000 | 00000nam c2200205 c 4500 | |
001 | 000045978546 | |
005 | 20190416163559 | |
007 | ta | |
008 | 181227s2019 ulk bmAC 000c eng | |
040 | ▼a 211009 ▼c 211009 ▼d 211009 | |
041 | 0 | ▼a eng ▼b kor |
085 | 0 | ▼a 0510 ▼2 KDCP |
090 | ▼a 0510 ▼b 6YD36 ▼c 357 | |
100 | 1 | ▼a 유승근 |
245 | 1 0 | ▼a Comprehensive damage assessment of cyberattacks on defense mission systems in cyber warfare / ▼d Seung Keun Yoo |
260 | ▼a Seoul : ▼b Graduate School, Korea Unversity, ▼c 2019 | |
300 | ▼a viii, 73장 ; ▼c 26 cm | |
500 | ▼a 지도교수: 백두권 | |
502 | 1 | ▼a 학위논문(박사)-- ▼b 고려대학교 대학원: ▼c 컴퓨터·전파통신공학과, ▼d 2019. 2 |
504 | ▼a 참고문헌: 장 68-71 | |
530 | ▼a PDF 파일로도 이용가능; ▼c Requires PDF file reader(application/pdf) | |
653 | ▼a comprehensive damage assessment ▼a cyber warfare | |
776 | 0 | ▼t Comprehensive Damage Assessment of Cyberattacks on Defense Mission Systems in Cyber Warfare ▼w (DCOLL211009)000000083087 |
900 | 1 0 | ▼a Yoo, Seung-keun, ▼e 저 |
900 | 1 0 | ▼a 백두권, ▼e 지도교수 |
900 | 1 0 | ▼a Baik, Doo-kwon, ▼e 지도교수 |
945 | ▼a KLPA |
Electronic Information
No. | Title | Service |
---|---|---|
1 | Comprehensive damage assessment of cyberattacks on defense mission systems in cyber warfare (40회 열람) |
View PDF Abstract Table of Contents |
Holdings Information
No. | Location | Call Number | Accession No. | Availability | Due Date | Make a Reservation | Service |
---|---|---|---|---|---|---|---|
No. 1 | Location Science & Engineering Library/Stacks(Thesis)/ | Call Number 0510 6YD36 357 | Accession No. 123060853 | Availability Available | Due Date | Make a Reservation | Service |
No. 2 | Location Science & Engineering Library/Stacks(Thesis)/ | Call Number 0510 6YD36 357 | Accession No. 123060854 | Availability Available | Due Date | Make a Reservation | Service |
No. 3 | Location Sejong Academic Information Center/Thesis(5F)/ | Call Number 0510 6YD36 357 | Accession No. 153081448 | Availability Available | Due Date | Make a Reservation | Service |
No. | Location | Call Number | Accession No. | Availability | Due Date | Make a Reservation | Service |
---|---|---|---|---|---|---|---|
No. 1 | Location Science & Engineering Library/Stacks(Thesis)/ | Call Number 0510 6YD36 357 | Accession No. 123060853 | Availability Available | Due Date | Make a Reservation | Service |
No. 2 | Location Science & Engineering Library/Stacks(Thesis)/ | Call Number 0510 6YD36 357 | Accession No. 123060854 | Availability Available | Due Date | Make a Reservation | Service |
No. | Location | Call Number | Accession No. | Availability | Due Date | Make a Reservation | Service |
---|---|---|---|---|---|---|---|
No. 1 | Location Sejong Academic Information Center/Thesis(5F)/ | Call Number 0510 6YD36 357 | Accession No. 153081448 | Availability Available | Due Date | Make a Reservation | Service |
Contents information
Abstract
In cyber warfare, enemies attempt to destroy, steal, and falsify the critical information that an organization or system uses for accomplishing its mission. The cyberattack, as a weapon to achieve these objectives, damages the targeted defense mission system. To decide if we operate this damaged defense mission system, we must know how much it is damaged, and thus, we need a trustable damage assessment. Many researches proposed assessment methods for the damage caused by cyberattacks, but they were not strong enough to be utilized in the defense domain for cyber warfare. Their purpose was mainly to detect a cyberattack, not to evaluate its damage, and the assessment results had low accuracy to correctly determine the actual situation. They also needed a long assessment time and had limitations for a swift response to cyber incidents. They were still far from the requirements in the defense domain for cyber warfare. To resolve these problems, accurate and fast damage assessments of cyberattacks are required from the comprehensive perspective. We enlarged the scope of the target to an entire defense mission system, defined measures to precisely evaluate the damage of cyberattacks, and develop a comprehensive method to rapidly assess the damage to the entire system at the mission level. Experiments are performed to demonstrate that our method has superior performance and that it can be successfully applied to actual defense applications. This research proposes a comprehensive assessment of the mission-level damage caused by cyberattacks on an entire defense mission system and contributes to the enhancement of damage assessment of cyberattacks with a faster and more accurate method.
Table of Contents
ABSTRACT ................................ i 1. Introduction ................................ 1 1.1 Research Motivation ................................ 1 1.2 Research Purpose ................................ 3 1.3 Research Taxonomy ................................ 3 1.4 Organization of the Dissertation ................................ 5 2. Related Works ................................ 6 2.1 Intrusion Detection Phase ................................ 6 2.2 Risk, Threat, or Vulnerability Evaluation Phase ................................ 7 2.3 Impact Assessment Phase ................................ 9 2.4 Impact Assessment on Mission Phase ................................ 10 3. Comprehensive Damage Assessment ................................ 12 3.1 Basic Concept ................................ 12 3.2 Layers and Components ................................ 13 3.3 Measures ................................ 15 3.4 Damage Assessment Process ................................ 18 3.4.1 Asset Layer Process ................................ 18 3.4.2 Mission Layer Process ................................ 20 3.4.3 Overall Process ................................ 21 4. Experiment and Evaluation ................................ 24 4.1 Experiment ................................ 24 4.1.1 Experimental Design ................................ 25 4.1.2 Experimental Data ................................ 27 4.1.3 Mission Capability Before Cyberattack ................................ 31 4.2 Experimental Result ................................ 34 4.2.1 Mission Capability After Cyberattack ................................ 34 4.2.2 Damage Assessment Results ................................ 44 4.3 Comparitive Evaluation ................................ 46 4.3.1 Comparitive Experiment Design ................................ 46 4.3.2 Comparison Objects ................................ 48 4.3.3 Quantitative Comparison ................................ 50 4.3.4 Qualitative Comparison ................................ 55 4.4 Discussion ................................ 57 4.4.1 Pros and Cons of CDAC Method ................................ 57 4.4.2 Requirements for Result Review ................................ 61 5. Conclustion and Future Works ................................ 64 5.1 Conclusion ................................ 64 5.2 Future Works ................................ 66 Bibliography ................................ 68 Abstaract (Korean) ................................ 72