HOME > 상세정보

상세정보

Comprehensive damage assessment of cyberattacks on defense mission systems in cyber warfare

Comprehensive damage assessment of cyberattacks on defense mission systems in cyber warfare

자료유형
학위논문
개인저자
유승근
서명 / 저자사항
Comprehensive damage assessment of cyberattacks on defense mission systems in cyber warfare / Seung Keun Yoo
발행사항
Seoul :   Graduate School, Korea Unversity,   2019  
형태사항
viii, 73장 ; 26 cm
기타형태 저록
Comprehensive Damage Assessment of Cyberattacks on Defense Mission Systems in Cyber Warfare   (DCOLL211009)000000083087  
학위논문주기
학위논문(박사)-- 고려대학교 대학원: 컴퓨터·전파통신공학과, 2019. 2
학과코드
0510   6YD36   357  
일반주기
지도교수: 백두권  
서지주기
참고문헌: 장 68-71
이용가능한 다른형태자료
PDF 파일로도 이용가능;   Requires PDF file reader(application/pdf)  
비통제주제어
comprehensive damage assessment , cyber warfare,,
000 00000nam c2200205 c 4500
001 000045978546
005 20190416163559
007 ta
008 181227s2019 ulk bmAC 000c eng
040 ▼a 211009 ▼c 211009 ▼d 211009
041 0 ▼a eng ▼b kor
085 0 ▼a 0510 ▼2 KDCP
090 ▼a 0510 ▼b 6YD36 ▼c 357
100 1 ▼a 유승근
245 1 0 ▼a Comprehensive damage assessment of cyberattacks on defense mission systems in cyber warfare / ▼d Seung Keun Yoo
260 ▼a Seoul : ▼b Graduate School, Korea Unversity, ▼c 2019
300 ▼a viii, 73장 ; ▼c 26 cm
500 ▼a 지도교수: 백두권
502 1 ▼a 학위논문(박사)-- ▼b 고려대학교 대학원: ▼c 컴퓨터·전파통신공학과, ▼d 2019. 2
504 ▼a 참고문헌: 장 68-71
530 ▼a PDF 파일로도 이용가능; ▼c Requires PDF file reader(application/pdf)
653 ▼a comprehensive damage assessment ▼a cyber warfare
776 0 ▼t Comprehensive Damage Assessment of Cyberattacks on Defense Mission Systems in Cyber Warfare ▼w (DCOLL211009)000000083087
900 1 0 ▼a Yoo, Seung-keun, ▼e
900 1 0 ▼a 백두권, ▼e 지도교수
900 1 0 ▼a Baik, Doo-kwon, ▼e 지도교수
945 ▼a KLPA

전자정보

No. 원문명 서비스
1
Comprehensive damage assessment of cyberattacks on defense mission systems in cyber warfare (39회 열람)
PDF 초록 목차
No. 소장처 청구기호 등록번호 도서상태 반납예정일 예약 서비스
No. 1 소장처 과학도서관/학위논문서고/ 청구기호 0510 6YD36 357 등록번호 123060853 도서상태 대출가능 반납예정일 예약 서비스 B M
No. 2 소장처 과학도서관/학위논문서고/ 청구기호 0510 6YD36 357 등록번호 123060854 도서상태 대출가능 반납예정일 예약 서비스 B M
No. 3 소장처 세종학술정보원/5층 학위논문실/ 청구기호 0510 6YD36 357 등록번호 153081448 도서상태 대출가능 반납예정일 예약 서비스
No. 소장처 청구기호 등록번호 도서상태 반납예정일 예약 서비스
No. 1 소장처 과학도서관/학위논문서고/ 청구기호 0510 6YD36 357 등록번호 123060853 도서상태 대출가능 반납예정일 예약 서비스 B M
No. 2 소장처 과학도서관/학위논문서고/ 청구기호 0510 6YD36 357 등록번호 123060854 도서상태 대출가능 반납예정일 예약 서비스 B M
No. 소장처 청구기호 등록번호 도서상태 반납예정일 예약 서비스
No. 1 소장처 세종학술정보원/5층 학위논문실/ 청구기호 0510 6YD36 357 등록번호 153081448 도서상태 대출가능 반납예정일 예약 서비스

컨텐츠정보

초록

In cyber warfare, enemies attempt to destroy, steal, and falsify the critical information that an organization or system uses for accomplishing its mission. The cyberattack, as a weapon to achieve these objectives, damages the targeted defense mission system. To decide if we operate this damaged defense mission system, we must know how much it is damaged, and thus, we need a trustable damage assessment. Many researches proposed assessment methods for the damage caused by cyberattacks, but they were not strong enough to be utilized in the defense domain for cyber warfare. Their purpose was mainly to detect a cyberattack, not to evaluate its damage, and the assessment results had low accuracy to correctly determine the actual situation. They also needed a long assessment time and had limitations for a swift response to cyber incidents. They were still far from the requirements in the defense domain for cyber warfare. To resolve these problems, accurate and fast damage assessments of cyberattacks are required from the comprehensive perspective. We enlarged the scope of the target to an entire defense mission system, defined measures to precisely evaluate the damage of cyberattacks, and develop a comprehensive method to rapidly assess the damage to the entire system at the mission level. Experiments are performed to demonstrate that our method has superior performance and that it can be successfully applied to actual defense applications. This research proposes a comprehensive assessment of the mission-level damage caused by cyberattacks on an entire defense mission system and contributes to the enhancement of damage assessment of cyberattacks with a faster and more accurate method.

목차

ABSTRACT  ................................ i
1. Introduction  ................................ 1
1.1 Research Motivation  ................................ 1
1.2 Research Purpose  ................................ 3
1.3 Research Taxonomy  ................................ 3
1.4 Organization of the Dissertation  ................................ 5
2. Related Works  ................................ 6
2.1 Intrusion Detection Phase  ................................ 6
2.2 Risk, Threat, or Vulnerability Evaluation Phase  ................................ 7
2.3 Impact Assessment Phase  ................................ 9
2.4 Impact Assessment on Mission Phase  ................................ 10
3. Comprehensive Damage Assessment  ................................ 12
3.1 Basic Concept  ................................ 12
3.2 Layers and Components  ................................ 13
3.3 Measures  ................................ 15
3.4 Damage Assessment Process  ................................ 18
3.4.1 Asset Layer Process ................................ 18
3.4.2 Mission Layer Process  ................................ 20
3.4.3 Overall Process  ................................ 21
4. Experiment and Evaluation  ................................ 24
4.1 Experiment  ................................ 24
4.1.1 Experimental Design  ................................ 25
4.1.2 Experimental Data  ................................ 27
4.1.3 Mission Capability Before Cyberattack  ................................ 31
4.2 Experimental Result  ................................ 34
4.2.1 Mission Capability After Cyberattack  ................................ 34
4.2.2 Damage Assessment Results  ................................ 44
4.3 Comparitive Evaluation ................................ 46
4.3.1 Comparitive Experiment Design  ................................ 46
4.3.2 Comparison Objects ................................ 48
4.3.3 Quantitative Comparison  ................................ 50
4.3.4 Qualitative Comparison  ................................ 55
4.4 Discussion  ................................ 57
4.4.1 Pros and Cons of CDAC Method ................................ 57
4.4.2 Requirements for Result Review ................................ 61
5. Conclustion and Future Works ................................ 64
5.1 Conclusion ................................ 64
5.2 Future Works ................................ 66
Bibliography  ................................ 68
Abstaract (Korean) ................................ 72