• Title/Summary/Keyword: 공격작전

Search Result 89, Processing Time 0.034 seconds

North Korea's Cyber Attack Patterns and Behaviors : An Analysis Based on Cyber Power and Coercion Theory (북한의 대남 사이버공격 양상과 행태 : 사이버파워와 강압이론을 통한 분석)

  • Yoon, Taeyoung;Woo, Jeongmin
    • Convergence Security Journal
    • /
    • v.18 no.1
    • /
    • pp.117-128
    • /
    • 2018
  • The purpose of this paper is to analyze the behavior of North Korea's cyber attack against South Korea since 2009 based on major international security theories and suggest South Korea's policy option. For this purpose, this paper applied the behavioral domain and characteristics of 'cyber power' and 'coercion dynamics' model, which are attracting attention in international security studies. The types of cyber attacks from North Korea are classified into the following categories: power-based incarceration, leadership attacks and intrusions, military operations interference, and social anxiety and confusion. In terms of types and means of cyber power, North Korean GPS disturbance, the Ministry of Defense server hacking and EMP are hard power with high retaliation and threat and cyber money cashing and ransomware are analyzed by force in the act of persuasion and incentive in the point of robbing or asking for a large amount of money with software pawns. North Korea 's cyber attack has the character of escape from realistic sanctions based on the second nuclear test. It is important for South Korea to clearly recognize that the aggressive cyberpower of North Korea is changing in its methods and capabilities, and to ensure that North Korea's actions result in far greater losses than can be achieved. To do this, it is necessary to strengthen the cyber security and competence to simultaneously attack and defend through institutional supplement and new establishment such as cyber psychological warfare, EMP attack preparation, and enhancement of security expertise against hacking.

  • PDF

Hacking attack and vulnerability analysis for unmanned reconnaissance Tankrobot (무인정찰 탱크로봇에 대한 해킹 공격 및 취약점 분석에 관한 연구)

  • Kim, Seung-woo;Park, Dea-woo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.24 no.9
    • /
    • pp.1187-1192
    • /
    • 2020
  • The dronebot combat system is a representative model of the future battlefield in the 4th industrial revolution. In dronebot, unmanned reconnaissance tankrobot can minimize human damage and reduce cost with higher combat power than humans. However, since the battlefield environment is very complex such as obstacles and enemy situations, it is also necessary for the pilot to control the tankrobot. Tankrobot are robots with new ICT technology, capable of hacking attacks, and if there is an abnormality in control, it can pose a threat to manipulation and control. A Bluetooth sniffing attack was performed on the communication section of the tankrobot and the controller to introduce a vulnerability to Bluetooth, and a countermeasure using MAC address exposure prevention and communication section encryption was proposed as a security measure. This paper first presented the vulnerability of tankrobot to be operated in future military operations, and will be the basic data that can be used for defense dronebot units.

Vulnerability Mitigation System Construction Method Based on ATT&CK in M ilitary Internal Network Environment (국방 네트워크 환경에서 ATT&CK 기반 취약점 완화 체계 구축 방안)

  • Ahn, Gwang Hyun;Lee, Hanhee;Park, Won Hyung;Kang, Ji Won
    • Convergence Security Journal
    • /
    • v.20 no.4
    • /
    • pp.135-141
    • /
    • 2020
  • The Ministry of National Defense is strengthening the power and capacity of cyber operations as cyber protection training is conducted. However, considering the level of enemy cyber attack capability, the level of cyber defense capability of the ministry of national defense is significantly low and the protection measures and response system for responding to cyber threats to military networks are not clearly designed, falling short of the level of cyber security capabilities of the public and private sectors. Therefore, this paper is to investigate and verify the establishment of a military internal network vulnerability mitigation system that applies the intention of attackers, tactics, techniques and procedures information (ATT&CK Framework), identified military internal network main threat information, and military information system security requirements with military specificity as factors that can establish a defense network vulnerability mitigation system by referring to the domestic and foreign cyber security framework It has the advantage of having.

A Study on Overseas Battle Cases Using Combat Drone (공격 드론을 활용한 해외 전투사례 연구)

  • Sang-Hyuk Park;Sung-Kwon Kim;Seung-Pil Namgung
    • The Journal of the Convergence on Culture Technology
    • /
    • v.9 no.5
    • /
    • pp.403-407
    • /
    • 2023
  • This study started with the background that future South Korean military organizations should develop a complex system linking unmanned systems by analyzing and considering cases using "drone," which has recently become an essential means of war. In 2014 and 2022, South Korea is facing serious security threats from North Korean drones that have recently invaded South Korea's airspace in a row. If a North Korean drone was loaded with explosives and poisonous gas and invaded our airspace, the damage would be more serious. Furthermore, what the Azerbaijan-Armenian War of 2020 and the ongoing Ukraine-Russia war have in common is that battles using "combat drones" are underway. Watching this shift in the domestic and overseas war paradigm, drones have become essential for military operations. In the context of a "ceasefire" and the military environment on the Korean Peninsula, South Korea should actively develop "Combat drones" that take into account precise strikes and portability against targets linked to military drones.

A Model for Determining Optimal Operating Time of Aircrafts Attacking Multiple Targets (다수 표적을 공격하는 편대항공기의 최적작전시간 결정 모형)

  • Kim Yong-Bok;Min Gye-Ryo
    • Journal of the military operations research society of Korea
    • /
    • v.18 no.1
    • /
    • pp.61-73
    • /
    • 1992
  • Up to the present, the operating time has been studied on only a single aircraft attacking a single target or multiple targets under enemy threats. This study is to determine optimal operating time and appropriate size of aircrafts attacking multiple targets. Measures of mission effectiveness is defined through derivation of the probability of the various events associated with operating. By using these measures, the expected benefit of operating and the expected cost of operating are generated as a function of time. To formulate operating time determination model, the expected gain of operating is defined as the difference between the expected benefit of operating and the expected cost of operating. The model can be used to determine optimal operating time which maximizes the expected gain of operating, and can be used as the basis for determining the appropriate size of aircrafts.

  • PDF

A Study of Fighter-plane Airworthiness Security Certification (전투기 감항 보안 인증에 관한 연구)

  • Kim, HyunJu;Kang, DongSu
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2018.05a
    • /
    • pp.117-120
    • /
    • 2018
  • 최신 전투기로 발전할수록 증가되는 소프트웨어 의존도와 네트워크 중심전으로의 작전 수행 개념의 변화, 그리고 무기체계에 대하여 지속적으로 발전하는 사이버 위협의 증가는 전투기 소프트웨어에 대한 강화된 보안 대책을 요구하고 있다. 이러한 상황의 변화는 전투기의 운용 및 소프트웨어 결함에 대한 감항인증 뿐만 아니라, 전투기 소프트웨어에 대한 사이버 위협의 보안 대책도 함께 요구한다. 따라서 본 연구에서는 항공기 및 시스템 감항 보안 인증기준인 DO-326A와 DO-356을 적용하여 전투기 운용 환경을 고려한 항공무기체계의 특성과 항공기에 대한 사이버 공격에 대해 살펴보고, 이를 바탕으로 감항 보안 프로세스를 적용해 본다.

Evaluating the Operational Capabilities and Security of the IoBT Network Architecture (IoBT 네트워크 환경에서 작전 영역의 보안 대응 체계 연구)

  • Kang, Hae-Young;Lee, Jemin Justin;Kim, Yu-Kyung;Go, Myong-Hyun;Lee, Kyungho
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2021.05a
    • /
    • pp.140-143
    • /
    • 2021
  • IoBT시장은 2023년까지 317억 달러로 성장할 것으로 예측되며, 센서 및 웨어러블 디바이스와 같은 IoBT 장비의 수가 급격히 늘어나고 있다. IoBT 장비들로부터 수집된 생체 정보와 같은 민감한 데이터를 효율적이고 안전하게 처리하기 위해 많은 노력이 필요하다. 하지만 초경량화, 저전력화된 IoBT 장비들은 보안적인 측면에서 취약한 상황이다. 본 논문은 Fog computing을 적용하여 전장과 지휘관 사이에서 결심 및 통제에 필요한 시각화 자료를 신속하게 제공하고 IoBT 장비의 보안 사항과 공격에 따른 완화 기법을 수행할 수 있는 새로운 네트워크 아키텍처를 제공하고자 한다.

Attack Capability Analysis for Securing Self-Survival of Air Defense Weapons (대공방어무기의 자기생존성 확보를 위한 공격능력분석)

  • Kim, Sea Ill;Shin, Jin
    • Journal of the Korea Society for Simulation
    • /
    • v.30 no.3
    • /
    • pp.11-17
    • /
    • 2021
  • The 30mm anti-aircraft gun has been developed with various types of weapon systems such as protective, protective complex, and wheel-type anti-aircraft artillery. The role of this anti-aircraft gun is an important anti-aircraft weapon in charge of air defense. Anti-aircraft weapons are tasked with defending the airspace from aircraft attacks. In particular, anti-aircraft weapons are organized in combination with mechanized units. And anti-aircraft weapons are prone to attack by enemies because they operate on the front lines of the battlefield. The enemy is expected to attack our troops by covering up or concealing as much as possible in order to increase their viability. Therefore, this study analyzed whether our 30mm anti-aircraft bullets could subdue the enemy in cover. This study analyzed the performance of 30mm anti-aircraft bullets using the M&S technique. For this study, live shooting and simulation method by M&S were used for the experiment. In this study, steel plate and plywood were used for the live shooting experiment. In addition, in the simulation process through M&S, this study used the PRODAS model, AUTODYN model, and Split-x model to analyze the trajectory, penetration, and fragmentation capability of 30mm anti-aircraft bullets. According to the experimental results, it has been proven that 30mm anti-aircraft bullets can destroy enemy armored vehicles. 30mm anti-aircraft bullets succeeded in quickly subduing enemies concealed in general buildings or forests. In this way, it was possible to minimize damage to allies in advance.

A Study on Defense and Attack Model for Cyber Command Control System based Cyber Kill Chain (사이버 킬체인 기반 사이버 지휘통제체계 방어 및 공격 모델 연구)

  • Lee, Jung-Sik;Cho, Sung-Young;Oh, Heang-Rok;Han, Myung-Mook
    • Journal of Internet Computing and Services
    • /
    • v.22 no.1
    • /
    • pp.41-50
    • /
    • 2021
  • Cyber Kill Chain is derived from Kill chain of traditional military terms. Kill chain means "a continuous and cyclical process from detection to destruction of military targets requiring destruction, or dividing it into several distinct actions." The kill chain has evolved the existing operational procedures to effectively deal with time-limited emergency targets that require immediate response due to changes in location and increased risk, such as nuclear weapons and missiles. It began with the military concept of incapacitating the attacker's intended purpose by preventing it from functioning at any one stage of the process of reaching it. Thus the basic concept of the cyber kill chain is that the attack performed by a cyber attacker consists of each stage, and the cyber attacker can achieve the attack goal only when each stage is successfully performed, and from a defense point of view, each stage is detailed. It is believed that if a response procedure is prepared and responded, the chain of attacks is broken, and the attack of the attacker can be neutralized or delayed. Also, from the point of view of an attack, if a specific response procedure is prepared at each stage, the chain of attacks can be successful and the target of the attack can be neutralized. The cyber command and control system is a system that is applied to both defense and attack, and should present defensive countermeasures and offensive countermeasures to neutralize the enemy's kill chain during defense, and each step-by-step procedure to neutralize the enemy when attacking. Therefore, thist paper proposed a cyber kill chain model from the perspective of defense and attack of the cyber command and control system, and also researched and presented the threat classification/analysis/prediction framework of the cyber command and control system from the defense aspect

Mission Task & Workload Analysis of Armed Helicopter (무장헬기 임무절차 수립 및 임무하중 분석 연구)

  • Park, Hyojin;Lee, Jinwoo;Lee, Minwoo;Park, Sang C.;Kwon, Yongjin;Lee, Jonghoon
    • Journal of the Korea Society for Simulation
    • /
    • v.21 no.4
    • /
    • pp.25-33
    • /
    • 2012
  • Armed helicopter is an integral part of armed forces, which conducts vital missions, such as anti-armor attack, close air support, escorting air assault operations, and reconnaissance. A typical cockpit arrangement of armed helicopters has been a tandem configuration. This is to reduce the frontal area, which in turn increases the forward speed as well as reduces the chance of being hit by enemy fires. However, many armed helicopters in the world are now being developed as a side-by-side configuration. Such configuration is quite different from the conventional cockpit arrangement in light of the crew communications and situational awareness. Therefore, the main objective of this study is to find the optimized combination of mission tasks among pilots in a side-by-side configuration cockpit by measuring the workload using the NASA Task Load Index method. The experimental results indicate that the workload of crew members differ as disparate tasks are being performed.