• Title/Summary/Keyword: 공격작전

Search Result 89, Processing Time 0.033 seconds

Analysis of an Effective Network of Information Delivery for Supporting Kill Chain in the Joint Battlefield Environment (합동전장 환경에서 효과적인 Kill Chain 지원을 위한 표적정보전달 네트워크 분석)

  • Lee, Chul-Hwa;Lee, Jong-Kwan;Goo, Ja-Youl;Lim, Jea-Sung
    • Journal of Information Technology and Architecture
    • /
    • v.11 no.1
    • /
    • pp.11-23
    • /
    • 2014
  • Kill Chain is getting attention due to North Korea's recent nuclear test and missile launches and has emerged the need for an early build up. In order to build a materialized kill chain, you should review the unique kill chain to support operations effectively using various sensors and striking weapon system. Especially, you need a suitable network to reduce a reaction time against the enemy attack under joint operations environment etc. Currently there are many communication ways(e.g. data link, voice, video and text message) used in operations through satellite, wired and wireless and so on. Now, this paper contains analysis on various means for target information exchange which are used in the kill chain. And appropriate network of the kill chain for target information transmission is addressed to confirm feasibility of its alternatives, which is developed using AHP(Analytic Hierarchy Process). Finally, this paper is suggesting network and means of its building up for target information transmission of kill chain which can be implemented under the situation of joint battle field.

A Study on the Operation Concept of Cyber Warfare Execution Procedures (사이버전 수행절차 운영개념에 관한 연구)

  • Kim, Sung-Joong;Yoo, JiHoon;Oh, HaengRok;Shin, Dongil;Shin, DongKyoo
    • Journal of Internet Computing and Services
    • /
    • v.21 no.2
    • /
    • pp.73-80
    • /
    • 2020
  • Due to the expansion of cyber space, war patterns are also changing from traditional warfare to cyber warfare. Cyber warfare is the use of computer technology to disrupt the activities of nations and organizations, especially in the defense sector. However, the defense against effective cyber threat environment is inadequate. To complement this, a new cyber warfare operation concept is needed. In this paper, we study the concepts of cyber intelligence surveillance reconnaissance, active defense and response, combat damage assessment, and command control in order to carry out cyber operations effectively. In addition, this paper proposes the concept of cyber warfare operation that can achieve a continuous strategic advantage in cyber battlefield.

Development of Air to Air Mission Tactics for Manned-Unmanned Aerial Vehicles Teaming (공대공 교전을 위한 유무인항공기 협업 전술 개발)

  • Hwang, Seong-In;Yang, Kwang-Jin;Oh, Jihyun;Seol, Hyeonju
    • Journal of the Korean Society for Aeronautical & Space Sciences
    • /
    • v.50 no.1
    • /
    • pp.47-57
    • /
    • 2022
  • UAVs have been deployed various missions such as deception, reconnaissance and attack since they have been applied in battlefield and achieved missions successfully instead of man. In the past, it is impossible for UAVs to conduct autonomous missions or cooperative mission between manned aircraft due to the limitation of the technology. However, theses missions are possible owing to the advance in communication and AI Technology. In this research, we identified the possible cooperative missions between manned and unmanned team based on air-to-air mission. We studied cooperative manned and unmanned tactics about fighter sweep mission which is the core and basic operation among various air-to-air missions. We also developed cooperative tactics of manned and unmanned team by classifying nonstealth and stealth confrontational tactics. Hereafter, we verified the validity of the suggested tactics using computer simulations.

Exercising the Rights of Self-Defense and Using Force in Response to North Korean Provocations (북한의 군사도발에 대응한 군사력 사용과 자위권 행사)

  • Bai, Hyung-Soo
    • Strategy21
    • /
    • s.40
    • /
    • pp.216-234
    • /
    • 2016
  • 본 논문은 자위권 사용과 군사력 사용 간의 관계를 분석하고 이를 한반도 서해에서의 한국과 북한 간 해상긴장 상황에 적용시킨 이슈를 다룬다. 국가가 행사하는 자위권(self-defense: 自衛權)은 기본적으로 전쟁 방지를 위한 기본적 원칙이다. 그러나 이는 군사력 사용(Use of Forces: 軍事力 使用) 또는 무력행사(武力行事)이라는 측면에서 칼의 양날과 같은 결과를 낳는다. 즉 자위권 행사로 전쟁의 확산을 방지하는 반면에 자위권 행사로 상대방에 대한 적성(敵性)을 인정해 주는 경우이다. 반면 북한의 군사도발은 전방향적이며, 1953년 한반도 정전협정 위반이다. 1953년 정전협정 체결 이후 양국은 서해 북방한계선(NLL)에서의 군사적 충돌을 거쳤으며, 이는 과연 한국이 자위권 차원에서의 방어태세와 군사력 사용 측면에서의 대응태세 간에 괴리가 존재하고 있다는 것으로 나타나고 있다. 당연히 피해를 받는 곳은 한국이며, 이는 서해 북방한계선에서의 남북한 해군 간 대결국면에서 나타나고 있다. 이에 본 논문은 자위권을 국가 차원 행사하는 수준과 작전에 투입된 현장 작전 지휘관 차원에서 행사하는 수준으로 구분하여 다룬다. 서해 북방한계선 부근 수역에서의 북한의 해상 군사도발에 대해 현장 작전 지휘관이 행사하는 자위권은 대한민국 정부 차원에서의 자위권 행사와는 다르면, 이 문제를 국제법을 중심으로 분석하기에는 너무나 많은 제한점이 있다. 현행 국제법상 국가 자위권 문제는 군사력을 동반하는 문제로서 그 행사요건이 매우 애매모호하고 까다롭다. 그러나 현장 작전지휘관의 자위권 행사는 단호해야 하며, 이는 군사력 운용으로 나타나야 한다. 실제 서해에서의 남북한 대결국면에서의 대한민국 해군의 자위권 행사는 정전협정에 의거 제한되고 있으며, 이는 2010년 북한의 천안함 침몰과 연평도 폭격도발 시 대한 민국 해군과 해병대의 대응에서 증명되었다. 현재 대한민국 국방부는 현장 작전 지휘관에서 소위 '선제적 자위권 행사' 부여 필요성에 대한 논의를 진행 중으로 알려져 있다. 이에 따라 선제적 자위권 행사를 위한 조치들을 제도화하는 움직임을 보이고 있다. 예를 들면 2013년 발표된 대한민국 합참과 유엔사령부/한미 연합사령부/주한미군사령부 북한 군사 도발에 대한 대응계획(ROK JCS and UNC/CFC/USFK Counter-Provocation Plan)이 이를 간접적으로 증명하고 있다. 선제적 자위권은 행사에 있어 몇 가지 원칙을 요구하고 있으며, 이에 대한 합법성 문제는 아직 해결되고 있지 않다. 따라서 이 문제와 북한 군사도발 시에 대한 대한민국의 선제적 자위권 행사 간 연관성 문제를 어떻게 해석할 수 있는가에 대한 연구가 필요한 실정이다. 평시 군사력 사용에 따른 무력행사의 적법성은 그 인정이 대단히 어려운 것이 현실이며, 이에 따라 북한의 군사도발에 대한 가장 효율적 방안이 선제적 자위권이라면, 이에 대한 법적 대응이 무엇인가에 대한 제도적 근거를 필요로 할 것이다.

A Study on the Military Runway Protection Performance for the Multiple Warheads Attack (다탄두 공격에 대한 군 활주로 방호성능 평가)

  • Hwang, Injae;Han, Jaeduk;You, Seunghan;Kim, Sungkon
    • KSCE Journal of Civil and Environmental Engineering Research
    • /
    • v.40 no.5
    • /
    • pp.521-526
    • /
    • 2020
  • Airfield pavements, such as runways and taxiways, are essential for smooth take-off and landing of fixed-wing aircraft and are the most important installation for the military to carry out air operations during wartime. Therefore, in wartime, it is necessary to reduce the damage to these installations and repair them in the shortest possible time. Recently, the pattern of attack is changing from the use of conventional high explosive which is to create large craters to the use of multiple warheads weapon system which is to effectively attack enemy's airfields but unrelated to accuracy. Hence in this study, through identifying the specification and composition of multiple warheads weapon system, we checked the protection performance and damage patterns of the pavement when explosion occurred on the installed military runway and taxiway by the multiple warheads weapon system. And The multiple warheads weapon systems is able to cause extensive damage but the destructive power of each warhead is not as great, so I would like to propose an airfield pavement design plan for minimal protection against such attacks.

Proposal of Detection Module for Fighter Aircraft Data Modulation Attack (전투기 데이터 변조 공격행위에 대한 탐지모듈 제안)

  • Hong, Byoung-jin;Kim, Wan-ju;Kim, Ho-keun;Lim, Jae-sung
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.1
    • /
    • pp.5-16
    • /
    • 2019
  • Modern state-of-the-art military aviation assets are operated with independent embedded real-time operating systems(RTOS). These embedded systems are made with a high level of information assurance. However, once the systems are introduced and installed on individual platforms for sustaining operational employment, the systems are not actively managed and as a result the platforms become exposed to serious threats. In this paper, we analyzed vulnerability factors in the processing of mission planning data and maintenance-related data for fighter aircraft. We defined the method and form of cyber attacks that modulate air data using these vulnerabilities. We then proposed a detection module for integrity detection. The designed module can preemptively respond to potential cyber threats targeting high - value aviation assets by checking and preemptively responding to malware infection during flight data processing of fighter aircraft.

Analysis and implications of North Korea's new strategic drones 'Satbyol-4', 'Satbyol-9' (북한의 신형 전략 무인기 '샛별-4형', '샛별-9형' 분석과 시사점)

  • Kang-Il Seo;Jong-Hoon Kim;Man-Hee Won;Dong-Min Lee;Jae-Hyung Bae;Sang-Hyuk Park
    • The Journal of the Convergence on Culture Technology
    • /
    • v.10 no.2
    • /
    • pp.167-172
    • /
    • 2024
  • In major wars of the 21st century, drones are expanding beyond surveillance and reconnaissance to include land and air as well as sea and underwater for purposes such as precision strikes, suicide attacks, and cognitive warfare. These drones will perform multi-domain operations, and to this end, they will continue to develop by improving the level of autonomy and strengthening scalability based on the High-Low Mix concept. Recently, drones have been used as a major means in major wars around the world, and there seems to be a good chance that they will evolve into game changers in the future. North Korea has also been making significant efforts to operate reconnaissance and attack drones for a long time. North Korea has recently continued to engage in provocations using drones, and its capabilities are gradually becoming more sophisticated. In addition, with the recent emergence of new strategic Drones, wartime and peacetime threats such as North Korea's use of these to secure surveillance, reconnaissance and early warning capabilities against South Korea and new types of provocations are expected to be strengthened. Through this study, we hope to provide implications by analyzing the capabilities of North Korea's strategic Drones, predicting their operation patterns, and conducting active follow-up research on the establishment of a comprehensive strategy, such as our military's drone deployment and counter-drone system solutions.

C4ISR Systems IDS Performance Enhancing Method (C4ISR 체계 IDS의 성능 향상 방안)

  • Choi, Junesung;Kook, Kwangho
    • Convergence Security Journal
    • /
    • v.12 no.4
    • /
    • pp.57-69
    • /
    • 2012
  • C4ISR system is an important tool for military operational command and control. Therefore, it is frequently exposed to the cyber-terror attempt to paralyze the military command and control system. Generally, the information system uses IDS and firewall as major security computing tools. C4ISR system also uses them as major measures for the information protection. But the usefulness of IDS is reduced due to the frequent false-positives and false-negatives if the behavioral patterns are modified or new behavioral patterns appear. This paper presents new IDS structure which can create modified attack patterns and unexpected attack patterns automatically during IDS probing process. The proposed IDS structure is expected to enhance the information protection capability of the C4ISR system by reducing false-positives and false-negatives through the creation and verification of new attack patterns.

Development and Application of Effect Measurement Tool for Victory Factors in Offensive Operations Using Big Data Analytics (빅데이터를 통한 공격작전 승리요인 효과측정도구 개발 및 분석 : KCTC 훈련사례를 중심으로)

  • Kim, Gak-Gyu;Kim, Dae-Sung
    • Journal of the Korean Operations Research and Management Science Society
    • /
    • v.39 no.2
    • /
    • pp.111-130
    • /
    • 2014
  • For the key factors determining victory of combat, many works have been focusing on qualitative analyses in the past. As military training paradigm changes along with technology developments, demands for scientific analysis to prepare future military strength increase regarding military training results, and big data analysis has opened such possibility. We analyze the data from KCTC (Korea Combat Training Center) training to investigate the factors affected victory in offensive operations. In this context, we develop a way to measure the victory and the factors related to it from existing studies and military doctrines. We first identify Independent variables that affect offensive operations through variable selection and propose a mathematical model to explain combat victory by performing multiple regression analysis. We also verify our results with battalion-level live training data as well as previous studies on victory factors in the military doctrines.

International Law on Drone's Military use - Focuse on Proportionality and Discrimination Principles - (드론의 군사적 활용에 따른 국제법적 쟁점 - 차별의 원칙과 비례성 원칙을 중심으로-)

  • Cho, Hong-Je;Kang, Ho-Jeung
    • The Korean Journal of Air & Space Law and Policy
    • /
    • v.35 no.1
    • /
    • pp.127-152
    • /
    • 2020
  • Despite growing international cooperation for maintenance of international peace and security, wars continue to occur due to conflicted state interests. Continuing conflicts has advanced development of various weapon systems such as global integrated intelligence, surveillance and reconnaissance. However, with a big increase in the number of civilian casualties caused by the weapon systems development, the international community has also advanced diplomatic efforts to minimize deaths of civilian and military personnel. Therefore, it is essential to observe the principle of discrimination between combatants and non-combatants when operating unmanned aerial vehicles (UAVs), better known as drones. Drones have become more capable of distinguishing combatants from non-combatants due to its high-tech prowess. In the operation of drones, any parties involved in combat or the war are responsible for mounting civilian casualties. In addition, it should comply with the principle of proportionality that calls for a balance between results of such action and expected military advantage anticipated from the attack. The rule of proportionality prohibits use of military force which may be expected to cause excessive civilian harm. Drones have been able to track and monitor targets for hours and select the accurate locations of the targets. The aim is to reduce civilian losses and damage to a minimum. Drones meet the standards of Article 51.4 of the Additional Protocol.