• Title/Summary/Keyword: Defense Information System Network

Search Result 268, Processing Time 0.024 seconds

A Study on a 4-Stage Phased Defense Method to Defend Cloud Computing Service Intrusion (Cloud Computing 서비스 침해방어를 위한 단계별 4-Stage 방어기법에 관한 연구)

  • Seo, Woo-Seok;Park, Dea-Woo;Jun, Moon-Seog
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.7 no.5
    • /
    • pp.1041-1051
    • /
    • 2012
  • Attack on Cloud Computing, an intensive service solution using network infrastructure recently released, generates service breakdown or intrusive incidents incapacitating developmental platforms, web-based software, or resource services. Therefore, it is needed to conduct research on security for the operational information of three kinds of services (3S': laaS, PaaS, SaaS) supported by the Cloud Computing system and also generated data from the illegal attack on service blocking. This paper aims to build a system providing optimal services as a 4-stage defensive method through the test on the attack and defense of Cloud Computing services. It is a defense policy that conducts 4-stage, orderly and phased access control as follows: controlling the initial access to the network, controlling virtualization services, classifying services for support, and selecting multiple routes. By dispersing the attacks and also monitoring and analyzing to control the access by stage, this study performs defense policy realization and analysis and tests defenses by the types of attack. The research findings will be provided as practical foundational data to realize Cloud Computing service-based defense policy.

T-Chord Ring System based on Overlay Network for Service Discovery and Delivery in MANET (MANET에서 서비스 발견 및 전달을 위한 오버레이 네트워크 기반의 T-Chord 링 시스템)

  • Han, Insung;Jeong, Hongsik;Park, Moosung
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.50 no.1
    • /
    • pp.51-63
    • /
    • 2013
  • Recently with base apply MANET with the application for the service discovery and delivery which are various techniques are being proposed the result of such MANET base research techniques from actual inside. This dissertation proposes T-Chord(Trustworthy-based Chord) Ring system for MANET to guarantees from such requirements. T-Chord Ring system in order to manage Efficiently the services which the mobile nodes provide is the service discovery system which uses P2P overlay network Technique in mobile environment. The system which is proposed MANET communications in order to accomplish a service discovery operation with physical network class and logical network class will be able to minimize problems from about MANET service discoveries, and uses the dispersive hash table technique for a service discovery and effectiveness of service discovery improves and will be able to guarantee the expandability of network size. The mobile nodes(mobile device) have a mobility from MANET and operate with service request node, service provide node and service transmit node. The mobile nodes will be able to elect cluster header using Trustworthy that was evaluated service request, provision and delivery in each other. The system which is proposed a service discovery and a delivery efficiently will compose the cluster head which will grow of P2P overlay networks and will be able to accomplish. The system which proposes from dissertation is composed of Trustworthy evaluations of MANET mobile nodes, service information collection which is dispersed and P2P overlay networks that composed of Chord algorithm modules which provide O(Log N) efficiencies. The system comparison evaluation analyzes an efficiency from the expandability side of effectiveness and the network of service discovery technique and the service discovery message over head, service discovery and delivery of former times and service discovery and delivery is excellent gives proof from MANET.

The Representative Technology Field Analysis of Domestic Defense Companies in Communication-electronics based on Patent Information Data (특허 자료 정보 기반 국내 통신전자 방산업체 대표 기술 분야 분석)

  • Kim, Jang-Eun;Cho, Yu-Seup
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.18 no.4
    • /
    • pp.446-458
    • /
    • 2017
  • In order to make a decision about the acquisition of command control communication weapon systems considering the client's technology level requirements, the improvement of the domestic technology level and security of core technology, the person in charge can perform technology evaluation/analysis based on command control communication weapon system patent data. As a method of collecting such patent data, we can collect the patent data of government-designated (Defense Acquisition Program Act Article 35) companies (11 Major defense companies/9 General defense companies) through the Korea Intellectual Property Rights Information System (KIPRIS) of the Korean Intellectual Property Office (KIPO) In this way, we collected 1,526 patents and 134 International Patent Classification (IPC) types through the KIPRIS of the KIPO. Based on these data, we performed three types of analysis, General information analysis, Principal Components Analysis (PCA) and Network analysis, and extracted 27, 19 and 13 IPC types from them, respectively. Based on the above three analysis results, we confirmed 8 IPC types (F41A, F41G, G06F, G01S, H04B, H04L, H04M and H04W) as the key technologies and representative technology fields of domestic communication-electronics defense companies.

A Study on the Establishment of Comparison System between the Statement of Military Reports and Related Laws (군(軍) 보고서 등장 문장과 관련 법령 간 비교 시스템 구축 방안 연구)

  • Jung, Jiin;Kim, Mintae;Kim, Wooju
    • Journal of Intelligence and Information Systems
    • /
    • v.26 no.3
    • /
    • pp.109-125
    • /
    • 2020
  • The Ministry of National Defense is pushing for the Defense Acquisition Program to build strong defense capabilities, and it spends more than 10 trillion won annually on defense improvement. As the Defense Acquisition Program is directly related to the security of the nation as well as the lives and property of the people, it must be carried out very transparently and efficiently by experts. However, the excessive diversification of laws and regulations related to the Defense Acquisition Program has made it challenging for many working-level officials to carry out the Defense Acquisition Program smoothly. It is even known that many people realize that there are related regulations that they were unaware of until they push ahead with their work. In addition, the statutory statements related to the Defense Acquisition Program have the tendency to cause serious issues even if only a single expression is wrong within the sentence. Despite this, efforts to establish a sentence comparison system to correct this issue in real time have been minimal. Therefore, this paper tries to propose a "Comparison System between the Statement of Military Reports and Related Laws" implementation plan that uses the Siamese Network-based artificial neural network, a model in the field of natural language processing (NLP), to observe the similarity between sentences that are likely to appear in the Defense Acquisition Program related documents and those from related statutory provisions to determine and classify the risk of illegality and to make users aware of the consequences. Various artificial neural network models (Bi-LSTM, Self-Attention, D_Bi-LSTM) were studied using 3,442 pairs of "Original Sentence"(described in actual statutes) and "Edited Sentence"(edited sentences derived from "Original Sentence"). Among many Defense Acquisition Program related statutes, DEFENSE ACQUISITION PROGRAM ACT, ENFORCEMENT RULE OF THE DEFENSE ACQUISITION PROGRAM ACT, and ENFORCEMENT DECREE OF THE DEFENSE ACQUISITION PROGRAM ACT were selected. Furthermore, "Original Sentence" has the 83 provisions that actually appear in the Act. "Original Sentence" has the main 83 clauses most accessible to working-level officials in their work. "Edited Sentence" is comprised of 30 to 50 similar sentences that are likely to appear modified in the county report for each clause("Original Sentence"). During the creation of the edited sentences, the original sentences were modified using 12 certain rules, and these sentences were produced in proportion to the number of such rules, as it was the case for the original sentences. After conducting 1 : 1 sentence similarity performance evaluation experiments, it was possible to classify each "Edited Sentence" as legal or illegal with considerable accuracy. In addition, the "Edited Sentence" dataset used to train the neural network models contains a variety of actual statutory statements("Original Sentence"), which are characterized by the 12 rules. On the other hand, the models are not able to effectively classify other sentences, which appear in actual military reports, when only the "Original Sentence" and "Edited Sentence" dataset have been fed to them. The dataset is not ample enough for the model to recognize other incoming new sentences. Hence, the performance of the model was reassessed by writing an additional 120 new sentences that have better resemblance to those in the actual military report and still have association with the original sentences. Thereafter, we were able to check that the models' performances surpassed a certain level even when they were trained merely with "Original Sentence" and "Edited Sentence" data. If sufficient model learning is achieved through the improvement and expansion of the full set of learning data with the addition of the actual report appearance sentences, the models will be able to better classify other sentences coming from military reports as legal or illegal. Based on the experimental results, this study confirms the possibility and value of building "Real-Time Automated Comparison System Between Military Documents and Related Laws". The research conducted in this experiment can verify which specific clause, of several that appear in related law clause is most similar to the sentence that appears in the Defense Acquisition Program-related military reports. This helps determine whether the contents in the military report sentences are at the risk of illegality when they are compared with those in the law clauses.

A Study on the regional cluster of munition industry by Social Network Analysis (사회연결망분석을 통한 군수품 산업의 지역별 클러스터 관계에 관한 연구)

  • Park, Dongsoo;Kim, JeongHwan;Lee, Donghun
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.19 no.10
    • /
    • pp.386-393
    • /
    • 2018
  • The Korean military supplies industry tends to become limited in terms of its development to specific areas in line with strategic promotion policies of the local private direct industrial site. However, the relation between base and small cluster is getting lower of the local industrial site. In this study, information related to authorized test reports for munitions was collected through the military quality information system and subjected to social network analysis(SNA). SNA was performed through the relationships among defense quality assurance agencies, test institutions, contracts and cooperative firms through UCINET's Two-Mode Network. In the field of weapon systems, the median technology industry, and the test analysis dependent are high in Seoul, so the analysis revealed that strengthening the infrastructure for test analysis is needed. Also, it was deemed necessary for government-driven political support. Besides, the field support system was efficiently utilizing a relatively local test analysis. It was analyzed that they are overcoming the regional boundaries of small clusters by strategically changing their contract and cooperative firms' status. The research found some spatial inconsistencies between base and small clusters in the military supplies industry, and it was judged that a political suggestion was needed.

An Intrusion Detection Technique Suitable for TICN (전술정보통신체계(TICN)에 적합한 침입탐지 기법)

  • Lee, Yun-Ho;Lee, Soo-Jin
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.14 no.6
    • /
    • pp.1097-1106
    • /
    • 2011
  • Tactical Information Communication Network(TICN), a concept-type integrated Military Communication system that enables precise command control and decision making, is designed to advance into high speed, large capacity, long distance wireless relay transmission. To support mobility in battlefield environments, the application of Ad-hoc networking technology to its wireless communication has been examined. Ad-hoc network works properly only if the participating nodes cooperate in routing and packet forwarding. However, if selfish nodes not forwarding packets of other nodes and malicious nodes making the false accusation are in the network, it is faced to many threats. Therefore, detection and management of these misbehaving nodes is necessary to make confident in Ad-hoc networks. To solve this problem, we propose an efficient intrusion detection technique to detect and manage those two types of attacks. The simulation-based performance analysis shows that our approach is highly effective and can reliably detect a multitude of misbehaving node.

Specification-based Intrusion Detection System for the Initial Authentication Phase of WiBro (와이브로의 초기인증에 적합한 명세기반의 침입탐지시스템)

  • Lee, Yun-Ho;Lee, Soo-Jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.20 no.2
    • /
    • pp.23-32
    • /
    • 2010
  • WiBro(Wireless Broadband), the service based on IEEE 802.16e(mobile WiMAX) standard, is a wireless broadband Internet technology being developed by the domestic telecommunication industry. In this paper, we analyze security vulnerabilities of WiBro focusing on initial authentication phase and propose a specification-based intrusion detection system that can detect those vulnerabilities. We first derive a specification from the normally operational process of the initial authentication based on PKMv2 EAP-AKA and formalize the derived specification as a state transition diagram. Proposed system executes the intrusion detection based on those specification and state transition diagram. In this paper, to verify the detection capability of proposed system, we construct a test bed network and execute scenario-based test.

A Study on the Identifying Emerging Defense Technology using S&T Text Mining (S&T Text Mining을 이용한 국방 유망기술 식별에 관한 연구)

  • Lee, Tae-Bong;Lee, Choon-Joo
    • Journal of the military operations research society of Korea
    • /
    • v.36 no.1
    • /
    • pp.39-49
    • /
    • 2010
  • This paper tries to identify emerging defense technology using S&T Text Mining. As a national agenda, there has been much effort to build S&T information systems including NTIS and DTiMS that enable researchers, policy makers, or field users to analyze technological changes and promote the best policy practices for efficient workflow, knowledge sharing, strategy development, or institutional competitiveness. In this paper, the S&T Text Mining application to unmanned combat technology using INSPEC DB is empirically illustrated and shows that it is a feasible approach to identify emerging defense technology as well as the structure of knowledge network of the future technology candidates.

Design of an Intrusion Detection System for Defense in Depth (계층적 방어를 위한 침입탐지 시스템 설계)

  • Koo, Min-Jeong;Han, Woo-Chul;Chang, Young-Hyun
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2010.07a
    • /
    • pp.525-526
    • /
    • 2010
  • 2000년 대규모 DDoS 공격이래, 2009년 7월 7일 국가주요정부기관 및 인터넷 포털, 금융권 등의 웹사이트 대상으로 1차, 2차, 3차로 나누어 대규모 사이버 공격이 발생하였다. 지속적으로 발전되는 행태를 보이고 DDoS 공격에 대해 본 논문에서는 계층적인 침입탐지시스템을 설계하였다. 네트워크 패킷을 분석하기 위해 e-Watch, NetworkMiner등의 패킷, 프로토콜 분석도구를 이용하여 TCP/IP의 Layer별 공격을 분석한 후 패킷의 유입량, 로그정보, 접속정보, Port, Address 정보를 분석하고 계층침입에 대한 방어를 수행하도록 설계하였다. 본 논문은 DDoS(Distributed Denial of Service)에 대한 패킷 전송에 대해 계층적인 방어를 통해 보다 안정적인 패킷수신이 이루어진다.

  • PDF

Analysis of Routing Protocol for Tactical Backbone of TICN (TICN 전술백본망을 위한 라우팅 프로토콜 분석)

  • Jang, Dong-Ki;Kwon, Tae-Wook
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.13 no.4
    • /
    • pp.650-658
    • /
    • 2010
  • Recently Korea Army developed the TICN which is the next army tactical communication system. The TICN will support ability from under environment, strategy maneuver communication system of integrated army dimension overcome and NCW. If the IER(Information Exchange Requirement) phases 3 of the future application system, the analysis that a transmission ability of the TICN is the uncapable is govern. The TICN tactical backbone's ability is very important. Therefore, network efficiency index in application and analysis of the standard protocol for the data transmission guarantee are obliged. For the TICN tactical backbone, this paper analyzes of routing protocol efficiency index and compares to superiority of the OSPF(v2) and integrated IS-IS protocols in the tactical environment. Conclusively we proposed that integrated IS-IS protocol is more suitable for TICN backbone routing protocol.