• Title/Summary/Keyword: Attack Role

Search Result 188, Processing Time 0.028 seconds

Optimal Allocation Heuristic Method of Military Engineering Equipments during Artillery Position Construction Operation (휴리스틱 기법을 이용한 포병진지 구축작전시 공병장비 최적배정)

  • Park, Se Hwan;Lee, Moon Gul
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.40 no.1
    • /
    • pp.11-21
    • /
    • 2017
  • Artillery fire power due to effectiveness which is hard to predict well-planned and surprising attack can give a fear and shock to the personnel and is a very core weapon system and takes a critical role in wartime. Therefore in order to maximize operational effectiveness, Army required protecting artillery and takes a quick attack action through rapid construction of artillery's positions. The artillery use artillery's position to prevent exposure by moving to other position frequently. They have to move and construct at new artillery's positions quickly against exposing existed place by foe's recognition. These positions should be built by not manpower but engineering construction equipment. Because artillery positions have to protect human and artillery equipment well and build quickly. Military engineering battalion have lots of construction equipment which include excavator, loader, dozer, combat multi-purposed excavator, armored combat earthmover dump truck and so on. So they have to decide to optimal number of Team combining these equipments and determine construction sequence of artillery's position in operational plan. In this research, we propose to decide number of Team efficiently and allocate required construction's positions for each Team under constraints of limited equipments and time. To do so, we develop efficient heuristic method which can give near optimal solution and be applied to various situation including commander's intention, artillery position's priority or grouping etc. This heuristic can support quick and flexible construction plan of artillery positions not only for using various composition's equipment to organize Teams but also for changing quantity of positions.

Digital Asset Analysis Methodology against Cyber Threat to Instrumentation and Control System in Nuclear Power Plants (원자력발전소의 디지털계측제어시스템의 사이버보안을 위한 디지털 자산분석 방법)

  • Koo, In-Soo;Kim, Kwan-Woong;Hong, Seok-Boong;Park, Geun-Ok;Park, Jae-Yoon
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.6 no.6
    • /
    • pp.839-847
    • /
    • 2011
  • Instrumentation & Control(I&C) System in NPP(Nuclear Power Plant) plays a important role as the brain of human being, it performs protecting, controling and monitoring safety operation of NPP. Recently, the I&C system is digitalized as digital technology such as PLC, DSP, FPGA. The different aspect of digital system which use digital communication to analog system is that it has potential vulnerability to cyber threat in nature. Possibility that digital I&C system is defected by cyber attack is increasing day by day. The result of cyber attack can be adverse effect to safety function in NPP. Therefore, I&C system required cyber security counter-measures that protect themselves from cyber threat efficiently and also cyber security design should be taken into consideration at concept stage in I&C system development process. In this study, we proposed the digital asset analysis method for cyber security assessment of I&C system design in NPP and we performed digital asset analysis of I&C system by using the proposed method.

From the point of view of ground operations principle, Chosin Link-up operation discussion of the US 1st Marine Division (지상작전의 원칙 측면에서 미 제1해병사단의 장진호 연결작전 고찰)

  • Kim, Kyu-Bin;Choi, Yong-Yoel
    • Journal of National Security and Military Science
    • /
    • s.13
    • /
    • pp.1-41
    • /
    • 2016
  • US 8th Army in the attack on the Western Front was a situation that was frustrated by the 13th Corps Communist army. To this time support this, goals that have been granted to the US 1st Marine Division that initiated the attack in Mupyonri direction, lack the potential to achieve was not decisive. It was a operation specific erroneous judgment that occurred because there was no one accurately grasp the battlefield of the situation the wrong UN Forces Command. Tactical victory can be to maximize the operation outcomes. However, there is no possible failure of the operation is to expand the tactical success. This is because the failure of the operation, because directly linked to the success or failure of the war. Tactical victory can be to maximize the operation outcomes. However, operation specific failure is not it possible to expand the tactical victory. Therefore tactical success of the US 1st Marine Division, can not compensate for operation specific failure of the United Nations Forces Command. However, Chinese Communist Army 9th Corps is obsessed only victory of tactics to annihilate the US 1st Marine Division, by being fixation to the Chosin whole area, it was not possible to run a operational operation. Therefore tactical success df the US 1st Marine Division, Chinese Communist Army 9th Corps is to extinguish the ability to increase the number of the 13th Corps of the Western Front, 8th Army US have contributed to have escaped the crisis. In addition, the US 10th Corps while maintaining the combat force, by an important role to withdraw through the sea, was able to complement the misjudgment of the operation.

  • PDF

An Analysis of Cyber Attacks and Response Cases Related to COVID-19 (코로나19 관련 사이버 공격 및 대응현황 분석)

  • Lee, Yongpil;Lee, Dong-Geun
    • Journal of Information Technology Services
    • /
    • v.20 no.5
    • /
    • pp.119-136
    • /
    • 2021
  • Since the global spread of COVID-19, social distancing and untact service implementation have spread rapidly. With the transition to a non-face-to-face environment such as telework and remote classes, cyber security threats have increased, and a lot of cyber compromises have also occurred. In this study, cyber-attacks and response cases related to COVID-19 are summarized in four aspects: cyber fraud, cyber-attacks on companies related to COVID-19 and healthcare sector, cyber-attacks on untact services such as telework, and preparation of untact services security for post-covid 19. After the outbreak of the COVID-19 pandemic, related events such as vaccination information and payment of national disaster aid continued to be used as bait for smishing and phishing. In the aspect of cyber-attacks on companies related to COVID-19 and healthcare sector, we can see that the damage was rapidly increasing as state-supported hackers attack those companies to obtain research results related to the COVID-19, and hackers chose medical institutions as targets with an efficient ransomware attack approach by changing 'spray and pray' strategy to 'big-game hunting'. Companies using untact services such as telework are experiencing cyber breaches due to insufficient security settings, non-installation of security patches, and vulnerabilities in systems constituting untact services such as VPN. In response to these cyber incidents, as a case of cyber fraud countermeasures, security notices to preventing cyber fraud damage to the public was announced, and security guidelines and ransomware countermeasures were provided to organizations related to COVID-19 and medical institutions. In addition, for companies that use and provide untact services, security vulnerability finding and system development environment security inspection service were provided by Government funding programs. We also looked at the differences in the role of the government and the target of security notices between domestic and overseas response cases. Lastly, considering the development of untact services by industry in preparation for post-COVID-19, supply chain security, cloud security, development security, and IoT security were suggested as common security reinforcement measures.

Analysis of Security Problems of Deep Learning Technology (딥러닝 기술이 가지는 보안 문제점에 대한 분석)

  • Choi, Hee-Sik;Cho, Yang-Hyun
    • Journal of the Korea Convergence Society
    • /
    • v.10 no.5
    • /
    • pp.9-16
    • /
    • 2019
  • In this paper, it will analyze security problems, so technology's potential can apply to business security area. First, in order to deep learning do security tasks sufficiently in the business area, deep learning requires repetitive learning with large amounts of data. In this paper, to acquire learning ability to do stable business tasks, it must detect abnormal IP packets and attack such as normal software with malicious code. Therefore, this paper will analyze whether deep learning has the cognitive ability to detect various attack. In this paper, to deep learning to reach the system and reliably execute the business model which has problem, this paper will develop deep learning technology which is equipped with security engine to analyze new IP about Session and do log analysis and solve the problem of mathematical role which can extract abnormal data and distinguish infringement of system data. Then it will apply to business model to drop the vulnerability and improve the business performance.

Extracting Neural Networks via Meltdown (멜트다운 취약점을 이용한 인공신경망 추출공격)

  • Jeong, Hoyong;Ryu, Dohyun;Hur, Junbeom
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.6
    • /
    • pp.1031-1041
    • /
    • 2020
  • Cloud computing technology plays an important role in the deep learning industry as deep learning services are deployed frequently on top of cloud infrastructures. In such cloud environment, virtualization technology provides logically independent and isolated computing space for each tenant. However, recent studies demonstrate that by leveraging vulnerabilities of virtualization techniques and shared processor architectures in the cloud system, various side-channels can be established between cloud tenants. In this paper, we propose a novel attack scenario that can steal internal information of deep learning models by exploiting the Meltdown vulnerability in a multi-tenant system environment. On the basis of our experiment, the proposed attack method could extract internal information of a TensorFlow deep-learning service with 92.875% accuracy and 1.325kB/s extraction speed.

Power spectral density method performance in detecting damages by chloride attack on coastal RC bridge

  • Mehrdad, Hadizadeh-Bazaz;Ignacio J., Navarro;Victor, Yepes
    • Structural Engineering and Mechanics
    • /
    • v.85 no.2
    • /
    • pp.197-206
    • /
    • 2023
  • The deterioration caused by chloride penetration and carbonation plays a significant role in a concrete structure in a marine environment. The chloride corrosion in some marine concrete structures is invisible but can be dangerous in a sudden collapse. Therefore, as a novelty, this research investigates the ability of a non-destructive damage detection method named the Power Spectral Density (PSD) to diagnose damages caused only by chloride ions in concrete structures. Furthermore, the accuracy of this method in estimating the amount of annual damage caused by chloride in various parts and positions exposed to seawater was investigated. For this purpose, the RC Arosa bridge in Spain, which connects the island to the mainland via seawater, was numerically modeled and analyzed. As the first step, each element's bridge position was calculated, along with the chloride corrosion percentage in the reinforcements. The next step predicted the existence, location, and timing of damage to the entire concrete part of the bridge based on the amount of rebar corrosion each year. The PSD method was used to monitor the annual loss of reinforcement cross-section area, changes in dynamic characteristics such as stiffness and mass, and each year of the bridge structure's life using sensitivity equations and the linear least squares algorithm. This study showed that using different approaches to the PSD method based on rebar chloride corrosion and assuming 10% errors in software analysis can help predict the location and almost exact amount of damage zones over time.

Numerical Simulation on Drag and Lift Coefficient around Ship Rudder using Computational Fluid Dynamics (전산 유체 역학을 이용한 선박 방향타 주변의 항력 및 양력 계수에 대한 수치 시뮬레이션)

  • Bon-Guk Koo
    • Journal of the Institute of Convergence Signal Processing
    • /
    • v.24 no.2
    • /
    • pp.97-102
    • /
    • 2023
  • Numerical simulations have been performed to investigate the hydrodynamic characteristics of the rudder since they play an important role in naval architecture fields. Although some values such as hydrodynamics forces can be measured easily in the towing tanks, it is difficult to obtain the detailed information of the flow fields such as pressure distribution, velocity distribution, vortex generation from experiments. In the present study, the effects of hydrodynamic coefficients and Reynolds number acting on the rudder were studied by using Computational Fluid Dynamics(CFD). Ansys fluent, one of commercial CFD solvers, solves the Navier-Stokes equations and the k-epsilon turbulence model is selected for the viscous model to solve RANS equations. At first, drag coefficients and lift coefficient for different angle of attack are obtained by using a CFD commercial code for KCS rudder. Secondly, the 2-D lift coefficients and drag coefficients are compared with 3-D coefficients at the same conditions. Thirdly, the effects of Reynolds number on the hydrodynamic forces are investigated.

Reinforcement Learning-Based Resource exhaustion attack detection and response in Kubernetes (쿠버네티스 환경에서의 강화학습 기반 자원 고갈 탐지 및 대응 기술에 관한 연구)

  • Ri-Yeong Kim;Seongmin Kim
    • Convergence Security Journal
    • /
    • v.23 no.5
    • /
    • pp.81-89
    • /
    • 2023
  • Kubernetes is a representative open-source software for container orchestration, playing a crucial role in monitoring and managing resources allocated to containers. As container environments become prevalent, security threats targeting containers continue to rise, with resource exhaustion attacks being a prominent example. These attacks involve distributing malicious crypto-mining software in containerized form to hijack computing resources, thereby affecting the operation of the host and other containers that share resources. Previous research has focused on detecting resource depletion attacks, so technology to respond when attacks occur is lacking. This paper proposes a reinforcement learning-based dynamic resource management framework for detecting and responding to resource exhaustion attacks and malicious containers running in Kubernetes environments. To achieve this, we define the environment's state, actions, and rewards from the perspective of responding to resource exhaustion attacks using reinforcement learning. It is expected that the proposed methodology will contribute to establishing a robust defense against resource exhaustion attacks in container environments

Ecological Characteristics of Termite(Reticulitermes speratus kyushuensis) for Preservation of Wooden Cultural Heritage (목조문화재의 보존을 위한 한국산 흰개미의 생태적 특성 연구)

  • Lee, Kyu-Shik;Jeong, So-Young
    • Korean Journal of Heritage: History & Science
    • /
    • v.37
    • /
    • pp.327-348
    • /
    • 2004
  • In this study, after analyzing several local climate characteristics of South Korea, I validated distribution, invasion, foraging, underground activities, attack season as ecological characteristics and also temperature, relative humidity, and tree species as preference characteristics of Korean termites (Reticulitermes speratus kyushuensis Morimoto). Especially, southern part of the Korean peninsula is a suitable area for inhabitation and motion of termites holding same ecological characteristic like R. speratus kyushuensis. Busan is a neighboring district at field distribution north limiting temperature of Coptotermes formosanus Shiraki and Chuncheon is a passing area through the Korean Peninsula of field distribution north limiting temperature of Reticulitermes speratus Kolbe. The termite attack of wood devices was about 34.5% for 3 years in the forest of Jongmyo. Although the attack rate of termite increased each year, the detection rate decreased and the missing rate was high by degrees. I confirmed a foraging habits which is a part of termite colony was a role of continuous decomposition and another was a role of new food hunt as experimental results. The foraging termites were found under ground at Jongmyo in Seoul from April to November in the 2001 and the most active period was on July and August. The termite invasion rate of bait station increased in every monitoring. Through the increasing attack rate of bait station during 2nd monitoring (November, 2000) and 3rd monitoring(March, 2001), I confirmed that termites moved into the deep underground in winter, and were working continuously to forage. R. speratus kyushuensis inhabiting at the Korean Peninsula is a species which has food consumption rate with higher temperature. The termite revealed the greatest amount of food(filter paper) at $30^{\circ}C$(90% RH), but showed increasing death rate at over $32^{\circ}C$. Also, survival rate of this termite was 97% at 84% RH($30^{\circ}C$), but killed 100% at 52% RH($30^{\circ}C$) and 70% RH($30^{\circ}C$). For wood feeding, this was observed the preference in a pine tree(Pinus densiflora) above all others. Survival of termites was high(87%) at a pine tree, but low(13.5%) at a paulownia tree(Paulownia coreana). In this study, I presented the biological characteristic of termite(R. speratus kyushuensis Morimoto) and confirmed the deterioration degree of termite on wooden cultural heritage in Korea. Depending on climate and soil temperature, each area in the southern part of the Korea Peninsula, has some different active period and different distribution of R. speratus kyushensis. With these results, I expect that this report helps to prepare the integrated pest management(IPM) of the termite on wooden cultural heritage in Korea, and it may help to reduce the economical loss from termite damage in Korea.