• Àüü
  • ÀüÀÚ/Àü±â
  • Åë½Å
  • ÄÄÇ»ÅÍ
´Ý±â

»çÀÌÆ®¸Ê

Loading..

Please wait....

±¹³» ³í¹®Áö

Ȩ Ȩ > ¿¬±¸¹®Çå > ±¹³» ³í¹®Áö > Çѱ¹ÀÎÅͳÝÁ¤º¸ÇÐȸ ³í¹®Áö

Çѱ¹ÀÎÅͳÝÁ¤º¸ÇÐȸ ³í¹®Áö

Current Result Document :

ÇѱÛÁ¦¸ñ(Korean Title) »çÀ̹ö°ø°£ ³» »óȲÀνÄÀ» À§ÇÑ »çÀ̹ö °øÅë ÀÛÀü »óȲµµ ¿¬±¸
¿µ¹®Á¦¸ñ(English Title) A study on the cyber common operation picture for situational awareness in cyberspace
ÀúÀÚ(Author) ±è¹Î±Ô   ÇÑ¸í¹¬   Min-Gyu Kim   Myung-Mook Han   ±è±¹Áø   À±ÀçÇÊ   À±¼®ÁØ   °­Áö¿ø   ±è°æ½Å      ½Åµ¿±Ô   Kook-jin Kim   Jae-pil Youn   Suk-joon Yoon      Ji-won Kang   Kyung-shin Kim   Dong-kyoo Shin  
¿ø¹®¼ö·Ïó(Citation) VOL 23 NO. 05 PP. 0087 ~ 0101 (2022. 10)
Çѱ۳»¿ë
(Korean Abstract)
»çÀ̹ö°ø°ÝÀº »çÀ̹ö°ø°£¿¡¼­ ´« ±ô¦ÇÒ »çÀÌ¿¡ ÀϾ¸ç, ±× ÇÇÇØ´Â Àü ¼¼°è¿¡ Á¡Â÷ ´Ã¾î³ª°í ÀÖ´Ù. µû¶ó¼­, »çÀ̹ö°ø°£ 3°èÃþ¿¡ ¼ÓÇÏ´Â ´Ù¾çÇÑ ÀÚ»êµéÀ» ¿©·¯ °¡Áö ½Ã°¢¿¡¼­ ÆľÇÇÒ ¼ö ÀÖ´Â »çÀ̹ö °øÅëÀÛÀü»óȲµµÀÇ °³¹ßÀÌ ÇÊ¿äÇÏ´Ù. ÀÌ´Â ±º¿¡¼­ »ç¿ëÇÏ´Â ÀüÀå Á¤º¸ Æľǿ¡ ´ëÇÑ ¹æ¾ÈÀ» Àû¿ëÇϸé ÃÖÀûÀÇ »çÀ̹ö°ø°£ ³» »óȲÀνÄÀ» ÇÒ ¼ö ÀÖ´Ù. µû¶ó¼­ º» ¿¬±¸¿¡¼­´Â »çÀ̹ö °øÅëÀÛÀü»óȲµµ¿¡ ÇÊ¿äÇÑ °¡½ÃÈ­ È­¸éµéÀ» ½Äº°ÇÏ°í ±âÁØ(ÀÀ´ä¼Óµµ, »ç¿ëÀÚ ÀÎÅÍÆäÀ̽º, °´Ã¼ ±âÈ£, °´Ã¼ Å©±â)µéÀ» Á¶»çÇÑ´Ù. ±× ÈÄ ½Äº° ¹× Á¶»çÇÑ »çÇ×µéÀ» Àû¿ëÇÏ¿© ÇÁ·¹ÀÓ¿öÅ©¸¦ ¼³°èÇÏ°í ±×¿¡ µû¶ó °¡½ÃÈ­ È­¸éµéÀ» ±¸ÇöÇÑ´Ù. ÃÖÁ¾ÀûÀ¸·Î °¡½ÃÈ­ È­¸éÀÌ Á¶»çÇÑ ±âÁØ Áß »çÁøÀ¸·Î´Â ¾Ë¾Æº¼ ¼ö ¾ø´Â ÀÀ´ä¼Óµµ¿¡ ´ëÇÑ ½ÇÇèÀ» ÁøÇàÇÑ´Ù. °á°úÀûÀ¸·Î ±¸ÇöµÈ °¡½ÃÈ­ È­¸éµéÀº ¸ðµÎ ÀÀ´ä¼Óµµ ±âÁØ¿¡ ºÎÇÕÇß´Ù. ÀÌ¿Í °°Àº ¿¬±¸´Â ÁöÈÖ°üÀ̳ª º¸¾È ´ã´çÀÚµéÀÌ »çÀ̹ö°ø°ÝÀ» ´ëºñÇϱâ À§ÇÑ »çÀ̹ö °øÅëÀÛÀü»óȲµµ¸¦ ±¸ÃàÇϴµ¥ µµ¿òÀÌ µÈ´Ù.
¿µ¹®³»¿ë
(English Abstract)
Cyber-attacks occur in the blink of an eye in cyberspace, and the damage is increasing all over the world. Therefore, it is necessary to develop a cyber common operational picture that can grasp the various assets belonging to the 3rd layer of cyberspace from various perspectives. By applying the method for grasping battlefield information used by the military, it is possible to achieve optimal cyberspace situational awareness. Therefore, in this study, the visualization screens necessary for the cyber common operational picture are identified and the criteria (response speed, user interface, object symbol, object size) are investigated. After that, the framework is designed by applying the identified and investigated items, and the visualization screens are implemented accordingly. Finally, among the criteria investigated by the visualization screen, an experiment is conducted on the response speed that cannot be recognized by a photograph. As a result, all the implemented visualization screens met the standard for response speed. Such research helps commanders and security officers to build a cyber common operational picture to prepare for cyber-attacks.
Å°¿öµå(Keyword) ÀͽºÆ®¸² ·£´ý Æ÷·¹½ºÆ®      Extreme Random Forest      Àΰø ½Å°æ¸Á   ÀÌ»ó ŽÁö      Artificial Neural Network   Anomaly Detection      ÀÌ»ó ŽÁö ¹× °ø°Ý À¯Çü ºÐ·ù      Anomaly Detection and Attack type Classification      ³×Æ®¿öÅ© ħÀÔ Å½Áö   Network Intrusion Detection   »çÀ̹öº¸¾È   »çÀ̹ö ÁöÈÖÅëÁ¦      »çÀ̹ö°ø°£   »çÀ̹ö ÀÛÀü      »çÀ̹ö »óȲÀνĠ  »çÀ̹ö °øÅëÀÛÀü»óȲµµ   Cybersecurity   Cyber Command & Control      Cyberspace   Cyber Operation      Cyber Situational Awareness      Cyber Common Operational Picture  
ÆÄÀÏ÷ºÎ PDF ´Ù¿î·Îµå