Research on Cyber IPB Visualization Method based on BGP Archive Data for Cyber Situation Awareness

被引:1
作者
Youn, Jaepil [1 ]
Oh, Haengrok [2 ]
Kang, Jiwon [1 ]
Shin, Dongkyoo [1 ]
机构
[1] Sejong Univ, Dept Comp Engn, 209 Neungdong Ro, Seoul 05006, South Korea
[2] Agcy Def Dev, 2nd R&D Inst 3rd Directorate, POB 132, Seoul 05661, South Korea
来源
KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS | 2021年 / 15卷 / 02期
基金
新加坡国家研究基金会;
关键词
BGP Archive Data Analysis; Cyber Intelligence Preparation of the Battlefield; Cyber IPB; Cyber Situation Awareness; Visualization;
D O I
10.3837/tiis.2021.02.020
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cyber powers around the world are conducting cyber information-gathering activities in cyberspace, a global domain within the Internet-based information environment. Accordingly, it is imperative to obtain the latest information through the cyber intelligence preparation of the battlefield (IPB) process to prepare for future cyber operations. Research utilizing the cyber battlefield visualization method for effective cyber IPB and situation awareness aims to minimize uncertainty in the cyber battlefield and enable command control and determination by commanders. This paper designed architecture by classifying cyberspace into a physical, logical network layer and cyber persona layer to visualize the cyber battlefield using BGP archive data, which is comprised of BGP connection information data of routers around the world. To implement the architecture, BGP archive data was analyzed and pre-processed, and cyberspace was implemented in the form of a Di-Graph. Information products that can be obtained through visualization were classified for each layer of the cyberspace, and a visualization method was proposed for performing cyber IPB. Through this, we analyzed actual North Korea's BGP and OSINT data to implement North Korea's cyber battlefield centered on the Internet network in the form of a prototype. In the future, we will implement a prototype architecture based on Elastic Stack.
引用
收藏
页码:749 / 766
页数:18
相关论文
共 26 条
  • [1] Barford P., 2016, IEEE SYM VIS CYB SEC, P1
  • [2] Visual Analytics for BGP Monitoring and Prefix Hijacking Identification
    Biersack, Ernst
    Jacquemart, Quentin
    Fischer, Fabian
    Fuchs, Johannes
    Thonnard, Olivier
    Theodoridis, Georgios
    Tzovaras, Dimitrios
    Vervier, Pierre-Antoine
    [J]. IEEE NETWORK, 2012, 26 (06): : 33 - 39
  • [3] Camargo L. F., 2020, COMPUTATIONAL SCI IT, V12250, P44, DOI DOI 10.1007/978-3
  • [4] Multi-view routing visualization for the identification of BGP issues
    Candela, Massimo
    Di Battista, Giuseppe
    Marzialetti, Luca
    [J]. JOURNAL OF COMPUTER LANGUAGES, 2020, 58
  • [5] Conti G., 2007, SECURITY DATA VISUAL, V1st, P105
  • [6] Demchak Y., 2018, Military Cyber Affairs, The Journal of the Military Cyber Professionals Association, V3, P7
  • [7] Douzet F, 2020, INT CONF CYBER CONFL, P157, DOI [10.23919/CyCon49761.2020.9131726, 10.23919/cycon49761.2020.9131726]
  • [8] Fonseca P., 2019, IEEE S COMPUTERS COM, P1, DOI [10.1109/ISCC47284.2019. 8969619, DOI 10.1109/ISCC47284.2019.8969619]
  • [9] Heinbockel W., 2016, P NATO IST 148 S CYB, P1
  • [10] Knake R, 2020, CYBER WAR NEXT THREA