• Title/Summary/Keyword: Active attack

Search Result 195, Processing Time 0.028 seconds

A Study on the Laser Designator for the Missile System Using Semi-Active Laser Seeker (반능동 레이저 탐색기를 사용하는 유도무기체계의 레이저 조사기 연구)

  • Bae, Minji;Ha, Jaehoon;Park, Heechan
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.23 no.5
    • /
    • pp.466-474
    • /
    • 2020
  • Semi-active laser missile systems with high accuracy are necessary to asymmetric threats, such as UAV(Unmanned Aerial Vehicle). They are usually used to attack stationary or slow moving targets, therefore we should study on the laser designator which can detect and track fast moving targets in order to deal with UAV. In this study, design specifications are came up through performance analysis of existing laser designators, and laser designation method for fast moving target is developed. The detection and tracking performance of developed laser designator are verified through inside/outside tests on ground/aerial stationary/moving targets. Through this study, we obtain laser designator techniques that could be applied to actual semi-active laser missile systems.

21Century of Combat Aspects of North Korean Attack Drones Through the War of the Century (21세기 전쟁을 통해 본 북한 공격 드론의 전투 양상 전망)

  • Kang-Il Seo;Sang-Keun Cho;Jong-Hoon Kim;Ki-Won Kim;Sang-Hyuk Park
    • The Journal of the Convergence on Culture Technology
    • /
    • v.9 no.3
    • /
    • pp.299-304
    • /
    • 2023
  • Recently, drones have been used as a major means of attack drones in major wars around the world, and it seems likely that they will evolve into game changers in the future. Recently, drones have been used as a major means of attack drones in major wars around the world, and it seems likely that they will evolve into game changers in the future. In the major wars of the 21century, attack drones are used for precision fire-guided or self-destruct attacks, For the purpose of cognitive warfare, its territory is expanding not only to land and air, but also to sea and water. These attack drones will perform multi-domain operations, and for this purpose, the level of autonomy will be improved and High-Low Mix We will continue to develop by strengthening concept-based scalability. North Korea has also been making considerable efforts to operate attack drones for a long time, and activities such as third-country-level self-explosive drones, artificial intelligence-based clustered self-explosive drones, and self-destructive stealth unmanned semi-submersible are expected. In addition to North Korea's provocations and attacks, it is hoped that there will be a need for active follow-up research on our military's countermeasures and utilization plans.

The Methodological Study on Atopic Dermatitis in the latest clinical study (최신(最新) 임상연구(臨床硏究)를 중심으로 한 아토피 피부염에 관한 방법론적(方法論的) 연구(硏究))

  • Min, Sang-Yeon;Kim, Jang-Hyun;Kim, Ki-Bong
    • The Journal of Pediatrics of Korean Medicine
    • /
    • v.20 no.1
    • /
    • pp.151-164
    • /
    • 2006
  • Objective : The objective of this study is to analyze an increasing rate, difference of attack rate in age, relationship between atopic dermatitis and breast-feeding, the relationship between atopic dermatitis and the Sasang constitution, and various treatments of atopic dermatitis. Methods : This clinical study was carried out with 22 theses which are related with diagnosis, treatments, prognosis and control of atopic dermatitis. The 22 theses are carried on J Korean Oriental Pediatrics, J Korean Oriental Ophthalmology, J Korean Oriental Med, J Korean Academy of Pediatric Allergy and Respiratory Disease, J Korean Acad Fam Med and Korean J Food & Nutr. Results : The prevalence rate, attack rate and diagnosis rate of atopic dermatitis are increased in the year of 2000, compared with those of 1995. Comparing age of patient between the year of 1992 and 2002, the attack rate of atopic dermatitis is increased quickly over 7 years old. Specific immunoglobulin E(IgE) antibodies detected in patients under 1 year old was exclusively caused by food. But for the age over 7 years old, food and inhalant allergen are detected in the year of 2002 in compare with that of 1992. Because of breast-feeding, intemperate diet adjustment during the period of maternity of family history of atopic dermatitis, the attack rate of atopic dermatitis is increased in infant. The types of patients are categorized according to Sasang constitution and Soeumin group was largest. The Oriental medicine treatments of atopic dermatitis are bath & skin hydration, avoidance from antigen, dietetic treatment, external treatment, medication and phototherapy. Conclusion : The atopic dermatitis is associated with breast-feeding, Sasang constitution types. More active approach for the treatment and prevention of Atopic dermatitis in children are needed.

  • PDF

Early Alert System of Vespa Attack to Honeybee Hive: Prototype Design and Testing in the Laboratory Condition (장수말벌 공격 조기 경보 시스템 프로토타입 설계 및 실내 시연)

  • Kim, Byungsoon;Jeong, Seongmin;Kim, Goeun;Jung, Chuleui
    • Journal of Apiculture
    • /
    • v.32 no.3
    • /
    • pp.191-198
    • /
    • 2017
  • Vespa hornets are notorious predators of honeybees in Korean beekeeping. Detection of vespa hornet attacking on honeybee colony was tried through analysis of wing beat frequency profiling from Vespa mandarinia. Wing beat profiles of V. mandarinia during active flight and resting were distinctively different. From the wing beat profiling, algorithm of automated detection of vespa attack was encoded, and alert system was developed using Teensy 3.2 and Raspberry pi 3. From the laboratory testing, the prototype system successfully detected vespa wing beats and delivered the vespa attack information to the user wirelessly. Further development of the system could help precision alert system of the vespa attack to apiary.

A Study on Survivability of Node using Response Mechanism in Active Network Environment (액티브 네트워크 환경에서 대응 메커니즘을 이용한 노드 생존성에 관한 연구)

  • Yang, Jin-Seok;Lee, Ho-Jae;Chang, Beom-Hwan;Kim, Hyoun-Ku;Han, Young-Ju;Chung, Tai-Myoung
    • The KIPS Transactions:PartC
    • /
    • v.10C no.6
    • /
    • pp.799-808
    • /
    • 2003
  • Existing security solutions such as Firewell and IDS (Intrusion Detection System) have a trouble in getting accurate detection rate about new attack and can not block interior attack. That is, existing securuty solutions have various shortcomings. Shortcomings of these security solutions can be supplemented with mechanism which guarantees an availability of systems. The mechanism which guarantees the survivability of node is various, we approachintrusion telerance using real time response mechanism. The monitoring code monitors related resources of system for survivability of vulnerable systm continuously. When realted resources exceed threshold, monitoring and response code is deployed to run. These mechanism guarantees the availability of system. We propose control mathod about resource monitoring. The monitoring code operates with this method. The response code may be resident in active node for availability or execute a job when a request is occurred. We suggest the node survivability mechanism that integrates the intrusion tolerance mechanism that complements the problems of existing security solutions. The mechanism takes asvantage of the automated service distribution supported by Active Network infrastructure instead of passive solutions. The mechanism takes advantage of the automated service distribution supported by Active Network infrastructure instead of passive system reconfiguration and patch.

On Enhanced e-Government Security - Network Forensics

  • Wei, Ren
    • 한국디지털정책학회:학술대회논문집
    • /
    • 2004.11a
    • /
    • pp.173-184
    • /
    • 2004
  • E-Government security is crucial to the development of e-government. Due to the complexity and characteristics of e-government security, the viable current approaches for security focus on preventing the network intrusion or misusing in advanced and seldom concern of the forensics data attaining for the investigation after the network attack or fraud. We discuss the method for resolving the problem of the e-government security from the different side of view - network forensics approaches? from the thinking of the active protection or defense for the e-government security, which can also improve the ability of emergence response and incident investigation for e-government security.

  • PDF

Performance Evaluation of Active Router in DDoS Attack Response Operation (DDoS 공격 대응과정에서의 능동 라우터 성능평가)

  • 권영호;김영민;문경신;안상현;한민호;나중찬
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2003.10c
    • /
    • pp.637-639
    • /
    • 2003
  • 인터넷이 널리 보급되면서 이용자들간에는 편리하고 빠른 정보교환이 가능하게 되었지만 이를 방해하는 해커들의 활동 또한 크게 증가하고 있다. 그 중 DDoS(Distributed Denial of Service) 공격은 인터넷 서비스를 하고 있는 서버에 심각한 해를 주며 탐지와 대응이 어려운 해킹방법중의 하나이다. 본 연구에서는 DDoS 공격 대응을 위해 액티브 네트워크를 이용해 개발한 DDoS 보안시스템[1][2]을 이용할 때 얼마나 효과적인 성능을 낼 수 있는지에 대한 분석 결과를 제공한다.

  • PDF

Active Phishing Attack and its Countermeasures (액티브 피싱 공격 및 대응방안 고찰)

  • Kim, S.H.;Lee, S.H.;Jin, S.H.
    • Electronics and Telecommunications Trends
    • /
    • v.28 no.3
    • /
    • pp.9-18
    • /
    • 2013
  • 인터넷을 기반으로 하는 서비스가 활성화됨에 따라, 불순한 목적으로 악용하는 사례 또한 증가하고 있다. 특히 피싱 공격은 사회적인 문제로까지 확대되고 있으며, 대응방안 또한 대국민 교육 차원에서 전달되고 있다. 하지만, 새롭게 등장하는 액티브 피싱 공격은 기존의 대응방안으로는 해결할 수 없으며, 여러 보안 기술을 사용하더라도 해결할 수 없다는 점에서 심각하다. 본고는 액티브 피싱에 대한 소개와 함께, 기존의 대응방안과 여러 보안 기술들의 한계점을 제시한다. 그리고 액티브 피싱을 해결하기 위해 필요한 기술의 요구사항을 고찰한다.

  • PDF

Traceback Mechanism for Spoofed IP Attack on Active Network (액티브 네트워크 기반의 위조 IP 공격 대응 메커니즘)

  • 이영석;방효찬;나중찬
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2003.04a
    • /
    • pp.287-289
    • /
    • 2003
  • 최근 인터넷을 통한 사이버 공격의 형태가 다양해지고 복잡해지면서 효과적인 탐지 및 대응이 어려워지고 있다. 특히 UDP 계열의 DoS. DDoS 공격에서 IP 패킷 내의 근원지 IP 주소를 타인의 IP 주소로 위조하여 공격하는 경우 패킷의 실제 송신자를 추적하고 고립화 시키는 것은 불가능하다. 본 논문에서는 이러한 공격에 쉽게 대응할 수 있는 보안 구조로서 액티브 네트워크를 이용한 보안 관리 프레임워크를 설계하고, 위조 IP 공격에 보다 능동적인 대응이 가능한 메커니즘을 제안한다.

  • PDF

the Authentication Algorithm Based on the Message Chainning (메세지 체인 방식에 의한 인증 알고리즘에 관한 연구)

  • Ahn, Hyo-Beom;Park, Chang-Seop
    • Review of KIISC
    • /
    • v.3 no.4
    • /
    • pp.27-37
    • /
    • 1993
  • 본 연구에서는 기존의 메세지 인증방식인 MAC(Message Aunthentication Code)와 MDC(Manipulation Detection Code)에 대한 제 3자의 적극적인 공격(active attack)하에서의 구조직인 취약점을 분석하고, 이를 보완하는 새로운 인증 방식을 제안하고 검증하였다. 새로운 메세지 인증방식은 기존의 방식과는 다르레 제3자의 공격을 받은 메세지 블럭을 바로 검출할 수 있다는 장점을 가지고 있기 때문에 통신 시스템 상에서 불필요한 메세지의 재전송을 줄일 수 있다는 측면에서 효율적인 인증 방식이다.

  • PDF