The countermeasure strategy based on big data against north Korean cyber-attacks

Yong Joon Lee, Hyuk Jin Kwon, Jae Il Lee, Dong Kyoo Shin

Research output: Contribution to journalArticlepeer-review

3 Scopus citations

Abstract

North Korea is enhancing its cyber-attack capability, as an asymmetric weapon, and the threat of North Korean cyber-attacks is continually increasing, as seen in the example of the cyber-attacks against South Korea within four months of a nuclear experiment. The analysis of the trends and characteristics of North Korean cyber-attacks in the last decade showed that the attacks had been intellectualized, complex, and objective–oriented, so there is a need for a national countermeasure that is more systematic than previous actions. More importantly, a nationwide cyber-attack prediction system that collects information about North Korean cyber-attacks should be established to detect and take actions against cyber-attacks in the early stages. Early prediction and prevention are possible with such a system, so it is necessary to prepare for a big data-based integrative analysis system. To do this, domestic and foreign cyber security teams must collect the cyber-attack information and malicious codes North Korea has produced. The collected information should be shared according to international standards, and thus we can predict North Korean cyber-attack strategies using the large amount of collected information. Based on the predictions, we can change our countermeasure strategy from that of a reactive one to a preemptive one by preparing response measures against North Korean cyber-attacks.

Original languageEnglish
Pages (from-to)437-454
Number of pages18
JournalKorean Journal of Defense Analysis
Volume30
Issue number3
StatePublished - Sep 2018

Keywords

  • Countermeasure strategy based on big data against cyber-attacks
  • Cyber-attack information-sharing
  • North Korean cyber-attacks

Fingerprint

Dive into the research topics of 'The countermeasure strategy based on big data against north Korean cyber-attacks'. Together they form a unique fingerprint.

Cite this