• Title/Summary/Keyword: 작전효과도

Search Result 133, Processing Time 0.027 seconds

A Study on the Analysis Method of the Operations Effectiveness of the Joint Coastal Guard System Against Small Targets (소형표적에 대한 합동 해안경계시스템 작전효과 분석방법 연구)

  • Kim, Taeho;Han, Hyun Jin;Lee, Byeong-Ho;Shin, Young-Tae
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.11 no.2
    • /
    • pp.59-66
    • /
    • 2022
  • The Joint Coastal Guard System is composed of a maritime surveillance system and a anti-coastal infiltration system, and is a system in which the Navy is mainly responsible for the maritime and the Army is responsible for the coast. We analyzed the operations effectiveness of the joint coastal guard system, in which various weapon systems of the army and navy are operated in a complex way, to the extent to which successful operation is possible against small targets. The operations effectiveness analysis was conducted by defining the operations effectiveness by operation type, configuring the simulation environment using METT-T elements, establishing the assumptions of the simulation scenario, conducting the simulation and analyzing the simulation results by weather condition. The simulation tools used were NORAM and EADSIM. As a result of the operations effectiveness analysis, the joint coastal guard system currently in operation showed a significant difference in operational success depending on the size of the target and weather conditions. This research can be used as useful data for establishing an effective joint coastal guard system and conducting systematic guard operations.

A Study for Analyzing Operations Effectiveness of Joint Coastal Security System (합동 해안경계시스템 작전효과 분석에 관한 연구)

  • Kim, Taeho;Han, Hyun Jin;Lee, Byeong-Ho;Shin, Young-Tae
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2021.11a
    • /
    • pp.379-382
    • /
    • 2021
  • 합동 해안경계시스템은 해상경계시스템과 해안대침투경계시스템으로 구성되며 주로 해군이 해상경계를, 육군이 해안경계를 책임지고 있는 시스템이다. 해군 및 육군의 다양한 무기체계가 복합적으로 운용되는 해안경계시스템의 작전효과를 시뮬레이션 기법을 이용하여 분석하였다. 작전효과 분석을 통해 현재 운용중인 해안경계시스템의 기상상태별 작전성공률 계량화가 가능하였다. 연구결과는 효과적인 합동 해안경계시스템을 구축하고 체계적인 경계작전을 수행하는데 활용될 수 있다.

A study on Deep Operations Effect Analysis for Realization of Simultaneous Offense-Defence Integrated Operations (공방동시통합작전 구현을 위한 종심작전 효과분석 연구)

  • Cho, Jung Keun;Yoo, Byung Joo;Han, Do Heon
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.22 no.6
    • /
    • pp.116-126
    • /
    • 2021
  • Ground Component Command (GCC) has been developing operational planning and execution systems to implement "Decisive Integrated Operations", which is the concept of ground operations execution, and achieved remarkable results. In particular, "Simultaneous Offense-Defense Integrated Operations" is developed mainly to neutralize enemies in deep areas and develop favorable conditions for the allies early by simultaneously attacking and defending from the beginning of the war. On the other hand, it is limited to providing scientific and reasonable support for the commander's decision-making process because analyzing the effects of the deep operation with existing M&S systems is impossible. This study developed a model for analyzing the effects of deep operations that can be used in the KJCCS. Previous research was conducted on the effects of surveillance, physical strike, and non-physical strike, which are components of deep operations to find the characteristics and limitations and suggest a research direction. A methodology for analyzing the effects of deep operations reflecting the interactions of components using data was then developed by the GCC, and input data for each field was calculated through combat experiments and a literature review. Finally, the Deep operations Effect CAlculating Model(DECAM) was developed and distributed to the GCC and Corps battle staff during the ROK-US Combined Exercise. Through this study, the effectiveness of the methodology and the developed model were confirmed and contribute to the development of the GCC and Corps' abilities to perform deep operations.

A study on the Application of Effects-based Operation in Cyberspace (사이버공간에서의 효과중심작전 적용방안 연구)

  • Jang, Won-gu;Lee, Kyun-ho
    • Journal of Internet Computing and Services
    • /
    • v.21 no.1
    • /
    • pp.221-230
    • /
    • 2020
  • The effects-based operation, which would reduce unnecessary efforts and meaningless sacrifices incurred during a war and simultaneously reach the will of the enemy leadership by strategic attacks, was discarded for the reason that it was difficult to apply it to military power except for airpower. However, cyberspace, which can be thoroughly logical and calculated, can be suitable for conducting effects-based operations. This study examined a way to carry out effects-based operations in such cyberspaces. It laid the foundation for overcoming the limitations of effects-based operations revealed in previous battle cases and executing the operations in cyber battlespace where the boundary between physical and cyberspaces gradually disappeared. Futhermore, it demonstrated that effects-based operations could be carried out in cyberspace by establishing a military strategy, which could conduct the operations through an analysis of previous cyber-attack cases.

A Study on the submarine operational effectiveness simulation model in the concept design phase (개념설계 단계의 잠수함 작전효과도 시뮬레이션 모델 연구)

  • Park Jun-Kyu
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.7 no.3 s.18
    • /
    • pp.47-58
    • /
    • 2004
  • This paper focuses on the technical information about the development of the submarine operational effectiveness simulation model for the feasibility study stage of the submarine design. The simulation model is classified into simulation control model and system model. Using user input and related performance parameters, it can simulate various scenarios by no change of the program because it includes tactic manager which makes decision about every situation. And the Monte-Carlo simulation mode which provides the stochastic results is available. Through the test simulation, the usefulness of the simulation model was verified. It should be helpful for the analysis of the submarine operational effectiveness by diversified scenarios in the concept design phase..

Development of Kill Chain Based Effective Maritime Operations Model for Naval Task Forces (Kill Chain 기반 해상기동부대의 효과적인 해상작전 모델 제안)

  • Lee, Chul-Hwa;Jang, Dong-Mo;Lee, Tae-Gong;Lim, Jae-Sung
    • Journal of Information Technology and Architecture
    • /
    • v.9 no.2
    • /
    • pp.177-186
    • /
    • 2012
  • Navy establishes the Naval Task Forces (TF) for many kinds of maritime operations. Then the TF in the maritime environment performs simultaneous component operations such as ASUW (Anti-Surface Warfare), ASW (Anti-Submarine Warfare), AAW (Anti-Aircraft Warfare), and assault operations. The TF consists of many tactical systems for the completion of missions C4I, VOIP (Voice Over Internet Protocol), DMHS (Digital Massage Handling System), and TDLs (Tactical Data Links) such as LINK-11, 16, ISDL (Inter Site Data Link). When the TF executes naval operations to complete a mission, we are interested in the kill chain for the maritime operations in the TF. The kill chain is a standard procedure for the naval operations to crush enemy defenses. Although each ship has a procedure about a manual for 'how to fight', it leave something to be desired for the TF detailed kill chain currently. Therefore, in this paper, we propose the naval TF's kill chain to perform the naval operations. Then, the operational effectiveness of the TF in the kill chain environment is determined through operation scenarios of TDL system implementation. It is to see the operational information sharing effect to a data link model based on MND-AF OV 6c (statement of tracking operational status) in the maritime operations applied to TDL and is to identify improvements in information dissemination process. We made the kill chain of maritime TF for the effective naval operations.

A Study on the Framework for Analyzing the Effectiveness of Cyber Weapon Systems Associated with Cyberspace and Physical Space (사이버 공간과 물리 공간이 연계된 사이버 무기체계의 효과성 분석 프레임워크 연구)

  • Jang, Ji-su;Kim, Kook-jin;Yoon, Suk-joon;Park, Min-seo;Ahn, Myung-Kil;Shin, Dong-kyoo
    • Journal of Internet Computing and Services
    • /
    • v.23 no.5
    • /
    • pp.111-126
    • /
    • 2022
  • As operations that were only conducted in physical space in the past change to operations that include cyberspace, it is necessary to analyze how cyber attacks affect weapon systems using cyber systems. For this purpose, it would be meaningful to analyze a tool that analyzes the effects of physical weapon systems in connection with cyber. The ROK military has secured and is operating the US JMEM, which contains the results of analyzing the effects of physical weapon systems. JMEM is applied only to conventional weapon systems, so it is impossible to analyze the impact of cyber weapon systems. In this study, based on the previously conducted cyber attack damage assessment framework, a framework for analyzing the impact of cyber attacks on physical missions was presented. To this end, based on the MOE and MOP of physical warfare, a cyber index for the analysis of cyber weapon system effectiveness was calculated. In addition, in conjunction with JMEM, which is used as a weapon system effect manual in physical operations, a framework was designed and tested to determine the mission impact by comparing and analyzing the results of the battle in cyberspace with the effects of physical operations. In order to prove the proposed framework, we analyzed and designed operational scenarios through domestic and foreign military manuals and previous studies, defined assets, and conducted experiments. As a result of the experiment, the larger the decrease in the cyber mission effect value, the greater the effect on physical operations. It can be used to predict the impact of physical operations caused by cyber attacks in various operations, and it will help the battlefield commander to make quick decisions.

Building an Analysis Model for Social Engineering Based Cyberspace Operations (사회공학 사이버작전 분석모델 정립연구)

  • Shin, Kyuyong;Kim, Jeewon;Lim, Hyun-myung;Kim, Yongju;Yoo, Jincheol
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.6
    • /
    • pp.1595-1606
    • /
    • 2018
  • Recently, there has been an increase in the number of social engineering techniques that indirectly attack the target system administrators or organizational weaknesses rather than the traditional technical cyber attacks that directly attacked the target systems. Accordingly, the type analysis and case study of social engineering techniques are being actively conducted. There has been, however, little effort to derive an analysis model that systematically analyzes social engineering based cyberspace operations. Therefore, this paper aims at building a Social Engineering Based Cyberspace Operations Analysis Model, which can be used as a reference framework for a case study or attack scenario generation of social engineering based cyberspace operations.

A Study on the Concept of Social Engineering Cyber Kill Chain for Social Engineering based Cyber Operations (사회공학 사이버작전을 고려한 사회공학 사이버킬체인 개념정립 연구)

  • Shin, Kyuyong;Kim, Kyoung Min;Lee, Jongkwan
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.5
    • /
    • pp.1247-1258
    • /
    • 2018
  • The Cyber Kill Chain originally proposed by Lockheed Martin defines the standard procedure of general cyber attacks and suggests tailored defensive actions per each step, eventually neutralizing the intent of the attackers. Defenders can effectively deal with Advanced Persistent Threat(APT)s which are difficult to be handled by other defensive mechanisms under the Cyber Kill Chain. Recently, however, social engineering techniques that exploits the vulnerabilities of humans who manage the target systems are prevail rather than the technical attacks directly attacking the target systems themselves. Under the circumstance, the Cyber Kill Chain model should evolve to encompass social engineering attacks for the improved effectiveness. Therefore, this paper aims to establish a definite concept of Cyber Kill Chain for social engineering based cyber attacks, called Social Engineering Cyber Kill Chain, helping future researchers in this literature.

Construction of Optimal Anti-submarine Search Patterns for the Anti-submarine Ships Cooperating with Helicopters based on Simulation Method (대잠 헬기와의 협동 작전을 고려한 수상함의 최적 대잠탐색 패턴 산출을 위한 시뮬레이션)

  • Yu, Chan-Woo;Park, Sung-Woon
    • Journal of the Korea Society for Simulation
    • /
    • v.23 no.1
    • /
    • pp.33-42
    • /
    • 2014
  • In this paper we analyzed the search patterns for the anti-submarine warfare (ASW) surface ships cooperating with ASW helicopters. For this purpose, we modeled evasive motion of a submarine with a probabilistic method. And maneuvers and search actions of ships and helicopters participating in the anti-submarine search mission are designed. And for each simulation scenario, the case where a ship and a helicopter searches a submarine independently according to its optimized search pattern is compared with the case where the search platforms participate in the ASW mission cooperatively. Based on the simulation results, we proposed the reconfigured search patterns that help cooperative ASW surface ships increase the total cumulative detection probability (CDP).