• Title/Summary/Keyword: Cyber warfare

Search Result 95, Processing Time 0.023 seconds

Aspects of Warfare in the Information Age - NCW Concerning (정보화 시대의 전쟁양상 - Network Centric Warfare(네트워크 중심 전쟁)을 중심으로)

  • Woo, Hee-Choul
    • Journal of Convergence Society for SMB
    • /
    • v.6 no.4
    • /
    • pp.45-50
    • /
    • 2016
  • This research suggests a method to contribute to the perfect execution of duty in prospective information warfare by inspecting network-based warfare, in which its basic concepts and efficient management plans are provided; it is especially important, due to growing focus on information warfare caused by sudden improvements on information technology which affects not only civil matters but international military affairs as well. For this purpose, this research scrutinizes on the chronological organization of warfare traits during the information age, and information-warfare execution, as well as its effects, thereby providing proper management plans for network-based warfare.

Integrated Scenario Authoring Method using Mission Impact Analysis Tool due to Cyber Attacks (사이버공격에 의한 임무영향 분석 도구를 이용한 통합시나리오 저작 방법)

  • Yonghyun Kim;Donghwa Kim;Donghwan Lee;Juyoub Kim;Myung Kil Ahn
    • Journal of Internet Computing and Services
    • /
    • v.24 no.6
    • /
    • pp.107-117
    • /
    • 2023
  • It must be possible to assess how combat actions taking place in cyberspace affect the military's major mission systems and weapon systems. In order to analyze the mission impact caused by a cyber attack through cyber M&S, the target mission system and cyber warfare elements must be built as a model and a scenario for simulation must be authored. Many studies related to mission impact analysis due to cyber warfare have been conducted focusing on the United States, and existing studies have authored separate scenarios for physical battlefields and cyber battlefields. It is necessary to build a simulation environment that combines a physical battlefield model and a cyber battlefield model, and be able to integrate and author mission scenarios and cyber attack/defense scenarios. In addition, the physical battlefield and cyber battlefield are different work areas, so authoring two types of scenarios for simulation is very complicated and time-consuming. In this paper, we propose a method of using mission system information to prepare the data needed for scenario authoring in advance and using the pre-worked data to author an integrated scenario. The proposed method is being developed by reflecting it in the design of the scenario authoring tool, and an integrated scenario authoring in the field of counter-fire warfare is being performed to prove the proposed method. In the future, by using a scenario authoring tool that reflects the proposed method, it will be possible to easily author an integrated scenario for mission impact analysis in a short period of time.

Strategic Decision Making Model Among Collective Intelligences Using The Game Theory in Cyber Attacks - Case study of KHNP Hacking - (사이버공격시 게임이론을 활용한 집단지성간 전략결정 모델 연구 - 한수원 해킹사건을 중심으로 -)

  • Park, Sang-min;Lee, Kyung-ho;Lim, Jong-in
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.1
    • /
    • pp.237-246
    • /
    • 2016
  • Recently various types of cyber attacks have occurred. The strategic goals & tactical means of these have evolved. Especially KHNP cyber attack was the type of hacktivism combined hack and psychological warfare. The cyber attackers have forecd the nation to participate in the cyber warfare and the government to make strategic decisions to the releases of confidential information and the threats of stopping KHNP. In this paper, we would like to study the effective strategic decision-making model utilizing the game theory and including an attack intelligence on open policy Decision framework.

A Study about the Direction and Responsibility of the National Intelligence Agency to the Cyber Security Issues (사이버 안보에 대한 국가정보기구의 책무와 방향성에 대한 고찰)

  • Han, Hee-Won
    • Korean Security Journal
    • /
    • no.39
    • /
    • pp.319-353
    • /
    • 2014
  • Cyber-based technologies are now ubiquitous around the glob and are emerging as an "instrument of power" in societies, and are becoming more available to a country's opponents, who may use it to attack, degrade, and disrupt communications and the flow of information. The globe-spanning range of cyberspace and no national borders will challenge legal systems and complicate a nation's ability to deter threats and respond to contingencies. Through cyberspace, competitive powers will target industry, academia, government, as well as the military in the air, land, maritime, and space domains of our nations. Enemies in cyberspace will include both states and non-states and will range from the unsophisticated amateur to highly trained professional hackers. In much the same way that airpower transformed the battlefield of World War II, cyberspace has fractured the physical barriers that shield a nation from attacks on its commerce and communication. Cyberthreats to the infrastructure and other assets are a growing concern to policymakers. In 2013 Cyberwarfare was, for the first time, considered a larger threat than Al Qaeda or terrorism, by many U.S. intelligence officials. The new United States military strategy makes explicit that a cyberattack is casus belli just as a traditional act of war. The Economist describes cyberspace as "the fifth domain of warfare and writes that China, Russia, Israel and North Korea. Iran are boasting of having the world's second-largest cyber-army. Entities posing a significant threat to the cybersecurity of critical infrastructure assets include cyberterrorists, cyberspies, cyberthieves, cyberwarriors, and cyberhacktivists. These malefactors may access cyber-based technologies in order to deny service, steal or manipulate data, or use a device to launch an attack against itself or another piece of equipment. However because the Internet offers near-total anonymity, it is difficult to discern the identity, the motives, and the location of an intruder. The scope and enormity of the threats are not just focused to private industry but also to the country's heavily networked critical infrastructure. There are many ongoing efforts in government and industry that focus on making computers, the Internet, and related technologies more secure. As the national intelligence institution's effort, cyber counter-intelligence is measures to identify, penetrate, or neutralize foreign operations that use cyber means as the primary tradecraft methodology, as well as foreign intelligence service collection efforts that use traditional methods to gauge cyber capabilities and intentions. However one of the hardest issues in cyber counterintelligence is the problem of "Attribution". Unlike conventional warfare, figuring out who is behind an attack can be very difficult, even though the Defense Secretary Leon Panetta has claimed that the United States has the capability to trace attacks back to their sources and hold the attackers "accountable". Considering all these cyber security problems, this paper examines closely cyber security issues through the lessons from that of U.S experience. For that purpose I review the arising cyber security issues considering changing global security environments in the 21st century and their implications to the reshaping the government system. For that purpose this study mainly deals with and emphasis the cyber security issues as one of the growing national security threats. This article also reviews what our intelligence and security Agencies should do among the transforming cyber space. At any rate, despite of all hot debates about the various legality and human rights issues derived from the cyber space and intelligence service activity, the national security should be secured. Therefore, this paper suggests that one of the most important and immediate step is to understanding the legal ideology of national security and national intelligence.

  • PDF

A Location Dependent Group Key Management Scheme for High Confidential Information in Tactical Wireless Networks (전술 무선 네트워크에서 고비밀성 정보 공유를 위한 위치 종속적 그룹키 관리 기법)

  • Lee, Jong-Kwan;Shin, Kyuyong;Kim, Kyung-Min
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.21 no.5
    • /
    • pp.658-664
    • /
    • 2018
  • In this paper, we propose a group key management scheme for very high confidential information in tactical wireless networks. For the proposed scheme, we consider the tactical networks that has a hierarchical topology and the nature of high confidential information. The leader node, which may have higher probability of good channel state than others, provides some data to all the network member in order to generate a geographical group key and it transmits the encrypted information with minimum transmission power level to others. By this scheme, the security and reliability for sharing confidential information is ensured. The performance of the proposed scheme is validated by mathematical analysis. It shows that the proposed scheme makes nodes to share a high confidential information securely if the proper parameters for network design are selected.

Centralized Group Key Management Scheme for Tactical Swarming Drone Networks (전술 군집 드론 네트워크를 위한 중앙집권식 그룹키 관리 기법)

  • Lee, Jong-Kwan;Shin, Kyuyong;Kim, Kyung-Min
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.21 no.6
    • /
    • pp.817-825
    • /
    • 2018
  • Recently, drones have been used in various field to overcome time and space limitations. However, single drone still has a lot of restriction on transportation wight and travel time. Therefore many studies have been conducted to increase the utilization by swarm of drones. Many things should be additionally considered in order to operate swarming drones securely. Especially the group key management is a challenging research topic in tactical domain due to existence of adversary that has anti-drone skill. In this paper, we proposed an efficient group key management scheme for tactical swarming drone networks where an adversary equipped with anti-drone skills exists. The group key can be updated with a small number of message exchange compared to other convenience schemes. The numerical and simulation results demonstrate that the proposed scheme manages the group key efficiently and securely.

North Korea's cyber attack threat analysis research (Based on the type of attack technology) (북한의 사이버 공격 위협 분석 연구 (공격 기술의 유형 중심으로))

  • Kim, Jin Gwang
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2020.07a
    • /
    • pp.107-110
    • /
    • 2020
  • 북한의 사이버 공격은 매년 증가하고 있으며 공격 수행인력 또한 6,800여 명으로 지속 늘어나고 있어 우리에게 큰 위협이 되고 있다. 그럼에도 불구하고 현재까지 북한의 사이버 공격사례 분석은 각각의 사건에 대한 개별 현황분석밖에 되지 않아 큰 시각에서의 공격 기술 유형이 어떻게 변화하였는지와 관련된 연구가 필요하다. 이에 따라 본 논문에서는 우선 사이버전의 일반사항 및 공격 기술을 확인하고 최근 3년간 발생한 북한의 사이버 공격사례를 조사하여 세부적으로 사용된 주요 공격 기술의 유형을 확인하고자 한다.

  • PDF

A Study of Administration of Cyber Range (사이버 레인지 운용 방안 연구)

  • Kim, Daesik;Kim, Yonghyun
    • Journal of Internet Computing and Services
    • /
    • v.18 no.5
    • /
    • pp.9-15
    • /
    • 2017
  • In the whole world the Attack Technologies of cyber warfare in modern society are growing faster and complicated. The frequency of the new attacks is shorter than before day by day. The defense technologies and experts against these attacks are very few. One of answers to solve these problems is the cyber range as a test-bed to prepare the cyber warfare considered by many countries. This paper examines the foreign cases and similar systems, collects and analyzes various attributes for cyber range. Finally it refines them through system engineering processes. In these processes missions and concepts for administration are set with architecture framework. The logical architecture is designed. Based on designed architecture two goals, defense technologies and procurement of experts, are established. And it shows effective and persistent administration of cyber range.

Analysis and Aspects of Space Warfare in the Russia-Ukraine War (Russian Invasion of Ukraine) and Considerations for Space Technology Development (러시아-우크라이나 전쟁(러시아의 우크라이나 침공)의 우주전 분석 및 양상 그리고 우주기술 개발시 고려사항)

  • Choi, Seonghwan
    • Journal of Space Technology and Applications
    • /
    • v.2 no.2
    • /
    • pp.169-186
    • /
    • 2022
  • In this article, Russia's space threat assessment and space warfare in the Russia-Ukraine war (Russian invasion of Ukraine) were analyzed and summarized. Considering the probability that commercial satellites will also be potential targets of space warfare, it is suggested that not only military satellites but also commercial satellites develop and apply space technology that can be applied equally to space threats when developing space technology. Necessary space technologies is listed.