• Title/Summary/Keyword: 군사위협

Search Result 188, Processing Time 0.028 seconds

Algorithm for Threat Data Integration of Multiple Sensor and selection of CounterMeasures (이기종 다중센서 위협데이터 통합 및 대응책 선정 알고리즘)

  • Go, Eun-Kyoung;Woo, Sang-Min;Jeong, Un-Seob
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.14 no.3
    • /
    • pp.474-481
    • /
    • 2011
  • The Electronic Warfare Computer for the Aircraft Survivability Equipment will improve the ability for countermeasures by analysis about threat information. This paper suggests method that threat data integration of multiple sensors(Radar Warning Receiver, Laser Warning Receiver, Missile Warning Receiver). The algorithm of threat data integration is based on detected threat sequence and azimuth information. The threat sequence information is analyzed in advance and the azimuth data is received from sensors. The suggested method is evaluated through simulation under the environment like real helicopter.

The Threat List Acquisition Method in an Engagement Area using the Support Vector Machines (SVM을 이용한 교전영역 내 위협목록 획득방법)

  • Koh, Hyeseung
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.19 no.2
    • /
    • pp.236-243
    • /
    • 2016
  • This paper presents a threat list acquisition method in an engagement area using the support vector machines (SVM). The proposed method consists of track creation, track estimation, track feature extraction, and threat list classification. To classify the threat track robustly, dynamic track estimation and pattern recognition algorithms are used. Dynamic tracks are estimated accurately by approximating a track movement using position, velocity and time. After track estimation, track features are extracted from the track information, and used to classify threat list. Experimental results showed that the threat list acquisition method in the engagement area achieved about 95 % accuracy rate for whole test tracks when using the SVM classifier. In case of improving the real-time process through further studies, it can be expected to apply the fire control systems.

The Design and Implementation of Simulated Threat Generator based on MITRE ATT&CK for Cyber Warfare Training (사이버전 훈련을 위한 ATT&CK 기반 모의 위협 발생기 설계 및 구현)

  • Hong, Suyoun;Kim, Kwangsoo;Kim, Taekyu
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.22 no.6
    • /
    • pp.797-805
    • /
    • 2019
  • Threats targeting cyberspace are becoming more intelligent and increasing day by day. To cope with such cyber threats, it is essential to improve the coping ability of system security officers. In this paper, we propose a simulated threat generator that automatically generates cyber threats for cyber defense training. The proposed Simulated Threat Generator is designed with MITRE ATT & CK(Adversarial Tactics, Techniques and Common Knowledge) framework to easily add an evolving cyber threat and select the next threat based on the threat execution result.

Counter-Drone System Evaluation Framework induced by RMA Thinking Process (군사혁신(RMA) 사고과정을 적용한 대드론체계 평가 기준(안) 정립)

  • Sang-Keun Cho;In-keun Son;Ki-Won Kim;Kang-Il Seo;Kwonil Kim;Sang-Hyuk Park
    • The Journal of the Convergence on Culture Technology
    • /
    • v.9 no.4
    • /
    • pp.277-281
    • /
    • 2023
  • Recent aggressive threats by North Korea using small drones have heavily impacted on ROK(Republic of Korea) society and it seems to be agreed that counter-drone systems are required to protect our properties. ROK government has been investigating current counter-drone systems for national important facilities. However, there is no consensus standard to evaluate the systems. This paper is to propose a counter-drone system evaluation framework which is the outcome through RMA(Revolution in Military Affairs) thinking process. The RMA thinking process is currently well-implemented in ROK army to develop future military strategy. The proposed framework has 4 categories - threat analysis of North Korea small drones, convergence of detection, tracking and neutralizing systems, integrated operations and available experts and organization - which have corresponding criteria.

Optimized Evaluation of Counter Drone System for Defending National Major Facilities through a Thinking Process of RMA (군사혁신(RMA) 사고과정을 적용한 국가중요시설 대드론체계 평가점검표 최적화)

  • Sang-Keun Cho;Ki-Won Kim;In-keun Son;Cook Rhie;Hyun-Ho Choi;Kang-Il Seo;Sang-Hyuk Park
    • The Journal of the Convergence on Culture Technology
    • /
    • v.9 no.6
    • /
    • pp.789-793
    • /
    • 2023
  • Evalution of counter drone systems is conducted in order to designate plausible countermeasues against possible drone threats, assess the level of safety of national major facilities and derive complementary measures for detected weakness. Recently drone threats by North Korea have heavily impacted ROK(Republic of Korea) people and it has been stronly stressed to build efficient counter drone system for make the society protected and secured against drone threats. The researchers has conducted field investigations for some of national major facilites. There is, however, no standardized evaluation checklist, so we have proposed an evaluation checklist for counter drone systems though thinking process of RMA(Revolution in Military Affairs). This paper is to introduce the evaluation checklist for properly diagnosing each counter drone system.

Development Directions for Enhanced Protection of National Mjor Facilities Countering Drone Threats (국가중요시설 방호력 강화를 위한 대드론체계 발전 방향)

  • Sang-Keun Cho;Ki-Won Kim;In-keun Son;Kang-Il Seo;Min-seop Jung;Sang-Hyuk Park
    • The Journal of the Convergence on Culture Technology
    • /
    • v.9 no.3
    • /
    • pp.257-262
    • /
    • 2023
  • Recently there are increasing number of claims that it is necessary to build a countermeasure in case of aggressive threats by small drones. During Russia-Ukraine war ignited by Russian invasion on February 2022, attacking drones have been being used widely to damage other country's national major facilities. On December 2022, 5 drones sent by North Korea made a flight around Seoul, South Korea about 7 hours, but it was not successful to search and track them. Furthermore, none of these were destroyed and shot down. Counter-drone system is essential system to search and identify unintended small drones and disable them. This paper is for proposing required functions for building a counter-drone system for national major facilities. We conducted focus group interviews with relevant government officials and analyzed their suggestions on how to augment protection capabilities to defend against small drone attacks.

North Korean military provocations and the corresponding direction - Focus on the threat that resulted in unequal power wood box mines provocation - (북한군의 군사적 도발 및 대응방향 - 목함 지뢰 도발에 이어진 비대칭전력 위협을 중심으로-)

  • Kim, Gyu Nam
    • Convergence Security Journal
    • /
    • v.15 no.6_1
    • /
    • pp.59-67
    • /
    • 2015
  • Our vision is to see the North and there is a large visual target that the two exchanges and cooperation and unity that put the main enemy of enemies in mind in need. North Korea is the main enemy was illegal invasion June 25, 1950 July 27, 1953 has continued after the armistice join the illegal provocations and cease fire violations so far. August 4, 2015, North Korea was operating by the power differential that operate on an all-out war and declared the initial state after the exhibition gave another provocative DMZ wood box mines. US-ROK military was in the process of real-time detection of the North Korean power operation and the results were broadcast live through the media. Looking at these military provocations on the threat of asymmetrical power of North Korea's military threat, we would like to present how to respond.

저고도 대공방어 무기체계-균형유지의 필요성을 중심으로

  • Son, Seong-Yun
    • Defense and Technology
    • /
    • no.3 s.229
    • /
    • pp.80-91
    • /
    • 1998
  • 오늘날 기동하는 장갑부대 및 기계화부대등 고가의 군사자산 보호는 제5의 위협으로 상정한바 있는 지상공격기(항공기, 유도미사일, 무인항공기 등)의 다양한 공격위협과 교전할 수 있는 전천후 방공능력이 절실히 요구되고 있기 때문에 서방 선진국은 저고도용 지대공 미사일(스팅어, 스타버스트, 미스트랄, RBS-70, 이글라 등)개발과 단일 장갑 차량에 "복합 방공무기체계"를 경쟁적으로 개발 및 운용하고, 중단거리 기동 방공체계를 연구 개발중이다. 특히 고도로 유동적인 장차전의 전장환경에서 적은 최신 무기로 공중침투 공격을 감행할 것으로 예상된다. 따라서 이 글에서는 선진국의 "저고도 대공방어 무기체계"를 고찰하고자 한다.

  • PDF

국방비의 배분과 투자방향

  • Jeong, Gi-Hyeon
    • Defense and Technology
    • /
    • no.11 s.285
    • /
    • pp.22-31
    • /
    • 2002
  • 많은 군사전문가들은 국방비를 국가생존권을 보장하고 국민이 생명가 재산을 보호하기 위한 '안보보험료'로 규정하곤 한다. 그러나 군관계자와 일반국민의 안보위협에 관한 인식의 차이는 90년대 이후 국방비가 1인당 자동차 보험료 수준보다도 낮은 수준으로 급격히 삭감배분되는 결과를 가져왔다. 이로 인하여 '선진 정예국방' 건설을 위해 추진중인 주요 전력증강 투자사업들이 순연되거나 축소되는 결과를 가져왔을 뿐만 아니라, 그 동안 어렵게 육성해 온 방위산업기반의 약화를 초래하였다. 이러한 문제점을 극복하고, 장차 남북간 화해협력과 평화통일을 힘으로 뒷받침하고 다양한 안보위협에 능동적으로 대처할 수 있는 국가 방위력을 갖추기 위해서는 GDP대비 3-4% 수준이상의 국방비가 매년 안정적으로 배분되는 것이 긴요하다는 것을 강조하고 싶다.

  • PDF

사이버전에 관한 주요국의 견해

  • 박상서;박춘식
    • Review of KIISC
    • /
    • v.14 no.6
    • /
    • pp.70-74
    • /
    • 2004
  • 사이버전의 위협과 발생 가능성에 대한 찬반 양론이 있기는 하지만, 분명한 것은 향후 사이버공간에서의 또는 사이버공간을 매개체로 한 분쟁은 분명히 커다란 위협으로 대두될 것이라는 것이다. 이에 따라, 주요국들은 각국이 처한 상황과 국가 정책 등에 따라 각각 사이버전의 개념을 정립해 나아가고 있다. 또한, 사이버전을 군사적인 측면뿐 아니라 경제적인 측면과 범죄의 관점에서 바라보고 있기도 하다. 본 고에서는 사이버전에 관련된 주요국가의 기본적인 견해를 정리한다.