$\require{mediawiki-texvc}$

연합인증

연합인증 가입 기관의 연구자들은 소속기관의 인증정보(ID와 암호)를 이용해 다른 대학, 연구기관, 서비스 공급자의 다양한 온라인 자원과 연구 데이터를 이용할 수 있습니다.

이는 여행자가 자국에서 발행 받은 여권으로 세계 각국을 자유롭게 여행할 수 있는 것과 같습니다.

연합인증으로 이용이 가능한 서비스는 NTIS, DataON, Edison, Kafe, Webinar 등이 있습니다.

한번의 인증절차만으로 연합인증 가입 서비스에 추가 로그인 없이 이용이 가능합니다.

다만, 연합인증을 위해서는 최초 1회만 인증 절차가 필요합니다. (회원이 아닐 경우 회원 가입이 필요합니다.)

연합인증 절차는 다음과 같습니다.

최초이용시에는
ScienceON에 로그인 → 연합인증 서비스 접속 → 로그인 (본인 확인 또는 회원가입) → 서비스 이용

그 이후에는
ScienceON 로그인 → 연합인증 서비스 접속 → 서비스 이용

연합인증을 활용하시면 KISTI가 제공하는 다양한 서비스를 편리하게 이용하실 수 있습니다.

러시아-우크라이나 전쟁에서의 사이버공격 사례 분석을 통한 한국의 대응 방안에 관한 연구
A Study on Korea's Countermeasures Through the Analysis of Cyberattack Cases in the Russia-Ukraine War 원문보기

정보처리학회논문지. KIPS transactions on computer and communication systems 컴퓨터 및 통신 시스템, v.11 no.10, 2022년, pp.353 - 362  

이형동 (숭실대학교 IT정책경영학과) ,  윤준희 (숭실대학교 IT정책경영학과) ,  이덕규 (숭실대학교 IT정책경영학과) ,  신용태 (숭실대학교 컴퓨터학부)

초록

러시아-우크라이나 전쟁이 군사적 무력 충돌과 함께 사이버공격이 진행되고 있다. 이번 전쟁과 관련하여 러시아가 한국을 비우호 국가로 지정함에 따라 한국에 대한 사이버공격의 위험성도 고조된 만큼 대응 방안 마련이 시급한 상황이다. 이에 따라 이번 전쟁에서 나타난 사이버공격 사례(19건)를 유형별로 영향을 분석하고, 자원 동원, 기술 진보 등 5가지 관점에서 고찰하여 특징과 시사점을 도출하였다. 이를 통해 한국 정부의 대응 방안으로, 가치공유 국가와의 다자협력 강화, 사이버공격 역량확보와 방어체계 강화, 해외 보안업체와의 연계 방안 마련 등 총 7가지를 제시하였다. 연구 결과는 한국 정부의 사이버안보 정책 수립에 활용될 수 있을 것이다.

Abstract AI-Helper 아이콘AI-Helper

The Russian-Ukraine war is accompanied by a military armed conflict and cyberattacks are in progress. As Russia designated Korea as an unfriendly country, there is an urgent need to prepare countermeasures as the risk of cyberattacks on Korea has also increased. Accordingly, impact of 19 cyberattack...

주제어

표/그림 (3)

참고문헌 (40)

  1. Y. J. Kim, "Russia's hybrid warfare, Ukraine faces another cyberattack," The Kyunghyang Shinmun, 2022.2.24. [Internet], https://www.khan.co.kr/world/europe-russia/article/202202241638001. 

  2. Biden, "Before Business Roundtable's CEO Quarterly Meeting," The White House, [Internet], https://www.whitehouse.gov/briefing-room/speeches-remarks/2022/03/21/remarks-by-president-biden-before-business-roundtables-ceo-quarterly-meeting/. 

  3. International Telecommunication Union, "Global Cyber-security Index 2020," pp.25-26, 2021. 

  4. Mathew J. Schwartz, "Cyber Activity Surges as Russia Masses on Ukraine's Border," BankInfoSecurity, [Internet], https://www.bankinfosecurity.com/cyber-activity-surges-as-russia-masses-on-ukraines-bider-a-18201. 

  5. Y. D. Jung and G. S. Jeong, "A study on countermeasures against North Korea's Cyber Attack," Journal of Convergence Security, Vol.16, No.6, pp.43-50, 2016. 

  6. D. I. Seo and H. S. Cho, "Security technology status and prospect for cyber warfare," Korea Institute of Information Security and Cryptology, Vol.21, No.6, pp.42-48, 2011. 

  7. C. S. Park and Y.S. Park, "A study on the improvement of capability assessment and the plan for enhancing cyber warfare capability of Korea," Journal of the Korea Institute of Information and Communication Engineering, Vol.19, No.5, pp.1251-1258, 2015. 

  8. Y. S. Lee, "A study on enhancing cyber security capabilities -Focusing on cyber weapon system development-," Ph.D. dissertation, Korea University, 2018. 

  9. H. C. Oh, "The emergence of hybrid warfare and the legality of cyber weapons under international law," The Journal of Peace Studies, Vol.21, No.1, pp.35-57, 2020. 

  10. "Cyber Warfare," Defense Science and Technology Glossary, [Internet], https://terms.naver.com/entry.naver?docId2757573&cid50307&categoryId50307. 

  11. H. K. Park, "Types and information security technology on cyber warfare," The Journal of the Korea Contents Association, Vol.11, No.4, pp.41-44, 2013. 

  12. J. G. Kim, "North Korea's cyber attack threat analysis research(Based on the type of attack technology)," Proceedings of the Korean Society of Computer Information Conference, Vol.28, No.2, pp.107-110, 2020. 

  13. C. H. Ryou, "A study on the classification and history of cyber warfare by generation," Military Research and Development, Vol.14, No.2, pp.59-92, 2020. 

  14. "National Cyber Safety Management Regulations," [Internet], https://www.law.go.kr/LSW/admRulLsInfoP.do?admRulSeq2000000100482. 

  15. K. N. Seong, "The world's first cyber warfare and cyber security law," Boannews [Internet], http://m.boannews.com/html/detail.html?idx53325. 

  16. "Serious damage to Ukraine's electricity shortage due to continuous cyberattacks," ScienceON [Internet], https://scienceon.kisti.re.kr/srch/selectPORSrchTrend.do?cnGTB2016001113&dbtAGT. 

  17. NCSC, "UK assesses Russian involvement in cyber attacks on Ukraine," GOV.UK [Internet], https://www.gov.uk/government/news/uk-assess-russian-involvement-in-cyber-attacks-on-ukraine. 

  18. ThreatLabz, "DanaBot Launches DDoS Attack Against the Ukrainian Ministry of Defense," Zscaler [Internet], https://www.zscaler.com/blogs/security-research/danabot-launches-ddos-attack-against-ukrainian-ministry-defense?&web_viewtrue. 

  19. Pavel Polityuk and Steve Holland, "Cyberattack hits Ukraine as U.S. warns Russia could be prepping for war," REUTERS [Internet], https://www.reuters.com/world/europe/expect-worst-ukraine-hit-by-cyberattack-russia-moves-more-troops-2022-01-14/. 

  20. Michael Raggi and Zydeca Cass, "Asylum Ambuscade: State Actor Uses Compromised Private Ukrainian Military Emails to Target European Governments and Refugee Movement," proofpoint [Internet], https://www.proofpoint.com/us/blog/threat-insight/asylum-ambuscade-state-actor-uses-compromised-private-ukrainian-military-emails. 

  21. Charlie Osborne, "Ukraine warns of InvisiMole attacks tied to state-sponsored Russian hackers," ZDNet [Internet], https://www.zdnet.com/article/ukraine-warns-of-invisimole-attacks-tied-to-state-sponsored-russian-hackers/?web_viewtrue. 

  22. Shane Huntley, "An update on the threat landscape," Threat Analysis Group [Internet], https://blog.google/threat-analysis-group/update-threat-landscape-ukraine/. 

  23. Keyur Talati, "Browser-in-the Browser (BITB) - A New Born Phishing Methodology," WeSecureApp [Internet], https://wesecureapp.com/blog/browser-in-the-browser-bitb-a-new-born-phishing-methodology/. 

  24. Mike Lennon, "Microsoft Uncovers Destructive Malware Used in Ukraine Cyberattacks," SECURITYWEEK [Internet], https://www.securityweek.com/microsoft-uncovers-destructive-malware-used-ukraine-cyberattacks 

  25. ESET Research, "IsaacWiper and HermeticWizard: New wiper and worm targeting Ukraine," ESET(welivesecurity) [Internet], https://www.welivesecurity.com/2022/03/01/isaacwiper-hermeticwizard-wiper-worm-targeting-ukraine/. 

  26. Charlie Osborne, "CaddyWiper: More destructive wiper malware strikes Ukraine," ZDNet [Internet], https://www.zdnet.com/article/caddywiper-more-destructive-wiper-malware-strikes-ukrainian-targets/. 

  27. "К?бератака на укра?нськ? п?дпри?мств а з використанням програми-деструк тора DoubleZero (CERT-UA#4243)," CERT-UA [Internet], https://cert.gov.ua/article/38088. 

  28. Viasat Corporate, "KA-SAT Network cyber attack overview," Viasat [Internet], https://www.viasat.com/about/newsroom/blog/ka-sat-network-cyber-attack-overview/. 

  29. Forbes.it, "Il provider ucraino Ukrtelecom colpito dal piu grave attacco informatico dall'inizio dell'invasione russa," Forbes [Internet], https://forbes.it/2022/03/30/providerinternet-ucraino-ukrtelecom-colpito-attacco-informatico/. 

  30. ESET Research, "Industroyer2: Industroyer reloaded," [Internet], https://www.welivesecurity.com/2022/04/12/industroyer2-industroyer-reloaded/. 

  31. Dan Milmo, "Anonymous: the hacker collective that has declared cyberwar on Russia," The Guardian [Internet], https://www.theguardian.com/world/2022/feb/27/anonymous-the-hacker-collective-that-has-declared-cyberwar-on-russia. 

  32. Sam Schechner, "Ukraine's 'IT Army' Has Hundreds of Thousands of Hackers, Kyiv Says," The Wall Street Journal [Internet], https://www.wsj.com/livecoverage/russia-ukraine-latest-news-2022-03-04/card/ukraine-s-it-army-has-hundreds-of-thousands-of-hackers-kyiv-says-RfpGa5zmLtavrot27OWX. 

  33. Stuti Mishra, "Anonymous hacks Russian state TV with Ukraine footage," INDEPENDENT [Internet], https://www.independent.co.uk/news/world/europe/anonymous-wink-ivi-russia-24-channel-1-moscow-24-b2029915.html. 

  34. Andrew Stanton, "Anonymous Apparently Behind Doxing of 120K Russian Soldiers in Ukraine War," Newsweek [Internet], https://www.newsweek.com/anonymous-leaks-personal-data-120k-russian-soldiers-fighting-ukraine-1694555. 

  35. Vilius Petkauskas, "Three Russian firms have over 400 GB worth of emails leaked," cybernews [Internet], https://cybernews.com/cyber-war/three-russian-firms-have-over-400-gb-worth-of-emails-leaked/. 

  36. Jaromir Horejsi, and Cedric Pernet, "New RURansom Wiper Targets Russia," TREND MICRO [Internet], https://www.trendmicro.com/en_us/research/22/c/new-ruransom-wiper-targets-russia.html. 

  37. Lucian Constantin, "Developer sabotages own npm module prompting open-source supply chain security questions," CSO [Internet], https://www.csoonline.com/article/3654298/developer-sabotages-own-npm-module-prompting-open-source-supply-chain-security-questions.html. 

  38. Peter Dickinson, "Cyber partisans target Russian army in Belarus amid Ukraine war fears," Atlantic Council [Internet], https://www.atlanticcouncil.org/blogs/belarusalert/cyber-partisans-target-russian-army-in-belarus-amid-ukraine-war-fears/. 

  39. Joyce Hakmeh, and Esther Naylor, "How the tech community has rallied to Ukraine's cyber-defence," The Guardian [Internet], https://www.theguardian.com/commentisfree/2022/mar/07/tech-community-rallied-ukraine-cyber-defence-eu-nato. 

  40. Gen. Paul M. Nakasone, "Posture statement of Gen. Paul M. Nakasone, commander, U.S. Cyber Command before the 117th Congress," U.S. Cyber Command [Internet], https://www.cybercom.mil/Media/News/Article/2989087/posture-statement-of-gen-paul-m-nakasone-commander-us-cyber-command-before-the/. 

저자의 다른 논문 :

관련 콘텐츠

오픈액세스(OA) 유형

GOLD

오픈액세스 학술지에 출판된 논문

저작권 관리 안내
섹션별 컨텐츠 바로가기

AI-Helper ※ AI-Helper는 오픈소스 모델을 사용합니다.

AI-Helper 아이콘
AI-Helper
안녕하세요, AI-Helper입니다. 좌측 "선택된 텍스트"에서 텍스트를 선택하여 요약, 번역, 용어설명을 실행하세요.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.

선택된 텍스트

맨위로