• Title/Summary/Keyword: Cyber Battlefield

Search Result 28, Processing Time 0.02 seconds

A Study on the Combination of Manned-unmanned Teaming for Future Ground Combat Victory

  • Sung-Kwon Kim;Sang-Hyuk Park
    • International Journal of Advanced Culture Technology
    • /
    • v.11 no.1
    • /
    • pp.159-164
    • /
    • 2023
  • This study is for manned-unmanned teaming battles for future ground combat victories. The composition of the study is as follows. The introduction to Chapter 1 presents the necessity of this study from a macro perspective, Chapter 2, the review of the complex combat system for both manned and unmanned introduced the paradigm shift of the future battlefield and the cyber area that is superconnected to the network in future wars. Chapter 3 analyzed the combined combat system of manned-unmanned teaming in advanced military countries through the cases of the United States and Israel. In Chapter 4, after discussing the direction of the development of combat performance of the Korean Army, was concluded in Chapter 5. In other words, the purpose of this study is that as the concept of fighting artificial intelligence robots and military innovation changes, the method of performing battles must be changed in order for our military to win the battle.

A Study about the Direction and Responsibility of the National Intelligence Agency to the Cyber Security Issues (사이버 안보에 대한 국가정보기구의 책무와 방향성에 대한 고찰)

  • Han, Hee-Won
    • Korean Security Journal
    • /
    • no.39
    • /
    • pp.319-353
    • /
    • 2014
  • Cyber-based technologies are now ubiquitous around the glob and are emerging as an "instrument of power" in societies, and are becoming more available to a country's opponents, who may use it to attack, degrade, and disrupt communications and the flow of information. The globe-spanning range of cyberspace and no national borders will challenge legal systems and complicate a nation's ability to deter threats and respond to contingencies. Through cyberspace, competitive powers will target industry, academia, government, as well as the military in the air, land, maritime, and space domains of our nations. Enemies in cyberspace will include both states and non-states and will range from the unsophisticated amateur to highly trained professional hackers. In much the same way that airpower transformed the battlefield of World War II, cyberspace has fractured the physical barriers that shield a nation from attacks on its commerce and communication. Cyberthreats to the infrastructure and other assets are a growing concern to policymakers. In 2013 Cyberwarfare was, for the first time, considered a larger threat than Al Qaeda or terrorism, by many U.S. intelligence officials. The new United States military strategy makes explicit that a cyberattack is casus belli just as a traditional act of war. The Economist describes cyberspace as "the fifth domain of warfare and writes that China, Russia, Israel and North Korea. Iran are boasting of having the world's second-largest cyber-army. Entities posing a significant threat to the cybersecurity of critical infrastructure assets include cyberterrorists, cyberspies, cyberthieves, cyberwarriors, and cyberhacktivists. These malefactors may access cyber-based technologies in order to deny service, steal or manipulate data, or use a device to launch an attack against itself or another piece of equipment. However because the Internet offers near-total anonymity, it is difficult to discern the identity, the motives, and the location of an intruder. The scope and enormity of the threats are not just focused to private industry but also to the country's heavily networked critical infrastructure. There are many ongoing efforts in government and industry that focus on making computers, the Internet, and related technologies more secure. As the national intelligence institution's effort, cyber counter-intelligence is measures to identify, penetrate, or neutralize foreign operations that use cyber means as the primary tradecraft methodology, as well as foreign intelligence service collection efforts that use traditional methods to gauge cyber capabilities and intentions. However one of the hardest issues in cyber counterintelligence is the problem of "Attribution". Unlike conventional warfare, figuring out who is behind an attack can be very difficult, even though the Defense Secretary Leon Panetta has claimed that the United States has the capability to trace attacks back to their sources and hold the attackers "accountable". Considering all these cyber security problems, this paper examines closely cyber security issues through the lessons from that of U.S experience. For that purpose I review the arising cyber security issues considering changing global security environments in the 21st century and their implications to the reshaping the government system. For that purpose this study mainly deals with and emphasis the cyber security issues as one of the growing national security threats. This article also reviews what our intelligence and security Agencies should do among the transforming cyber space. At any rate, despite of all hot debates about the various legality and human rights issues derived from the cyber space and intelligence service activity, the national security should be secured. Therefore, this paper suggests that one of the most important and immediate step is to understanding the legal ideology of national security and national intelligence.

  • PDF

A Study on the Militarization of Artificial Intelligence Technology in North Korea and the Development Direction of Corresponding Weapon System in South Korea (북한 인공지능 기술의 군사화와 우리 군의 대응 무기체계 발전방향 연구)

  • Kim, Min-Hyuk
    • Journal of Information Technology Services
    • /
    • v.20 no.1
    • /
    • pp.29-40
    • /
    • 2021
  • North Korea's science and technology policies are being pursued under strong leadership and control by the central government. In particular, a large part of the research and development of science and technology related to the Fourth Industrial Revolution in North Korea is controlled and absorbed by the defense organizations under the national defense-oriented policy framework, among which North Korea is making national efforts to develop advanced technologies in artificial intelligence and actively utilize them in the military affairs. The future weapon system based on AI will have superior performance and destructive power that is different from modern weapons systems, which is likely to change the paradigm of the future battlefield, so a thorough analysis and prediction of the level of AI militarization technology, the direction of development, and AI-based weapons system in North Korea is needed. In addition, research and development of South Korea's corresponding weapon systems and military science and technology are strongly required as soon as possible. Therefore, in this paper, we will analyze the level of AI technology, the direction of AI militarization, and the AI-based weapons system in North Korea, and discuss the AI military technology and corresponding weapon systems that South Korea military must research and develop to counter the North Korea's. The next study will discuss the analysis of AI militarization technologies not only in North Korea but also in neighboring countries in Northeast Asia such as China and Russia, as well as AI weapon systems by battlefield function, detailed core technologies, and research and development measures.

A Study on the Concept of Military Robotic Combat Using the 4th Industrial Revolution Technology (4차 산업혁명 기술을 활용한 군사로봇 전투개념 연구)

  • Sang-Hyuk Park;Seung-Pil Namgung;Sung-Kwon Kim
    • The Journal of the Convergence on Culture Technology
    • /
    • v.9 no.5
    • /
    • pp.397-401
    • /
    • 2023
  • The study presents milestones for the Korean military to win the future battlefield based on the 4th Industrial Revolution. Chapter 1 deals with the necessity of research on how advanced countries operate industrial technology in the defense sector based on the 4th Industrial Revolution. Chapter 2 examines the current technology status of the 4th Industrial Revolution in Korea and the concept of Korean combat. Chapter 3 analyzes the military robotic technology of advanced military countries through examples of unmanned combat robots in the United States, Israel, and Germany. In the end, in future battles, it will be possible to dominate the battlefield only by taking a leap into a super-connected and super-intelligent military based on a high-tech platform. Our military should also research and develop military robotics in accordance with the characteristics of each combat system, and further expand and develop the concept of combat performance to protect our core capabilities and centers from enemy cyber, electronic warfare, and space attacks.

Study on High-speed Cyber Penetration Attack Analysis Technology based on Static Feature Base Applicable to Endpoints (Endpoint에 적용 가능한 정적 feature 기반 고속의 사이버 침투공격 분석기술 연구)

  • Hwang, Jun-ho;Hwang, Seon-bin;Kim, Su-jeong;Lee, Tae-jin
    • Journal of Internet Computing and Services
    • /
    • v.19 no.5
    • /
    • pp.21-31
    • /
    • 2018
  • Cyber penetration attacks can not only damage cyber space but can attack entire infrastructure such as electricity, gas, water, and nuclear power, which can cause enormous damage to the lives of the people. Also, cyber space has already been defined as the fifth battlefield, and strategic responses are very important. Most of recent cyber attacks are caused by malicious code, and since the number is more than 1.6 million per day, automated analysis technology to cope with a large amount of malicious code is very important. However, it is difficult to deal with malicious code encryption, obfuscation and packing, and the dynamic analysis technique is not limited to the performance requirements of dynamic analysis but also to the virtual There is a limit in coping with environment avoiding technology. In this paper, we propose a machine learning based malicious code analysis technique which improve the weakness of the detection performance of existing analysis technology while maintaining the light and high-speed analysis performance applicable to commercial endpoints. The results of this study show that 99.13% accuracy, 99.26% precision and 99.09% recall analysis performance of 71,000 normal file and malicious code in commercial environment and analysis time in PC environment can be analyzed more than 5 per second, and it can be operated independently in the endpoint environment and it is considered that it works in complementary form in operation in conjunction with existing antivirus technology and static and dynamic analysis technology. It is also expected to be used as a core element of EDR technology and malware variant analysis.

A Study on the Strategy for Improvement of Operational Test and Evaluation of Weapon System and the Determination of Priority (무기체계 운용시험평가 개선전략 도출 및 우선순위 결정)

  • Lee, Kang Kyong;Kim, Geum Ryul;Yoon, Sang Don;Seol, Hyeon Ju
    • Convergence Security Journal
    • /
    • v.21 no.1
    • /
    • pp.177-189
    • /
    • 2021
  • Defense R&D is a key process for securing weapons systems determined by mid- and long-term needs to cope with changing future battlefield environments. In particular, the test and evaluation provides information necessary to determine whether or not to switch to mass production as the last gateway to research and development of weapons systems and plays an important role in ensuring performance linked to the life cycle of weapons systems. Meanwhile, if you look at the recent changes in the operational environment of the Korean Peninsula and the defense acquisition environment, you can see three main characteristics. First of all, continuous safety accidents occurred during the operation of the weapon system, which increased social interest in the safety of combatants, and the efficient execution of the limited defense budget is required as acquisition costs increase. In addition, strategic approaches are needed to respond to future battlefield environments such as robots, autonomous weapons systems (RAS), and cyber security test and evaluation. Therefore, in this study, we would like to present strategies for improving the testing and evaluation of weapons systems by considering the characteristics of the security environment that has changed recently. To this end, the improvement strategy was derived by analyzing the complementary elements of the current weapon system operational test and evaluation system in a multi-dimensional model and prioritized through the hierarchical analysis method (AHP).

A Study on the Improvement of Transmission Speed of Data Link Processor (전술데이터링크 처리기의 전송 속도 개선에 대한 연구)

  • Lee, Kang
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.14 no.6
    • /
    • pp.1069-1076
    • /
    • 2019
  • With the development of information and communication technology, the military's battle environment is changing greatly to network centric warfare in where weapon system is connected in a network and carries out mission by exchanging the real-time data. The core of the network centric warfare is Tactical Data Link(TDL) system, and subscribers of TDL exchange tactical information in real time through wireline, wireless and satellite network to share the battlefield situation. The amount of data sent and received through TDL inevitably increase as military's weapon systems equipped with TDL systems increase over time and the performance of communications equipment improves. This study proposes ways to improve the transmission speed and processing capacity of the TDL system by improving the Data Link Processor.

Following the Cold War, both the United States' military operational concept and the Republic of Korea Army's developmental study (탈냉전기 미국의 군사작전 개념과 한국군 발전방향 연구-합동작전을 중심으로)

  • Lee, Se-Han
    • Journal of National Security and Military Science
    • /
    • s.2
    • /
    • pp.121-163
    • /
    • 2004
  • Science technique development expanded into, not only land, sea, and air operations but also those of airspace, and cyber battle spaces. It is generally accepted at this time that space centric operations currently cannot be effectively divided from air operations. However, science and technology advancements make it possible to integrate Army, Navy, Airforce, and Marine forces into effective operations as never before. The Republic of Korea Armed Forces needs to establish a more effective joint concept. The US military, considered by many experts as the most effective in the world, understands the necessity of joint operations and accordingly has highly developed its own concept of joint operations. The US joint operational concepts demonstrated their effectiveness during the Iraqi War by dominating the battlefield through effective use of all combat and non-combat power. Following the US Iraqi War experience, the US Department of Defense continued to enhance Joint Capability through the acceleration of US Military Transformation involving all components. The future national security of the Republic of Korea, faced with the peculiarity of communist threat in the form of North Korea, and the conflicting interest of four strong powers; the United States, China, Japan, and Russia, depends on small but strong armed forces employing all available combat power through effective National and Military Strategy, and considering domestic and international constraints. In order to succeed in future wars, military operations following joint operational concepts must effectively employ all available combat power in a timely manner. The Republic of Korea Armed Forces must establish a joint forces concept in order to integrate all available combat power during employment. Therefore we must establish military operations that develop the military structure and organization, doctrine, weapon systems, training and education of our armed forces based on the key concept of joint operations.

  • PDF