• Title/Summary/Keyword: Defended Asset

Search Result 3, Processing Time 0.019 seconds

Application and Determination of Defended Footprint Using a Simulation Model for Ballastic Missile Trajectory (탄도미사일 궤적 시뮬레이션 모델을 이용한 방어영역 산출 및 응용)

  • Hong, Dongwg;Yim, Dongsoon;Choi, Bongwhan
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.21 no.4
    • /
    • pp.551-561
    • /
    • 2018
  • Footprint is defined as ground area that is projected from the outer edges of the battle space protected by a defence system. This concept can be effectively used for making decisions on site selection of anti missile systems to defend against enemy's ballistic missiles. In this paper, simulations of ballistic missile trajectories based on various launch conditions are performed first and then the footprint is derived with engagement zone set as a boundary condition. Results of the simulation with various relative positions between the defense system and defended asset are also presented. The proposed method, in which the trajectories are generated based on launch point of the ballistic missile, has an advantage of approximating the defended area close to reality. Two applications are introduced in the present paper to describe how the derivation of defended area could be utilized in deployment decision of defense systems.

A Study on Intercept Probability and Cost based Multi-layer Defense Interceptor Operating Method using Mathematical Model (수리모형을 이용한 요격확률 및 비용 기반의 다층 방어 요격미사일 운용방법 연구)

  • Seo, Minsu;Ma, Jungmok
    • Journal of the Korea Society for Simulation
    • /
    • v.29 no.2
    • /
    • pp.49-61
    • /
    • 2020
  • It is important to operate a limited number of interceptors effectively to counter ballistic missile threats. The existing interceptor operating method determines the number of interceptors according to the level of TBM (Theater Ballistic Missile) engagement effectiveness applied to a defended asset. It can cause either excessive interceptor waste compared to the intercept probability or the intercept probability decrease. Thus, interceptor operating method must be decided considering the number of ballistic missiles, intercept probability and cost. This study proposes a mathematical model to improve the existing interceptor operating method. In addition, the efficiency indicator is proposed for trade-off between intercept probability and cost. As a result of the simulations, the mathematical model-based interceptor operating method can achieve better results than the existing interceptor operating method.

Probabilistic safety assessment-based importance analysis of cyber-attacks on nuclear power plants

  • Park, Jong Woo;Lee, Seung Jun
    • Nuclear Engineering and Technology
    • /
    • v.51 no.1
    • /
    • pp.138-145
    • /
    • 2019
  • With the application of digital technology to safety-critical infrastructures, cyber-attacks have emerged as one of the new dangerous threats. In safety-critical infrastructures such as a nuclear power plant (NPP), a cyber-attack could have serious consequences by initiating dangerous events or rendering important safety systems unavailable. Since a cyber-attack is conducted intentionally, numerous possible cases should be considered for developing a cyber security system, such as the attack paths, methods, and potential target systems. Therefore, prior to developing a risk-informed cyber security strategy, the importance of cyber-attacks and significant critical digital assets (CDAs) should be analyzed. In this work, an importance analysis method for cyber-attacks on an NPP was proposed using the probabilistic safety assessment (PSA) method. To develop an importance analysis framework for cyber-attacks, possible cyber-attacks were identified with failure modes, and a PSA model for cyber-attacks was developed. For case studies, the quantitative evaluations of cyber-attack scenarios were performed using the proposed method. By using quantitative importance of cyber-attacks and identifying significant CDAs that must be defended against cyber-attacks, it is possible to develop an efficient and reliable defense strategy against cyber-attacks on NPPs.