• Title/Summary/Keyword: 사이버국방

Search Result 120, Processing Time 0.027 seconds

A Study on Operational Element Identification and Integrated Time Series Analysis for Cyber Battlefield Recognition (사이버 전장인식을 위한 작전상태 요소 식별 및 통합 시계열 분석 연구)

  • Son-yong Kim;Koo-hyung Kwon;Hyun-jin Lee;Jae-yeon Lee;Jang-hyuk Kauh;Haeng-rok Oh
    • Convergence Security Journal
    • /
    • v.22 no.4
    • /
    • pp.65-73
    • /
    • 2022
  • Since cyber operations are performed in a virtual cyber battlefield, the measurement indicators that can evaluate and visualize the current state of the cyber environment in a consistent form are required for the commander to effectively support the decision-making of cyber operations. In this paper, we propose a method to define various evaluation indicators that can be collected on the cyber battlefield, normalized them, and evaluate the cyber status in a consistent form. The proposed cyber battlefield status element consists of cyber asset-related indicators, target network-related indicators, and cyber threat-related indicators. Each indicator has 6 sub-indicators and can be used by assigning weights according to the commander's interests. The overall status of the cyber battlefield can be easily recognized because the measured indicators are visualized in time series on a single screen. Therefore, the proposed method can be used for the situational awareness required to effectively conduct cyber warfare.

국가사이버위협에 따른 국방사이버대응 실태

  • Choi, Kwangbok
    • Review of KIISC
    • /
    • v.22 no.8
    • /
    • pp.36-40
    • /
    • 2012
  • 북한은 사이버공간을 해방구로 보고 지난 2003년도에 인터넷 대란 공격을 실시한 이래 사이버 공격을 지속적이고 강력하게 감행하고 있다.1) 지난해에는 농협전산망을 공격하였으며 최근에는 서해상에서 GPS교란 공격을 실시하여 인천 국제공항에 이착륙하는 항공기에 심각한 위협을 초래하기도 하였다. 이처럼 북한을 포함한 전 세계적인 사이버 공격이 이제는 국가안보상의 심대한 위협이 되고 있어 각국은 사이버전 대비에 심혈을 기울이고 있다. 이제 우리나라는 사이버공격을 가장 많이 받는 국가 중의 하나가 되고 있다. 국가적인 사이버위협이 지속되는 상황하에서 국방차원에서의 사이버대응 실태를 살펴보고 발전책을 제시하고자 한다.

Vulnerability Mitigation System Construction Method Based on ATT&CK in M ilitary Internal Network Environment (국방 네트워크 환경에서 ATT&CK 기반 취약점 완화 체계 구축 방안)

  • Ahn, Gwang Hyun;Lee, Hanhee;Park, Won Hyung;Kang, Ji Won
    • Convergence Security Journal
    • /
    • v.20 no.4
    • /
    • pp.135-141
    • /
    • 2020
  • The Ministry of National Defense is strengthening the power and capacity of cyber operations as cyber protection training is conducted. However, considering the level of enemy cyber attack capability, the level of cyber defense capability of the ministry of national defense is significantly low and the protection measures and response system for responding to cyber threats to military networks are not clearly designed, falling short of the level of cyber security capabilities of the public and private sectors. Therefore, this paper is to investigate and verify the establishment of a military internal network vulnerability mitigation system that applies the intention of attackers, tactics, techniques and procedures information (ATT&CK Framework), identified military internal network main threat information, and military information system security requirements with military specificity as factors that can establish a defense network vulnerability mitigation system by referring to the domestic and foreign cyber security framework It has the advantage of having.

사이버공격에 대비한 국방체계 발전방안 연구

  • An, Yoo-Seong
    • Review of KIISC
    • /
    • v.23 no.2
    • /
    • pp.48-54
    • /
    • 2013
  • 인터넷을 중심으로 하는 IT기술의 발전에 따라 이를 통한 사이버공격 혹은 사이버테러가 전세계적으로 급격히 증가하고 있다. 특히 우리나라는 속도 및 보급률에서 인터넷 최강국이며 IT 기술국이다. 그에 따라 사이버테러가 빈번히 발생하고 일단 발생하면 그 확산 및 피해가 엄청나다. 최근에 들어 DDoS 공격을 주축하는 여러형태의 사이버테러가 민간의 범주를 벗어나 국가의 안위를 흔들 정도로 발생하고 있다. 본 연구의 목적은 사이버테러에 대비하고자 외국의 사례들을 살펴 면밀히 분석하고 우리나라의 국방체계 수립에 반영하고자 한다.

Research on Cyber Kill Chain Models for Offensive Cyber Operations (공세적 사이버 작전을 위한 사이버 킬체인 모델 연구)

  • Seong Bae Jo;Wan Ju Kim;Jae Sung Lim
    • Convergence Security Journal
    • /
    • v.23 no.4
    • /
    • pp.71-80
    • /
    • 2023
  • Cyberspace has emerged as the fifth domain of warfare, alongside land, sea, air, and space. It has become a crucial focus for offensive and defensive military operations. Governments worldwide have demonstrated their intent to engage in offensive cyber operations within this domain. This paper proposes an innovative offensive cyber kill chain model that integrates the existing defensive strategy, the cyber kill chain model, with the joint air tasking order (ATO) mission execution cycle and joint target processing procedure. By combining physical and cyber operations within a joint framework, this model aims to enhance national cyber operations capabilities at a strategic level. The integration of these elements seeks to address the evolving challenges in cyberspace and contribute to more effective jointness in conducting cyber operations.

국방 소프트웨어의 현대화 및 공급망 보안을 위한 DevSecOps 도입 방안 연구

  • Lee, Seungwoon;Ryu, Haneul;Hong, Suyoun;Kim, Taekyu
    • Review of KIISC
    • /
    • v.32 no.5
    • /
    • pp.67-73
    • /
    • 2022
  • DevOps는 개발과 운영을 배포 기간을 최소화함과 동시에 안정적인 운영을 목표로 하는 현재 가장 진보된 개발 문화이자 방법론이다. DevOps는 수많은 IT 기업에서 활용되고 있으며, 국방 분야도 마찬가지로 소프트웨어 전력 우위를 선점하기 위하여 DevOps 도입을 고려해왔다. 그러나 사이버 위협의 대응이 부족한 DevOps을 국방 소프트웨어에 적용하기가 쉽지 않다. 이에 미 국방부(Department of Defense, 이하 DoD)는 미래의 사이버 위협으로부터 국방 소프트웨어의 피해를 최소화하고자 DevOps 전 단계에 사이버 보안을 결합한 DevSecOps를 채택하여 개발 및 시범운영 중에 있다. 본 연구에서는 DevOps와 DevSecOps의 개념을 소개하고 국방 소프트웨어 분야의 적용 사례를 살펴본다. 그 중 DoD의 DevSecOps의구조, 구축 사례, 공급망 보안 방안을 분석하고 이를 바탕으로 우리 군의 DevSecOps 적용 가능성에 대해 논의하고자 한다.

Cyber Defense Analysis and Improvement of Military ecosystem with Information Security Industry (국방 사이버 방호체계 구축 생태계 취약점 분석 및 개선방안)

  • Baek, Jaejong;Moon, Byoung-Moo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.6
    • /
    • pp.1263-1269
    • /
    • 2014
  • Since the cyber defense has been dependent on commercial products and protection systems, in aspect of the recent trends, our cyber defence ecosystem can be more vulnerable. In case of general defense weapon companies, they have to be observed by the government such as certain proprietary technologies and products for the protection from the enemy. On the contrary, most cyber weapon companies have not been managed like that. For this reason, cyber attack can reach to the inside of our military through the security hole of commercial products. In this paper, we enhanced a military cyber protection ecosystems out of enemy attacks and analyze the hypothetical scenarios to evaluate and verify the vulnerability, and finally more securable ecosystem of military protection system is presented politically and technically.

A Study on Maturity Model for the Assessment of Cyber Resilience Level in the Defence Information System (국방정보시스템 사이버복원력 수준 평가를 위한 성숙도모델에 관한 연구)

  • Choi, Jae-hyeok;Kim, Wan-ju;Lim, Jae-sung
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.5
    • /
    • pp.1153-1165
    • /
    • 2019
  • Recently, threats of hacking have been increasing on the national intelligence service network and key infrastructure, including the defense field. The defense information system responds to threats from the outside through the network separation, but if the defense information system is hacked, it has a serious impact on the operations of wartime or peacetime military forces. Today, cyberattacks and threats are rising to unpredictable levels and making it practically impossible to completely block and prevent hacking threats completly. So, in this study proposed a maturity model to assess the level of cyber-resilience, which is the ability to ensure the system's viability and maintain continuity through rapid response and recovery if signs of cyberattacks by the defense information system are expected or occurred. The proposed maturity model is expected to contribute to improving the cyber security level of the defense information system by assessing the level of cyber resilience of the defense information system and identifying and supplementing fields that are lacking.

미래 사이버 전 능력 필요

  • O, Je-Sang
    • Defense and Technology
    • /
    • no.10 s.272
    • /
    • pp.52-57
    • /
    • 2001
  • 미래 전쟁에서 정보작전의 전 범위에 걸쳐 정보우세를 성취하기 위하여, 실시간 전투원의 공격 혹은 방어적인 조치를 가능하게 하기 위하여 실시간 탐지/타격 체계(sensor to shooter systems)의 기반구조가 국방정보통신체계로 구성되어야 한다. 또한 이러한 아군의 국방정보통신체계를 적의 공격으로부터 보호할 수 있는 능력을 구비하여야 하며, 반면에 유사시 적의 국방정보통신체계를 마비시킬 수 있는 정보공격 무기인 해커, 바이러스, 전자기파 폭탄(electromagnetic pulse bomb : EMP), 기타 사이버 무기 등을 확보하여야 할 것이다.

  • PDF

Control measures in Cyberspace in the light of Rimland theory (림랜드 이론으로 본 사이버공간 통제방안 (북한의 사이버전 사례연구를 중심으로))

  • Dong-hyun Kim;Soo-jin Lee;Wan-ju Kim;Jae Sung Lim
    • Convergence Security Journal
    • /
    • v.22 no.4
    • /
    • pp.11-16
    • /
    • 2022
  • Development of science technology make integrated CPS(Cyber-Physical System) appear. In CPS era, cyberspace and physical-space are hard to separate anymore, that is developing toward integrated CPS. The reality is not stopping, that is consistently changing and the concept of space is developing too. But several articles are considering for cyberspace and physical-space separately, and they are developing tailed alternative each case. The theorical approaching that is not considering reality is dwelled on past, and is dangerous from dropping down to floating cloud that is not considering progressed reality. This article is suggested to consider rimland theory to control measures in cyberspace. That is dedicated to integrated approaching from physical-space to cyberspace. And that is developing concreted controling measures in cyberspace. Especially, this article is suggested to policy alternative by analyzing north korea cyber warfare from rimland theory including human sources. Simplicity is the ultimate sophistication. This article make integrated approaching effects about cyberspace and physical-space to preparing in the CPS era.