| Collection of scientific works of Odesa Military Academy |
| ISSN (Print) 2313-7509 |
| 1 - 2025 (23) |
| DOI: https://doi.org/10.37129/2313-7509.2025.23.1 |
| THE ABSENCE OF CYBER WEAPON AS A CONSTRAINING FACTOR ON THE PATH TO DOMINATION IN CYBERSPACE: PROBLEM AND WAYS TO SOLUTION |
| UDC 004.01/.08+355.4 |
| 1Semenenko O. | https://orcid.org/0000-0001-6477-3414 |
| 1Horhulenko V. | https://orcid.org/0000-0001-6382-5075 |
| 2Iefimenko A. | https://orcid.org/0000-0003-1582-2675 |
| 3Vodchyts O. | https://orcid.org/0000-0002-3294-7632 |
| 3Siecheniev O. | https://orcid.org/0009-0000-4173-966X |
| 1Central Research Institute of the Armed Forces of Ukraine, Kyiv, Ukraine | |
| 2Military Academy (Odesa), Ukraine | |
| 3Department of Military Training, National Aviation University, Kyiv, Ukraine |
Abstract
Abstract. The particular importance of innovations in today's war is determined by the enemy's advantage in both natural and financial, as well as human resources. This fact forces us to search for and find more rational ways to achieve victory. One of such ways is dominance in cyberspace. However, the incomplete acquisition by the Armed Forces of Ukraine of capabilities for cyber defense of the state, conducting cyber warfare, and conducting defensive and offensive cyber actions (cyberattacks, cyber strikes, reconnaissance and preventive cyber actions) somewhat slows down this process. The absence of cyber weapons as standard weapons and military equipment in the arsenal of the Armed Forces of Ukraine is the most influential deterrent factor on the path to dominance over the enemy in cyberspace. The purpose of the article is to highlight the problem of the lack of cyber weapons as a deterrent factor on the path to the dominance of the Armed Forces of Ukraine over the enemy in cyberspace, to formulate and substantiate possible ways to solve it. The main results of the study are formulated and substantiated ways to overcome the problem of the lack of cyber weapons, which consist in: substantiating the rational composition and structure of the units of the promising Cyber Forces of the Armed Forces of Ukraine; defining specific tasks and the purpose of the relevant units; based on the defined tasks of the units, developing a catalog of carriers of capabilities for conducting confrontation in cyberspace; forming tactical and technical characteristics (requirements), the principle of action and the desired effect of cyber weapons by types: cyber intelligence, cyber defense, cyber influence; substantiating indicators and criteria for assessing the effectiveness of the use of cyber weapons by types and purpose; introduction of a system of cyber training grounds that can be deployed in training centers and military institutions of higher education, where military specialists in cybersecurity will be trained; development of approximate standards for equipping typical carriers of the capabilities of the Armed Forces of Ukraine with cyber weapons for conducting confrontation in cyberspace. The practical value of the research results is the possibility of their implementation during the process of developing promising cyber weapons of the Armed Forces of Ukraine.
Keywords: cyber warfare, cyber weapons, cyberspace, cyber defense, weapons and military equipment.
References
1. Horhulenko, V. A., (2024). Cyber warfare in modern military conflicts: experience, trends and regularities of development. Suchasni informatsiini tekhnolohii u sferi bezpeky ta oborony. 50 (2). P. 11–28. https://doi.org/10.33099/2311-7249/2024-50-2-11-28.
2. Bronk C., Collins G., Wallach D. The Ukrainian Information and Cyber War. The Cyber Defense Review. 2023. Vol. 8 (3). P. 33–50.
3. Statistical report on the work of the system for detecting vulnerabilities and responding to cyber incidents and cyber attacks for 2022 [online], (2022). DTsKZ DSSZZI Ukrainy. Available at: https://scpc.gov.ua/uk/articles/233 [Accessed: 01 March 2025].
4. Hryschuk, R. V., Danyk, Yu. H., (2016). Fundamentals of cyber security: a monograph. Zhytomyr: ZhNAEU.
5. Joint Publication 3-12 "Cyberspace Operations". J7 Directorate for Joint Force Development. 2018. URL: https://irp.fas.org/doddir/dod/jp3_12.pdf (дата звернення: 15.11.2024).
6. Defense Primer: Army Multi-Domain Operations (MDO). Congressional research service. 2024. URL: https://sgp.fas.org/crs/natsec/IF11409.pdf (дата звернення: 16.11.2024).
7. Horhulenko, V. A., (2024). Factors affecting on the capabilities of the Armed Forces of Ukraine in a cyber domain. In: Military innovations in the contemporary warfare: zb. tez dop. mizhnar. akad. forumu. Kyiv, Ukraina, 18–19 kvitnia 2024. Kyiv: 7BC.
8. Hryshchuk R. V., (2024). Cyber domain in the russian-ukrainian war: underestimated capabilities. In: Military innovations in the contemporary warfare: zb. tez dop. mizhnar. akad. forumu. Kyiv, Ukraina,
18–19 kvitnia 2024. Kyiv: 7BC.
9. Alekseieva, O. A., (2024). Cyber weapon: concepts, their manifestations and countermeasures. Informatsiia i pravo. 50 (3). P. 162–169. https://doi.org/10.37750/2616-6798.2024.3(50).311720.
10. Horhulenko, V. A., (2024). Military-theoretical justification of recommendations for the development of terminological apparatus in the sphere of cyber warfare. Suchasni informatsiini tekhnolohii u sferi bezpeky ta oborony. 3(51), P. 41–50. DOI: https://doi.org/10.33099/2311-7249/2024-51-3-41-50.
11. Vdovenko, S. H, Danyk, Yu. H, Faraon, S. I., (2019). Definitive problems of the Terms of the Sphere of Cyber security and Cyber Defense and the Ways of their solution. Kompiuterni nauky ta kiberbezpeka. 13 (1). 17–29. https://doi.org/10.26565/2519-2310-2019-1-02.
12. Fediienko, O. P., (2024). Modern trends in regulatory support for the institutional formation of cyber forces (cyber forces): the experience of some NATO countries. Informatsiia i pravo. 48 (1). P. 150–161. https://doi.org/10.37750/2616-6798.2024.1(48).300800.
13. Reinhold, T., Reuter, C. (2022). Cyber Weapons and Artificial Intelligence: Impact, Influence and the Challenges for Arms Control. In: Reinhold, T., Schörnig, N. (eds) Armament, Arms Control and Artificial Intelligence. Studies in Peace and Security. Springer, Cham. https://doi.org/10.1007/978-3-031-11043-6_11.
14. Gilad, A., & Tishler, A. (2023). Mitigating the Risk of Advanced Cyber Attacks: The Role of Quality, Covertness and Intensity of Use of Cyber Weapons. Defence and Peace Economics, 34(6), P. 726–746. https://doi.org/10.1080/10242694.2022.2161739.
15. Biliuha A. D., (2021). Cyberweapons: modern threats to national security and ways to counter them. Nauka i oborona. 2 (15). P. 42–49. DOI: https://doi.org/10.33099/2618-1614-2021-15-2-42-49.
16. Hryshchuk R. V., (2016). Cyber weapon: classification, basic principles of construction, methods and means of application and protection against them. Suchasna spetsialna tekhnika. 3 (46), P. 94–101.
17. Mikhieiev Yu. I., Pavlenko M. M., Loboda V. V., Voitko T. M., (2024). Requirements for promising cyber weapons of the Armed Forces of Ukraine. Systemy i tekhnolohii zviazku, informatyzatsii ta kiberbezpeky. 6, P. 146–152. https://doi.org/10.58254/viti.6.2024.11.146.
18. Semenenko O. M., Yefimenko A. Ye., Lukhanin V. V., Horhulenko V. A., Dobrovolskyi Yu. B., Yarmolchyk M. O., (2023). Methodical approach to improving the simulation model of describing the operation of a group of troops (forces) by updating the procedure for modeling combat operations of units of mechanized (tank) troops. Zbirnyk naukovykh prats Viiskovoi akademii (m. Odesa). 1 (19), P. 50–57. https://doi.org/10.37129/2313-7509.2023.19.50-57.
19. Nazarkin V. M., Semenenko O. M., Yefimenko A. Ye., Ivanov V. L., (2019). Structural and logical scheme for conducting research on the military-economic justification of the rational size of the armed forces of Ukraine during the formation of their development programs. Zbirnyk naukovykh prats Viiskovoi akademii (m. Odesa). 2 (12), P. 102–110. https://doi.org/ 10.37129/2313-7509.2019.12.2.102-110.
The article was submitted 15.09.2024
© Semenenko, O., Horhulenko, V., Iefimenko, A., Vodchyts, O., Siecheniev, O.
Creative Commons Attribution 4.0 International License (CC BY 4.0)