Study on Prioritization of Actions by Classifying and Quantifying Cyber Operational Elements Using 5W1H Method
When approaching a target point in cyberspace, it is difficult to address complexities such as network vulnerability, accessibility, time efficiency, and concealment. Therefore, there is a need for techniques to classify, automate, and optimize various operational elements belonging to the three lay...
Saved in:
| Main Authors: | , , , , , |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
IEEE
2022-01-01
|
| Series: | IEEE Access |
| Subjects: | |
| Online Access: | https://ieeexplore.ieee.org/document/9829723/ |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| _version_ | 1846128608227098624 |
|---|---|
| author | Kookjin Kim Sukjoon Yoon Donghwan Lee Jisoo Jang Haengrok Oh Dongkyoo Shin |
| author_facet | Kookjin Kim Sukjoon Yoon Donghwan Lee Jisoo Jang Haengrok Oh Dongkyoo Shin |
| author_sort | Kookjin Kim |
| collection | DOAJ |
| description | When approaching a target point in cyberspace, it is difficult to address complexities such as network vulnerability, accessibility, time efficiency, and concealment. Therefore, there is a need for techniques to classify, automate, and optimize various operational elements belonging to the three layers of cyberspace necessary for approach. If the policy-making technique used by the military is applied, optimization can be used for the quantification and determination of the best decision-making process to approach the objective. Thus, in this study, cyber operations elements will be classified according to the 5W1H method for cyber-attack and defense training. Then, we propose the way of establishing course of action (COA) through quantifying and evaluating each category of 5W1H and prioritizing it. The effectiveness was analyzed by applying the extracted COA to a famous cyber-attack case, and the factors that had the greatest influence could be extracted. This study helps cyberattack teams build the best cyber operations COAs when conducting cyber-attack and defense training. |
| format | Article |
| id | doaj-art-5fb39cc39d0544b8b3d2c89ef60360bc |
| institution | Kabale University |
| issn | 2169-3536 |
| language | English |
| publishDate | 2022-01-01 |
| publisher | IEEE |
| record_format | Article |
| series | IEEE Access |
| spelling | doaj-art-5fb39cc39d0544b8b3d2c89ef60360bc2024-12-11T00:02:44ZengIEEEIEEE Access2169-35362022-01-0110747657477810.1109/ACCESS.2022.31905309829723Study on Prioritization of Actions by Classifying and Quantifying Cyber Operational Elements Using 5W1H MethodKookjin Kim0https://orcid.org/0000-0001-9094-4053Sukjoon Yoon1Donghwan Lee2Jisoo Jang3Haengrok Oh4Dongkyoo Shin5https://orcid.org/0000-0002-2665-3339Department of Computer Engineering, Sejong University, Seoul, South KoreaCyber Warfare Institute, Sejong University, Seoul, South KoreaDepartment of Computer Engineering, Sejong University, Seoul, South KoreaDepartment of Computer Engineering, Sejong University, Seoul, South KoreaCyber/Network Technology Center 3 Team, Agency for Defense Development, Seoul, South KoreaDepartment of Computer Engineering, Sejong University, Seoul, South KoreaWhen approaching a target point in cyberspace, it is difficult to address complexities such as network vulnerability, accessibility, time efficiency, and concealment. Therefore, there is a need for techniques to classify, automate, and optimize various operational elements belonging to the three layers of cyberspace necessary for approach. If the policy-making technique used by the military is applied, optimization can be used for the quantification and determination of the best decision-making process to approach the objective. Thus, in this study, cyber operations elements will be classified according to the 5W1H method for cyber-attack and defense training. Then, we propose the way of establishing course of action (COA) through quantifying and evaluating each category of 5W1H and prioritizing it. The effectiveness was analyzed by applying the extracted COA to a famous cyber-attack case, and the factors that had the greatest influence could be extracted. This study helps cyberattack teams build the best cyber operations COAs when conducting cyber-attack and defense training.https://ieeexplore.ieee.org/document/9829723/Cyber warfarecyberspacecyber operationcourse of action5W1H method |
| spellingShingle | Kookjin Kim Sukjoon Yoon Donghwan Lee Jisoo Jang Haengrok Oh Dongkyoo Shin Study on Prioritization of Actions by Classifying and Quantifying Cyber Operational Elements Using 5W1H Method IEEE Access Cyber warfare cyberspace cyber operation course of action 5W1H method |
| title | Study on Prioritization of Actions by Classifying and Quantifying Cyber Operational Elements Using 5W1H Method |
| title_full | Study on Prioritization of Actions by Classifying and Quantifying Cyber Operational Elements Using 5W1H Method |
| title_fullStr | Study on Prioritization of Actions by Classifying and Quantifying Cyber Operational Elements Using 5W1H Method |
| title_full_unstemmed | Study on Prioritization of Actions by Classifying and Quantifying Cyber Operational Elements Using 5W1H Method |
| title_short | Study on Prioritization of Actions by Classifying and Quantifying Cyber Operational Elements Using 5W1H Method |
| title_sort | study on prioritization of actions by classifying and quantifying cyber operational elements using 5w1h method |
| topic | Cyber warfare cyberspace cyber operation course of action 5W1H method |
| url | https://ieeexplore.ieee.org/document/9829723/ |
| work_keys_str_mv | AT kookjinkim studyonprioritizationofactionsbyclassifyingandquantifyingcyberoperationalelementsusing5w1hmethod AT sukjoonyoon studyonprioritizationofactionsbyclassifyingandquantifyingcyberoperationalelementsusing5w1hmethod AT donghwanlee studyonprioritizationofactionsbyclassifyingandquantifyingcyberoperationalelementsusing5w1hmethod AT jisoojang studyonprioritizationofactionsbyclassifyingandquantifyingcyberoperationalelementsusing5w1hmethod AT haengrokoh studyonprioritizationofactionsbyclassifyingandquantifyingcyberoperationalelementsusing5w1hmethod AT dongkyooshin studyonprioritizationofactionsbyclassifyingandquantifyingcyberoperationalelementsusing5w1hmethod |