Method for Effectiveness Assessment of Electronic Warfare Systems In
Total Page:16
File Type:pdf, Size:1020Kb
S S symmetry Article Method for Effectiveness Assessment of Electronic Warfare Systems in Cyberspace Seungcheol Choi 1, Oh-Jin Kwon 1,* , Haengrok Oh 2 and Dongkyoo Shin 3 1 Department of Electrical Engineering, Sejong University, 209 Neungdong-ro, Gwangjin-gu, Seoul 05006, Korea; [email protected] 2 Agency for Defense Development (ADD), Seoul 05771, Korea; [email protected] 3 Department of Computer Engineering, Sejong University, 209 Neungdong-ro, Gwangjin-gu, Seoul 05006, Korea; [email protected] * Correspondence: [email protected] Received: 27 November 2020; Accepted: 16 December 2020; Published: 18 December 2020 Abstract: Current electronic warfare (EW) systems, along with the rapid development of information and communication technology, are essential elements in the modern battlefield associated with cyberspace. In this study, an efficient evaluation framework is proposed to assess the effectiveness of various types of EW systems that operate in cyberspace, which is recognized as an indispensable factor affecting modern military operations. The proposed method classifies EW systems into primary and sub-categories according to EWs’ types and identifies items for the measurement of the effectiveness of each EW system by considering the characteristics of cyberspace for evaluating the damage caused by cyberattacks. A scenario with an integrated EW system incorporating two or more different types of EW equipment is appropriately provided to confirm the effectiveness of the proposed framework in cyber electromagnetic warfare. The scenario explicates an example of assessing the effectiveness of EW systems under cyberattacks. Finally, the proposed method is demonstrated sufficiently by assessing the effectiveness of the EW systems using the scenario. Keywords: battle damage assessment; cyberspace; effectiveness assessment; electronic warfare 1. Introduction Cyberspace is a global information environment composed of independent networks that include information technology infrastructure such as the internet, communication networks, computer systems, and embedded processors [1]. Rapid advances in cyberspace and information and communication technologies (ICT) have made them the significant enablers of the Fourth Industrial Revolution, which refers to the accelerated shift in industrial technologies characterized by hyper-connectivity and super-intelligence. The cyber physics system that blurs the boundary between cyberspace and physical space has been realized by deploying a network capable of exchanging information between objects and people. Therefore, cyberspace in our environment is no longer a conventional network infrastructure because all other systems that can communicate with systems in the network are considered to belong to cyberspace. In today’s information-oriented age, countries, economies, and societies are highly susceptible to cyber threats. An increasing number of attempts to exploit cyberspace are being conducted. Cyberspace offers attackers the desired anonymity and cyberattacks are usually low-cost. Furthermore, advances in technology have dramatically increased the level of cyber threats: from simple threats through viruses to advanced persistent cyberattacks targeting major social facilities, including governments; such attacks are already taking place [2]. Symmetry 2020, 12, 2107; doi:10.3390/sym12122107 www.mdpi.com/journal/symmetry Symmetry 2020, 12, 2107 2 of 16 Symmetry 2020, 12, x FOR PEER REVIEW 2 of 18 Meanwhile, a paradigm shift in modern warfare has been caused by the convergence of existing Meanwhile, a paradigm shift in modern warfare has been caused by the convergence of existing defense technologies and the following ICT technologies [3]: defense technologies and the following ICT technologies [3]: Data, human–machine integrated systems; • Data, human–machine integrated systems; Artificial intelligence (AI), Internet of Things (IoT), big data technology; • Artificial intelligence (AI), Internet of Things (IoT), big data technology; Mechanized intelligence across the battlefield and weapon systems; • Mechanized intelligence across the battlefield and weapon systems; New technologies such as 3D printing and robots. • New technologies such as 3D printing and robots. TheseThese technologicaltechnological breakthroughs breakthroughs are are expected expected to find to find their their way wayinto future into future battlefields. battlefields. Robots Robotsarmed armedwith smart with sensors smart sensorsand AI will and be AI the will main be thesubjects main of subjects combat. of Human combat. forces Human will become forces willsuper-dominant become super-dominant by using the by robotic using the exoskeleton, robotic exoskeleton, advanced advanced weapons, weapons, and muscle- and muscle-and sensory- and sensory-enhancementenhancement genetic geneticengineering engineering technology. technology. Hacking Hacking technology, technology, fueled fueled by AI, by advances, AI, advances, and andcyber cyber warfare, warfare, which which cancan be defined be defined as information as information warfare warfare performed performed by collecting, by collecting, analyzing, analyzing, and andprocessing processing information information distributed distributed in cyberspace, in cyberspace, will become will become a signif a significanticant part of part the of war the [4]. war Cyber [4]. Cyberwarfare warfare has far-reaching has far-reaching implications implications and andcan canprove prove detrimental detrimental in inwar war situations. situations. For For example, example, it itcan can be be used used to to disrupt the weapon systems andand criticalcritical infrastructureinfrastructure ofof thethe enemyenemy even even before before a a physicalphysical attack attack has has commenced. commenced. ICTICT technology technology has has ledled toto thethe developmentdevelopment and expansion expansion of of cyberspace cyberspace and and many many advances advances in inelectronic electronic warfare warfare (EW) (EW) systems. systems. EW EW refers refers to to military military actions performedperformed byby controllingcontrolling thethe electromagneticelectromagnetic spectrumspectrum through through Command Command and and Control Control (C2)’s (C2)’s five five military military actions: actions: operation operation security,security, EW, EW, psychological psychological operation, operation, military military deception, deception, and and physical physical strike strike [ 5[5].]. EW, EW, as as shown shown in in FigureFigure1, 1, consists consists of of an an electronic electronic attack attack (EA), (EA), which which controls controls the the enemy’s enemy’s electromagnetic electromagnetic spectrum; spectrum; electronicelectronic protection protection (EP), (EP), which which is used is used for defense; for defense; and electronic and electronic warfare supportwarfare (ES),support which (ES), supports which taskssupports such tasks as surveillance such as surveill and reconnaissanceance and reconnaissance [5–7]. [5–7]. Electronic Warfare Electronic Attack Electronic Protection An offensive action that uses electromagnetic energy, Military actions protecting personnel, facilities, and directed energy, or anti-radiation weapons to attack equipment from any effects of the electromagnetic enemy’s personnel, facilities, and equipment, thereby spectrum reducing its combat ability Electronic Warfare Support Actions involving recognition and response to threats by performing a search, identification, • Electromagnetic Jamming blocking, and detection of enemy’s • Spectrum Management • Electromagnetic Deception electromagnetic radiation • Electromagnetic Hardening • Directed Energy • Emission Control • Antiradiation Missile • Expendables • Threat Warning • Collection Supporting EW • Direction Finding FigureFigure 1. 1.Electronic Electronic warfare warfare sub-divisions sub-divisions and and applications applications [6 [6].]. OwingOwing to to the the convergence convergence of of ICT ICT technology technology and and defense defense science science and and technology, technology, EW EW is is widely widely conductedconducted in in modern modern military military activities activities with with military military activity activity convergence, convergence, and and in in particular, particular, it it is is usedused in in cyberspace. cyberspace. The The US US Army Army emphasizes emphasizes that that cyber cyber warfare warfare and and EW EW should should be be carried carried out out in in a a convergedconverged form, form, as as both both are are mostly mostly conducted conducted for for similar similar purposes purposes [8 [8].]. ThisThis paper paper proposes proposes an an e ffiefficientcient assessment assessment framework framework for for di differentfferent EW EW systems systems that that operate operate in in thethe cyber cyber environment environment as as a a new new form form of of modern modern warfare. warfare. The The proposed proposed framework framework defines defines how how to to assessassess the the e ffeffectivenessectiveness of of EW EW systems systems operating operating in in response response to to threats threats and and attacks attacks on on cyberspace. cyberspace. ThisThis study study aims aims to obtainto obtain an indexan index that measuresthat meas theures impact the impact of cyberattacks of cyberattacks on electronic on electronic warfare systemswarfare operating systems operating in cyberspace. in cyberspace. Applying Applying this study this will study allow will us to:allow us to: Help commanders