• Title/Summary/Keyword: 공격작전

Search Result 89, Processing Time 0.029 seconds

A Survey on Hardware Characteristic-based Drone Identification and Authentication Technology (하드웨어적 고유 특성 기반 드론 식별 및 인증 기술 연구 동향 분석)

  • Sungbin Park;Hoon Ji;Yeonjoon Lee
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2023.11a
    • /
    • pp.1181-1184
    • /
    • 2023
  • 최근 드론은 군사 작전, 물류 운송, 인명 구조 등 다양한 분야에서 활용되고 있으며 관련 산업의 규모는 증가하는 추세이다. 이에 따라, GPS 스푸핑, 조종사 비익명화 등의 드론을 향한 공격 기법들 또한 발달하고 있다. 이런 공격들은 드론에 대한 인증을 도입함으로써 대비할 수 있는 공격들이다. 이에, 학계에서는 강건한 인증을 위해 드론 하드웨어의 고유 특성을 활용할 수 있는 RF 신호, 소리 신호, 드론 내부 센서 신호 등에 기반한 인증 기술들이 연구되어온 바 있다. 본 논문에서는 지금까지의 드론 인증 기술 연구 동향을 분석하고, 이를 기반으로 향후 연구 방향을 제시한다.

Cyber Weapon Model for the National Cybersecurity (국가사이버안보를 위한 사이버무기 모델 연구)

  • Bae, Si-Hyun;Park, Dae-Woo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.23 no.2
    • /
    • pp.223-228
    • /
    • 2019
  • Recently, the United States has been trying to strengthen its cybersecurity by upgrading its position as an Unified Combatant Command that focuses on the Cyber Command in the United States, strengthening operations in cyberspace, and actively responding to cyber threats. Other major powers are also working to strengthen cyber capabilities, and they are working to strengthen their organization and power. The world demands economic power for its own interests rather than its own borders. But Cyber World is a world without borders and no defense. Therefore, a cyber weapon system is necessary for superiority in cyberspace (defense, attack) for national cybersecurity. In this paper, we analyze operational procedures for cyber weapons operation. And we design cyber weapons to analyze and develop the best cyber weapons to lead victory in cyberwarfare. It also conducts cyber weapons research to solve the confrontation between Cyber World.

읽을거리 - 항공기 실전원리(12) - 바다 속 기뢰를 찾아라, 소해헬기(AMCM)

  • 한국항공우주산업진흥협회
    • Aerospace Industry
    • /
    • s.107
    • /
    • pp.68-69
    • /
    • 2010
  • 기뢰(機雷, naval mine) 또는 수뢰((水雷)는 수중에 설치되어 함선이 접근 또는 접촉했을 때, 자동 또는 원격 조작에 의해 폭발하는 수중 병기다. 저렴하고 단순하지만 가장 현대적이고 강력한 해군조차도 겁내하는 해중무기다. 적상선 및 잠수함 공격에 효과적인 무기로 미국 남북전쟁을 기점으로 대량 사용되었다. 기뢰의 다양화, 지능화에 따라 적의 기뢰를 찾아 파괴하는 소해임무도 함께 강조되고 있다. 함정의 안전한 해상작전을 위해서는 반드시 따라야 하는 대기뢰전, 특히 헬기를 이용한 '공중 대기뢰전(Airborne Mine countermeasures)'은 현대 해군의 필수다. 세계 주요 소해헬기와 관련 기술에 대해 소개한다.

  • PDF

첨단과학기술현장 - 사이버전쟁시대 '창과 방패'

  • Korean Federation of Science and Technology Societies
    • The Science & Technology
    • /
    • v.32 no.8 s.363
    • /
    • pp.73-77
    • /
    • 1999
  • 1999년 3월 27일 북서대서양조약기구(NATO)의 전폭기들이 유고슬라비아에 대한 폭격을 개시한 뒤 꼭 3일만에 전쟁은 사이버공간으로 번져 나갔다. 컴퓨터 해커들이 NATO의 전자우편 통신시스템 교란작전을 개시한 것이다. 이것은 역사상 NATO 컴퓨터 시스템이 전시에 공격을 받은 최초의 사건이었다. 그러나 이 사이버전쟁은 오래 끌지 못했다. NATO는 '비장의 방패'로 해커들의 '창'을 물리쳤기 때문이다.

  • PDF

지상 전술 $C^4I$체계의 위치보고체계 구축을 위한 제대간 데이터 통신망 구성 방안

  • Kim, Yong-Yun
    • Defense and Technology
    • /
    • no.2 s.252
    • /
    • pp.46-57
    • /
    • 2000
  • 군 통신도 앞으로 상용에서의 이동통신 시스템이나 ATM(Asynchronous Transfer Mode), 위성통신과 같은 첨단 통신방식으로 발전하는 추세에 있으므로 전술제대 단위로 위치보고체계의 통신망을 구성한다면 상호운용성(Interoperability)면에서 중대한 문제점이 발생할 수 있다. 한편 장차전의 양상은 화력전, 입체 고속 기동전으로 가는 추세이며 기갑/기계화부대는 비선형 기동전의 주역으로서 적의 취약점을 포착하는 즉시 민첩한 기동전투력으로 종심공격을 실시하여 적에게 불리한 비선형의 전장을 적극적으로 조성하고 주도권을 행사하는 전술작전 능력을 발휘한다

  • PDF

Future Cyber Information Warfare (사이버 정보전 준비 해야)

  • 오제상
    • Convergence Security Journal
    • /
    • v.1 no.1
    • /
    • pp.31-35
    • /
    • 2001
  • Currently if we are to make a thought to depend on our fast developing information technology, a future war is necessarily to be made a situation of a cyber information warfare. A attacker in the cyber information warfare is able to make attack a military or a civil information and communication system, especially if a attack of a hacker, a virus or a electromagnetic pulse bomb at a military C4ISR system is able to make a confusion or a interruption in military operations, they are available to attack as a real time with non restrictions of physical distance, time, weather and space. While a expenditure of carrying out the cyber information warfares is the lowest expenditure, a effect of carrying out the cyber information warfares is the greatest effect in side of a interruption of information, a confusion, a terror, a pillage and crime of the people. This paper is to introduce "weapons of cyber information warfares", "offence capability of cyber information warfares about several nations" and to propose "a cyber information warfare organization" or the future knowledge warfare. the future knowledge warfare.

  • PDF

Case Studies on Planning and Learning for Large-Scale CGFs with POMDPs through Counterfire and Mechanized Infantry Scenarios (대화력전 및 기계화 보병 시나리오를 통한 대규모 가상군의 POMDP 행동계획 및 학습 사례연구)

  • Lee, Jongmin;Hong, Jungpyo;Park, Jaeyoung;Lee, Kanghoon;Kim, Kee-Eung;Moon, Il-Chul;Park, Jae-Hyun
    • KIISE Transactions on Computing Practices
    • /
    • v.23 no.6
    • /
    • pp.343-349
    • /
    • 2017
  • Combat modeling and simulation (M&S) of large-scale computer generated forces (CGFs) enables the development of even the most sophisticated strategy of combat warfare and the efficient facilitation of a comprehensive simulation of the upcoming battle. The DEVS-POMDP framework is proposed where the DEVS framework describing the explicit behavior rules in military doctrines, and POMDP model describing the autonomous behavior of the CGFs are hierarchically combined to capture the complexity of realistic world combat modeling and simulation. However, it has previously been well documented that computing the optimal policy of a POMDP model is computationally demanding. In this paper, we show that not only can the performance of CGFs be improved by an efficient POMDP tree search algorithm but CGFs are also able to conveniently learn the behavior model of the enemy through case studies in the scenario of counterfire warfare and the scenario of a mechanized infantry brigade's offensive operations.

Scenario-based Future Infantry Brigade Information Distribution Capability Analysis (시나리오 기반의 미래 보병여단 정보유통능력 분석 연구)

  • Junseob Kim;Sangjun Park;Yiju You;Yongchul Kim
    • Convergence Security Journal
    • /
    • v.23 no.1
    • /
    • pp.139-145
    • /
    • 2023
  • The ROK Army is promoting cutting-edge, future-oriented military development such as a mobile, intelligent, and hyper-connected Army TIGER system. The future infantry brigade plans to increase mobility with squad-level tactical vehicles to enable combat in multi-domain operations and to deploy various weapon systems such as surveillance and reconnaissance drones. In addition, it will be developed into an intelligent unit that transmits and receives data collected through the weapon system through a hyper-connected network. Accordingly, the future infantry brigade will transmit and receive more data. However, the Army's tactical information communication system has limitations in operating as a tactical communication system for future units, such as low transmission speed and bandwidth and restrictions on communication support. Therefore, in this paper, the information distribution capability of the future infantry brigade is presented through the offensive operation scenario and M&S.

Improvement Method for Message Processing Speed of ADC2A System (방공지휘통제경보체계 메시지처리속도 향상 방안)

  • Lee, Jeong-min;Lim, Won-gi;Park, Seung-jin;Choi, June-sung
    • Journal of IKEEE
    • /
    • v.19 no.3
    • /
    • pp.349-356
    • /
    • 2015
  • Air Defense Command Control and Alert(ADC2A) system is a system that ensures simultaneity and integrity of air defense operations by combining sensors, weapons and Command and Control(C2) systems over a tactical network to protect forces, facilities and strategic points from enemy's air attack. Improving message processing speed is a very important factor for ADC2A, because it uses high frequency bit-processing of the Army standard KVMF message to communicate with internal and external systems. In this paper we proposed improved method of KVMF message processing for ADC2A system.

A Study on Priority Decision Method of Required Capability for North West Islands (서북도서에 대한 요구능력 우선순위 결정방법에 관한 연구)

  • Jang, Dong Mo;Lim, Gye Hwan
    • Convergence Security Journal
    • /
    • v.13 no.5
    • /
    • pp.45-56
    • /
    • 2013
  • In order to prepare against the unpredictable provocation of nK on NWI, instead of the threat based force enhancement, sufficient capability based force planning is required in consideration to enemy capability, operations environment, and technological development. This thesis proposes a method on how to prioritize the required capabilities of NWI during the process of identifying capabilities and investing on the decided acquisition assets. Ambiguity in deciding the priority is eliminated and detailed planning is possible through instituting relationship of organization, operation and capability, and by designating weight based on the above relationship. This method identify the various operations and required capabilities, classify the order of priority clearly for NWI, when compare to other method of priority decision. Although capability based force planning requires more assets and faces limitations due to budget, this method will provide and efficient decision making procedure through precise prioritization.