Browse > Article
http://dx.doi.org/10.7472/jksii.2020.21.2.73

A Study on the Operation Concept of Cyber Warfare Execution Procedures  

Kim, Sung-Joong (Department of Computer Engineering, Sejong University)
Yoo, JiHoon (Department of Computer Engineering, Sejong University)
Oh, HaengRok (Agency for Defense Development)
Shin, Dongil (Department of Computer Engineering, Sejong University)
Shin, DongKyoo (Department of Computer Engineering, Sejong University)
Publication Information
Journal of Internet Computing and Services / v.21, no.2, 2020 , pp. 73-80 More about this Journal
Abstract
Due to the expansion of cyber space, war patterns are also changing from traditional warfare to cyber warfare. Cyber warfare is the use of computer technology to disrupt the activities of nations and organizations, especially in the defense sector. However, the defense against effective cyber threat environment is inadequate. To complement this, a new cyber warfare operation concept is needed. In this paper, we study the concepts of cyber intelligence surveillance reconnaissance, active defense and response, combat damage assessment, and command control in order to carry out cyber operations effectively. In addition, this paper proposes the concept of cyber warfare operation that can achieve a continuous strategic advantage in cyber battlefield.
Keywords
Cyber Warfare; Battle Damage Assessment;
Citations & Related Records
Times Cited By KSCI : 4  (Citation Analysis)
연도 인용수 순위
1 Park, Chan-soo and Park, Yongsuk, "A Study on the Improvement of Capability Assessment and the Plan for Enhancing Cyber Warfare Capability of Korea," JKIICE vol. 19, no. 5, pp. 1251-1258, May 2015. https://doi.org/10.6109/jkiice.2015.19.5.1251
2 Kaiser, R., "The Birth of Cyberwar," Political Geography 46,pp.11-20, 2015. https://doi.org/10.1016/j.polgeo.2014.10.001   DOI
3 James P. Farewell and Rafal Ronhozinski, "Stuxnet and the Future of Cyber War," Survival 53, no.1, pp.23-40, February-March 2011. http://dx.doi.org/10.1080/00396338.2011.555586   DOI
4 Robinson, M., Jones, K., & Janicke, H., "Cyber warfare: Issues and challenges." Computers & security 49, pp.70-94, 2015. https://doi.org/10.1016/j.cose.2014.11.007   DOI
5 Secretary of Defense. DoD Publications. http://www.dod.gov/pubs/foi/ojcs/07-F-2105doc1.pdf [accessed 17.08.10].
6 Hildreth, Steven A. "Cyberwarfare." LIBRARY OF CONGRESS WASHINGTON DC CONGRESSIONAL RESEARCH SERVICE, 2001.
7 Jeffrey Carr, Inside Cyber Warfare 2nd edition, Sebastropol, CA : O'Reilly, 2012.
8 Colarik, A., & Janczewski, L., "Establishing cyber warfare doctrine," Current and Emerging Trends in Cyber Operations, pp. 37-50, Palgrave Macmillan, London, 2015. http://dx.doi.org/10.5038/1944-0472.5.1.3
9 Lindsay, Jon R. "Stuxnet and the limits of cyber warfare." Security Studies 22.3, pp.365-404, 2013. https://doi.org/10.1080/09636412.2013.816122   DOI
10 Hutchins, Eric M., Michael J. Cloppert, and Rohan M. Amin. "Intelligence-driven computer network defense informed by analysis of adversary campaigns and intrusion kill chains." Leading Issues in Information Warfare & Security Research 1.1, 80, 2011.
11 Department of Defense, "Cybersecurity Test and Evaluation Guidebook. Version 2.0", 2018.
12 Ramon Krikken, Anton Chuvakin. "Selecting Security Monitoring Approaches by Using the Attack Chain Model," Research ID G00264714. Gartner., 2014.
13 Hewlett Packard Enterprise. "HPE Attack Life Cycle Use Case Methodology," Technical White Paper, 2016.
14 Park, JinHo, et al. "Design and Implementation of Simulation Tool for Cyber Battle Damage Assessment Using MOCE (Measure of Cyber Effectiveness)." Journal of the Korea Institute of Information Security and Cryptology, 29.2, 465-472, 2019. https://doi.org/10.13089/JKIISC.2019.29.2.465   DOI
15 Yoo, Jae-won, and Dea-woo Park. "Cyber kill chain strategy for hitting attacker origin." Journal of the Korea Institute of Information and Communication Engineering 21.11, 2199-2205, 2017. https://doi.org/10.6109/jkiice.2017.21.11.2199   DOI
16 Department of Defense, "ARCYBER The NEXT Battlefield", 2013.12.10.
17 Lionel D. Alford Jr., "Cyber Warfare : A New Doctrine and Taxonomy," The Journal of Defense Software Engineering 14, no.4, pp.27-30, April 2001.