| Collection of scientific works of Odesa Military Academy |
| ISSN (Print) 2313-7509 |
| 2 - 2025 (24) |
| DOI:https://doi.org/10.37129/2313-7509.2025.24.4 |
| THE ANALYSIS OF MODERN APPROACHES FOR CYBER WEAPON USAGE EFFECTIVENESS ASSESSMENT DURING MILITARY OPERATIONS IN CYBERSPACE |
| УДК 004.01/.08+355.4 |
| Semenenko O. M. | https://orcid.org/0000-0001-6477-3414 |
| Horhulenko V. A. | https://orcid.org/0000-0001-6382-5075 |
| Yefimenko A. Ye. | https://orcid.org/0000-0001-1582-2675 |
| Vodchyts O. H. | https://orcid.org/0000-0002-3294-7632 |
| Paiuk O. S. | https://orcid.org/0000-0002-6436-7464 |
Abstract
Wars and military conflicts in the modern time are characterized by hybridity, network-centricity and asymmetry of all domains of the combat environment, one of which is the cyber domain today. The intensity of military actions in cyberspace continues to grow, and the forms and methods of their conduct are improving. One of the main existing contradictions in the field of research of military actions in cyberspace (cyber warfare, cyber operations, active cyber protection of critical information and cyber infrastructure of the state) is the uncertainty of the issue of assessing the effectiveness of cyber actions carried out to achieve the set goal. This uncertainty lies in the absence of an established system of indicators and criteria for effectiveness, which would fully convey the nature of the results of military actions in cyberspace, as well as a scientifically sound methodology that would allow assessing such effectiveness. The purpose of the article is to analyze modern scientific and methodological approaches to assessing the effectiveness of the use of cyber weapons during military operations in cyberspace. During the study of modern scientific and methodological approaches, methods of analysis, generalization and comparison were used. The theoretical and practical value of the results of the analysis of modern approaches to assessing the effectiveness of the use of cyber weapons during military operations in cyberspace is to highlight the positive and negative features of each of them, as well as to identify those that are most consistent with the requirements and trends of modern asymmetric warfare. The prospect of further research in this area is to develop and substantiate a methodology for assessing the effectiveness of conducting cyber warfare in the interests of the use of groups of troops (forces).
Keywords: cyber warfare, cyber weapon, cyberspace, cyber defense, effectiveness assessment
FULL TEXT (in Ukrainian)
References
1. Hryshchuk R. V. (2016). Cyber weapon: classification, basic principles of construction, methods and means of application and protection against them. Suchasna spetsialna tekhnika. 3 (46), P. 94-101.
2. Alekseieva, O. A., (2024). Cyber weapon: concepts, their manifestations and countermeasures. Informatsiia i pravo. 50 (3). 162-169. https://doi.org/10.37750/2616-6798.2024.3(50).311720.
3. Hryshchuk R. V., (2024). Cyber domain in the russian-ukrainian war: underestimated capabilities. In: Military innovations in the contemporary warfare: zb. tez dop. mizhnar. akad. forumu. Kyiv, Ukraina, 18-19 kvitnia 2024. Kyiv: 7BC.
4. Mikhieiev Yu. I., Pavlenko M. M., Loboda V. V., Voitko T. M., (2024). Requirements for promising cyber weapons of the Armed Forces of Ukraine. Systemy i tekhnolohii zviazku, informatyzatsii ta kiberbezpeky. 6, P. 146-152. https://doi.org/10.58254/viti.6.2024.11.146.
5. Horhulenko V. A. (2024) Formalized statement of the scientific task to increase the effectiveness of cyber warfare in the interests of the operational-strategic grouping of troops (forces). Zbirnyk naukovykh prats TsNDI ZS Ukrainy. 2024. 3(110). P. 349-358.
6. Semenenko O., Palamarchuk S., Poberezhets T., Palamarchuk N., Mytchenko S. Cybersecurity in Modern Armed Conflicts: Threats and Responses. International Journal of Advances in Soft Computing and its Applications. 2025. № 17(1). P. 32. https://doi.org/10.15849/IJASCA.250330.03.
7. Danyk Yu.H., Shestakov V.I., Labunets V.O. Analysis, assessment, and forecasting of the development of robotics in contemporary and future military conflicts. Zbirnyk naukovykh prats Kharkivskoho natsionalnoho universytetu Povitrianykh Syl. 2025. 1(83). P. 89-97. https://doi.org/10.30748/zhups.2025.83.11.
8. Bronk C., Collins G., Wallach D. The Ukrainian Information and Cyber War. The Cyber Defense Review. 2023. Vol. 8(3). P. 33-50.
9. Hryschuk, R. V., Danyk, Yu. H., (2016). Fundamentals of cyber security: a monograph. Zhytomyr: ZhNAEU.
10. Mazulevskyi, O. Ye., Zholobovych, N. V., (2024). Assessment of the current state of cyber resilience, taking into account the situation in cyberspace. Suchasni informatsiini tekhnolohii u sferi bezpeky ta oborony. 3(51), 34-40. https://doi.org/10.33099/2311-7249/2024-51-3-34-40.
11. Park J., Kim D., Shin D. Design and Implementation of Simulation Tool for Cyber Battle Damage Assessment Using MOCE (Measure of Cyber Effectiveness). Journal of the Korea Institute of Information Security & Cryptology. 2019. Vol. 29(2). P. 465-472. https://doi.org/10.13089/JKIISC.2019.29.2.465.
12. Bohdanovych, V. Yu., Hryshchuk, R. V., Levchenko, O. V., (2017). System of criteria and indicators for assessing the effectiveness of the information security system. Zbirnyk naukovykh prats Natsionalnoi akademii Derzhavnoi prykordonnoi sluzhby Ukrainy. Seriia: Viiskovi ta tekhnichni nauky. 4(74), 21-37.
13. Shypovskyi V. V. Cyber resilience assessment model information systems of critical objects infrastructures under the influence of hybrids cyber-attack using algorithms machine learning. Bezpeka informatsii. 2024. 2(30). P. 235-243. https://doi.org/10.18372/2225-5036.30.19234.
14. Shypovskyi V. V. System of cyber resistance assessment indicators information systems of critical infrastructure objects. Zakhyst informatsii. 2023. 1(25). P. 37-45. https://doi.org/10.18372/2410-7840.25.17597.
15. Chaudhary S., Gkioulos V., Katsikas S. Developing metrics to assess the effectiveness of cybersecurity awareness program, Journal of Cybersecurity, 2022. Vol. 8(1). https://doi.org/10.1093/cybsec/tyac006.
16. Korchenko O., Ivanchenko Ye., Bakalinskyi O., Myalkovskyi D., Zubkov D. Method for assessing the level of cybersecurity enhancement of critical infrastructure objects of the state. Naukoiemni tekhnolohii. 2024. 1(61). https://doi.org/10.18372/2310-5461.61.18509.
17. Hryshchuk R. Example of Differential Transformations Application in Cybersecurity. ISecIT. 2021. P. 223-227. URL: https://ceur-ws.org/Vol-3200/paper31.pdf (accessed: 12 February 2025).
18. Horhulenko, V. A., (2025). A mathematical model for determining probabilistic states of an information and communication system in the conditions of cyberwarfare. Suchasni informatsiini tekhnolohii u sferi bezpeky ta oborony. 52 (1), 77-84. P. 3-20. https://doi.org/10.33099/2311-7249/2025-52-1-77-84
The article was submitted 02.12.2025
© Semenenko, O.M., Horhulenko, V.A., Yefimenko, A.Ye., Vodchyts, O.H., Paiuk, O.S., 2025
Creative Commons Attribution 4.0 International License (CC BY 4.0)