• Title/Summary/Keyword: Cyber Weapon

Search Result 30, Processing Time 0.026 seconds

A Simulated Study on the Stability during Crossing Operation of K21 Infantry Fighting Vehicle (K21 보병전투차량의 도하작전 간 안정성에 관한 시뮬레이션 연구)

  • Sung Do Kim;Byung Kil Lee;Jang Wook Hur
    • Journal of the Korean Society of Systems Engineering
    • /
    • v.19 no.1
    • /
    • pp.39-43
    • /
    • 2023
  • In ground weapon systems, the design and analysis technology for water operation stability is a relatively unknown area compared to maritime weapon systems. Through this study, it was confirmed that our weapon system satisfies the criteria for stability on the water when considering the operational concept and operational performance. However, there is a limitation of the study that it did not perform verification tests on the actual system. Therefore, in the future research and weapon system acquisition process, a procedure to prove the stability through freeboard analysis using the actual system is required.

Cyber threats: taxonomy, impact, policies, and way forward

  • Malik, Annas W.;Abid, Adnan;Farooq, Shoaib;Abid, Irfan;Nawaz, Naeem A.;Ishaq, Kashif
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.16 no.7
    • /
    • pp.2425-2458
    • /
    • 2022
  • The continuous evolution and proliferation of computer technology and our increasing dependence on computer technology have created a new class of threats: "cyber threats." These threats can be defined as activities that can undermine a society's ability to maintain internal or external order while using information technology. Cyber threats can be mainly divided into two categories, namely cyber-terrorism and cyber-warfare. A variety of malware programs are often used as a primary weapon in these cyber threats. A significant amount of research work has been published covering different aspects of cyber threats, their countermeasures, and the policy-making for cyber laws. This article aims to review the research conducted in various important aspects of cyber threats and provides synthesized information regarding the fundamentals of cyber threats; discusses the countermeasures for such threats; provides relevant details of high-profile cyber-attacks; discusses the developments in global policy-making for cyber laws, and lastly presents promising future directions in this area.

A Study on the Cyber Weapons Classification System (사이버무기 분류체계에 관한 시론)

  • Lee, Yongseok;Kwon, Hunyeong;Choi, Jeongmin;Lim, Jongin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.4
    • /
    • pp.905-917
    • /
    • 2018
  • The sovereign state has the right to engage in self-defense or war with the approval of the Security Council when it receives an invasion of territory from a foreign country. War is conducted under the principle of the necessity and proportionality of self-defense. In case of cyber attack, proportional countermeasure must be made through attack means and effect analysis, and cyber weapons need to be classified for this purpose. Therefore, this study aims to provide a rational and legitimate response according to the necessity and proportionality of the self - defense right by suggesting definition and classification criteria of cyber weapons. In this study, cyber weapons were defined as "means of collecting, attacking, and protecting information using cyber technology in the cyber space according to military objectives. Based on existing weapon systems and public cyber weapons cases, cyber weapons were classified as (1) cyber weapons for information gathering, (2) cyber weapons for attack, and (3) cyber weapons for protection. We suggest the considerations for applying the proportional response according to this functional classification. In order to guarantee the principle of proportionality to cyber attacks in the future, the classification study based on the cyber weapon effect should be conducted. This study has conducted an exploratory study on the classification of cyber clusters which constitutes one axis of the proportionality principle.

A Study on Constructing a RMF Optimized for Korean National Defense for Weapon System Development (무기체계 개발을 위한 한국형 국방 RMF 구축 방안 연구)

  • Jung keun Ahn;Kwangsoo Cho;Han-jin Jeong;Ji-hun Jeong;Seung-joo Kim
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.33 no.5
    • /
    • pp.827-846
    • /
    • 2023
  • Recently, various information technologies such as network communication and sensors have begun to be integrated into weapon systems that were previously operated in stand-alone. This helps the operators of the weapon system to make quick and accurate decisions, thereby allowing for effective operation of the weapon system. However, as the involvement of the cyber domain in weapon systems increases, it is expected that the potential for damage from cyber attacks will also increase. To develop a secure weapon system, it is necessary to implement built-in security, which helps considering security from the requirement stage of the software development process. The U.S. Department of Defense is implementing the Risk Management Framework Assessment and Authorization (RMF A&A) process, along with the introduction of the concept of cybersecurity, for the evaluation and acquisition of weapon systems. Similarly, South Korea is also continuously making efforts to implement the Korea Risk Management Framework (K-RMF). However, so far, there are no cases where K-RMF has been applied from the development stage, and most of the data and documents related to the U.S. RMF A&A are not disclosed for confidentiality reasons. In this study, we propose the method for inferring the composition of the K-RMF based on systematic threat analysis method and the publicly released documents and data related to RMF. Furthermore, we demonstrate the effectiveness of our inferring method by applying it to the naval battleship system.

State Management Mechanisms for the Exchange of Information Regarding Cyberattacks, Cyber Incidents and Information Security Incidents

  • Kryshtanovych, Myroslav;Britchenko, Igor;Losonczi, Peter;Baranovska, Tetiana;Lukashevska, Ulyana
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.4
    • /
    • pp.33-38
    • /
    • 2022
  • The main purpose of the study is to determine the key aspects of the mechanisms of state management of the exchange of information about cyberattacks, cyber incidents, and information security incidents. The methodology includes a set of theoretical methods. Modern government, on the one hand, must take into account the emergence of such a new weapon as cyber, which can break various information systems, can be used in hybrid wars, influence political events, pose a threat to the national security of any state. As a result of the study, key elements of the mechanisms of state management of the exchange of information about cyberattacks, cyber incidents, and information security incidents were identified.

Risk Analysis and Monitoring Model of Urban SCADA Network Infrastructure (도시 기반시설 SCADA 망의 위험분석 및 모니터링 모델 연구)

  • Kim, Wan-Jib;Lee, Kyung-Ho;Kim, Huy-Kang;Youm, Heung-Youl
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.21 no.6
    • /
    • pp.67-81
    • /
    • 2011
  • In recently years, there are cyber-weapon aim to national infrastructure such as 'stuxnet'. Security experts of the world are paying attention to this phenomenon. The networks which controls traffic, subway, waterworks of the city are safe from threats such as computer virus, malware, because the networks were built on closed-networks. However, it's about time to develop countermeasure for the cyber-weapon. In this paper, we review status-quo of the control systems for metropolitan infrastructure and analyze the risk of industrial control system in SCADA(Supervisory Control And Data Acquisition) network. Finally, we propose a security model for control systems of metropolitan infrastructure.

A Study on the Militarization of Artificial Intelligence Technology in North Korea and the Development Direction of Corresponding Weapon System in South Korea (북한 인공지능 기술의 군사화와 우리 군의 대응 무기체계 발전방향 연구)

  • Kim, Min-Hyuk
    • Journal of Information Technology Services
    • /
    • v.20 no.1
    • /
    • pp.29-40
    • /
    • 2021
  • North Korea's science and technology policies are being pursued under strong leadership and control by the central government. In particular, a large part of the research and development of science and technology related to the Fourth Industrial Revolution in North Korea is controlled and absorbed by the defense organizations under the national defense-oriented policy framework, among which North Korea is making national efforts to develop advanced technologies in artificial intelligence and actively utilize them in the military affairs. The future weapon system based on AI will have superior performance and destructive power that is different from modern weapons systems, which is likely to change the paradigm of the future battlefield, so a thorough analysis and prediction of the level of AI militarization technology, the direction of development, and AI-based weapons system in North Korea is needed. In addition, research and development of South Korea's corresponding weapon systems and military science and technology are strongly required as soon as possible. Therefore, in this paper, we will analyze the level of AI technology, the direction of AI militarization, and the AI-based weapons system in North Korea, and discuss the AI military technology and corresponding weapon systems that South Korea military must research and develop to counter the North Korea's. The next study will discuss the analysis of AI militarization technologies not only in North Korea but also in neighboring countries in Northeast Asia such as China and Russia, as well as AI weapon systems by battlefield function, detailed core technologies, and research and development measures.

Integrated Scenario Authoring Method using Mission Impact Analysis Tool due to Cyber Attacks (사이버공격에 의한 임무영향 분석 도구를 이용한 통합시나리오 저작 방법)

  • Yonghyun Kim;Donghwa Kim;Donghwan Lee;Juyoub Kim;Myung Kil Ahn
    • Journal of Internet Computing and Services
    • /
    • v.24 no.6
    • /
    • pp.107-117
    • /
    • 2023
  • It must be possible to assess how combat actions taking place in cyberspace affect the military's major mission systems and weapon systems. In order to analyze the mission impact caused by a cyber attack through cyber M&S, the target mission system and cyber warfare elements must be built as a model and a scenario for simulation must be authored. Many studies related to mission impact analysis due to cyber warfare have been conducted focusing on the United States, and existing studies have authored separate scenarios for physical battlefields and cyber battlefields. It is necessary to build a simulation environment that combines a physical battlefield model and a cyber battlefield model, and be able to integrate and author mission scenarios and cyber attack/defense scenarios. In addition, the physical battlefield and cyber battlefield are different work areas, so authoring two types of scenarios for simulation is very complicated and time-consuming. In this paper, we propose a method of using mission system information to prepare the data needed for scenario authoring in advance and using the pre-worked data to author an integrated scenario. The proposed method is being developed by reflecting it in the design of the scenario authoring tool, and an integrated scenario authoring in the field of counter-fire warfare is being performed to prove the proposed method. In the future, by using a scenario authoring tool that reflects the proposed method, it will be possible to easily author an integrated scenario for mission impact analysis in a short period of time.

Review on improving measurement of cyber terror management system

  • Park, Jong-Ryeol;Noe, Sang-Ouk
    • Journal of the Korea Society of Computer and Information
    • /
    • v.21 no.6
    • /
    • pp.89-96
    • /
    • 2016
  • Damage and attack size of cyber terror is growing to the national size. Not only targeting at a certain companies or individuals but number of cyber terror targeting government bodies or unspecific people is increasing. This is because compared to traditional weapon, input cost is very cheap but ripple effect and shock are much stronger, affecting not only certain groups but also each individuals. 'Anti-terror measurement for protection of nation and public safety' passed last month is one of the renowned measurement passed regardless of objection from opposition party. The opposition party went against this through filibuster for 192 hours but this finally passed National Congress due to lack of oppositions. Korean government is taking post actions after passage of anti-terror measurement. Legislation of enforcement ordinance and regulations is due by 6th of next month. This regulation will be executed from June 4th after legislation. Whenever there is any security issues such as hacking of Korea Hydro and Nuclear Power and National Intelligence Service happens, lot of attention is made to those hackers. However, social recognition or management of those hackers need lot more improvement. Especially, as market of internet of things is increasing, there is an increased anxiety on information security. But as we only rely on security solutions, this problems are keep happening. Therefore, active investment on nurturing hackers who play the role of 'spear and shield' shall be made. Government should put more efforts to allow white hackers to show their abilities. We should have a policy for supporting high-quality programs such as BoB. To make information protection industry into future growth engine, it is necessary to nurture professionals for information protection and white hackers through special programs. Politicians should make related regulations as soon as possible to remove factors that prevent swift management of cyber attack due to lack of legislation. Government should pay lot more financial investment to nurturing professional manpower than now. Protecting life and asset of nation is responsibility and duty of our government. We all should recognize that controlling cyber attack is a part of national defense.

A Study on Image Labeling Technique for Deep-Learning-Based Multinational Tanks Detection Model

  • Kim, Taehoon;Lim, Dongkyun
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.14 no.4
    • /
    • pp.58-63
    • /
    • 2022
  • Recently, the improvement of computational processing ability due to the rapid development of computing technology has greatly advanced the field of artificial intelligence, and research to apply it in various domains is active. In particular, in the national defense field, attention is paid to intelligent recognition among machine learning techniques, and efforts are being made to develop object identification and monitoring systems using artificial intelligence. To this end, various image processing technologies and object identification algorithms are applied to create a model that can identify friendly and enemy weapon systems and personnel in real-time. In this paper, we conducted image processing and object identification focused on tanks among various weapon systems. We initially conducted processing the tanks' image using a convolutional neural network, a deep learning technique. The feature map was examined and the important characteristics of the tanks crucial for learning were derived. Then, using YOLOv5 Network, a CNN-based object detection network, a model trained by labeling the entire tank and a model trained by labeling only the turret of the tank were created and the results were compared. The model and labeling technique we proposed in this paper can more accurately identify the type of tank and contribute to the intelligent recognition system to be developed in the future.