Conceptual Approaches to the Assessment of the Effectiveness of Cyber Warfare in Military Information and Communication Systems

Keywords: Artificial Intelligence, Information Security, Information Technologies, Information Space, Cyber Warfare, Cybersecurity, Cyber Defense, Cyber Protection, Cyberspace, Cyber Influence, Cyber Intelligence, Effectiveness Evaluation, Forecasting, Mathematical Model, Modelling

Abstract

Purpose. To analyze, generalize, systematize, and compare conceptual approaches to assessing the effectiveness of conducting cyber warfare in military information and communication systems, including relevant information technologies and mathematical models.

Method. General scientific theoretical research methods were employed, including analysis, generalization, systematization, and comparison, which enable a comprehensive examination of the key features and differences among conceptual approaches to assessing the effectiveness of conducting cyber warfare in military information and communication systems.

Practical implications: It is determined by the possibility of applying the research results in the development and improvement of decision support systems, mathematical models of specific cyber warfare processes, the planning of cyber defense measures, and the assessment of the effectiveness of actions within the framework of contemporary hybrid military conflicts.

Future research. Consist in the implementation of the obtained results into the practice of modeling and assessing the effectiveness of the course and outcomes of conducting cyber warfare by military command authorities at all levels of command.

Paper type. Theoretical.

Downloads

Download data is not yet available.

References

Semenenko, O., Kirsanov, S., Movchan, A., Sliusarenko, M., & Horhulenko, V., (2025). Addressing the Legal Gaps in AI Regulation for National Security: The Case of Ukraine’s Defense Sector. Law, State and Telecommunications Review, 17(2), 56–85. https://doi.org/10.26512/lstr.v17i2.56351.

Liu M., Shore M., Yeoh W., Jiang F., Zeadally S., (2025). Toward effective cybersecurity management: a hierarchical process model with performance assessment, Journal of Cybersecurity, Vol. 11 (1). https://doi.org/10.1093/cybsec/tyaf020.

S. Kumar, G. Nagar. Threat Modeling for Cyber Warfare Against Less Cyber-Dependent Adversaries. Vol. 23 No. 1 (2024): Proceedings of the 23rd European Conference on Cyber Warfare and Security, 27–28 June 2024, p. 257–264. https://doi.org/10.34190/eccws.23.1.2462.

Kalaida Yu. P., (2025) Hybrid cyberattacks in the conditions of the ukrainian-russian cyberwar. Informatsiia i pravo, vol. 55 (4), p. 206–214. https://doi.org/10.37750/2616-6798.2025.4(55).346481.

Hryschuk, R. V., Danyk, Yu. H., (2016). Fundamentals of cyber security: a monograph. Zhytomyr: ZhNAEU.

Semenenko O., Palamarchuk S., Poberezhets T., Palamarchuk N., Mytchenko S., (2025). Cybersecurity in Modern Armed Conflicts: Threats and Responses. International Journal of Advances in Soft Computing and its Applications. 2025. № 17(1). P. 32. https://doi.org/10.15849/IJASCA.250330.03.

Hrabar, I. H., Hryshchuk, R. V., & Molodetska, K. V. (2019). Bezpekova synerhetyka: kibernetychnyi ta informatsiinyi aspekty. Hryshchuk, R. V. (Ed.). Zhytomyr: ZhNAEU.

Khoroshko V., Shelest M., Tkach Yu., (2021). Multialternative detection of cyberattacks in information networks. Ukrainian Scientific Journal of Information Security, vol. 27 (3), p. 136–140. https://doi.org/10.18372/2225-5036.27.16515.

Mazulevskyi, O. Ye., Zholobovych, N. V., (2024). Assessment of the current state of cyber resilience, taking into account the situation in cyberspace. Suchasni informatsiini tekhnolohii u sferi bezpeky ta oborony. 3(51), 34–40. https://doi.org/10.33099/2311-7249/2024-51-3-34-40.

Park J., Kim D., Shin D. Design and Implementation of Simulation Tool for Cyber Battle Damage Assessment Using MOCE (Measure of Cyber Effectiveness)., (2019). Journal of the Korea Institute of Information Security & Cryptology. Vol. 2 (29). P. 465–472. https://doi.org/10.13089/JKIISC.2019.29.2.465.

Murasov R., Pharaon S., Huk O., (2025) Critical infrastructure cybersecurity: assessment and management of cyberattack risks. Suchasni informatsiini tekhnolohii u sferi bezpeky ta oborony, vol. 54 (3), p. 75–83. https://doi.org/10.33099/2311-7249/2025-54-3-75-83.

Danyk Y., Shestakov V., Labunets V., (2025). Analysis, assessment, and forecasting of the development of robotics in contemporary and future military conflicts. Zbirnyk naukovykh prats Kharkivskoho natsionalnoho universytetu Povitrianykh Syl, vol. 83 (1), p. 89–97. https://doi.org/10.30748/zhups.2025.83.11.

Snitsarenko, P. M., Sarychev, Yu. O., Hordiichuk, V. V., (2024). On the essence of cyber space and its relationship with cybernetic space. Suchasni informatsiini tekhnolohii u sferi bezpeky ta oborony. 50 (2). 5–10. https://doi.org/10.33099/2311-7249/2024-50-2-5-10.

Vdovenko, S. H, Danyk, Yu. H, Faraon, S. I., (2019). Definitive problems of the Terms of the Sphere of Cyber security and Cyber Defense and the Ways of their solution. Kompiuterni nauky ta kiberbezpeka. 13 (1). 17–29. https://doi.org/10.26565/2519-2310-2019-1-02.


Abstract views: 126
PDF Downloads: 124
Published
2026-02-28
How to Cite
SolomitskyіО., Yankovyi, Y., Dobrovolskyi, Y., Semenenko, A., Hetman, A., & Musienko, V. (2026). Conceptual Approaches to the Assessment of the Effectiveness of Cyber Warfare in Military Information and Communication Systems. Social Development and Security, 16(1), 324-333. https://doi.org/10.33445/sds.2026.16.1.24
Section
Engineering and Technology