• Title/Summary/Keyword: Defense Information System Network

Search Result 267, Processing Time 0.031 seconds

Echelons Scale Identification Scheme of Surveillance and Reconnaissance Sensor Network (감시정찰 센서네트워크에서 제대규모 식별 기법)

  • Choi, Ji-Hye;Kwon, Tae-Wook
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.13 no.3
    • /
    • pp.438-444
    • /
    • 2010
  • Surveillance and reconnaissance sensor network system is an application system based on ubiquitous sensor network technology. This technique is to avoid accidental close combat, to minimize the consumption of limited military resources and personnel, and to provide battlefield situational awareness information for the unit's future combat missions. In this paper, we have proposed a echelons scale identification scheme based on information obtained from surveillance and reconnaissance sensor network system.

A Blockchain-enabled Multi-domain DDoS Collaborative Defense Mechanism

  • Huifen Feng;Ying Liu;Xincheng Yan;Na Zhou;Zhihong Jiang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.17 no.3
    • /
    • pp.916-937
    • /
    • 2023
  • Most of the existing Distributed Denial-of-Service mitigation schemes in Software-Defined Networking are only implemented in the network domain managed by a single controller. In fact, the zombies for attackers to launch large-scale DDoS attacks are actually not in the same network domain. Therefore, abnormal traffic of DDoS attack will affect multiple paths and network domains. A single defense method is difficult to deal with large-scale DDoS attacks. The cooperative defense of multiple domains becomes an important means to effectively solve cross-domain DDoS attacks. We propose an efficient multi-domain DDoS cooperative defense mechanism by integrating blockchain and SDN architecture. It includes attack traceability, inter-domain information sharing and attack mitigation. In order to reduce the length of the marking path and shorten the traceability time, we propose an AS-level packet traceability method called ASPM. We propose an information sharing method across multiple domains based on blockchain and smart contract. It effectively solves the impact of DDoS illegal traffic on multiple domains. According to the traceability results, we designed a DDoS attack mitigation method by replacing the ACL list with the IP address black/gray list. The experimental results show that our ASPM traceability method requires less data packets, high traceability precision and low overhead. And blockchain-based inter-domain sharing scheme has low cost, high scalability and high security. Attack mitigation measures can prevent illegal data flow in a timely and efficient manner.

A Proposal of New MOE to Assess the Combat Power Synergistic Effect of Warfare Information System (전장 정보체계의 전투력 상승효과 측정을 위한 새로운 MOE 제안)

  • Lee, Yong-Bok;Jung, Whan-Sik;Kim, Yong-Heup;Lee, Jae-Yeong
    • IE interfaces
    • /
    • v.22 no.3
    • /
    • pp.205-213
    • /
    • 2009
  • Warfare information system is a core factor of future combat operation under NCW(Network centric Warfare) environment. In this paper, we proposed a new MOE(Measure of Effectiveness) that can assess the combat power synergistic effect of warfare information system in the theater-level joint fire operation. This new MOE uses the rule of Newton's second law($F=(m{\Delta}{\upsilon})/{\Delta}t{\Rightarrow}(M{\upsilon}I)/T$). Four factors considered in combat power evaluation are network power(M), movement velocity(v), information superiority(I), command and control time(T). We applied this new MOE to the JFOS-K(Joint Fire Operating System-Korea) to assess its combat power effect and compared with other's effects obtained from different MOE.

An Algorithm for evaluating Combat Power Effectiveness by considering the Influence of Human Factors (인적요소의 영향력을 고려한 전투효과 평가 알고리즘)

  • Kwon, Oh-Sang;Park, Gun-Woo;Lee, Sang-Hoon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.16 no.1
    • /
    • pp.201-210
    • /
    • 2011
  • Each area of society has changed because of the development of information technology. Especially, the advent of NCW based on the technology of network has become a new paradigm for executing warfare. Effectiveness of NCW can be maximized by building the C4I system which is a core system of NCW. However, if we don't consider the influence in term of human dimension, we can't expect the effect of C4I system, since the key factor in C4I is human. In this paper, we propose an algorithm for evaluating Combat Power Effectiveness by considering the Influence of Human Factors that wasn't reflected in the past. Based on experimental validation our algorithm is more substantial than baseline algorithms. In addition, we proved that the Influence of Human Factors(e.g. collaboration) is the most important in battlefield. Therefore, proposed algorithm can be used for enhancing not only mission effectiveness in terms of military field but also work performance by effective Human Resource Management in terms of an enterprise.

Vulnerability Mitigation System Construction Method Based on ATT&CK in M ilitary Internal Network Environment (국방 네트워크 환경에서 ATT&CK 기반 취약점 완화 체계 구축 방안)

  • Ahn, Gwang Hyun;Lee, Hanhee;Park, Won Hyung;Kang, Ji Won
    • Convergence Security Journal
    • /
    • v.20 no.4
    • /
    • pp.135-141
    • /
    • 2020
  • The Ministry of National Defense is strengthening the power and capacity of cyber operations as cyber protection training is conducted. However, considering the level of enemy cyber attack capability, the level of cyber defense capability of the ministry of national defense is significantly low and the protection measures and response system for responding to cyber threats to military networks are not clearly designed, falling short of the level of cyber security capabilities of the public and private sectors. Therefore, this paper is to investigate and verify the establishment of a military internal network vulnerability mitigation system that applies the intention of attackers, tactics, techniques and procedures information (ATT&CK Framework), identified military internal network main threat information, and military information system security requirements with military specificity as factors that can establish a defense network vulnerability mitigation system by referring to the domestic and foreign cyber security framework It has the advantage of having.

A Discovery System of Malicious Javascript URLs hidden in Web Source Code Files

  • Park, Hweerang;Cho, Sang-Il;Park, Jungkyu;Cho, Youngho
    • Journal of the Korea Society of Computer and Information
    • /
    • v.24 no.5
    • /
    • pp.27-33
    • /
    • 2019
  • One of serious security threats is a botnet-based attack. A botnet in general consists of numerous bots, which are computing devices with networking function, such as personal computers, smartphones, or tiny IoT sensor devices compromised by malicious codes or attackers. Such botnets can launch various serious cyber-attacks like DDoS attacks, propagating mal-wares, and spreading spam e-mails over the network. To establish a botnet, attackers usually inject malicious URLs into web source codes stealthily by using data hiding methods like Javascript obfuscation techniques to avoid being discovered by traditional security systems such as Firewall, IPS(Intrusion Prevention System) or IDS(Intrusion Detection System). Meanwhile, it is non-trivial work in practice for software developers to manually find such malicious URLs which are hidden in numerous web source codes stored in web servers. In this paper, we propose a security defense system to discover such suspicious, malicious URLs hidden in web source codes, and present experiment results that show its discovery performance. In particular, based on our experiment results, our proposed system discovered 100% of URLs hidden by Javascript encoding obfuscation within sample web source files.

A proposal of new MOE to assess the combat power synergistic effect of warfare information system. (전장 정보체계의 전투력 상승효과 측정을 위한 새로운 MOE 제안)

  • Lee, Yong-Bok;Kim, Yong-Heup;Lee, Jae-Yeong
    • Proceedings of the Korean Operations and Management Science Society Conference
    • /
    • 2008.10a
    • /
    • pp.104-112
    • /
    • 2008
  • In modern war information system development makes battlefield materialize, and combat factors can maximize combat power exhibition as that apply synchronization. Information system is the core of combat power operation under NCW(Network centric Warfare). This paper proposed a new MOE(Measure of Effectiveness) that can assess the combat power synergistic effect of information system at the theater joint fire operation in NCW environment. This methodology applied the rule of Newton's second law $F=(m{\Delta}{\upsilon})/t{\Rightarrow}(M{\upsilon}I)/T$) Details factor in combat power evaluation is as following. (1) M : Network power; (2) v : Movement velocity; (3) I : Information superiority; (4) T : C2(command and control) time. We applied this methodology to the "JFOS-K(Joint Fire Operating System-Korea) in Joint Chief of Staff" in the real military affair section.

  • PDF

Research of Small Fixed-Wing Swarm UAS (소형 고정익 무인기 군집비행 기술 연구)

  • Myung, Hyunsam;Jeong, Junho;Kim, Dowan;Seo, Nansol;Kim, Yongbin;Lee, Jaemoon;Lim, Heungsik
    • Journal of the Korean Society for Aeronautical & Space Sciences
    • /
    • v.49 no.12
    • /
    • pp.971-980
    • /
    • 2021
  • Recently popularized drone technologies have revealed that low-cost small unmanned aerial vehicles(UAVs) can be a significant threat to prevailing power by operating in group or in swarms. Researchers in many countries have tried to utilize integrated swarm unmanned aerial system(SUAS) in the battlefield. Agency for Defense Development also identified four core technologies in developing SUAS: swarm control, swarm network, swarm information, and swarm collaboration, and the authors started researches on swarm control and network technologies in order to be able to operate vehicle platforms as the first stage. This paper introduces design and integration of SUAS consisting of small fixed-wing UAVs, swarm control and network algorithms, a ground control system, and a launcher, with which swarm control and network technologies have been verified by flight tests. 19 fixed-wing UAVs succeeded in swarm flight in the final flight test for the first time as a domestic research.

Evaluating Algorithm for Network Power Using Social Network Analysis in C2 System (소셜 네트워크 분석 기반 C2 체계 네트워크 파워 평가 알고리즘)

  • Kim, Dong-Seok;Park, Gun-Woo;Lee, Sang-Hoon
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2012.06b
    • /
    • pp.80-82
    • /
    • 2012
  • 전쟁수행 패러다임이 변화하면서 NCW 환경에서 발생하는 네트워크 파워를 측정하려는 많은 연구들이 수행되고 있다. 그러나 기존의 연구는 현실의 전장환경내 구축되어 있는 C2 체계의 네트워크 구조와 각 시스템간의 상호운용성 요소를 평가에 반영하지 못하고 있다. 따라서 본 연구에서는 최근 다양한 분야에서 활용되고 있는 소셜 네트워크 분석 기법을 적용하여 다수의 지휘통제체계에 의해 구축되는 네트워크 구조를 평가할 수 있는 알고리즘을 제안한다. 제안한 알고리즘을 통해 진화하는 군 C2 체계의 네트워크 구조를 대상으로 평가 결과를 분석해보았으며, 연결성에 근거한 네트워크 구조에 상호운용성 가치를 반영함으로써 보다 실질적인 네트워크 파워를 제시함에 그 목적이 있다.

A Study on Building an Integration Security System Applying Virtual Clustering (Virtual Clustering 기법을 적용한 Integration Security System 구축에 관한 연구)

  • Seo, Woo-Seok;Park, Dea-Woo;Jun, Moon-Seog
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.21 no.2
    • /
    • pp.101-110
    • /
    • 2011
  • Recently, an attack to an application incapacitates the intrusion detection rule, the defense policy for a network and database and induces intrusion incidents. Thus, it is necessary to study integration security to ensure the security of an internal network and database from that attack. This article is about building an integration security system to prevent an attack to an application set with intrusion detection rules. It responds to network-based attack through detection, disperses attack with the internal integration security system through virtual clustering and load balancing, and sets up defense policy for attacking destination packets, analyzes and records attack packets, and updates rules through monitoring and analysis. Moreover, this study establishes defense policy according to attacking types to settle access traffic through virtual machine partition policy and suggests an integration security system applied to prevent attack and tests its defense. The result of this study is expected to provide practical data for integration security defense for hacking attack from outside.