Browse > Article
http://dx.doi.org/10.33778/kcsa.2022.22.2.027

A Study on the Model for Preemptive Intrusion Response in the era of the Fourth Industrial Revolution  

Hyang-Chang Choi (대전대학교 안보군사연구원)
Publication Information
Abstract
In the era of the Fourth Industrial Revolution, digital transformation to increase the effectiveness of industry is becoming more important to achieving the goal of industrial innovation. The digital new deal and smart defense are required for digital transformation and utilize artificial intelligence, big data analysis technology, and the Internet of Things. These changes can innovate the industrial fields of national defense, society, and health with new intelligent services by continuously expanding cyberspace. As a result, work productivity, efficiency, convenience, and industrial safety will be strengthened. However, the threat of cyber-attack will also continue to increase due to expansion of the new domain of digital transformation. This paper presents the risk scenarios of cyber-attack threats in the Fourth Industrial Revolution. Further, we propose a preemptive intrusion response model to bolster the complex security environment of the future, which is one of the fundamental alternatives to solving problems relating to cyber-attack. The proposed model can be used as prior research on cyber security strategy and technology development for preemptive response to cyber threats in the future society.
Keywords
Fourth Industrial Revolution; Incident Response Models; Cyber Security threats; Cyber threat intelligence; Cyber Security Models;
Citations & Related Records
Times Cited By KSCI : 4  (Citation Analysis)
연도 인용수 순위
1 Gabrielli do Livramento Goncalves, Walter Leal Filho, Samara da Silva Neiva et al., "The Impacts of the Fourth Industrial Revolution on Smart and Sustainable Cities," Sustainability, 2021. 
2 Erik Feyen, Jon Frost, Leonardo Gambacorta et al., "Fintech and the digital transformation of financial services: implications for market structure and public policy," Bank for International Settlements, pp. 1000-1004, 2021. 
3 Machkour, Badr, and Ahmed Abriane. , "Industry 4.0 and its Implications for the Financial Sector," Elservier B.V., pp. 496-502, 2020. 
4 V Fremont, "The Digital Transformation of the Manufacturing Industry," Vincent Fremont, Oct. 2021. 
5 Rafat Mahmood1 and Michael Jetter, "Communications Technology and Terrorism," Journal of Conflict Resolution, pp. 127-166, 2020. 
6 "United Nations Security Council Counter-Terrorism Committee Executive Directorate: Information and Communications Technologies," UN Security Council, 2021. 
7 Robert Graham, "How Terrorists Use Encryption," CTS(Comating Terrorism Center at West Point), vol. 37, no. 4, pp. 20-25, Jun. 2016. 
8 "우리 집 거실 훤히 '월패드 해킹'...똑똑한 아파트일수록 불안 커진다," 한국일보, 2021, https://www.hankookilbo.com/News/Read/A2021120915500002964 
9 Mahmudul Hasan, Milon Islam, Ishrak Islam Zarif, Hashem, "Attack and anomaly detection in IoT sensors in IoT sites using machine learning approaches," Internet of Things, 2019. 
10 Fahiba Farhin; Ishrat Sultana; Nahida Islam; M Shamim Kaiser; Md. Sazzadur Rahman; Mufti Mahmud, "Attack Detection in Internet of Things using Software Defined Network and Fuzzy Neural Network," 2020 Joint 9th International Conference on Informatics, 2021. 
11 Vasily Desnitsky, Andrey Chechulin, Igor Kotenko, "Multi-Aspect Based Approach to Attack Detection in IoT Clouds," PubMed Central, 2022. 
12 Gauthama Raman M. R., Chuadhry Mujeeb Ahmed & Aditya Mathur "Machine learning for intrusion detection in industrial control systems: challenges and lessons from experimental evaluation," Cybersecurity. springeropen, 2021 
13 Mohamad Kaouk; Jean-Marie Flaus; Marie-Laure Potet; Roland Groz, "A Review of Intrusion Detection Systems for Industrial Control Systems," 2019 6th International Conference on Control, Decision and Information Technologies (CoDIT), 2019. 
14 Hussain Ahmad, Isuru Dharmadasa, Faheem Ullah, M. Ali Babar, "A Review on C3I Systems' Security: Vulnerabilities, Attacks, and Countermeasures," Cornell University, 2021. 
15 Bernard Marr, "The Top 10 Technology Trends Of The 4th Industrial Revolution," Forbes, 2020. 
16 Sean Lyngaas, "Universal Health Services reports $67 million in losses after apparent ransomware attack," Sophos Endpoint Cybersecurity, 2021. 
17 "사회기반시설에 대한 민간투자법," 기획재정부, 2021. 
18 "The Critical Importance of Endpoint Management and Security," TBConsulting, 2020. 
19 "Wikipedia," 2022, https://en.wikipedia.org/wiki/Society 
20 "FIWARE," FIWARE Foundation, 2021, https://www.fiware.org/ 
21 "Gartner's 8 Cybersecurity Predictions for 2023-2025,",2022, https://krontech.com/gartners-8-cybersecurity-predictions-for-2023-2025. 
22 Dominic Endicott, John Sviokla, "Facing up to a four-generation society,"strategy&, 2022, https://www.strategy-business.com/aricle/Facing-Up-to-a-Four-Generation-Society 
23 Klaus Schwab, "The Fourth Industrial Revolution: what it means, how to respond," WORLD ECONOMIC FORUM, 2016, https://www.weforum.org/agenda/2016/01/the-fourth-industrial-revolution-what-it-means-and-how-to-respond/ 
24 Matthew J. Kalas, "Drones Aren't Just Hackers' Targets - They're Hackers' Weapons," Locke Lord, 2020, https://www.lockelord.com/newsandevents/publications/2020/07/drones-arent-just-hackers-targets.
25 Patrick Howell O'Neillarchive page, "These hackers showed just how easy it is to target critical infrastructure," 2022, https://www.technologyreview.com/2022/04/21/1050815/hackers-target-critical-infrastructure-pwn2own/ 
26 Andres Munoz-Arcentales, Sonsoles Lopez-Pernas, Alejandro Pozo, Alvaro Alonso, Joaquin Salvachua and Gabriel Huecas, "Data Usage and Access Control in Industrial Data Spaces: Implementation Using FIWARE," Sustainability, 2020. 
27 Stamford, "Gartner Predicts By 2025 Cyber Attackers Will Have Weaponized Operational Technology Environments to Successfully Harm or Kill Humans," Gartner, 2021. 
28 Robert M. Lee, Michalel J. Assante, Tim Conway, "Analysis of the Cyber Attack on the Ukrainian Power Grid," Electricity Information Sharing and Analysis Center, 2016. 
29 Andre Kudelski, "The dark side of the Fourth Industrial Revolution," World Economic Forum, 2016. 
30 Goiuri Peralta, Raul G. Cid-Fuentes, Josu Bilbao and Pedro M. Crespo, "Network Coding-Based Next-Generation IoT for Industry 4.0," Intechopen, 2017. 
31 Mohd Javaid, Abid Haleem, Ravi PratapSingh, Shanay Rab, Rajiv Suman, "Significance of sensors for industry 4.0: Roles, capabilities, and applications," ScienceDirect, 2021. 
32 Vidar, "Google's Quantum Computer Is About 158 Million Times Faster Than the World's Fastest Supercomputer," Published in Predict, 2021. 
33 Michal Krelina, "Quantum Technology for Military Applications," arXiv:2103.12548v2, 2021.    DOI
34 Amyas Morse, "Investigation: WannaCry cyber attack and the NHS," National Audit Office, 2017. 
35 Kenneth B Medlock, "The Colonial Pipeline Outage: An Important Lesson For US Energy Security," Forbes, 2021. 
36 Andy Greenberg, "A Hacker Tried to Poison a Florida City's Water Supply, Officials Say," WIRED, 2021. 
37 Sandra Grabowska, "SMART FACTORIES IN THE AGE OF INDUSTRY 4.0 ," Management Systems in Production Engineering, vol. 28, no. 2, pp. 90-96, 2020.    DOI
38 Saheed Oladimeji, Sean Michael Kerner, "SolarWinds hack explained: Everything you need to know," TechTarget, 2021. 
39 Pedoro Soto-Acosta, "COVID-19 Pandemic: Shifting Digital Transformation to a High-Speed Gear," Information Systems Management, vol. 37, no. 4, pp. 260-266, 2020.    DOI