• Title/Summary/Keyword: 예상 공격

Search Result 181, Processing Time 0.021 seconds

Improved Anti-Jamming Frame Error Rate and Hamming Code Repetitive Transmission Techniques for Enhanced SATURN Network Reliability Supporting UAV Operations (UAV 운영 신뢰성 개선을 위한 SATURN 통신망 항재밍 프레임 오율과 해밍코드 반복 전송 향상 기술)

  • Hwang, Yoonha;Baik, Jungsuk;Gu, Gyoan;Chung, Jong-Moon
    • Journal of Internet Computing and Services
    • /
    • v.23 no.3
    • /
    • pp.1-12
    • /
    • 2022
  • As the performance of Unmanned Aerial Vehicles (UAVs) are improving and the prices are lowering, it is expected that the use of UAVs will continuously grow in the future. It is important to always maintain control signal and video communication to operate remote UAVs stably, especially in military UAV operations, as unexpected jamming attacks can result in fatal UAV crashes. In this paper, to improve the network reliability and low latency when supporting UAV operations, the anti-jamming performance of Second generation Anti-jam Tactical UHF Radio for NATO (SATURN) networks is analyzed and enhanced by applying Forward Error Correction (FEC) and Minimum Shift Keying (MSK) modulation as well as Hamming code based multiple transmission techniques.

A Study on Decentralized Combats of the Armed Forces of Ukraine Based on Mission Command (임무형 지휘에 기초한 우크라이나군의 분권화 전투 연구)

  • Shin, Hee Hyun
    • The Journal of the Convergence on Culture Technology
    • /
    • v.8 no.4
    • /
    • pp.115-120
    • /
    • 2022
  • The Rsussian Armed Forces(RAF) invaded Ukraine on Feburary 24. However, the Armed Forces of Ukraine(AFU) unexpectedly blocked the Russian wave attack made the war between Ukraine and Russia lengthened. Major think-tanks and military experts in the world assessed that the AFU overwhelmed the RAF at the initial stage of the war because of decentralized combats based on mission command. Especially, the decentralized small units of the AFU damaged the RAF and slowed down its Iniative. The 4th industrial revolution makes the Korean Peninsula the multi-domain battlefield in the future; accordingly, the Decentralized combat won't be a choice, but a necessity in the future. Therefore, the AFU's offensive decentralized combats in this war Suggests many things to the Republic of Korea Army.

Analysis of NIST PQC Standardization Process and Round 4 Selected/Non-selected Algorithms (NIST PQC 표준화 과정 및 Round 4 선정/비선정 알고리즘 분석)

  • Choi Yu Ran;Choi Youn Sung;Lee Hak Jun
    • Convergence Security Journal
    • /
    • v.24 no.2
    • /
    • pp.71-78
    • /
    • 2024
  • As the rapid development of quantum computing compromises current public key encryption methods, the National Institute of Standards and Technology (NIST) in the United States has initiated the Post-Quantum Cryptography(PQC) project to develop new encryption standards that can withstand quantum computer attacks. This project involves reviewing and evaluating various cryptographic algorithms proposed by researchers worldwide. The initially selected quantum-resistant cryptographic algorithms were developed based on lattices and hash functions. Currently, algorithms offering diverse technical approaches, such as BIKE, Classic McEliece, and HQC, are under review in the fourth round. CRYSTALS-KYBER, CRYSTALS-Dilithium, FALCON, and SPHINCS+ were selected for standardization in the third round. In 2024, a final decision will be made regarding the algorithms selected in the fourth round and those currently under evaluation. Strengthening the security of public key cryptosystems in preparation for the quantum computing era is a crucial step expected to have a significant impact on protecting future digital communication systems from threats. This paper analyzes the security and efficiency of quantum-resistant cryptographic algorithms, presenting trends in this field.

Prostate Imaging Reporting and Data System (PI-RADS) v 2.1: Overview and Critical Points (전립선영상 판독과 자료체계 2.1 버전: 개요와 비판적인 의견)

  • Chan Kyo Kim
    • Journal of the Korean Society of Radiology
    • /
    • v.84 no.1
    • /
    • pp.75-91
    • /
    • 2023
  • The technical parameters and imaging interpretation criteria of the Prostate Imaging Reporting and Data System version 2 (PI-RADS v2) using multiparametric MRI (mpMRI) are updated in PI-RADS v2.1. These changes have been an expected improvement for prostate cancer evaluation, although some issues remain unsolved, and new issues have been raised. In this review, a brief overview of PI-RADS v2.1 is and several critical points are discussed as follows: the need for more detailed protocols of mpMRI, lack of validation of the revised transition zone interpretation criteria, the need for clarification for the revised diffusion-weighted imaging and dynamic contrast-enhanced imaging criteria, anterior fibromuscular stroma and central zone assessment, assessment of background signal and tumor aggressiveness, changes in the structured report, the need for the parameters for imaging quality and performance control, and indications for expansion of the system to include other indications.

Secure Management Method for Private Key using Smartphon's Information (스마트폰 고유정보를 이용한 안전한 개인키 관리 방안)

  • Kim, Seon-Joo
    • The Journal of the Korea Contents Association
    • /
    • v.16 no.8
    • /
    • pp.90-96
    • /
    • 2016
  • The 3390 million people, around 83% of the adult population in Korea use smartphone. Although the safety problem of the certificate has been occurred continuously, most of these users use the certificate. These safety issues as a solution to 'The owner of a mobile phone using SMS authentication technology', 'Biometric authentication', etc are being proposed. but, a secure and reliable authentication scheme has not been proposed for replace the certificate yet. and there are many attacks to steal the certificate and private key. For these reasons, security experts recommend to store the certificate and private key on usb flash drive, security tokens, smartphone. but smartphones are easily infected malware, an attacker can steal certificate and private key by malicious code. If an attacker snatchs the certificate, the private key file, and the password for the private key password, he can always act as valid user. In this paper, we proposed a safe way to keep the private key on smartphone using smartphone's unique information and user password. If an attacker knows the user password, the certificate and the private key, he can not know the smart phone's unique information, so it is impossible to use the encrypted private key. Therefore smartphone user use IT service safely.

Roles of Glyceraldehyde-3-Phosphate Dehydrogenase in Edwardsiella tarda Pathogenesis (Edwardsiella tarda의 glyceraldehyde-3-phosphate dehydrogenase가 병원성에 미치는 영향)

  • Yu, Jong-Earn;Oh, Young-Eun;Lee, Tae-Ho;Kang, Ho-Young
    • Journal of Life Science
    • /
    • v.20 no.12
    • /
    • pp.1743-1749
    • /
    • 2010
  • A research group demonstrated that the 37 kDA protein of Edwardsiella tarda, a causing causative agent of edwardsiellosis in fish, exhibited high antigenicity in Japanese flounder. The research group also showed that the N-terminus amino acid sequences of the 37 kDa protein were mapped to the N-terminus of GAPDH (glyceraldehyde-3-phosphate dehydrogenase). Using degenerated primer sets based on the known N-terminus sequence, the corresponding E. tarda DNA was amplified and cloned. The nucleotide sequences of the cloned gene revealed high homology with a bacterial gene for GAPDH, as we was expected. The amino acid sequence of E. tarda GAPDH (etGAPDH) revealed a <70% similarity with GAPDH proteins in other Enterobacteriaceae. With the application of artificial protein overexpression system in Escherichia coli, the recombinant etGAPDH (rGAPDH) was produced and purified. In this study, Using the purified rGAPDH, the etGAPDH specific polyclonal antibody has been was generated using the purified rGAPDHin this study. The immunoblotting analyses demonstrated that the location of the GAPDH protein is located with the association of is associated with the envelops of E. tarda. The rGAPDH was administrated into Japanese flounder via IP route for evaluation of the protective ability. Although the specific antibody titer against etGAPDH was increased about 3-fold after 4 weeks post-vaccination, the survival rates of vaccinated Japanese flounder and the control group with wild type E. tarda was were 12.5% and 0%, respectively. Our results indicated that rGAPDH is immunoreactive antigen but that it will not generate protective immunity in Japanese flounder.

The study of Defense Artificial Intelligence and Block-chain Convergence (국방분야 인공지능과 블록체인 융합방안 연구)

  • Kim, Seyong;Kwon, Hyukjin;Choi, Minwoo
    • Journal of Internet Computing and Services
    • /
    • v.21 no.2
    • /
    • pp.81-90
    • /
    • 2020
  • The purpose of this study is to study how to apply block-chain technology to prevent data forgery and alteration in the defense sector of AI(Artificial intelligence). AI is a technology for predicting big data by clustering or classifying it by applying various machine learning methodologies, and military powers including the U.S. have reached the completion stage of technology. If data-based AI's data forgery and modulation occurs, the processing process of the data, even if it is perfect, could be the biggest enemy risk factor, and the falsification and modification of the data can be too easy in the form of hacking. Unexpected attacks could occur if data used by weaponized AI is hacked and manipulated by North Korea. Therefore, a technology that prevents data from being falsified and altered is essential for the use of AI. It is expected that data forgery prevention will solve the problem by applying block-chain, a technology that does not damage data, unless more than half of the connected computers agree, even if a single computer is hacked by a distributed storage of encrypted data as a function of seawater.

The Study of Security System for Candidates for the 17th President (제17대 대통령선거후보자 경호제도에 관한 연구)

  • Kim, Doo-Hyun
    • Korean Security Journal
    • /
    • no.14
    • /
    • pp.43-67
    • /
    • 2007
  • This is the study of efficient security system for candidates for the 17th President. The president election will be held in 20 countries this year. As conflicts between interest groups are expected to emerge, they are afraid of accidental raid in the campaign tour in addition to revival of regionalism and possibility of confrontation between interest groups with issues of anti-FTA In our country. The purpose of this study is to suggest appropriate method through study of security system for president candidate as just 6 months are left for the 17th president election. Also this study covers security environment for the president election, principle of security, and theoretical study for cause of terror, security system domestic and abroad and its analysis and how to provide the efficient security for president candidate. Therefore first, for desirable security the security should be provided by professional org like president security department. Second, combined security for target by current rules should be done. Fourth, total security is necessary to prevent security threats in advance. Third, the public security should be provided for every president candidates. Fifth, example of secret service in America should be studied and economical security should be considered Sixth, we should increase the use of Security Company and martial artists.

  • PDF

Effects of Kalopanax Pictus Extracts and Their Related Origin on Gastric Lesions (해동피 및 유사생약 추출물의 위 손상에 대한 효과)

  • Hwang, In Young;Hwang, Seon A;Jeong, Choon Sik
    • Journal of Food Hygiene and Safety
    • /
    • v.28 no.4
    • /
    • pp.367-375
    • /
    • 2013
  • Kalopanax pictus has pharmacologically anti-inflammatory and analgesic effect and is known to respond to treatment of backache, knee pain and etc. In this study, we investigated the effects on gastric lesions of Kalopanax pictus both from Korea (KPK) and China (KPC) compared with their related origin, Znthoxylum ailanthoide both from Korea (ZAK) and China (ZAC), and Korean Bombax malabaricum (BMK). In preliminary screening, KPK and KPC shown effective inhibition of HCI EtOH-induced gastritis in rats. To elucidate their protective effects on gastric lesions, we assessed inhibition of H. pylori colonization, 2,2-diphenyl-1-picrylhydrazyl(DPPH) radical scavenging activities, reducing power test, and inhibition of lipid peroxidation. KPK was the most effective from antioxidant assays. KPK also shown the inhibition of indomethacin-induced gastric ulcer in rats. Gastric secretion in rats, KPK reduced the secretion of gastric juice and total acidity and raised pH. Therefore, it is possible that KPK can be developed as health functional food and natural medicine. In addition, it can contribute to the standardization with objectivity and reliability for KPK through the criteria establishment of the precise origin of medicine, the prevention of indiscriminate distribution of imitation, and the rising rate of dependence on imports of medicinal herbs, and mixing prevention of low-quality goods.

A Study of the Future Terrorism : Its Patterns and Perspectives (미래 국제 테러 유형과 전망에 관한 연구)

  • Choi, Jin-Tai
    • Korean Security Journal
    • /
    • no.15
    • /
    • pp.337-358
    • /
    • 2008
  • With the Japanese attacks on Pearl Harbor in 1941, approximately 2,500 people were killed. The terrorist attack on World Trade Center in the United States resulted in the heavy loss of people's lives, 2,749 in all. The 9.11 demonstrated that terrorist attack could be more serious problem than the war in our modern life. In addition, terrorist armed with new and high technologies have become more dangerous elements to the international community. Especially, the fact that the weapons of mass destruction are used by terrorist organizations is a matter of great concern. The strength of terrorist arsenal gives terrorist a decided advantage over us. The chances of success for terrorist have been increased due to the terrorist friendly environments. Terrorism has evolved without stopping from its birth, which is imposing a great burden on the authorities concerned. The counter-terrorism strategy and tactics used in the past have been useless in the fighting against new terrorism. To cope with the fast changing terrorism, comprehensive countermeasures should be developed. The purpose of this study is to know the enemy. To achieve the goal, the current situation on international terrorism as a whole is examined. Based on the result of the research, this paper also tried to give a perspectives on the future terrorism. At the same time, it provides a guidelines of the direction in the fighting against terrorism.

  • PDF