• 제목/요약/키워드: Defense Information System Network

Search Result 267, Processing Time 0.039 seconds

A Study on the Efficient Information Security Methodology under a Korea War-Game Exercise System (워게임 연습체계에서의 효율적 정보보호 방안 연구)

  • 이강택;이동희;김귀남
    • Proceedings of the Korea Information Assurance Society Conference
    • /
    • 2004.05a
    • /
    • pp.219-225
    • /
    • 2004
  • There is increasing tension in the Korean Peninsula from the US' putting the NK's nuclear issue along the line of war in Iraq. However, there is worsening in ROK's field exercise condition from decresing defense financial supports, being difficlut to obtain enough space for volumable exercises, and securities and circumstances issues. With acknowleging those problems, CPX(Command Post Exercise), namely war game exercise which is more economical and scientific exercise has earned its attention as the best alternative measure of field exercise war game exercise has already been applyied to independent, joint, and combined exercises. However, the current war game system contains lots of problems in terms of security. Defense network uses dedicated line isolated with internet and secure data through network level encoding. It is vulerable to get attack during war game exercise or from credited network. System security is also subject to reinforced. This research is performed focusing on network and system level securities, and through it, the author will show the effective and optimized security solution for war game system.

  • PDF

Session Analysis based Intruder Traceback System in Defense Network (국방망에서 세션분석기반의 침입자 역추적 시스템)

  • Jang Hee-Jin;Yun Ho-Sang;Kim Sang-Soo;Park Jae-Keun;Kim Cheol-Ho
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2006.06c
    • /
    • pp.304-306
    • /
    • 2006
  • 21세기 정보혁명을 바탕으로 전쟁의 양상은 정보전, 네트워크 및 컴퓨터 중심의 사이버전과 같은 새로운 전쟁 패러다임으로 변화하고 있다. 이러한 정보전에 대비하여 국방정보체계에 다양한 정보보호시스템을 설치하여 사용하고 있다. 그러나 국방정보체계 환경에 현재까지 배치된 정보보호시스템들은 침해 사고에 대한 탐지 및 보고 등의 수동적인 대응만을 지원한다. 그러므로 발생한 공격에 대한 대응을 마련하더라도 동일한 공격자가 동일한 목표 시스템에 대하여 또 다른 공격 기술을 이용하여 재침입이 가능하다. 이를 방어하기 위하여 공격에 대한 능동적인 대응이 필요하다. 대표적인 능동 대응 기술인 침입자 역추적은 시스템 및 네트워크에 대하여 공격을 시도하는 침입자의 네트워크 상의 실제 위치를 추적하는 기술이다. 침해 사고를 근본적으로 차단하기 위하여 침입자의 실제 신분 확인이 필수적이다. 이를 위하여 본 논문에서는 침입자 역추적 기술을 분석하고 국방정보체계 환경을 위한 세션분석기반의 침입자 역추적 기술을 제안한다. 또한 이 기술을 기반으로 구현한 침입자 역추적 시스템을 소개한다.

  • PDF

Zigbee-based Local Army Strategy Network Configurations for Multimedia Military Service

  • Je, Seung-Mo
    • Journal of Multimedia Information System
    • /
    • v.6 no.3
    • /
    • pp.131-138
    • /
    • 2019
  • With the rapid evolution of communication technology, it became possible to overcome the spatial and temporal limitations faced by humans to some extent. Furthermore, the quality of personal life was revolutionized with the emergence of the personal communication device commonly known as the smart phone. In terms of defense networks, however, due to restrictions from the military and security perspectives, the use of smart phones has been prohibited and controlled in the army; thus, they are not being used for any defense strategy purposes as yet. Despite the current consideration of smart phones for military communication, due to the difficulties of network configuration and the high cost of the necessary communication devices, the main tools of communication between soldiers are limited to the use of flag, voice or hand signals, which are all very primitive. Although these primitive tools can be very effective in certain cases, they cannot overcome temporal and spatial limitations. Likewise, depending on the level of the communication skills of each individual, communication efficiency can vary significantly. As the term of military service continues to be shortened, however, types of communication of varying efficiency depending on the levels of skills of each individual newly added to the military is not desirable at all. To address this problem, it is essential to prepare an intuitive network configuration that facilitates use by soldiers in a short period of time by easily configuring the strategy network at a low cost while maintaining its security. Therefore, in this article, the author proposes a Zigbee-based local strategic network by using Opnet and performs a simulation accordingly.

CSfC Network Security Architecture Analysis for the Assurance of Commercial Security Solutions in Defense Area (국방 상용보안제품 도입을 위한 CSfC(Commercial Solutions for Classified Program) 네트워크 보안 아키텍처 분석)

  • Lee, Yong-joon;Park, Se-joon;Park, Yeon-chool
    • Journal of Internet Computing and Services
    • /
    • v.22 no.6
    • /
    • pp.91-97
    • /
    • 2021
  • The United States is responding to evolving cyberattacks through the Commercial Solutions for Classified Program (CSfC). Authorized safety evaluation and certification are being carried out so that US government agencies can quickly introduce civilian commercial security products into the national pavilion. Commercial security products registered in the CSfC process can be used by defense agencies through a rapid approval process. Defense agencies approve commercial security products without duplicate evaluation. Approved security products can reduce the time, cost, and cost of the approval process required to implement the defense information system. In this study, security control for 4 types of network security architecture MSC (Multi-Site Connectivity), MA (Mobile Access), Campus WLAN, and DAR (Data at Rest) proposed by the US National Security Agency (NSA) for introduction to national defense A detailed analysis was performed on the items.

Using Machine Learning Techniques for Accurate Attack Detection in Intrusion Detection Systems using Cyber Threat Intelligence Feeds

  • Ehtsham Irshad;Abdul Basit Siddiqui
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.4
    • /
    • pp.179-191
    • /
    • 2024
  • With the advancement of modern technology, cyber-attacks are always rising. Specialized defense systems are needed to protect organizations against these threats. Malicious behavior in the network is discovered using security tools like intrusion detection systems (IDS), firewall, antimalware systems, security information and event management (SIEM). It aids in defending businesses from attacks. Delivering advance threat feeds for precise attack detection in intrusion detection systems is the role of cyber-threat intelligence (CTI) in the study is being presented. In this proposed work CTI feeds are utilized in the detection of assaults accurately in intrusion detection system. The ultimate objective is to identify the attacker behind the attack. Several data sets had been analyzed for attack detection. With the proposed study the ability to identify network attacks has improved by using machine learning algorithms. The proposed model provides 98% accuracy, 97% precision, and 96% recall respectively.

A Study on Target Selection from Seeker Image of Aerial Vehicle in Sea Environment (해상 탐지 영상에서의 비행체 표적 선정에 관한 연구)

  • Kim, Ki-Bum;Baek, In-Hye;Kwon, Ki-Jeong
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.20 no.5
    • /
    • pp.708-716
    • /
    • 2017
  • We deal with the target selection in seeker-detection image through network, using the detection information from aerial vehicle and the target information from surveillance and reconnaissance system. Especially, we constrain the sea battle environment, where it is difficult to perform scene-matching rather than land. In this paper, we suggest the target selection algorithm based on the confidence estimation with respect to distance and size. In detail, we propose the generation method of reference point for distance evaluation, and we investigate the effect of pixel margin and target course for size evaluation. Finally, the proposed algorithm is simulated and analyzed through several scenarios.

Performance Analysis of Artificial Neural Network for Expanding the Ionospheric Correction Coverage of GNSS (위성항법시스템의 전리층 보정 가능 영역 확장을 위한 인공 신경망의 성능 분석)

  • Ryu, Gyeong-don;So, Hyoungmin;Park, Heung-won
    • Journal of Advanced Navigation Technology
    • /
    • v.22 no.5
    • /
    • pp.409-414
    • /
    • 2018
  • Extrapolating the correction information of ionosphere is essential for expanding wide area differential GPS (WADGPS) service area beyond the reference station network. In this paper, design and analysis of the artificial neural network for expanding the ionospheric correction region will be proposed. First, analysis about influence of each input of neural network were performed. The inputs are the day/year periodic function, sunspot number, and geomagnetic index (Ap). Second, performance analysis with respect to the number of hidden layers and neurons in the neural network is shown. As a result, estimation of total electron contents (TEC) on the high/low latitude regions in solar max(2014) are displayed.

Design and Evaluation of Information Broker Architecture for Network-Centric Operational Environment (네트워크 중심 작전 환경을 위한 정보 브로커 아키텍처 설계 및 평가)

  • Park, Jejun;Kang, Dongsu
    • Journal of KIISE
    • /
    • v.43 no.6
    • /
    • pp.668-677
    • /
    • 2016
  • The information superiority through effective networking is a core element that accelerates command decision for mission completion. Our military wants to acquire capabilities of effective information sharing with Network-Centric Operational Environment(NCOE) for Network-Centric Warfare (NCW). In this paper, we suggested an information broker for overcoming current limits and maximizing future expandability and possibility of information sharing capacities. The information broker, which is an intermediate layer between users and information providers, provides the functions for mediating and managing information and for ensuring security of the system. We evaluated the consistency of proposed architecture and the implementation of the operational architecture design concept using existing design frameworks.

Ad Hoc Routing Method Based on Betweenness Centrality and Location Information for Unmanned Ground System Networks (지상 무인로봇체계 네트워크를 위한 매개 중심도와 위치정보 기반 Ad Hoc 라우팅)

  • Ahn, Hyochun;Yim, Jinhyuk;Ko, Young-Bae;Choi, HyungSeok;Kwon, DaeHoon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.41 no.4
    • /
    • pp.441-450
    • /
    • 2016
  • Wireless multi-hop communication is one of the key technologies to operate Unmanned Ground System (UGS) networks efficiently. Conventionally a lot of routing protocol has been developed and studied for multi-hop networks like Mobile Ad-hoc Network (MANET). However, the routing protocol for the unique environment of the UGS requires further studies, since conventional routing protocols cannot be used itself for UGS networks. In this paper, we propose the Betweenness Centrality based Geographic Routing (BCGR) which considers the main function of UGS. BCGR utilizes expanded ego betweenness centrality, mobility and location information error, respectively. We have conducted a simulation study for evaluating the performance of the BCGR using ns-3, and our simulation results show that BCGR outperforms the conventional routing protocols such as AODV and GPSR in terms of end-to-end transmission reliability, throughput and delay.

Building structural health monitoring using dense and sparse topology wireless sensor network

  • Haque, Mohammad E.;Zain, Mohammad F.M.;Hannan, Mohammad A.;Rahman, Mohammad H.
    • Smart Structures and Systems
    • /
    • v.16 no.4
    • /
    • pp.607-621
    • /
    • 2015
  • Wireless sensor technology has been opened up numerous opportunities to advanced health and maintenance monitoring of civil infrastructure. Compare to the traditional tactics, it offers a better way of providing relevant information regarding the condition of building structure health at a lower price. Numerous domestic buildings, especially longer-span buildings have a low frequency response and challenging to measure using deployed numbers of sensors. The way the sensor nodes are connected plays an important role in providing the signals with required strengths. Out of many topologies, the dense and sparse topologies wireless sensor network were extensively used in sensor network applications for collecting health information. However, it is still unclear which topology is better for obtaining health information in terms of greatest components, node's size and degree. Theoretical and computational issues arising in the selection of the optimum topology sensor network for estimating coverage area with sensor placement in building structural monitoring are addressed. This work is an attempt to fill this gap in high-rise building structural health monitoring application. The result shows that, the sparse topology sensor network provides better performance compared with the dense topology network and would be a good choice for monitoring high-rise building structural health damage.