• Title/Summary/Keyword: 방어시스템

Search Result 691, Processing Time 0.03 seconds

Design and Application of the TFM Based System Test Model for the Weapon System Embedded Software (무기체계 임베디드 소프트웨어에 대한 TFM 기반 시스템 테스트 모델 설계 및 적용)

  • Kim, Jae-Hwan;Yoon, Hee-Byung
    • The KIPS Transactions:PartD
    • /
    • v.13D no.7 s.110
    • /
    • pp.923-930
    • /
    • 2006
  • In this paper we design the system test model for the weapon system embedded software based on the Time Factor Method(TFM) considering time factors and suggest the results through the case study. For doing this, we discuss the features, system tests and the object-oriented model based UML notations of the weapon system embedded software. And we give a test method considering time factors, a measuring method to time factors, and a test case selection algorithm as an approach to the TFM for designing the system test model. The TFM based system test model consists of three factors (X, Y, Z) in the weapon system embedded software. With this model, we can extract test cases through the selection algorithm for a maximum time path in 'X', identify the objects related to the Sequence Diagram in 'Y' and measure the execution time of each objects which is identified by the Timing Diagram in 'Z' Also, we present the method of extracting the system test cases by applying the proposed system test model to the 'Multi-function missile defense system'.

A Study of Development of Diagnostic System for Web Application Vulnerabilities focused on Injection Flaws (Injection Flaws를 중심으로 한 웹 애플리케이션 취약점 진단시스템 개발)

  • Kim, Jeom-Goo;Noh, Si-Choon;Lee, Do-Hyeon
    • Convergence Security Journal
    • /
    • v.12 no.3
    • /
    • pp.99-106
    • /
    • 2012
  • Today, the typical web hacking attacks are cross-site scripting(XSS) attacks, injection vulnerabilities, malicious file execution and insecure direct object reference included. Web hacking security systems, access control solutions, access only to the web service and flow inside but do not control the packet. So you have been illegally modified to pass the packet even if the packet is considered as a unnormal packet. The defense system is to fail to appropriate controls. Therefore, in order to ensure a successful web services diagnostic system development is necessary. Web application diagnostic system is real and urgent need and alternative. The diagnostic system development process mu st be carried out step of established diagnostic systems, diagnostic scoping web system vulnerabilities, web application, analysis, security vulnerability assessment and selecting items. And diagnostic system as required by the web system environment using tools, programming languages, interfaces, parameters must be set.

Evaluation of flood runoff reduction facilities based on the decrease in CN: case studies from Gimcheon Pyeonghwa district (CN 저감을 기반으로 한 홍수유출저감시설의 평가: 김천 평화분구지역을 중심으로)

  • Zhu, Ju Hua;Lee, Hyungtaek;Yoo, Chulsang
    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 2016.05a
    • /
    • pp.247-247
    • /
    • 2016
  • 최근 한국은 지구환경 변화에 따른 기후변화 영향으로 집중호우로 인한 도시홍수가 급증하고 있다. 기상변화에 의한 집중호우와 급증된 도시화로 인해 불투수면적이 증가하고, 이는 홍수시 유출량을 증가시켜 기존 하도 또는 내배수 시스템의 적정 소통량을 초과하여 홍수를 발생시킨다. 그리하여 홍수피해를 저감하기 위해 구조적 및 비구조적 홍수방어대책들이 마련되어 시행하고 있다. 하지만 내수배제시설의 경우, 기존의 치수계획이 빗물펌프장 등 일부 구조물에 한정되어 있기에 해당 홍수방어시설에 과도한 부담이 있는 실정이다. 따라서 유역 내에 투수면적을 최대한 확보하여 토양의 수문학적 특성을 유지 보전시켜 첨두유량, 도달시간, 직접유출량을 도시 개발 이전상태와 최대한 유사하도록 하는 홍수유출저감시설을 설치하여 빗물펌프장과 같은 홍수방어시설에 대한 과부하를 덜어준다. 이러한 홍수유출저감시설은 크게 저류시설과 침투시설로 구분된다. 홍수유출저감시설들은 해당 지역의 입지특성, 재해저감효과 및 제약조건에 따라 설치 위치 및 규모가 결정된다. 또한 저감효과는 CN 값의 변화로 정량화하여 시설의 적합성을 판단할 수 있다. 본 연구에서는 SWMM 모형을 이용하여 김천시의 평화배수분구지역을 대상으로 CN 저감을 기반으로 한홍수유출저감시설을 평가하고자 한다.

  • PDF

Study of Adversarial Attack and Defense Deep Learning Model for Autonomous Driving (자율주행을 위한 적대적 공격 및 방어 딥러닝 모델 연구)

  • Kim, Chae-Hyeon;Lee, Jin-Kyu;Jung, Eun;Jung, Jae-Ho;Lee, Hyun-Jung;Lee, Gyu-Young
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2022.11a
    • /
    • pp.803-805
    • /
    • 2022
  • 자율주행의 시대가 도래함에 따라, 딥러닝 모델에 대한 적대적 공격 위험이 함께 증가하고 있다. 카메라 기반 자율주행차량이 공격받을 경우 보행자나 표지판 등에 대한 오분류로 인해 심각한 사고로 이어질 수 있어, 자율주행 시스템에서의 적대적 공격에 대한 방어 및 보안 기술 연구가 필수적이다. 이에 본 논문에서는 GTSRB 표지판 데이터를 이용하여 각종 공격 및 방어 기법을 개발하고 제안한다. 시간 및 정확도 측면에서 성능을 비교함으로써, 자율주행에 최적인 모델을 탐구하고 더 나아가 해당 모델들의 완전자율주행을 위한 발전 방향을 제안한다.

An Agent based Emergency Warning System for Dealing With Defensive Information Warfare in Strategic Simulation Exercises (전략시뮬레이션 훈련에서의 방어적 정보전을 위한 에이전트 기반 위기경보시스템의 개발)

  • Lee Yong-Han;Kumara Soundar R.T.
    • Journal of Intelligence and Information Systems
    • /
    • v.10 no.3
    • /
    • pp.11-26
    • /
    • 2004
  • Software for analyzing documents on the net to detect specific categories of occurrences is in great demand. In the current world where detecting terrorist threats is critical there is a great need for such systems. One of the critical application areas of such software is the automatic detection of a national infrastructure emergency. In this research an agent-based generic architecture for emergency warning systems is proposed and implemented. This system, called the National Infrastructure Emergency Warning System (NIEWS), is designed to analyze given documents, to detect threats, and to report possible threats with the necessary information to the appropriate users autonomously. In addition, a systematic analysis framework to detect emergencies on the subject of defensive information warfare is designated and implemented through a knowledge base. The developed system along with the knowledge base is implemented and successfully deployed to Strategic Crisis Exercise (SCE) at the United State Army War College (USAWC), saving a good amount of money by replacing human SMEs (subject matter experts) in the SCE.

  • PDF

Optimal Weapon-Target Assignment of Multiple Dissimilar Closed-In Weapon Systems Using Mixed Integer Linear Programming (혼합정수선형계획법을 이용한 다수 이종 근접 방어 시스템의 최적 무장 할당)

  • Roh, Heekun;Oh, Young-Jae;Tahk, Min-Jea;Jung, Young-Ran
    • Journal of the Korean Society for Aeronautical & Space Sciences
    • /
    • v.47 no.11
    • /
    • pp.787-794
    • /
    • 2019
  • In this paper, a Mixed Integer Linear Programming(MILP) approach for solving optimal Weapon-Target Assignment(WTA) problem of multiple dissimilar Closed-In Weapon Systems (CIWS) is proposed. Generally, WTA problems are formulated in nonlinear mixed integer optimization form, which often requires impractical exhaustive search to optimize. However, transforming the problem into a structured MILP problem enables global optimization with an acceptable computational load. The problem of interest considers defense against several threats approaching the asset from various directions, with different time of arrival. Moreover, we consider multiple dissimilar CIWSs defending the asset. We derive a MILP form of the given nonlinear WTA problem. The formulated MILP problem is implemented with a commercial optimizer, and the optimization result is proposed.

Technical Review of the IAEA Regulations for Transportation of Radioactive Materials and Major Revision in the 1996 IAEA Safety Standard Series No. ST-l (IAEA 방사성물질 안전운송규정에 대한 요약과 1996년도판 개정의 요점)

  • Yoon, Jeong-Hyoun;Kim, Chang-Lak;Cho, Gyu-Seong;Choi, Heui-Joo;Park, Joo-Wan
    • Journal of Radiation Protection and Research
    • /
    • v.23 no.3
    • /
    • pp.197-210
    • /
    • 1998
  • Regulations for the safe transport of radioactive material published by IAEA Safety Standard Series ST-l is reviewed and summarized. Safety Series No.115(International standard of radiation protection and safety for ionizing radiation and radiation sources), which reflected the new recommendation of ICRP60 published in 1991, has been a important encouragement for IAEA to revise their safety series related to the transportation of radioactive materials. IAEA Safety, Standard Series No. ST-l is summarized by comparing IAEA Safety Series No.6 regarding radiation protection system and its implementation, technical standards of packages, concept of Q system and exemption of regulation. The IAEA regulations of transportation of radioactive materials is summarized from the viewpoint of radiation protection and safety assessment. Research on transportation system of radioactive waste is suggested as a further study.

  • PDF

Secure Routing Mechanism to Defend Multiple Attacks in Sensor Networks (무선 센서 네트워크에서 다중 공격 방어를 위한 보안 라우팅 기법)

  • Moon, Soo-Young;Cho, Tae-Ho
    • Journal of Intelligence and Information Systems
    • /
    • v.16 no.1
    • /
    • pp.45-56
    • /
    • 2010
  • Sensor Networks are composed of many sensor nodes, which are capable of sensing, computing, and communicating with each other, and one or more sink node(s). Sensor networks collect information of various objects' identification and surrounding environment. Due to the limited resources of sensor nodes, use of wireless channel, and the lack of infrastructure, sensor networks are vulnerable to security threats. Most research of sensor networks have focused on how to detect and counter one type of attack. However, in real sensor networks, it is impractical to predict the attack to occur. Additionally, it is possible for multiple attacks to occur in sensor networks. In this paper, we propose the Secure Routing Mechanism to Defend Multiple Attacks in Sensor Networks. The proposed mechanism improves and combines existing security mechanisms, and achieves higher detection rates for single and multiple attacks.

Development of guided weapon systems and the role of satellites (유도무기체계의 발전과 인공위성의 역할)

  • Hyun-seung Son;Kyung-won Oh
    • Journal of Aerospace System Engineering
    • /
    • v.17 no.4
    • /
    • pp.75-86
    • /
    • 2023
  • The guided missiles and decoy systems that have been developed have been likened to a spear and shield. When a new attack system appears, another defense system is developed, and the attack system is once again upgraded to neutralize it. Now, due to the limitations of the decoy system, guided weapons have become the main force of both the defense and attack systems. Also, these systems have been expanded to use Space systems as a means of defending against a guided weapon system that is too fast for terrestrial-based systems. Induced weapon systems started at the sub-sonic level, and have become so important that their speeds have become super-sonic and hyper-sonic. The concept of Space has been included in the range of guided missiles, and satellite systems have become essential elements of guided missiles. Focusing on the correlation between the guided missile system and the satellite system, we analyze the characteristics of modern guided munitions and the direction of development of the guided weapons system.

Real-time hacking, detection and tracking ICT Convergence Security Solutions Test and Evaluation (실시간 해킹, 탐지 및 추적관리 ICT 융합 보안 솔루션 시험평가)

  • Kim, Seung-Bum;Yang, Hae-Sool
    • Journal of Digital Convergence
    • /
    • v.13 no.4
    • /
    • pp.235-246
    • /
    • 2015
  • Understanding the various unspecified hacking and repeated cyber DDoS attacks, finally was able to find a solution in the methods of attacks. Freely researching approach that combines the attacker and defender, offensive and defensive techniques can be called a challenge to discover the potential in whimsy. In this paper we test and evaluate "KWON-GA", global white hackers team has made by many years of experiences in infiltration and diagnosis under guise of offence is the best defence. And it is knowledge information ICT Convergence security solution which is developed for the purpose of defence, it provide customization policy that can be fit to customer's system environment with needed techniques and it is processed with unique proprietary technology so that it's not possible to scan. And even if it has leaked internally it's impossible to analyze so hackers can't analyze vulnerability, also it can't be abused as hacking tools.