• Title/Summary/Keyword: 고가치자산

Search Result 3, Processing Time 0.015 seconds

A Study of Secure Client System with HVA(High Value Asset) (HVA를 이용한 안전한 클라이언트 시스템 연구)

  • Park, Jae-kyung;Kim, Young-Ga;Lee, Hyung-Su
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2018.07a
    • /
    • pp.455-456
    • /
    • 2018
  • 본 논문에서는 기존의 클라이언트 서버 환경에서 해킹에 취약한 구조를 개선하고자 새로운 형태의 클라이언트 서버 환경을 제안한다. 서버 측에는 기존의 웹 서버를 클라이언트 측으로 내려서 클라이언트가 필요한 데이터 만을 전달하는 방식으로 서버에 웹 공격 자체가 이루어질 수 없는 구조를 제안한다. 이를 통해 기존의 서버가 해킹을 당해 악성코드를 유포하고 서버의 데이터를 해킹하는 문제를 완전히 차단할 수 있음은 물론 클라이언트 PC에 악성코드가 감염되어도 서버에는 여향을 미치지 않는 새로운 패러다임을 제시하고자 한다. 본 논문에서는 클라이언트 측에 USB형태의 BBS(Big Bad Stick) 하드웨어를 통하여 제안하는 환경을 검증하고 서버 측의 보안장비와의 암호화 통신을 통해 안전한 서비스가 제공됨을 증명하여 본 연구가 새로운 보안성을 갖춘 시스템임을 보인다.

  • PDF

The Development of Air Escort Tactics for High-Value Airborne Assets Using Manned-Unmanned Teaming and the Study on Effective Force Disposition Using M&S (유무인 협업을 활용한 고가치 공중 자산의 호위 전술 개발과 M&S를 활용한 효과적인 전력배치 방안 연구)

  • Park, Myunghwan;Yoo, Seunghoon;Oh, Jihyon;Seol, Hyeonju
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.25 no.4
    • /
    • pp.401-411
    • /
    • 2022
  • As the role of high-value air assets(e.g., AWACS, JSTARS, Rivet Joint, E-2) becomes more critical in modern warfare, the air escort for these assets blocking attacks from any potential enemy fighter also becomes vital. Without the escort, the operations of the assets become restricted. However, such an escort is not always possible due to the limited flight time of the escort fighters. In this paper, we introduce an escort tactics for high-value air assets performed by the manned-unmanned teaming composed of a transport aircraft and UAVs(unmanned aerial vehicles). In this tactics, the transport aircraft plays the role of an aircraft carrier, which carries, launches, and retrieves the UAVs. The missions of UAVs in this tactics are to detect and engage enemy fighters. We also introduce the simulation result of this tactics to identify the UAVs' required capabilities and optimal maneuvering.

Proposal of Detection Module for Fighter Aircraft Data Modulation Attack (전투기 데이터 변조 공격행위에 대한 탐지모듈 제안)

  • Hong, Byoung-jin;Kim, Wan-ju;Kim, Ho-keun;Lim, Jae-sung
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.1
    • /
    • pp.5-16
    • /
    • 2019
  • Modern state-of-the-art military aviation assets are operated with independent embedded real-time operating systems(RTOS). These embedded systems are made with a high level of information assurance. However, once the systems are introduced and installed on individual platforms for sustaining operational employment, the systems are not actively managed and as a result the platforms become exposed to serious threats. In this paper, we analyzed vulnerability factors in the processing of mission planning data and maintenance-related data for fighter aircraft. We defined the method and form of cyber attacks that modulate air data using these vulnerabilities. We then proposed a detection module for integrity detection. The designed module can preemptively respond to potential cyber threats targeting high - value aviation assets by checking and preemptively responding to malware infection during flight data processing of fighter aircraft.