• Title/Summary/Keyword: Defense-ESM

Search Result 9, Processing Time 0.023 seconds

Research on Improving Schedule Forecasting Method for Delayed Defense Research & Development Project (지연된 국방 연구개발 프로젝트의 일정 예측방식 개선 연구)

  • Cho, Jungho;Lim, Jaesung
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.23 no.3
    • /
    • pp.286-293
    • /
    • 2020
  • Since Dr. Lipke announces earned schedule management(ESM) in 2002, it has been used in project management to make up for the insufficient schedule management function of earned value management technique. However, it is difficult to accurately forecast the schedule of delayed defense research and development(R&D) projects with the ESM technique. Therefore, this paper proposes a new schedule forecasting method considering the progress of delayed work in ESM technique. This concept can also be adopted to the traditional project progress management (PPM) technique. We verify the effectiveness of the proposed concept through several defense R&D projects and prove that it is possible to supplement the schedule forecasting of the ESM and PPM technique.

A Detection Rule Exchange Mechanism for the Collaborative Intrusion Detection in Defense-ESM (국방통합보안관제체계에서의 협업 침입탐지를 위한 탐지규칙 교환 기법)

  • Lee, Yun-Hwan;Lee, Soo-Jin
    • Convergence Security Journal
    • /
    • v.11 no.1
    • /
    • pp.57-69
    • /
    • 2011
  • Many heterogeneous Intrusion Detection Systems(IDSs) based in misuse detection technique including the self-developed IDS are now operating in Defense-ESM(Enterprise Security Management System). IDS based on misuse detection may have different capability in the intrusion detection process according to the frequency and quality of its signature update. This makes the integration and collaboration with other IDSs more difficult. In this paper, with the purpose of creating the proper foundation for integration and collaboration between heterogeneous IDSs being operated in Defense-ESM, we propose an effective mechanism that can enable one IDS to propagate its new detection rules to other IDSs and receive updated rules from others. We also prove the performance of rule exchange and application possibility to defense environment through the implementation and experiment.

대함 유도탄 방어의 현재와 미래(3)

  • Kim, Gyeong-Gi
    • Defense and Technology
    • /
    • no.3 s.169
    • /
    • pp.36-45
    • /
    • 1993
  • 유도탄에 의존하는 전투 경향은 향후 계속적으로 증대될 것이며 더구나 유도탄은 지금까지 설명한 것 같이 장거리화, 고속화, 스텔스화, 고고도 또는 저고도 탄도선택, 명중 직전까지 탐지 곤란 및 최종유도 단계에서 고가속도 운동 등 성능은 향상 일로에 있습니다. 함정의 생존성을 제고시키기 위한 각국의 대함유도탄 방어체계 개발 노력은 함정 탑재 무기체계인 근접방어 무기체계, 함대공유도탄, ESM 및 유도탄 기만 장치의 지속적인 성능개량과 함께 지속될 것입니다

  • PDF

유럽의 항공기개발과 프랑스의 방위산업

  • Im, Seong-Nam
    • Defense and Technology
    • /
    • no.2 s.156
    • /
    • pp.14-19
    • /
    • 1992
  • 유럽 무기체계의 공통사항은 주요 방산업체를 국가가 주도적으로 운영하고 있고, 개발위험부담을 줄이기 위해 국가간 공동개발 및 합작생산을 추구하고 있다는점이다. 유럽은 공동개발 체제하에 항공기를 생산함으로써 각국이 개발한 무기간의 호환성을 증대시켜 왔으며, 개발비 부담을 감소시켜 왔다. 또한 단일기종으로 ESM, ECM, 정찰임무 등의 복합임무가 가능하므로 제한된 전장지역에 적합하며, 침단기술 이전 면에서도 적극적인 자세를 보이고 있다. 한국 공군에서도 무기체계도입 및 기술협력 다변화를 위해, 앞으로 유럽 무기체계에 대한 적극적인 관심이 필요하리라 생각된다

  • PDF

A Study on Security Hole Attack According to the Establishment of Policies to Limit Particular IP Area (특정 IP 영역 제한정책 설정에 따른 보안 취약점 공격에 관한 연구)

  • Seo, Woo-Seok;Jun, Moon-Seog
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.5 no.6
    • /
    • pp.625-630
    • /
    • 2010
  • With regard to the examples of establishing various sorts of information security, it can be seen that there are gradual, developmental procedures including Firewall and VPN (Virtual Private Network), IDS (Intrusion Detection System), or ESM(Enterprise Security Management). Each of the security solutions and equipments analyzes both defense and attack for information security with the criteria of classifying the problems of security policies by TCP/IP layers or resulted from attack patterns, attack types, or invasion through specialized security technology. The direction of this study is to examine latency time vulnerable to invasion which occurs when L2-stratum or lower grade equipments or policies are applied to the existing network through TCP/IP layer's L3-stratum or higher grade security policies or equipments and analyze security holes which may generate due to the IP preoccupation in the process of establishing policies to limit particular IP area regarding the policies for security equipments to figure out technological problems lying in it.

A Study on Security Event Detection in ESM Using Big Data and Deep Learning

  • Lee, Hye-Min;Lee, Sang-Joon
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.13 no.3
    • /
    • pp.42-49
    • /
    • 2021
  • As cyber attacks become more intelligent, there is difficulty in detecting advanced attacks in various fields such as industry, defense, and medical care. IPS (Intrusion Prevention System), etc., but the need for centralized integrated management of each security system is increasing. In this paper, we collect big data for intrusion detection and build an intrusion detection platform using deep learning and CNN (Convolutional Neural Networks). In this paper, we design an intelligent big data platform that collects data by observing and analyzing user visit logs and linking with big data. We want to collect big data for intrusion detection and build an intrusion detection platform based on CNN model. In this study, we evaluated the performance of the Intrusion Detection System (IDS) using the KDD99 dataset developed by DARPA in 1998, and the actual attack categories were tested with KDD99's DoS, U2R, and R2L using four probing methods.

Design and Implementation of a Real-time Integrated Analysis Framework based on Multiprocessor Search Modules against Malicious Codes (악성코드 대응 MPSM기반 실시간통합분석체계의 설계 및 구현)

  • Moon, Yoon Jong
    • Convergence Security Journal
    • /
    • v.15 no.1
    • /
    • pp.69-82
    • /
    • 2015
  • This dissertation introduce how to react against the cybercrime and analysis of malware detection. Also this dissertation emphasize the importance about efficient control of correspond process for the information security. Cybercrime and cyber breach are becoming increasingly intelligent and sophisticated. To correspond those crimes, the strategy of defense need change soft kill to hard kill. So this dissertation includes the study of weak point about OS, Application system. Also this dissertation suggest that API structure for handling and analyzing big data forensic.

A Study of Web Application Attack Detection extended ESM Agent (통합보안관리 에이전트를 확장한 웹 어플리케이션 공격 탐지 연구)

  • Kim, Sung-Rak
    • Journal of the Korea Society of Computer and Information
    • /
    • v.12 no.1 s.45
    • /
    • pp.161-168
    • /
    • 2007
  • Web attack uses structural, logical and coding error or web application rather than vulnerability to Web server itself. According to the Open Web Application Security Project (OWASP) published about ten types of the web application vulnerability to show the causes of hacking, the risk of hacking and the severity of damage are well known. The detection ability and response is important to deal with web hacking. Filtering methods like pattern matching and code modification are used for defense but these methods can not detect new types of attacks. Also though the security unit product like IDS or web application firewall can be used, these require a lot of money and efforts to operate and maintain, and security unit product is likely to generate false positive detection. In this research profiling method that attracts the structure of web application and the attributes of input parameters such as types and length is used, and by installing structural database of web application in advance it is possible that the lack of the validation of user input value check and the verification and attack detection is solved through using profiling identifier of database against illegal request. Integral security management system has been used in most institutes. Therefore even if additional unit security product is not applied, attacks against the web application will be able to be detected by showing the model, which the security monitoring log gathering agent of the integral security management system and the function of the detection of web application attack are combined.

  • PDF