bank for International Settlements, pp. 1000-1004, 2021. 
  5. Machkour, Badr, and Ahmed Abriane. , "Industry 4.0 and its Implications for the Financial Sector," Elservier B.V., pp. 496-502, 2020. 
  6. V Fremont, "The Digital Transformation of the Manufacturing Industry," Vincent Fremont, Oct. 2021. 
  7. Rafat Mahmood1 and Michael Jetter, "Communications Technology and Terrorism," Journal of Conflict Resolution, pp. 127-166, 2020. 
  8. "United Nations Security Council Counter-Terrorism Committee Executive Directorate: Information and Communications Technologies," UN Security Council, 2021. 
  9. Robert Graham, "How Terrorists Use Encryption," CTS(Comating Terrorism Center at West Point), vol. 37, no. 4, pp. 20-25, Jun. 2016. 
  10. Patrick Howell O'Neillarchive page, "These hackers showed just how easy it is to target critical infrastructure," 2022, https://www.technologyreview.com/2022/04/21/1050815/hackers-target-critical-infrastructure-pwn2own/ 
  11. Stamford, "Gartner Predicts By 2025 Cyber Attackers Will Have Weaponized Operational Technology Environments to Successfully Harm or Kill Humans," Gartner, 2021. 
  12. Robert M. Lee, Michalel J. Assante, Tim Conway, "Analysis of the Cyber Attack on the Ukrainian Power Grid," Electricity Information Sharing and Analysis Center, 2016. 
  13. Andre Kudelski, "The dark side of the Fourth Industrial Revolution," World Economic Forum, 2016. 
  14. Andres Munoz-Arcentales, Sonsoles Lopez-Pernas, Alejandro Pozo, Alvaro Alonso, Joaquin Salvachua and Gabriel Huecas, "Data Usage and Access Control in Industrial Data Spaces: Implementation Using FIWARE," Sustainability, 2020. 
  15. Goiuri Peralta, Raul G. Cid-Fuentes, Josu Bilbao and Pedro M. Crespo, "Network Coding-Based Next-Generation IoT for Industry 4.0," Intechopen, 2017. 
  16. Mohd Javaid, Abid Haleem, Ravi PratapSingh, Shanay Rab, Rajiv Suman, "Significance of sensors for industry 4.0: Roles, capabilities, and applications," ScienceDirect, 2021. 
  17. Vidar, "Google's Quantum Computer Is About 158 Million Times Faster Than the World's Fastest Supercomputer," Published in Predict, 2021. 
  18. Michal Krelina, "Quantum Technology for Military Applications," arXiv:2103.12548v2, 2021.  https://doi.org/10.1140/epjqt/s40507-021-00113-y
  19. Amyas Morse, "Investigation: WannaCry cyber attack and the NHS," National Audit Office, 2017. 
  20. Kenneth B Medlock, "The Colonial Pipeline Outage: An Important Lesson For US Energy Security," Forbes, 2021. 
  21. Andy Greenberg, "A Hacker Tried to Poison a Florida City's Water Supply, Officials Say," WIRED, 2021. 
  22. Saheed Oladimeji, Sean Michael Kerner, "SolarWinds hack explained: Everything you need to know," TechTarget, 2021. 
  23. "우리 집 거실 훤히 '월패드 해킹'...똑똑한 아파트일수록 불안 커진다," 한국일보, 2021, https://www.hankookilbo.com/News/Read/A2021120915500002964 
  24. Mahmudul Hasan, Milon Islam, Ishrak Islam Zarif, Hashem, "Attack and anomaly detection in IoT sensors in IoT sites using machine learning approaches," Internet of Things, 2019. 
  25. Fahiba Farhin; Ishrat Sultana; Nahida Islam; M Shamim Kaiser; Md. Sazzadur Rahman; Mufti Mahmud, "Attack Detection in Internet of Things using Software Defined Network and Fuzzy Neural Network," 2020 Joint 9th International Conference on Informatics, 2021. 
  26. Vasily Desnitsky, Andrey Chechulin, Igor Kotenko, "Multi-Aspect Based Approach to Attack Detection in IoT Clouds," PubMed Central, 2022. 
  27. Gauthama Raman M. R., Chuadhry Mujeeb Ahmed & Aditya Mathur "Machine learning for intrusion detection in industrial control systems: challenges and lessons from experimental evaluation," Cybersecurity. springeropen, 2021 
  28. Mohamad Kaouk; Jean-Marie Flaus; Marie-Laure Potet; Roland Groz, "A Review of Intrusion Detection Systems for Industrial Control Systems," 2019 6th International Conference on Control, Decision and Information Technologies (CoDIT), 2019. 
  29. Bernard Marr, "The Top 10 Technology Trends Of The 4th Industrial Revolution," Forbes, 2020. 
  30. Sean Lyngaas, "Universal Health Services reports $67 million in losses after apparent ransomware attack," Sophos Endpoint Cybersecurity, 2021. 
  31. "사회기반시설에 대한 민간투자법," 기획재정부, 2021. 
  32. Hussain Ahmad, Isuru Dharmadasa, Faheem Ullah, M. Ali Babar, "A Review on C3I Systems' Security: Vulnerabilities, Attacks, and Countermeasures," Cornell University, 2021. 
  33. "The Critical Importance of Endpoint Management and Security," TBConsulting, 2020. 
  34. "Wikipedia," 2022, https://en.wikipedia.org/wiki/Society 
  35. "FIWARE," FIWARE Foundation, 2021, https://www.fiware.org/ 
  36. "Gartner's 8 Cybersecurity Predictions for 2023-2025,",2022, https://krontech.com/gartners-8-cybersecurity-predictions-for-2023-2025. 
  37. Dominic Endicott, John Sviokla, "Facing up to a four-generation society,"strategy&, 2022, https://www.strategy-business.com/aricle/Facing-Up-to-a-Four-Generation-Society 
  38. Klaus Schwab, "The Fourth Industrial Revolution: what it means, how to respond," WORLD ECONOMIC FORUM, 2016, https://www.weforum.org/agenda/2016/01/the-fourth-industrial-revolution-what-it-means-and-how-to-respond/ 
  39. Matthew J. Kalas, "Drones Aren't Just Hackers' Targets - They're Hackers' Weapons," Locke Lord, 2020, https://www.lockelord.com/newsandevents/publications/2020/07/drones-arent-just-hackers-targets.