• Title/Summary/Keyword: Defense Information System Network

Search Result 267, Processing Time 0.028 seconds

Improving the Backbone Architecture of the National Defence Information System Network (국방정보통신망 백본구조 개선 방안)

  • Kim, HanKwan;Lee, KilSup;Lee, SungJong
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2004.05a
    • /
    • pp.1295-1298
    • /
    • 2004
  • 국내 정보화 서비스 수준의 향상과 멀티미디어 유형의 자료의 증가로 초고속 광 네트워크 기술에 대한 관심이 높아지고 있다. 한편, 국방정보통신망은 ATM 기술을 기반으로 한 백본 망을 구성하여 운영 중이나 최근에는 매년 평균 1.5배 규모로 통화량이 증가하고 있는 추세이다. 이에 따라 수년 내에 현 백본 망에서 수용할 수 있는 통화량의 한계점에 도달할 것으로 예측되어 백본구조의 개선이 필요한 시점이다. 따라서 본 논문에서는 초고속 광 네트워크 기술을 이용하여 국방정보통신망의 백본구조를 개선하는 방안을 제시하고자 한다. 이를 위하여 최신 광 전송 및 네트워크 기술을 살펴보고, 실행 가능한 2가지 대안을 제시한다. 이어서 이들 대안들에 대한 장점, 제한사항 그리고 정량적인 비용분석을 통하여 최적안을 제안한다. 그 결과 국방정보통신망의 5년간 증설 및 운용유지 비용에서 28% 정도를 절감하면서 통화량 수용능력을 최소 1.7배 이상 확대하여 차후 망의 증설에 대비한 유연성을 확보하는 효과가 기대된다.

  • PDF

QoS Support in the Air Defense Alternative System (방공작전 예비체계의 QoS 지원)

  • Sim, Dong-Sub;Lee, Young-Ran;Kim, Ki-Hyung
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.13 no.5
    • /
    • pp.903-909
    • /
    • 2010
  • ADAS is the air defense control system performing air surveillance and identification of ROK and near air. This system is self-developed by Air Force, currently operated successfully as the alternative system of MCRC. ADAS processes converting and combining transferred the real time radar data detected by radars. additionally, it displays significant radar data as producing in tracks. Then, it uses the message queue for IPC(Inter Process Communication). the various tactical data processed in the server is ultimately send to the network management process through the message queue for transmitting to the weapon director console. the weapon director receives this transmitted tactical data through the console to execute air defense operations. However, there is a problem that data packet is delayed or lost since the weapon Director does not receive as the amount of tactical data from the server overflowed with air tracks and missions increased. This paper improved the algorism to display and transmit the various tactical data processed from ADAS server to numbers of the weapon director console in the real time without any delay or lost. Improved the algorism, established at exercise, the development server in the real operation network and the weapon director console, is proved by comparing the number of sending tactical data packets in the server and receiving packets in the weapon director.

Automated Assessment Of The Air Situation During The Preparation And Conduct Of Combat Operations Using A Decision Support System Based On Fuzzy Networks Of Target Installations

  • Volkov, Andriy;Bazilo, Serhii;Tokar, Oleksandr;Horbachov, Kostiantyn;Lutsyshyn, Andrii;Zaitsev, Ihor;Iasechko, Maksym
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.11
    • /
    • pp.184-188
    • /
    • 2022
  • The article considers the improved method and model of automated air situation assessment using a decision support system based on fuzzy networks of target installations. The advanced method of automated assessment of the air situation using the decision support system is based on the methodology of reflexive control of the first rank. With this approach, the process of assessing the air situation in the framework of the formulated task can be reduced to determining the purpose, probabilistic nature of actions and capabilities of the air target. The use of a homogeneous functional network for the formal presentation of air situation assessment processes will formally describe the process of determining classes of events during air situation assessment and the process of determining quantitative and qualitative characteristics of recognized air situation situations. To formalize the patterns of manifestation of the values of quantitative and symbolic information, it is proposed to use the mathematical apparatus of fuzzy sets.

Intrusion Detection System based on Packet Payload Analysis using Transformer

  • Woo-Seung Park;Gun-Nam Kim;Soo-Jin Lee
    • Journal of the Korea Society of Computer and Information
    • /
    • v.28 no.11
    • /
    • pp.81-87
    • /
    • 2023
  • Intrusion detection systems that learn metadata of network packets have been proposed recently. However these approaches require time to analyze packets to generate metadata for model learning, and time to pre-process metadata before learning. In addition, models that have learned specific metadata cannot detect intrusion by using original packets flowing into the network as they are. To address the problem, this paper propose a natural language processing-based intrusion detection system that detects intrusions by learning the packet payload as a single sentence without an additional conversion process. To verify the performance of our approach, we utilized the UNSW-NB15 and Transformer models. First, the PCAP files of the dataset were labeled, and then two Transformer (BERT, DistilBERT) models were trained directly in the form of sentences to analyze the detection performance. The experimental results showed that the binary classification accuracy was 99.03% and 99.05%, respectively, which is similar or superior to the detection performance of the techniques proposed in previous studies. Multi-class classification showed better performance with 86.63% and 86.36%, respectively.

Indicator-based Behavior Ontology for Detecting Insider Threats in Network Systems

  • Kauh, Janghyuk;Lim, Wongi;Kwon, Koohyung;Lee, Jong-Eon;Kim, Jung-Jae;Ryu, Minwoo;Cha, Si-Ho
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.10
    • /
    • pp.5062-5079
    • /
    • 2017
  • Malicious insider threats have increased recently, and methods of the threats are diversifying every day. These insider threats are becoming a significant problem in corporations and governments today. From a technology standpoint, detecting potential insider threats is difficult in early stage because it is unpredictable. In order to prevent insider threats in early stage, it is necessary to collect all of insiders' data which flow in network systems, and then analyze whether the data are potential threat or not. However, analyzing all of data makes us spend too much time and cost. In addition, we need a large repository in order to collect and manage these data. To resolve this problem, we develop an indicator-based behavior ontology (IB2O) that allows us to understand and interpret insiders' data packets, and then to detect potential threats in early stage in network systems including social networks and company networks. To show feasibility of the behavior ontology, we developed a prototype platform called Insider Threat Detecting Extractor (ITDE) for detecting potential insider threats in early stage based on the behavior ontology. Finally, we showed how the behavior ontology would help detect potential inside threats in network system. We expect that the behavior ontology will be able to contribute to detecting malicious insider threats in early stage.

A Study on the Design of Network System for Defense Integrated Data Center Using NFV/SDN (NFV/SDN을 활용한 군(軍) 데이터센터 네트워크 체계 설계에 관한 연구)

  • Chae, Woong;Kwon, Taewook
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.9 no.2
    • /
    • pp.31-36
    • /
    • 2020
  • The creation of the Defense Integrated Data Center(DIDC) has resulted in a reduction in manpower, operating costs, efficient and effective management of resources. However, it is difficult to effectively collect and manage the data of a large number of battlefields coming from equipments such as drones, robots, and IoT added to the fourth industrial revolution and the future battlefield. Therefore, we will propose the design of DIDC network system using NFV and SDN, which are emerging as the core technologies of 5G, a mobile communication technology. After analyzing the data sheet of each equipment, it is considered that by integrating the redundant functions, energy efficiency, resource utilization and effective network management will be possible.

A Study on the Differentiated Services Adaptation Scheme using MPLS over ATM in the Defense Information System Network (국방전산망에서 ATM기반 MPLS를 이용한 차등서비스 적용방안에 관한 연구)

  • Kim, Sung-Soon;Lee, Sung-Jong
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2003.05b
    • /
    • pp.1257-1260
    • /
    • 2003
  • 현재 국방전산망은 인터넷과 마찬가지로 Best Effort 서비스만을 지원하고 있으나 급속도로 발전하는 외부의 미래 네트워크 환경에 대비하여 지속적으로 진화가 추진되고 있다. 본 논문에서는 미래 국방전산망의 요구사항인 서비스의 차별화에 관점을 두고 신속하고 신뢰성 있는 중요 의사결정 자료 전송을 위해 국방전산망에 ATM기반 MPLS 기술을 적용하여 군 기능별 차등서비스 제공방안 및 서비스 우선순위에 따른 트래픽 재 할당에 대하여 제안 하고자 한다.

  • PDF

A Study on the direction of implementing the Defence Logistics Supproting System for Network Centric Warfare (미래 네트워크중심전쟁에 부합하는 네트워크화 군수지원시스템 구축 방향)

  • Choi, S.Y.;Kang, S.J.;Park, K.W.
    • Journal of the military operations research society of Korea
    • /
    • v.32 no.2
    • /
    • pp.165-187
    • /
    • 2006
  • The aim of this study is to suggest the direction of implementing the new defense logistics systems for the network centric warfare in the future. For this purpose, we reviewed SARL(Sense and Response Logistics) which receives great attention from the U.S. Department of Defence as the future logistic concept of network centric warfare, coupled with recent development in information technologies which give technical revolution in the future logistics information system. Also, we analyzed problems underlying logistics information system currently used in the Korean Armed Forces. Finally, we suggested the direction of implementing the new logistics information system for the network centric warfare, expecting to reduce total logistics cost, speed up logistics velocity, and enhance the efficiency of the combat support.

MLP-A(Multi Link Protection for Airborne Network Verifying) algorithms and implementation in multiple air mobile/verification links (다중 공중 이동/검증 링크에서의 MLP-A 알고리즘 및 구현)

  • Youn, Jong-Taek;Jeong, Hyung-jin;Kim, Yongi;Jeon, Joon-Seok;Park, Juman;Joo, Taehwan;Go, Minsun
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.26 no.3
    • /
    • pp.422-429
    • /
    • 2022
  • In this paper, the intermediate frequency transmission signal level between the network system-based baseband and RF unit consisting of multi-channel airborne relay devices and a lot of mission devices, which are currently undergoing technology development tasks, is kept constant at the reference signal level. Considering the other party's receiving input range, despite changes in the short-range long-range wireless communication environment, it presents a multi-link protection and MLP-A algorithm that allows signals to be transmitted stably and reliably through signal detection automatic gain control, and experiments and analysis considering short-distance and long-distance wireless environments were performed by designing, manufacturing, and implementing RF units to which MLP-A algorithms were applied, and applying distance calculation equations to the configuration of multiple air movements and verification networks. Through this, it was confirmed that a stable and reliable RF communication system can be operated.

Detection System of Hidden Javascript URLs in Web Source Codes (웹 소스코드에 은닉된 Javascript URL 점검체계)

  • Park, Hweerang;Cho, Sangil;Park, JungKyu;Cho, Youngho
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2019.01a
    • /
    • pp.119-122
    • /
    • 2019
  • 최근 웹 변조 공격은 대형 포탈, 은행, 학교 등 접속자가 많은 홈페이지에 악성 URL을 불법 삽입하여 해당 URL을 통해 접속자 PC에 자동으로 악성코드 유포하고 대규모 봇넷(botnet)을 형성한 후 DDoS 공격을 수행하거나 감염 PC들의 정보를 지속적으로 유출하는 형태로 수행된다. 이때, 홈페이지에 삽입되는 악성 URL은 탐지가 어렵도록 Javascript 난독화 기법(obfuscation technique) 등으로 은밀히 삽입된다. 본 논문에서는 웹 소스코드에 은닉된 악성 Javascript URL들에 대한 일괄 점검체계를 제안하며, 구현된 점검체계의 prototype을 활용하여 점검성능에 대한 시험결과를 제시한다.

  • PDF