• Title/Summary/Keyword: Defense Service

Search Result 445, Processing Time 0.027 seconds

A study on the AC and PMI model for the Defense computer network

  • Yoon, H.S.;Kim, S.C.;Song, J.S.
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2001.10b
    • /
    • pp.977-980
    • /
    • 2001
  • This paper is a study on the AC and PMI model for the defense computer network. It is suggested that the organization plan of PMI model is a proper model for the characteristics of military system and military defense network security demands based on defense PKI system. Futhermore, it will be presented both various types of defense AC and AC according to the role and clearance in PMI. Defense AC will provide strong users' authentication and Role Based Access Control to give more secured and trusted authentication service by using users' attribute such as role and clearance.

  • PDF

Methods of Defense DoS Attack by Traffic Metering and Controlling Technique in a Router (트래픽 제어 기법을 이용한 라우터에서의 서비스 거부 공격 방어 기법)

  • Lee, Ho-Gyun;Kim, Jeong-Nyeo
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2003.11c
    • /
    • pp.1985-1988
    • /
    • 2003
  • As the Distributed Denial of Service attack technique is getting smarter, defense method have been developed by various means. Existing defense method baseds on detection technique is not effective to DDoS attack. Because it depend on rule set that is used to detect attack and DDoS attack pattern has become very similar to real traffic pattern. So the rule set is not efficient method to find DDoS attack. To solve this problem, DDoS defense mechanism based on QoS technique has been suggested. In this paper, we summarize existing DDoS defense mechanism and focus on method based on QoS, and introduce a new DDoS defense framework.

  • PDF

Developing Improvement Plans for National Defense Safety Directive to Align with the Serious Accident Punishment Act

  • Jeong-Woo Han;Cho-Young Jung
    • Journal of the Korean Society of Marine Environment & Safety
    • /
    • v.30 no.3
    • /
    • pp.275-282
    • /
    • 2024
  • To ensure a systematic and integrated approach to defense safety management, individual safety management regulations have been consolidated into the National Defense Safety Directive. However, despite being enacted after the enforcement of the Severe Accident Punishment Act, the National Defense Safety Directive does not incorporate the contents of the Serious Accident Punishment Act. This omission is likely to cause confusion in safety management. In this paper, a PDCA analysis of the Severe Accident Punishment Act and the National Defense Safety Directive was conducted to identify area for improvement and supplementation in the Directive. Chapter 3 proposes amendments to clearly define the scope and responsibilities of safety management, implement serious accident prevention measures and inspections, and establish the penalties for those involved. These amendments aim to ensure faithful compliance with the Severe Accident Punishment Act. Chapter 4 emphasizes the implementation and inspection of risk assessments to enhance the effectiveness of safety accident prevention and preparation, thereby ensuring the completeness of the PDCA cycle.

K-Defense Cloud Computing System Design through Cloud Modeling and Analysis of Social Network Service Application (소셜 네트워크 서비스 어플리케이션의 클라우드 모델링 및 분석을 통한 국방 클라우드 컴퓨탱 시스템 설계)

  • Lee, Sung-Tae;Ryou, Hwang-Bin
    • Convergence Security Journal
    • /
    • v.13 no.1
    • /
    • pp.37-43
    • /
    • 2013
  • In 2010, the Ministry of National Defense decided to build a MegaCenter including the cloud computing technology by 2014, as part of the '2012 Information Service Plan', which is now underway. The Cloud computing system environment should be designed applying cloud computing technology and policy for an efficient infrastructure that many IT resources are available in the data center as a concentrated form. That is, the system should be designed in such a way that clouding services will be efficiently provided to meet the needs of users and there will not be unnecessary waste of resources. However, in order to build an optimal system, it should be possible to predict the service performance and the resource availability at the initial phase of system design. In this paper, using the CloudAnalyst simulator to predict availability of the K-defence cloud computing system service, conducts cloud modeling and analysis of the 'Facebook', one of the most famous social network service applications with most users in the world. An Optimal K-Defense cloud computing design model is proposed through simulation results.

Study on Velocity and Altitude Keeping Method of a UAV Around Service Ceiling Altitude (실용상승한도 고도 부근에서 무인기의 속도 및 고도유지 제어에 관한 연구)

  • Hong, Jin-sung;Won, Dae-yeon;Jang, Se-ah
    • Journal of the Korean Society for Aeronautical & Space Sciences
    • /
    • v.49 no.5
    • /
    • pp.383-388
    • /
    • 2021
  • Air-breathing engines used in aircraft have a performance limit as the altitude increases, and this determines the service and absolute ceiling altitude. The method of maintaining altitude and speed in a fixed-wing aircraft in level flight using classical control method is generally using thrust for speed increase/deceleration and pitch attitude for altitude increase/decrease. If this method is used near the service ceiling altitude, increasing the pitch to reduce the altitude error results in a speed reduction. Therefore, it is necessary to use a control method that maintains the speed first using the pitch attitude. Especially in the case of unmanned aerial vehicles, these two methods should be automatically available at the right time. In this paper, we propose a method of switching the speed and altitude maintenance algorithm near service ceiling altitude.

DDoS Defense using Address Prefix-based Priority Service (Address Prefix에 기반한 우선 순위 서비스를 이용한 DDoS 방어)

  • Jin, Jinghe;Lee, Tai-Jin;Nam, Seung-Yeob
    • Journal of the Korea Society for Simulation
    • /
    • v.18 no.4
    • /
    • pp.207-217
    • /
    • 2009
  • We propose a two-stage Distributed Denial of Service (DDoS) defense system, which can protect a given subnet by serving existing flows and new flows with a different priority based on IP history information. Denial of Service (DoS) usually occurs when the resource of a network node or link is limited and the demand of the users for that resource exceeds the capacity. The objective of the proposed defense system is to provide continued service to existing flows even in the presence of DDoS attacks. The proposed scheme can protect existing connections effectively with a smaller memory size by reducing the monitored IP address set through sampling and per-prefix history management. We evaluate the performance of the proposed scheme through simulation.

Developing Strategies to Improve Operational Test and Evaluation of Weapon System in the Age of the Fourth Industrial Revolution (4차 산업혁명 시대에 적합한 무기체계 운용시험평가 개선전략 도출)

  • Lee, Kangkyong;Seol, Hyeonju
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.23 no.6
    • /
    • pp.591-601
    • /
    • 2020
  • After North Korea's sixth nuclear test, the operational environment on the Korean Peninsula has fundamentally changed, and the South Korean military faces various security challenges, including a reduction in military service resources and shorter military service periods. In particular, the South Korean military is seeking a new paradigm in military construction amid changes in the defense acquisition environment linked to the push for defense reform 2.0 and the utilization of the fourth industrial revolution. Therefore, this study considered strategies for improving the operational test and evaluation of weapons systems suitable for changes in the defense acquisition environment to effectively prepare for existing military threats and future warfare patterns. For this purpose, external environment analysis and internal capabilities were diagnosed using PEST Analysis and SPRO Analysis, and improvement strategies were derived through SWOT analysis.

CDN Scalability Improvement using a Moderate Peer-assisted Method

  • Shi, Peichang;Wang, Huaimin;Yin, Hao;Ding, Bo;Wang, Tianzuo;Wang, Miao
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.6 no.3
    • /
    • pp.954-972
    • /
    • 2012
  • Content Delivery Networks (CDN) server loads that fluctuant necessitate CDN to improve its service scalability especially when the peak load exceeds its service capacity. The peer assisted scheme is widely used in improving CDN scalability. However, CDN operators do not want to lose profit by overusing it, which may lead to the CDN resource utilization reduced. Therefore, improving CDN scalability moderately and guarantying CDN resource utilization maximized is necessary. However, when and how to use the peer-assisted scheme to achieve such improvement remains a great challenge. In this paper, we propose a new method called Dynamic Moderate Peer-assisted Method (DMPM), which uses time series analysis to predict and decide when and how many server loads needs to offload. A novel peer-assisted mechanism based on the prediction designed, which can maximize the profit of the CDN operators without influencing scalability. Extensive evaluations based on an actual CDN load traces have shown the effectiveness of DMPM.

A Study on the Security System of the Web Based Defense Information Service Network (WEB 환경에서 국방정보통신망 정보보호체계 구축에 관한 연구)

  • 신유찬;남길현
    • Journal of the military operations research society of Korea
    • /
    • v.28 no.1
    • /
    • pp.115-135
    • /
    • 2002
  • The limits of current DN(Defense networks), private and closed network, become to reality; for Example, high expense of construction and maintenance of networks, restriction of new subscribers on DN. Therefore, a network using web environment that reflect fast development of If and IS(Information Security) technology is demanded for MND. Meeting the requirement of reliable IS system and extension and improvement of DN using common network, we can reduce the expense to extend, maintain, repair DN, form the environment that makes military business cooperate better with civil company and government agency, advance implementing Defense computing and networking service for field small size units that was a exception of Defense digitalization. But it is essential to construct DN based on common network that there are security requisites; confidentiality, integrity, availability, efficiency, log, backup, restoration, that have to be realized at demanding level for IS. This thesis suggested four measurements; replacement DN with common network to resolve the requirements of building new network and improvement of performance for private DN, linkage with common network for new requirement, distribution of traffic using common network, configuration of DN using Internet and Proposed a refinement of IS management organization to treat security threat of common network flexibly, and LAN IS standard model of DN based on the web environment.

A Study of the improvement to National Technology Qualification System activation scheme for HRD on the Ministry of National Defense (국방부 인적자원개발 활성화를 위한 국가기술자격 운영개선에 관한 연구)

  • Kim, Woo-Hyun;Lee, Won-Park;Jeong, Byung-Han;Park, Jae-Hyun;Jung, Young-Deak
    • Journal of the Korea Safety Management & Science
    • /
    • v.14 no.4
    • /
    • pp.321-332
    • /
    • 2012
  • The special organization that our military service is conscripted by the duty of national defense purposes to the period of military service. So couple of soldiers are think as the corresponds to college, or some knowledge layer from the operating management discarding period, lifetime value. But, now a day changed of the military life, it is when the individual soldiers can have some self-development and the lifelong education in terms of a period, and can changeing the footsteps of the new life that the function as a 'bridge' to activate production of barracks life. So that it can be supported themselves need to strive for human resource development. This study is being discussed on the correlation of military human resources and qualified operating and sustainable and promising future eligibility for qualified by taking advantage of the Boston Consulting Group Matrix(Boston Consulting Group Matrix).