• Title/Summary/Keyword: 정보전쟁

Search Result 328, Processing Time 0.026 seconds

Study on Policies for National Cybersecurity (국가 사이버안보를 위한 정책 연구)

  • Ham, Seung-hyeon;Park, Dea-woo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.21 no.9
    • /
    • pp.1666-1673
    • /
    • 2017
  • Republic of Korea is divided into South Korea and North Korea, creating military conflicts and social conflicts. North Korea is conducting cyberattacks against South Korea and has hacked South Korea's defense network. In the world of cyberspace, the boundaries of the borders are becoming obscured, and cyberattacks and cyberterrorism for cyberwarfare operate with digital computing connected to points, time and space. Agenda and manual are needed for national cybersecurity. Also, it is necessary to study national cybersecurity laws and policies that can create and implement nationalcyber security policy. This paper investigates cyberterrorism situation in North and South Korean confrontation situation and damage to cyberwarfare in the world. We also study cybersecurity activities and cyberwarfare response agendas, manuals and new technologies at home and abroad. And propose national cybersecurity policy and propose policies so that '(tentative) The National Cybersecurity Law' is established. This study will be used as basic data of national cybersecurity law and policy.

A Study on the War Simulation and Prediction Using Bayesian Inference (베이지안 추론을 이용한 전쟁 시뮬레이션과 예측 연구)

  • Lee, Seung-Lyong;Yoo, Byung Joo;Youn, Sangyoun;Bang, Sang-Ho;Jung, Jae-Woong
    • The Journal of the Korea Contents Association
    • /
    • v.21 no.11
    • /
    • pp.77-86
    • /
    • 2021
  • A method of constructing a war simulation based on Bayesian Inference was proposed as a method of constructing heterogeneous historical war data obtained with a time difference into a single model. A method of applying a linear regression model can be considered as a method of predicting future battles by analyzing historical war results. However it is not appropriate for two heterogeneous types of historical data that reflect changes in the battlefield environment due to different times to be suitable as a single linear regression model and violation of the model's assumptions. To resolve these problems a Bayesian inference method was proposed to obtain a post-distribution by assuming the data from the previous era as a non-informative prior distribution and to infer the final posterior distribution by using it as a prior distribution to analyze the data obtained from the next era. Another advantage of the Bayesian inference method is that the results sampled by the Markov Chain Monte Carlo method can be used to infer posterior distribution or posterior predictive distribution reflecting uncertainty. In this way, it has the advantage of not only being able to utilize a variety of information rather than analyzing it with a classical linear regression model, but also continuing to update the model by reflecting additional data obtained in the future.

Session Analysis based Intruder Traceback System in Defense Network (국방망에서 세션분석기반의 침입자 역추적 시스템)

  • Jang Hee-Jin;Yun Ho-Sang;Kim Sang-Soo;Park Jae-Keun;Kim Cheol-Ho
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2006.06c
    • /
    • pp.304-306
    • /
    • 2006
  • 21세기 정보혁명을 바탕으로 전쟁의 양상은 정보전, 네트워크 및 컴퓨터 중심의 사이버전과 같은 새로운 전쟁 패러다임으로 변화하고 있다. 이러한 정보전에 대비하여 국방정보체계에 다양한 정보보호시스템을 설치하여 사용하고 있다. 그러나 국방정보체계 환경에 현재까지 배치된 정보보호시스템들은 침해 사고에 대한 탐지 및 보고 등의 수동적인 대응만을 지원한다. 그러므로 발생한 공격에 대한 대응을 마련하더라도 동일한 공격자가 동일한 목표 시스템에 대하여 또 다른 공격 기술을 이용하여 재침입이 가능하다. 이를 방어하기 위하여 공격에 대한 능동적인 대응이 필요하다. 대표적인 능동 대응 기술인 침입자 역추적은 시스템 및 네트워크에 대하여 공격을 시도하는 침입자의 네트워크 상의 실제 위치를 추적하는 기술이다. 침해 사고를 근본적으로 차단하기 위하여 침입자의 실제 신분 확인이 필수적이다. 이를 위하여 본 논문에서는 침입자 역추적 기술을 분석하고 국방정보체계 환경을 위한 세션분석기반의 침입자 역추적 기술을 제안한다. 또한 이 기술을 기반으로 구현한 침입자 역추적 시스템을 소개한다.

  • PDF

A Study on National Strategy For Countering the New Terrorism As Network War (네트워크 전쟁의 도래와 테러리즘의 새로운 흐름 - 국가대응전략을 중심으로 -)

  • Ahn, Hee-Nam;Jang, Ki-Boong
    • Korean Security Journal
    • /
    • no.16
    • /
    • pp.137-159
    • /
    • 2008
  • In the 21st century, the Information Revolution caused unpredictable kinds of complications. Human society conducts a tactical network war like Swarming. Network war simultaneously consists of merits such as global monitoring and anti-dictatorship campaign, and violent demerits like terrorism. It has been becoming a generalization of terrorism of the present time to build a brotherhood and ideology to commit terrorism. This is considered as new terrorism, a form of network war. Theses days, terror organizations including Al Qaeda establish a brotherly network to commit terrorism when and where they want. New terrorism is a novel form that harms unspecified individuals. In fact, many countries have been experiencing damage from new terrorism. It is becoming an urgent issue to every country to prepare a suitable plan that cope with new terrorism. This dissertation provides defense strategy in macro and micro aspect as a responding scheme to new terrorism.

  • PDF

유인전투기의 장래-인간공학적 측면에서의 고찰

  • Kim, Gi-Seok
    • Defense and Technology
    • /
    • no.8 s.138
    • /
    • pp.60-67
    • /
    • 1990
  • 아마도 앞으로 10년간은 거의 모든 전투기에 인간이 조종사로서 계속 쓰일 것이 확실시 되며, 물론 무인기라든가 원격조종기의 이용도 해매다 늘어날 것이다. 또한 전쟁을 억지하는 일련의 체계중에서 인간이 중심적인 역할을 해나갈 것임에 틀림없다. 양질의 정보가 없이는 만족할만한 결심을 할수 없을 것이다. 만일 인간의 두뇌로 결정을 내려야 한다면 결정에 도움을 줄수 있는 정보를 정보의 홍수속에서 끌어낼수 있는 기술을 개발해야 할 것이다.

  • PDF

Mutual Authenticate Protocol among Sensor for Network Centric Warfare (네트워크 중심전을 위한 센서간의 상호인증기법)

  • Yang, Ho-Kyung;Cha, Hyun-Jong;Shin, Hyo-Young;Ryou, Hwnag-Bin
    • Convergence Security Journal
    • /
    • v.12 no.6
    • /
    • pp.25-30
    • /
    • 2012
  • As the network composed of numerous sensor nodes, sensor network conducts the function of sensing the surrounding information by sensor and of the sensed information. Our military has also developed ICT(Information and Communication Technology) along with the methods for effective war by sharing smooth information of battlefield resources through network with each object. In this paper, a sensor network is clustered in advance and a cluster header (CH) is elected for clusters. Before deployment, a certificate is provided between the BS and the sensor nodes, and after clustering, authentication is done between the BS and the sensor nodes. Moreover, inter-CH authentication technique is used to allow active response to destruction or replacement of sensor nodes. Also, because authentication is done twice, higher level of security can be provided.