System for Organizing Cyber Operations in the Context of Military Aggression

Authors

DOI:

https://doi.org/10.15407/scine21.03.086

Keywords:

cyber operation, cyberweapons, cyber attack, cyber war, military aggression

Abstract

Introduction. In the modern world, the importance of information and communication technologies, as well as the threats associated with cyberattacks during military aggression, has significantly increased. The widespread adoption of these technologies is accompanied by a high level of risk from cyber threats targeting various objects and management systems.
Problem Statement. Cyber operations have become a substantial technique for conducting warfare in the context of military conflict. Access to sensitive military, economic, or strategic data can support their execution and implementation. The leakage of this information can cause significant damage to the enemy, both militarily and politically, undermining their authority and potentially disrupting or even destroying specific military and political plans. Attacks on communication and management systems, or their complete disabling, can lead to collapse and devastation in the enemy's ranks, ultimately resulting in their defeat. Therefore, it is crucial to conduct research and improve methods for cyber operations, as well as to ensure effective defense against such threats.
Purpose. The primary aim of this research is to enhance the organization of cyber operations in military contexts by utilizing essential principles of management and offering recommendations for their optimization.
Materials and Methods. This research is based on an analysis of theoretical sources on cyber operations, as well as practical examples of previous cyber incidents in military settings.
Results. A framework for cyber operations has been developed. The main stages of cyber operations within the management domain have been explored. A typical management system structure has been proposed. Key recommendations for improving the management and functionality of cyber operation systems have been provided.
Conclusions. This study highlights the significance of developing and implementing effective management strategies. The improvement of these processes is vital to ensuring reliable security and a robust response to cyber threats during military conflict.

Downloads

Download data is not yet available.

References

Brooks, D. (2023). The importance of modern-day data security platforms. Security Intelligence. URL: https://securityintelligence.com/posts/importance-modern-day-data-security-platform (Last accessed: 10.05.202 4).

Dr. Stevens, T., Dr. Burton, J. (2023). NATO and strategic competition in cyberspace. NATO REVIEW. URL: https:// www.nato.int/docu/review/articles/2023/06/06/nato-and-strategic-competition-in-cyberspace/index.html (Last accessed: 10.05.2024).

Kurochko, N. (2023, September). Powerful DDoS attacks and other cyber threats of the end of 2023: what businesses should prepare for and how to protect themselves from them. Speka. URL: https://speka.media/ponad-2500-potuznix-ddos-atakta-novi-prognozikiberekspertiv-do-cogo-gotuvatisya-biznesu-pndqwv (Last accessed: 10.05.2024) [in Ukrainian].

Situation Center for Cybersecurity. Security Service of Ukraine. URL: https://ssu.gov.ua/ sytuatsiinyi-tsentr-zabezpechenniakiberbezpeky (Last accessed: 10.05.2024) [in Ukrainian].

Cyberpolice. (n.d.). Cyberpolice. URL: https://cyberpolice.gov.ua (Last accessed: 10.05.2024) [in Ukrainian].

Communications and Cyber Security Forces. Ukrainian Military Pages. URL: https://www.ukrm ilitary.com/p/signaltroops.html (Last accessed: 10.05.2024) [in Ukrainian].

Ovsyanyk, Y. (2022, March 5). Cyber Cossacks — fighters of the invisible front. URL: https://zbruc.eu/node/110961 (Last accessed: 10.05.2024 [in Ukrainian].

On the Basic Principles of Ensuring Cybersecurity of Ukraine, Law of Ukraine No. 2163-VIII (2022) (Ukraine). URL: https://zakon.rada.gov.ua/laws/show/2163-19#Text (Last accessed: 10.05.2024) [in Ukrainian].

Hutchins, E.M., Cloppert, M.J., & Amin, R.M. (2011). Intelligence-Driven Computer Network Defense Informed by Analy sis of Adversary Campaigns and Intrusion Kill Chai ns.

Buckbee, M. What is The Cyber Kill Chain and How to Use It Effectively. Varonis. URL: https://www.varonis.com/blog/ cyber-kill-chain (Last accessed: 10.05.202 4).

Cyber Security Glossary. Heimdal security. URL: https://heimdalsecurity.com/glossary#C (Last accessed: 10.05.202 4).

Paganini, P. (2012). Cyber Weapons. The Hacker New Magazine.

Kuperstein, L. M., Radetska, A. O. (2022). Cyberweapons as an effective integral tool of military conflict: electronic scientific publications. LI Scientific and Technical Conference of the Faculty of Information Technology and Computer Engineering. URL: https://conferences.vntu.edu.ua/index.php/all-fitki/all-fitki-2022/paper/view/15803/13286 (Last accessed: 10.05.2024) [in Ukrainian].

Knapczyk, P. (2023, 18 August). Overview of the Cyber Weapons Used in the Ukraine — Russia War. Trustwave. URL: https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/overview-of-the-cyber-weapons-used-in-theukraine-russia-war (Last accessed: 10.05.2024).

Passeri, P. What is a cyber weapon? Hackmageddon. URL: https://www.hackmageddon.com/2012/04/22/what-is-acyber-weapon (Last accessed: 10.05.2024).

Stark, S. (2022, January 14). Websites of Diia, MFA, SES, MoD hacked by hackers. Ilounge journal. URL: https://ilounge. ua/ua/blog/sajty-diya-vzlomali-hakery (Last accessed: 10.05.2024) [in Ukrainian].

Russians have created new clones of Ukrainian media. (2023, September). Spravdi. URL: https://spravdi.gov.ua/ukrayinaprodaye-ditej-na-nelegalnyh-rynkah-i-uhylyanty-hovayutsya-u-vyshah-rosiyany-stvoryuyut-klony-ukrayinskyhnovynnyh-media (Last accessed: 10.05.2024) [in Ukrainian].

Ukrainian hackers gained access to the databases of the Russia-Africa 2023 economic summit. (2023, July 15). Inform Napalm. URL: https://informnapalm.org/ua/rosia-afryka-2023 (Last accessed: 10.05.2024) [in Ukrainian].

Boyko, I. (2022, March 10). Anonymous hacked Roskomnadzor and leaked data to the network. Unian. URL: https://www. unian.ua/world/anonymous-zlamali-roskomnaglyad-i-zlili-dani-v-merezhu-novini-svitu-11738668.html (Last accessed: 10.05.2024) [in Ukrainian].

Morgulets, O. B. (2012). Management in the service sector. Kyiv [in Ukrainian].

Nebava, M. I., Ratushniak, O. G. (2012). Management of organizations and administration [in Ukrainian].

Kupershtein, L., Voitovych, О., Baryshev, Y., Kolibabchuk, E. (2016). Investigation of simple Denial-of-Service attacks. Third International Scientific-Practical Conference Problems of Infocommunications Science and Technology (PIC S&T). https://doi.org/10.1109/INFOCOMMST.2016.7905362

Romagna, M., van den Hout, N. J. (2017). Hacktivism and Website Defacement: Motivations, Capabilities and Potential Threats. 27th Virus Bulletin International (October, 2017, Madrid, Spain). URL: https://www.researchgate.net/publication/ 320330579_Hacktivism_and_Website_Defacement_Motivations_Capabilities_and_Potential_Threats (Last accessed: 10.05.2024).

Kirsten, S. Cross site scripting (xss). Owasp. URL: https://owasp.org/www-community/attacks/xss (Last accessed: 10.05.2024).

Voitovych, O. P., Yuvkovetskyi, O. S., Kupershtein, L. M. (2016). SQL injection prevention system. 2016 International Conference “Radio Electronics & Info Communications” (UkrMiC o). IEEE. https://doi.org/10.1109/ukrmico.2016.7739642

Social Engineering: Definition & 6 Attack Types. URL: https://www.tripwire.com/state-of-security/5-social-engineeringattacks-to-watch-out-for (Last accessed: 10.05.2024).

Google Hacking Database. Exploit Database. URL: https://www.exploit-db.com/google-hacking-database (Last accessed: 10.05.2024).

Bielska, A., Kurz, N. R., Baumgartner, Y., Benetis, V. (2020). Open source intelligence tools and resources handbook. I-intelligence. URL: https://i-intelligence.eu/uploads/public-documents/OSINT_Handbook_2020.pdf (Last accessed: 10.05.2024).

Schmitt, M. (2017). Tallinn Manual 2.0 on the International Law Applicable to Cyber Operations. In Tallinn Manual 2.0 on the International Law Applicable to Cyber Operations (pp. I-Ii). Cambridge. URL: https://assets.cambridge.org/97811071/ 77222/frontmatter/9781107177222_frontmatter.pdf (Last accessed: 10.05.2024). https://doi.org/10.1017/9781316822524

Dudatyev, A., Kupershtein, L., Voitovych, O. (2023). Information counterfeature: models of implementation and evaluation of information operations. Electronic Professional Scientific Edition “Cybersecurity: Education, Science, Technique”, 4(20), 72—80. https://doi.org/10.28925/2663-4023.2023.20.7280 [in Ukrainian].

Baryshev, Y., Kupershtein, L., Maidanovych, V., Voitovych, O., Prokopenko, S. (2023). Information System for the Factchecker Support. CEUR Workshop Proceedings, 3646, 127—138. URL: https://ceur-ws.org/Vol-3646/Paper_13.pdf (Last accessed: 10.05.202 4).

Downloads

Published

2025-06-12

How to Cite

KUPERSTEIN, L., LUKICHOV, V., RADETSKA , A., & DUDATYEV, A. (2025). System for Organizing Cyber Operations in the Context of Military Aggression. Science and Innovation, 21(3), 86–98. https://doi.org/10.15407/scine21.03.086

Issue

Section

The Scientific Basis of Innovation