Browse > Article
http://dx.doi.org/10.13089/JKIISC.2019.29.6.1447

A Study on the Assessment Method of Battle Damage in Cyberspace by Cyberattacks  

Jang, Won-gu (Graduate School of Information Security, Korea University)
Lee, Kyung-ho (Graduate School of Information Security, Korea University)
Abstract
Evaluating battle damage after conducting an attack on selected targets during warfare is essential. However, regarding the assessment of battle damage caused by cyber-attacks, some methods available under limited circumstances have been suggested so far. Accordingly, this paper suggests a militarily applicable, comprehensive, and specific method of battle damage assessment from battle damage assessment methods in combat assessment theories from the understanding of cyberspace. By using cyberspace components, this paper classifies cyber targets, suggests the assessment methods of data damage, social cognitive damage, derived damage, and the existing battle damage assessment methods such as physical damage, functional damage, and target systems, and provides an example to demonstrate that this method is applicable to the actual past cyberattack cases.
Keywords
Combat Assessment; Cyber Battle Damage Assessment; Cyberspace; Cyber Attack;
Citations & Related Records
연도 인용수 순위
  • Reference
1 Wansoo Cho, Taekyu Kim, "Modeling and Simulation of Cyber Damage Assessment for Cyber Warfare Effectiveness Analysis", JKIIE-S'16, pp. 3119-3125, Apr. 2016.
2 Duhoe Kim, Yonghyun, Kim, Dongkyoo Shin, "Cyber Battle Damage Assessment Framework", KIPS-F'17, pp. 178-181, Nov. 2017.
3 SeungKeun Yoo, "Comprehensive Approach to Evaluate the Damage of Cyberattack on the Defense Mission System", KSS-F'18, pp. 1-11, Dec. 2018.
4 Kihwan Kim, Wanju Kim, "A Study on Simulation-Based Worm Damage Assessment on ATCIS", Journal of the Korea Institute of Military Science and Technology 11(1), pp. 43-50, 2007.
5 Youngbae Jeon, Hyunsook Jeong, Insung Han, "An Asset-Mission Dependency Model Adaptation and Optimized Implementation for Efficient Cyber Mission Impact Assessment", KIISE Transactions on Computing Practices 23(10), pp. 579-587, 2017.   DOI
6 Jungho Kang, "Effective Cyber Operation Combat Damage Evaluation Model Design through Tactical Network Integrated Operation", Journal of Security Engineering 14(1), pp. 1-8, 2017.   DOI
7 Sunyoung Im, Hyunsook Jeong, "Damage Assessment for Cyber Assets", KICS-S'18, pp. 310-311, Jun. 2018.
8 Joint Staff, CJCSI 3162.02: Methodology for Combat Assessment, Joint Staff, Washington D.C., pp. B-1 B-5, 2019.
9 AhnLab, "AhnLabSabo Security World", https://blogsabo.ahnlab.com/743, 2019.12.1
10 Wongu Jang, "Bigdata Governance Model for Effective Operation in Cyberspace", The Korea Journal of Bigdata 4(1), pp. 47, 2019.   DOI
11 Joint Staff, Joint Publication 3-0: Joint Operations, Joint Staff, Washington D.C., pp. IV-4. 2018.
12 Hyeonsu Youn, Yonghyun Kim, Donghwa Kim, Dongkyu Shin. "Development of Risk Index of Cyber Attack and Damage Assessment Priority Calculation Measures", KIPS-F'17, pp. 224-227, Nov. 2017.
13 Worlsu Jang, "A Study on a Model for Estimating Damage Costs Emanating from Leakage in Military Secrets", Ph.D. Thesis, Korea University, pp. 37. Aug. 2012.
14 "67 cyberattacks from 6.25 Cyberterror...14 information destruction", joongan gilbo, 2013. 7. 4, https://news.joins.com/article/11981111
15 "7.7 DDoS, 6.25 Cyberterror, KHNP Hacking Psychological Warfare...Over and over again cyberattacks", etnews, 2017. 2. 21, http://www.etnews.com/20170221000305
16 Red Alert, "6.25 Cyber terror analysis report", NSHC, 2013.