HOME > Detail View

Detail View

Comprehensive damage assessment of cyberattacks on defense mission systems in cyber warfare

Comprehensive damage assessment of cyberattacks on defense mission systems in cyber warfare

Material type
학위논문
Personal Author
유승근
Title Statement
Comprehensive damage assessment of cyberattacks on defense mission systems in cyber warfare / Seung Keun Yoo
Publication, Distribution, etc
Seoul :   Graduate School, Korea Unversity,   2019  
Physical Medium
viii, 73장 ; 26 cm
기타형태 저록
Comprehensive Damage Assessment of Cyberattacks on Defense Mission Systems in Cyber Warfare   (DCOLL211009)000000083087  
학위논문주기
학위논문(박사)-- 고려대학교 대학원: 컴퓨터·전파통신공학과, 2019. 2
학과코드
0510   6YD36   357  
General Note
지도교수: 백두권  
Bibliography, Etc. Note
참고문헌: 장 68-71
이용가능한 다른형태자료
PDF 파일로도 이용가능;   Requires PDF file reader(application/pdf)  
비통제주제어
comprehensive damage assessment , cyber warfare,,
000 00000nam c2200205 c 4500
001 000045978546
005 20190416163559
007 ta
008 181227s2019 ulk bmAC 000c eng
040 ▼a 211009 ▼c 211009 ▼d 211009
041 0 ▼a eng ▼b kor
085 0 ▼a 0510 ▼2 KDCP
090 ▼a 0510 ▼b 6YD36 ▼c 357
100 1 ▼a 유승근
245 1 0 ▼a Comprehensive damage assessment of cyberattacks on defense mission systems in cyber warfare / ▼d Seung Keun Yoo
260 ▼a Seoul : ▼b Graduate School, Korea Unversity, ▼c 2019
300 ▼a viii, 73장 ; ▼c 26 cm
500 ▼a 지도교수: 백두권
502 1 ▼a 학위논문(박사)-- ▼b 고려대학교 대학원: ▼c 컴퓨터·전파통신공학과, ▼d 2019. 2
504 ▼a 참고문헌: 장 68-71
530 ▼a PDF 파일로도 이용가능; ▼c Requires PDF file reader(application/pdf)
653 ▼a comprehensive damage assessment ▼a cyber warfare
776 0 ▼t Comprehensive Damage Assessment of Cyberattacks on Defense Mission Systems in Cyber Warfare ▼w (DCOLL211009)000000083087
900 1 0 ▼a Yoo, Seung-keun, ▼e
900 1 0 ▼a 백두권, ▼e 지도교수
900 1 0 ▼a Baik, Doo-kwon, ▼e 지도교수
945 ▼a KLPA

Electronic Information

No. Title Service
1
Comprehensive damage assessment of cyberattacks on defense mission systems in cyber warfare (40회 열람)
View PDF Abstract Table of Contents
No. Location Call Number Accession No. Availability Due Date Make a Reservation Service
No. 1 Location Science & Engineering Library/Stacks(Thesis)/ Call Number 0510 6YD36 357 Accession No. 123060853 Availability Available Due Date Make a Reservation Service B M
No. 2 Location Science & Engineering Library/Stacks(Thesis)/ Call Number 0510 6YD36 357 Accession No. 123060854 Availability Available Due Date Make a Reservation Service B M
No. 3 Location Sejong Academic Information Center/Thesis(5F)/ Call Number 0510 6YD36 357 Accession No. 153081448 Availability Available Due Date Make a Reservation Service M
No. Location Call Number Accession No. Availability Due Date Make a Reservation Service
No. 1 Location Science & Engineering Library/Stacks(Thesis)/ Call Number 0510 6YD36 357 Accession No. 123060853 Availability Available Due Date Make a Reservation Service B M
No. 2 Location Science & Engineering Library/Stacks(Thesis)/ Call Number 0510 6YD36 357 Accession No. 123060854 Availability Available Due Date Make a Reservation Service B M
No. Location Call Number Accession No. Availability Due Date Make a Reservation Service
No. 1 Location Sejong Academic Information Center/Thesis(5F)/ Call Number 0510 6YD36 357 Accession No. 153081448 Availability Available Due Date Make a Reservation Service M

Contents information

Abstract

In cyber warfare, enemies attempt to destroy, steal, and falsify the critical information that an organization or system uses for accomplishing its mission. The cyberattack, as a weapon to achieve these objectives, damages the targeted defense mission system. To decide if we operate this damaged defense mission system, we must know how much it is damaged, and thus, we need a trustable damage assessment. Many researches proposed assessment methods for the damage caused by cyberattacks, but they were not strong enough to be utilized in the defense domain for cyber warfare. Their purpose was mainly to detect a cyberattack, not to evaluate its damage, and the assessment results had low accuracy to correctly determine the actual situation. They also needed a long assessment time and had limitations for a swift response to cyber incidents. They were still far from the requirements in the defense domain for cyber warfare. To resolve these problems, accurate and fast damage assessments of cyberattacks are required from the comprehensive perspective. We enlarged the scope of the target to an entire defense mission system, defined measures to precisely evaluate the damage of cyberattacks, and develop a comprehensive method to rapidly assess the damage to the entire system at the mission level. Experiments are performed to demonstrate that our method has superior performance and that it can be successfully applied to actual defense applications. This research proposes a comprehensive assessment of the mission-level damage caused by cyberattacks on an entire defense mission system and contributes to the enhancement of damage assessment of cyberattacks with a faster and more accurate method.

Table of Contents

ABSTRACT  ................................ i
1. Introduction  ................................ 1
1.1 Research Motivation  ................................ 1
1.2 Research Purpose  ................................ 3
1.3 Research Taxonomy  ................................ 3
1.4 Organization of the Dissertation  ................................ 5
2. Related Works  ................................ 6
2.1 Intrusion Detection Phase  ................................ 6
2.2 Risk, Threat, or Vulnerability Evaluation Phase  ................................ 7
2.3 Impact Assessment Phase  ................................ 9
2.4 Impact Assessment on Mission Phase  ................................ 10
3. Comprehensive Damage Assessment  ................................ 12
3.1 Basic Concept  ................................ 12
3.2 Layers and Components  ................................ 13
3.3 Measures  ................................ 15
3.4 Damage Assessment Process  ................................ 18
3.4.1 Asset Layer Process ................................ 18
3.4.2 Mission Layer Process  ................................ 20
3.4.3 Overall Process  ................................ 21
4. Experiment and Evaluation  ................................ 24
4.1 Experiment  ................................ 24
4.1.1 Experimental Design  ................................ 25
4.1.2 Experimental Data  ................................ 27
4.1.3 Mission Capability Before Cyberattack  ................................ 31
4.2 Experimental Result  ................................ 34
4.2.1 Mission Capability After Cyberattack  ................................ 34
4.2.2 Damage Assessment Results  ................................ 44
4.3 Comparitive Evaluation ................................ 46
4.3.1 Comparitive Experiment Design  ................................ 46
4.3.2 Comparison Objects ................................ 48
4.3.3 Quantitative Comparison  ................................ 50
4.3.4 Qualitative Comparison  ................................ 55
4.4 Discussion  ................................ 57
4.4.1 Pros and Cons of CDAC Method ................................ 57
4.4.2 Requirements for Result Review ................................ 61
5. Conclustion and Future Works ................................ 64
5.1 Conclusion ................................ 64
5.2 Future Works ................................ 66
Bibliography  ................................ 68
Abstaract (Korean) ................................ 72