• 제목/요약/키워드: Defense Service

검색결과 441건 처리시간 0.032초

국방경영 효율화를 위한 분석형 통계시스템 구축 (The Developing of Analytical Statistics System for the Efficiency of Defense Management)

  • 이정만
    • 산업경영시스템학회지
    • /
    • 제38권3호
    • /
    • pp.87-94
    • /
    • 2015
  • Recently, management based on statistical data has become a big issue and the importance of the statistics has been emphasized for the management innovation in the defense area. However, the Military Management based on the statistics is hard to expect because of the shortage of the statistics in the military. There are many military information systems having great many data created in real time. Since the infrastructure for gathering data form the many systems and making statistics by using gathered data is not equipped, the usage of the statistics is poor in the military. The Analytical Defense Statistics System is designed to improve effectively the defense management in this study. The new system having the sub-systems of Data Management, Analysis and Service can gather the operational data from interlocked other Defense Operational Systems and produce Defense Statistics by using the gathered data beside providing statistics services. Additionally, the special function for the user oriented statistics production is added to make new statistics by handling many statistics and data. The Data Warehouse is considered to manage the data and Online Analytical Processing tool is used to enhance the efficiency of the data handling. The main functions of the R, which is a well-known analysis program, are considered for the statistical analysis. The Quality Management Technique is applied to find the fault from the data of the regular and irregular type. The new Statistics System will be the essence of the new technology like as Data Warehouse, Business Intelligence, Data Standardization and Statistics Analysis and will be helpful to improve the efficiency of the Military Management.

국방정보시스템 사이버복원력 수준 평가를 위한 성숙도모델에 관한 연구 (A Study on Maturity Model for the Assessment of Cyber Resilience Level in the Defence Information System)

  • 최재혁;김완주;임재성
    • 정보보호학회논문지
    • /
    • 제29권5호
    • /
    • pp.1153-1165
    • /
    • 2019
  • 최근 국방 분야를 포함한 국가정보통신망 및 주요 기반시설 등에 대한 해킹 위협이 증가하고 있다. 국방정보시스템은 망분리를 통해 외부로부터의 위협에 대응하고 있으나, 해킹 성공시 전 평시 군사작전에 큰 영향을 미치게 된다. 오늘날 사이버 공격과 위협은 예측 불가능한 수준으로 높아지고 있어 해킹 위협을 완전히 차단하고 예방하는 것은 현실적으로 불가능하다. 따라서 본 연구에서는 국방정보시스템의 사이버 공격 징후가 예상되거나 발생했을 경우 신속한 대응 및 시스템의 생존성을 보장하고 지속성을 유지할 수 있는 능력인 '사이버복원력(Cyber Resilience)'의 수준을 평가할 수 있는 성숙도모델을 제시하였다. 제시된 성숙도모델을 통해 국방정보시스템의 사이버복원력 수준을 평가하고 부족한 분야를 식별 및 보완함으로써 국방정보시스템의 사이버보안 수준을 향상시키는데 기여할 수 있을 것으로 기대된다.

EA as an Actionable Architecture

  • 정찬기
    • 정보화연구
    • /
    • 제9권2호
    • /
    • pp.133-142
    • /
    • 2012
  • Gartner predicts that by 2012, 40% of EA programs will be stopped due to poor execution and the failure of delivering business value. An organization needs a practical solution to achieve an EA vision. The EA essential approach should be that of business service and process orientation than systems and IT orientation. We propose an Actionable Enterprise Architecture (AEA) which is based on BPM (Business Process Management) and SOA (Service Oriented Architecture), and connected to service & process orientation and engineering. The architecture proposed provides traceability between service-oriented enterprise architecture and its solution. The proposed architecture can transform enterprise architecture from conceptual to physical levels (solutions) with a service and business process paradigm.

Lifetime prediction for interfacial adhesion of Carbon/Cork composites with an accelerated aging test

  • Lee, Hyung Sik;Chung, Sang Ki;Kim, Hyung Gean;Park, Byeong Yeol;Won, Jong Sung;Lee, Seung Goo
    • Carbon letters
    • /
    • 제28권
    • /
    • pp.9-15
    • /
    • 2018
  • In the aerospace field, Carbon/Cork composites have been used for rocket propulsion systems as a light weight structural component with a high bending stiffness and high thermal insulation properties. For the fabrication of a carbon composite with a heat insulation cork part, the bonding properties between them are very important to determine the service life of the Carbon/Cork composite structure. In this study, the changes in the interfacial adhesion and mechanical properties of Carbon/Cork composites under accelerated aging conditions were investigated. The accelerated aging experiments were performed with different temperatures and humidity conditions. The properties of the aged Carbon/Cork composites were evaluated mainly with the interfacial strength. Finally, the lifetime prediction of the Carbon/Cork composites was performed with the long-term property data under accelerated conditions.

Topology-based Workflow Scheduling in Commercial Clouds

  • Ji, Haoran;Bao, Weidong;Zhu, Xiaomin;Xiao, Wenhua
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제9권11호
    • /
    • pp.4311-4330
    • /
    • 2015
  • Cloud computing has become a new paradigm by enabling on-demand provisioning of applications, platforms or computing resources for clients. Workflow scheduling has always been treated as one of the most challenging problems in clouds. Commercial clouds have been widely used in scientific research, such as biology, astronomy and weather forecasting. Certainly, it is very important for a cloud service provider to pursue the profits for the commercial essence of clouds. This is also significantly important for the case of providing services to workflow tasks. In this paper, we address the issues of workflow scheduling in commercial clouds. This work takes the communication into account, which has always been ignored. And then, a topology-based workflow-scheduling algorithm named Resource Auction Algorithm (REAL) is proposed in the objective of getting more profits. The algorithm gives a good performance on searching for the optimum schedule for a sample workflow. Also, we find that there exists a certain resource amount, which gets the most profits to help us get more enthusiasm for further developing the research. Experimental results demonstrate that the analysis of the strategies for most profits is reasonable, and REAL gives a good performance on efficiently getting an optimized scheme with low computing complexity.

A Dynamic Defense Using Client Puzzle for Identity-Forgery Attack on the South-Bound of Software Defined Networks

  • Wu, Zehui;Wei, Qiang;Ren, Kailei;Wang, Qingxian
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제11권2호
    • /
    • pp.846-864
    • /
    • 2017
  • Software Defined Network (SDN) realizes management and control over the underlying forwarding device, along with acquisition and analysis of network topology and flow characters through south bridge protocol. Data path Identification (DPID) is the unique identity for managing the underlying device, so forged DPID can be used to attack the link of underlying forwarding devices, as well as carry out DoS over the upper-level controller. This paper proposes a dynamic defense method based on Client-Puzzle model, in which the controller achieves dynamic management over requests from forwarding devices through generating questions with multi-level difficulty. This method can rapidly reduce network load, and at the same time separate attack flow from legal flow, enabling the controller to provide continuous service for legal visit. We conduct experiments on open-source SDN controllers like Fluid and Ryu, the result of which verifies feasibility of this defense method. The experimental result also shows that when cost of controller and forwarding device increases by about 2%-5%, the cost of attacker's CPU increases by near 90%, which greatly raises the attack difficulty for attackers.

Analysis of Threat Model and Requirements in Network-based Moving Target Defense

  • Kang, Koo-Hong;Park, Tae-Keun;Moon, Dae-Sung
    • 한국컴퓨터정보학회논문지
    • /
    • 제22권10호
    • /
    • pp.83-92
    • /
    • 2017
  • Reconnaissance is performed gathering information from a series of scanning probes where the objective is to identify attributes of target hosts. Network reconnaissance of IP addresses and ports is prerequisite to various cyber attacks. In order to increase the attacker's workload and to break the attack kill chain, a few proactive techniques based on the network-based moving target defense (NMTD) paradigm, referred to as IP address mutation/randomization, have been presented. However, there are no commercial or trial systems deployed in real networks. In this paper, we propose a threat model and the request for requirements for developing NMTD techniques. For this purpose, we first examine the challenging problems in the NMTD mechanisms that were proposed for the legacy TCP/IP network. Secondly, we present a threat model in terms of attacker's intelligence, the intended information scope, and the attacker's location. Lastly, we provide seven basic requirements to develop an NMTD mechanism for the legacy TCP/IP network: 1) end-host address mutation, 2) post tracking, 3) address mutation unit, 4) service transparency, 5) name and address access, 6) adaptive defense, and 7) controller operation. We believe that this paper gives some insight into how to design and implement a new NMTD mechanism that would be deployable in real network.

A Neural Network Aided Kalman Filtering Approach for SINS/RDSS Integrated Navigation

  • Xiao-Feng, He;Xiao-Ping, Hu;Liang-Qing, Lu;Kang-Hua, Tang
    • 한국항해항만학회:학술대회논문집
    • /
    • 한국항해항만학회 2006년도 International Symposium on GPS/GNSS Vol.1
    • /
    • pp.491-494
    • /
    • 2006
  • Kalman filtering (KF) is hard to be applied to the SINS (Strap-down Inertial Navigation System)/RDSS (Radio Determination Satellite Service) integrated navigation system directly because the time delay of RDSS positioning in active mode is random. BP (Back-Propagation) Neuron computing as a powerful technology of Artificial Neural Network (ANN), is appropriate to solve nonlinear problems such as the random time delay of RDSS without prior knowledge about the mathematical process involved. The new algorithm betakes a BP neural network (BPNN) and velocity feedback to aid KF in order to overcome the time delay of RDSS positioning. Once the BP neural network was trained and converged, the new approach will work well for SINS/RDSS integrated navigation. Dynamic vehicle experiments were performed to evaluate the performance of the system. The experiment results demonstrate that the horizontal positioning accuracy of the new approach is 40.62 m (1 ${\sigma}$), which is better than velocity-feedback-based KF. The experimental results also show that the horizontal positioning error of the navigation system is almost linear to the positioning interval of RDSS within 5 minutes. The approach and its anti-jamming analysis will be helpful to the applications of SINS/RDSS integrated systems.

  • PDF

Flexible camera series network for deformation measurement of large scale structures

  • Yu, Qifeng;Guan, Banglei;Shang, Yang;Liu, Xiaolin;Li, Zhang
    • Smart Structures and Systems
    • /
    • 제24권5호
    • /
    • pp.587-595
    • /
    • 2019
  • Deformation measurement of large scale structures, such as the ground beds of high-rise buildings, tunnels, bridge, and railways, are important for insuring service quality and safety. The pose-relay videometrics method and displacement-relay videometrics method have already presented to measure the pose of non-intervisible objects and vertical subsidence of unstable areas, respectively. Both methods combine the cameras and cooperative markers to form the camera series networks. Based on these two networks, we propose two novel videometrics methods with closed-loop camera series network for deformation measurement of large scale structures. The closed-loop camera series network offers "closed-loop constraints" for the camera series network: the deformation of the reference points observed by different measurement stations is identical. The closed-loop constraints improve the measurement accuracy using camera series network. Furthermore, multiple closed-loops and the flexible combination of camera series network are introduced to facilitate more complex deformation measurement tasks. Simulated results show that the closed-loop constraints can enhance the measurement accuracy of camera series network effectively.

A New Approach to Selection of Inspection Items using Risk Insight of Probabilistic Safety Assessment for Nuclear Power Plants

  • Park, Younwon;Kim, Hyungjin;Lim, Jihan;Choi, Seongsoo
    • 한국압력기기공학회 논문집
    • /
    • 제14권2호
    • /
    • pp.49-58
    • /
    • 2018
  • The regulatory periodic inspection program (PSI) conducted at every overhaul period is the most important process for confirming the safety of nuclear power plants. The PSI for operating nuclear power plants in Korea mainly consist of component level performance check that had been developed based on deterministic approach putting the same degree of importance to all the inspection items. This inspection methodology is likely to be effective for preoperational inspection. However, once the plant is put into service, the PSI must be focused on whether to minimize the risk of accident using defense-in-depth concept and risk insight. The incorporation of defense-in-depth concept and risk insight into the deterministic based safety inspection has not been well studied so far. In this study, two track approaches are proposed to make sure that core damage be avoided: one is to secure success path and the other to block the failure path in a specific event tree of PSA. The investigation shows how to select safety important components and how to set up inspection group to ensure that core damage would not occur for a given initiating event, which results in strengthening defense-in-depth level 3.