• Title/Summary/Keyword: 공격 미사일

Search Result 66, Processing Time 0.029 seconds

Vulnerability Case Analysis of Wireless Moving Vehicle (무선이동체의 취약점 사례 분석)

  • Oh, Sangyun;Hong, Jinkeun
    • Journal of the Korea Convergence Society
    • /
    • v.9 no.8
    • /
    • pp.41-46
    • /
    • 2018
  • As the industry related to drones has been activated, the public interest in drones has increased explosively, and many cases of drone-using are increasing. In the case of military drones, the security problem is the level of defense of the aircraft or cruise missiles, but commercial small and low cost drones are often released and utilized without security count-measure. This makes it possible for an attacker to easily gain access to the root of the drones, access internal files, or send fake packets. However, this droning problem can lead to another dangerous attack. In this regard, this paper has identified the vulnerabilities inherent in the commercial drones by analyzing the attack cases in the communication process of the specific drones. In this paper, we analyze and test the vulnerability in terms of scanning attack, meson attack, authentication revocation attack, packet stop command attack, packet retransmission attack, signal manipulation and de-compile attack. This study is useful for the analysis of drones attack and vulnerability.

Military Competition and Arms Control in Space (우주상 군비경쟁과 군비통제)

  • Shin, Dong-Chun;Cho, Hong-Je
    • The Korean Journal of Air & Space Law and Policy
    • /
    • v.26 no.2
    • /
    • pp.203-237
    • /
    • 2011
  • Since USSR successfully launched its satellite "Sputnik"in 1957, many countries including US and USSR began military use of space, and engaged in arms race in space, which is against spirit and ideals of peaceful use of space as common heritage of mankind stipulated in many treaties such as Outer Space Treaty. With worsening Cold War between East and Western Bloc, this military use of space and arms race in space has been intensifying. Regarding the ideals of peaceful use of space, it is interpreted that military use of space is possible unless it does not have the purpose of aggression. The military use of space may have diverse forms such as attacking satellites in space, or attacking from satellites, making use of present and future technologies available which should include the use of nuclear and kinetic/hyper-speed weapons, laser, particle beams, near explosion, disturbance weapons in different directions (i.e., surface to space, space to space, and space to surface). Arms control is being implemented by the efforts of many countries in different formalities including legislature of international treaties under the auspices of UNCOPUOS and prohibition of weapons of mass destruction. Taking outstanding examples aiming at arms control by international community, there are confidence building measures (CBM), strengthening implementation of existing treaties, partial ban of nuclear tests, countryand regional approach, comprehensive approach and measures having legally binding force. While U.S. has surpassed other countries concerned in the area of military useof space, it withdrew from OST in early 2000s, thereby raising concern of international community. It requires concerted efforts of cooperationand implementation by international society to make sure peace of mankind and environmental conservation through arms control in space. Observing de facto possession of nuclear weapons by North Korea following series of nuclear tests and launching satellites, and efforts of launching rockets by South Korea, it is strongly needed for both countries to take part in arms control efforts by international community.

  • PDF

A Study on Defense and Attack Model for Cyber Command Control System based Cyber Kill Chain (사이버 킬체인 기반 사이버 지휘통제체계 방어 및 공격 모델 연구)

  • Lee, Jung-Sik;Cho, Sung-Young;Oh, Heang-Rok;Han, Myung-Mook
    • Journal of Internet Computing and Services
    • /
    • v.22 no.1
    • /
    • pp.41-50
    • /
    • 2021
  • Cyber Kill Chain is derived from Kill chain of traditional military terms. Kill chain means "a continuous and cyclical process from detection to destruction of military targets requiring destruction, or dividing it into several distinct actions." The kill chain has evolved the existing operational procedures to effectively deal with time-limited emergency targets that require immediate response due to changes in location and increased risk, such as nuclear weapons and missiles. It began with the military concept of incapacitating the attacker's intended purpose by preventing it from functioning at any one stage of the process of reaching it. Thus the basic concept of the cyber kill chain is that the attack performed by a cyber attacker consists of each stage, and the cyber attacker can achieve the attack goal only when each stage is successfully performed, and from a defense point of view, each stage is detailed. It is believed that if a response procedure is prepared and responded, the chain of attacks is broken, and the attack of the attacker can be neutralized or delayed. Also, from the point of view of an attack, if a specific response procedure is prepared at each stage, the chain of attacks can be successful and the target of the attack can be neutralized. The cyber command and control system is a system that is applied to both defense and attack, and should present defensive countermeasures and offensive countermeasures to neutralize the enemy's kill chain during defense, and each step-by-step procedure to neutralize the enemy when attacking. Therefore, thist paper proposed a cyber kill chain model from the perspective of defense and attack of the cyber command and control system, and also researched and presented the threat classification/analysis/prediction framework of the cyber command and control system from the defense aspect

함정용 전투체계 개발동향 및 전망 (1)

  • Kim, Yeong-Gil
    • Defense and Technology
    • /
    • no.3 s.169
    • /
    • pp.28-35
    • /
    • 1993
  • 미래의 4차원 교전 개념은 항공기, 수상함, 잠수함 및 육상기지로부터 미사일에 의한 동시다발적인 원거리 정밀 공격능력으로 특징지어지는 위협특성과 함정자체의 센서와 무기의 능력향상으로 인한 전투공간의 확대에서 비롯된다고 볼수 있습니다. 그러나 이러한 전장환경의 변화는 표적의 조기탐지 및 식별, 전투공간 확대로 인해 그 수량이 폭발적으로 증가되는 정보의 처리, 제한된 함정자원을 활용하여 자함의 생존성을 극대화시켜야 하는 문제를 야기시키게 되었으며, 이와 같은 문제를 해결하고자 제시된 대안이 통합 전투체계의 개발인 것입니다

  • PDF

우주방위-기술한계는 어디인가

  • Mun, Sin-Haeng
    • Defense and Technology
    • /
    • no.12 s.142
    • /
    • pp.54-59
    • /
    • 1990
  • 명백히 현재 군사부문에서 얻어지고 있는 순수한 과학적 지식은 종래에는 민간부문의 많은 분야에서 응용될수 있을 것이다. 미사일을 공격하기 위한 고출력 자유전자 레이저는 이미 의학분야에서 응용되고 있다. 이 밖에도 다른 많은 파괴를 위한 개발노력들이 유용하게 응용될수 있다고 가정하는 것은 무리가 아니다. 이제 미국과 소련이 전략방어체제에 실체적인 발전을 이루고 있으므로 협력만이 앞으로 계속해 나갈수 있는 유일한 길이다. 무엇보다도 상호경쟁을 제거해 나감으로써 예산을 절감할수 있고, 새로운 기술의 평화적 이용을 극대화시킬수 있을 것이다

  • PDF

A Study on Detecting Black IPs for Using Destination Ports of Darknet Traffic (다크넷 트래픽의 목적지 포트를 활용한 블랙 IP 탐지에 관한 연구)

  • Park, Jinhak;Kwon, Taewoong;Lee, Younsu;Choi, Sangsoo;Song, Jungsuk
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.27 no.4
    • /
    • pp.821-830
    • /
    • 2017
  • The internet is an important infra resource that it controls the economy and society of our country. Also, it is providing convenience and efficiency of the everyday life. But, a case of various are occurred through an using vulnerability of an internet infra resource. Recently various attacks of unknown to the user are an increasing trend. Also, currently system of security control is focussing on patterns for detecting attacks. However, internet threats are consistently increasing by intelligent and advanced various attacks. In recent, the darknet is received attention to research for detecting unknown attacks. Since the darknet means a set of unused IP addresses, no real systems connected to the darknet. In this paper, we proposed an algorithm for finding black IPs through collected the darknet traffic based on a statistics data of port information. The proposed method prepared 8,192 darknet space and collected the darknet traffic during 3 months. It collected total 827,254,121 during 3 months of 2016. Applied results of the proposed algorithm, black IPs are June 19, July 21, and August 17. In this paper, results by analysis identify to detect frequency of black IPs and find new black IPs of caused potential cyber threats.

GPS Jamming Techniques and Anti-Jamming GPS Technologies (GPS 재밍 기법과 항재밍 GPS 기술)

  • Jo, In-hwa;Kim, Hyeong-suk;Park, Tae-yong
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2015.10a
    • /
    • pp.573-575
    • /
    • 2015
  • Positioning system using satellite GPS is used at positioning, navigation, acquisition time information and other various field and taking an important part precision guided weapon such as missile. But commercial code(C/A code) do not have ECCM. Therefore commercial code is vulnerable to various jamming techniques and noise jamming from near station can attack even the encrypted military code(P code) GPS. In this paper, GPS jamming techniques, North Korean GPS jamming cases and anti-jamming GP S technologies are surveyed and described.

  • PDF

A Study on the Analysis of R&D Trends and the Development Plan of Electronic Attack System (전자공격체계 연구개발 동향 분석과 발전방안에 대한 연구)

  • Sim, Jaeseong;Park, Byoung-Ho
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.22 no.6
    • /
    • pp.469-476
    • /
    • 2021
  • An electronic attack (EA) system is an essential weapon system for performing electronic warfare missions that contain signal tracking and jamming against multiple threats using electromagnetic waves, such as air defense radars, wireless command and communication networks, and guided missiles. The combat effectiveness can be maximized, and the survivability of militarily protecting combat power can be enhanced through EA mission operations, such as disabling the functions of multiple threats. The EA system can be used as a radio frequency jamming system to respond to drone attacks on the core infrastructure, such as airports, power plants, and communication broadcasting systems, in the civilian field. This study examined the criteria for classification according to the electronic attack missions of foreign EA systems based on an aviation platform. The foreign R&D trends by those criteria were investigated. Moreover, by analyzing the R&D trends of domestic EA systems and future battlefields in the domestic security environments, this paper proposes technological development plans of EA systems suitable for the future battlefield environments compared to the foreign R&D trends.

A Study on Collection and Analysis Method of Malicious URLs Based on Darknet Traffic for Advanced Security Monitoring and Response (효율적인 보안관제 수행을 위한 다크넷 트래픽 기반 악성 URL 수집 및 분석방법 연구)

  • Kim, Kyu-Il;Choi, Sang-So;Park, Hark-Soo;Ko, Sang-Jun;Song, Jung-Suk
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.6
    • /
    • pp.1185-1195
    • /
    • 2014
  • Domestic and international CERTs are carrying out security monitoring and response services based on security devices for intrusion incident prevention and damage minimization of the organizations. However, the security monitoring and response service has a fatal limitation in that it is unable to detect unknown attacks that are not matched to the predefined signatures. In recent, many approaches have adopted the darknet technique in order to overcome the limitation. Since the darknet means a set of unused IP addresses, no real systems connected to the darknet. Thus, all the incoming traffic to the darknet can be regarded as attack activities. In this paper, we present a collection and analysis method of malicious URLs based on darkent traffic for advanced security monitoring and response service. The proposed method prepared 8,192 darknet space and extracted all of URLs from the darknet traffic, and carried out in-depth analysis for the extracted URLs. The analysis results can contribute to the emergence response of large-scale cyber threats and it is able to improve the performance of the security monitoring and response if we apply the malicious URLs into the security devices, DNS sinkhole service, etc.

Development of an electronic protection simulator using decoy antenna (디코이 안테나를 이용한 전파회피 시뮬레이터 개발)

  • Lim, Joong-Soo;Chae, Gyoo-Soo;Kim, Min-Nyun
    • Proceedings of the KAIS Fall Conference
    • /
    • 2010.11a
    • /
    • pp.134-137
    • /
    • 2010
  • 본 논문에서는 대방미사일(ARM: Anti Radiation Missile)로부터 레이다를 보호하기 위하여 디코이 안테나를 이용한 전파회피기술을 효과적으로 모의하기위한 시뮬레이터를 제안하자 한다. 제안된 시뮬레이터는 디코이(Decoy) 안테나의 효과적인 배치와 ARM 수신기에 수신되는 전파의 특성 분석이 가능하도록 설계되었다. 디코이 안테나의 배치 효과를 검증하기위해서 ARM 수신기에 도달하는 디코이 안테나 신호의 위상과 진폭을 분석 결과를 제시하였다. 또한 다수 디코이 안테나를 사용하는 경우 ARM의 공격효과를 다양하게 분석하였으며 ARM 방어를 위한 효과적인 디코이 배치에 유용하게 활용 될 것이다.

  • PDF