Study on Prioritization of Actions by Classifying and Quantifying Cyber Operational Elements Using 5W1H Method

When approaching a target point in cyberspace, it is difficult to address complexities such as network vulnerability, accessibility, time efficiency, and concealment. Therefore, there is a need for techniques to classify, automate, and optimize various operational elements belonging to the three lay...

Full description

Saved in:
Bibliographic Details
Main Authors: Kookjin Kim, Sukjoon Yoon, Donghwan Lee, Jisoo Jang, Haengrok Oh, Dongkyoo Shin
Format: Article
Language:English
Published: IEEE 2022-01-01
Series:IEEE Access
Subjects:
Online Access:https://ieeexplore.ieee.org/document/9829723/
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1846128608227098624
author Kookjin Kim
Sukjoon Yoon
Donghwan Lee
Jisoo Jang
Haengrok Oh
Dongkyoo Shin
author_facet Kookjin Kim
Sukjoon Yoon
Donghwan Lee
Jisoo Jang
Haengrok Oh
Dongkyoo Shin
author_sort Kookjin Kim
collection DOAJ
description When approaching a target point in cyberspace, it is difficult to address complexities such as network vulnerability, accessibility, time efficiency, and concealment. Therefore, there is a need for techniques to classify, automate, and optimize various operational elements belonging to the three layers of cyberspace necessary for approach. If the policy-making technique used by the military is applied, optimization can be used for the quantification and determination of the best decision-making process to approach the objective. Thus, in this study, cyber operations elements will be classified according to the 5W1H method for cyber-attack and defense training. Then, we propose the way of establishing course of action (COA) through quantifying and evaluating each category of 5W1H and prioritizing it. The effectiveness was analyzed by applying the extracted COA to a famous cyber-attack case, and the factors that had the greatest influence could be extracted. This study helps cyberattack teams build the best cyber operations COAs when conducting cyber-attack and defense training.
format Article
id doaj-art-5fb39cc39d0544b8b3d2c89ef60360bc
institution Kabale University
issn 2169-3536
language English
publishDate 2022-01-01
publisher IEEE
record_format Article
series IEEE Access
spelling doaj-art-5fb39cc39d0544b8b3d2c89ef60360bc2024-12-11T00:02:44ZengIEEEIEEE Access2169-35362022-01-0110747657477810.1109/ACCESS.2022.31905309829723Study on Prioritization of Actions by Classifying and Quantifying Cyber Operational Elements Using 5W1H MethodKookjin Kim0https://orcid.org/0000-0001-9094-4053Sukjoon Yoon1Donghwan Lee2Jisoo Jang3Haengrok Oh4Dongkyoo Shin5https://orcid.org/0000-0002-2665-3339Department of Computer Engineering, Sejong University, Seoul, South KoreaCyber Warfare Institute, Sejong University, Seoul, South KoreaDepartment of Computer Engineering, Sejong University, Seoul, South KoreaDepartment of Computer Engineering, Sejong University, Seoul, South KoreaCyber/Network Technology Center 3 Team, Agency for Defense Development, Seoul, South KoreaDepartment of Computer Engineering, Sejong University, Seoul, South KoreaWhen approaching a target point in cyberspace, it is difficult to address complexities such as network vulnerability, accessibility, time efficiency, and concealment. Therefore, there is a need for techniques to classify, automate, and optimize various operational elements belonging to the three layers of cyberspace necessary for approach. If the policy-making technique used by the military is applied, optimization can be used for the quantification and determination of the best decision-making process to approach the objective. Thus, in this study, cyber operations elements will be classified according to the 5W1H method for cyber-attack and defense training. Then, we propose the way of establishing course of action (COA) through quantifying and evaluating each category of 5W1H and prioritizing it. The effectiveness was analyzed by applying the extracted COA to a famous cyber-attack case, and the factors that had the greatest influence could be extracted. This study helps cyberattack teams build the best cyber operations COAs when conducting cyber-attack and defense training.https://ieeexplore.ieee.org/document/9829723/Cyber warfarecyberspacecyber operationcourse of action5W1H method
spellingShingle Kookjin Kim
Sukjoon Yoon
Donghwan Lee
Jisoo Jang
Haengrok Oh
Dongkyoo Shin
Study on Prioritization of Actions by Classifying and Quantifying Cyber Operational Elements Using 5W1H Method
IEEE Access
Cyber warfare
cyberspace
cyber operation
course of action
5W1H method
title Study on Prioritization of Actions by Classifying and Quantifying Cyber Operational Elements Using 5W1H Method
title_full Study on Prioritization of Actions by Classifying and Quantifying Cyber Operational Elements Using 5W1H Method
title_fullStr Study on Prioritization of Actions by Classifying and Quantifying Cyber Operational Elements Using 5W1H Method
title_full_unstemmed Study on Prioritization of Actions by Classifying and Quantifying Cyber Operational Elements Using 5W1H Method
title_short Study on Prioritization of Actions by Classifying and Quantifying Cyber Operational Elements Using 5W1H Method
title_sort study on prioritization of actions by classifying and quantifying cyber operational elements using 5w1h method
topic Cyber warfare
cyberspace
cyber operation
course of action
5W1H method
url https://ieeexplore.ieee.org/document/9829723/
work_keys_str_mv AT kookjinkim studyonprioritizationofactionsbyclassifyingandquantifyingcyberoperationalelementsusing5w1hmethod
AT sukjoonyoon studyonprioritizationofactionsbyclassifyingandquantifyingcyberoperationalelementsusing5w1hmethod
AT donghwanlee studyonprioritizationofactionsbyclassifyingandquantifyingcyberoperationalelementsusing5w1hmethod
AT jisoojang studyonprioritizationofactionsbyclassifyingandquantifyingcyberoperationalelementsusing5w1hmethod
AT haengrokoh studyonprioritizationofactionsbyclassifyingandquantifyingcyberoperationalelementsusing5w1hmethod
AT dongkyooshin studyonprioritizationofactionsbyclassifyingandquantifyingcyberoperationalelementsusing5w1hmethod