• Title/Summary/Keyword: Information Warfare

Search Result 372, Processing Time 0.024 seconds

A Study on the Concept of Social Engineering Cyber Kill Chain for Social Engineering based Cyber Operations (사회공학 사이버작전을 고려한 사회공학 사이버킬체인 개념정립 연구)

  • Shin, Kyuyong;Kim, Kyoung Min;Lee, Jongkwan
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.5
    • /
    • pp.1247-1258
    • /
    • 2018
  • The Cyber Kill Chain originally proposed by Lockheed Martin defines the standard procedure of general cyber attacks and suggests tailored defensive actions per each step, eventually neutralizing the intent of the attackers. Defenders can effectively deal with Advanced Persistent Threat(APT)s which are difficult to be handled by other defensive mechanisms under the Cyber Kill Chain. Recently, however, social engineering techniques that exploits the vulnerabilities of humans who manage the target systems are prevail rather than the technical attacks directly attacking the target systems themselves. Under the circumstance, the Cyber Kill Chain model should evolve to encompass social engineering attacks for the improved effectiveness. Therefore, this paper aims to establish a definite concept of Cyber Kill Chain for social engineering based cyber attacks, called Social Engineering Cyber Kill Chain, helping future researchers in this literature.

Automatic Modulation Recognition Algorithm Based on Cyclic Moment and New Modified Cumulant for Analog and Digital Modulated Signals (Cyclic Moment 및 변형 Cumulant를 기반으로 한 아날로그 및 디지털 변조신호 자동변조인식 알고리즘)

  • Kim, Dong-Ho;Kim, Jae-Yoon;Sim, Kyu-Hong;Ahn, Jun-Il
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.17 no.9
    • /
    • pp.2009-2019
    • /
    • 2013
  • In this paper, we propose an automatic modulation recognition algorithm based on cyclic moment and new modified cumulant for analog and digital modulation signals. It is noteworthy that each modulated signal has different cycle frequency characteristics according to its order of cyclic moment. By means of this characteristics as classification features, various modulated signals can be efficiently classified. Also, to identify modulated signals having the same cycle frequency characteristics, we take advantage of the additional classification factors such as variations of envelope and phase as well as modified cumulant. The proposed algorithm was evaluated by considering the number of symbols, SNR, and frequency offset. In the simulation condition where the number of gathered symbols was about 819, and SNR and frequency offset were above 10dB and below 25%, respectively, the average accuracy of the proposed algorithm was more than 95%.

Modeling of Received Radar Signals for Scan Pattern Analysis (스캔패턴 분석을 위한 레이더 수신신호 모델링)

  • Kim, Yong-Hee;Kim, Wan-Jin;Song, Kyu-Ha;Lee, Dong-Won;Kim, Hyoung-Nam
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.47 no.4
    • /
    • pp.73-85
    • /
    • 2010
  • In dense electronic warfare signal environments, the conventional radar identification methods based on the basic parameters such as frequency, pulse width, and pulse repetition interval are confronted by the problem of identification ambiguity. To overcome this critical problem, a new approach introducing scan pattern of radars has been presented. Researches on new identification methods, however, suffer from a practical problem that it is not easy to secure the many radar signals including various scan pattern information and operation parameters. This paper presents a modeling method of radar signals with which we can generate radar signals including various scan pattern types according to the parameters determining the variation pattern of received signal strength. In addition, with the radar signals generated by the proposed model we analyze their characteristics according to the location of an electronic warfare support (ES) system.

Implementation of 2.4 GHz Wireless Keyboard and Mouse Electromagnetic Signal Analysis and Manipulate Systems (2.4 GHz 무선 키보드/마우스 전자파 신호 분석 및 조작 시스템 구축)

  • Kim, Sang-Su;Oh, Seung-Sub;Na, In-Seok
    • The Journal of Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.27 no.12
    • /
    • pp.1075-1083
    • /
    • 2016
  • Nowadays, the use of wireless input devices has been increasing on the basis of high convenience and portability. In particular the most widely used wireless keyboard and the mouse to use the 2.4 GHz frequency band, but due to the third party receives the electromagnetic wave from leaking when the radio equipment it is easy to obtain the personal information and the vulnerability is also being reported consistently. In this paper, implement a system to analyze and manipulate the packets of 2.4 GHz wireless keyboard and mouse using USRP device and GNU Radio package for verify the vulnerability of 2.4 GHz wireless keyboard and mouse. Using the construction system has attained a equipment specific address and key information by analyzing the communication protocol and the packet structure of the device was proved that a user can operate the PC to send the random key from long distance.

A Study on Architecture Design of Network Management System for DX (구축함(DX) 네트워크 관리 시스템 구조 설계에 대한 연구)

  • Lee, Kwang-Je;Chung, Jin-Wook
    • Journal of the Institute of Electronics Engineers of Korea TE
    • /
    • v.39 no.2
    • /
    • pp.95-103
    • /
    • 2002
  • We know that the all of warfare system has been becoming complex and variety in warfield thru the Gulf-War. The all of warfare electronic systems is designed to inter-operate by networks in recently. Especially Warfare Equipment systems of Men-of-War(War ship) as like KDX(Korea Destroyer, Experimental), FF(Frigate), PCC(Costal Patrol Craft), Submarine are connected by Combat System Databus to the Command system(C2 System), so C2 system can control all of equipments in ship. In this view, the status of network(Combat System Databus) is very critical parameter in war field. So In this paper, we propose the method of Network Management System construction for War ship, and especially propose the architectural design of network management system for DX(Destroyer, Experimental) equipments using SNMP(Simple Network Management Protocol). And Link Utilization is monitored by simulation. 

A De-interleaving Method of Frequency Agility Radar Signals in Comparison with PRI's of radars (PRI 비교를 통한 주파수 급속변경 레이더 신호분리)

  • Lim, Joong-Soo;Hong, Kyung-Ho;Lee, Du-Kyung;Shin, Dong-Hoon;Kim, Yong-Hwan
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.10 no.8
    • /
    • pp.1832-1838
    • /
    • 2009
  • In this paper, we present new signal de-interleaving method for the frequency agility radar in which the carrier frequency is changed irregularly. Generally radar use a fixed carrier frequency, and it is easy for electronic warfare system to de-interleave the radar signal with respect to the frequency, pulse width(PW), and direction of signal arriving(DOA). In frequency agility radar, it is difficult to de-interleave the radar signals according to the carrier frequency because the frequency is changed irregularly. We suggest a good de-interleaving method to identify the frequency agility radar signals in comparison with PRI's of radars. First we calculate pulse repeat Interval(PRI) of radar in linked-list and queue structure and de-interleave the radar signals with PRI, PW, and DOA, then identify the frequency agility radar. When we use the proposed algorism to the frequency agility radar, we have a good de-interleaving results with electronic warfare systems.

A Study on the Improvement of Naval Combat Management System for the Defense of Drone

  • Ki-Chang Kwon;Ki-Pyo Kim;Ki-Tae Kwon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.28 no.4
    • /
    • pp.93-104
    • /
    • 2023
  • Recently, the technology of drones is developing remarkably. The role of military drones is so great that they can cause serious damage to the enemy's important strategic assets without any damage to our allies in all battlefield environments (land, sea, air). However, the battleship combat management system currently operated by the Korean Navy is vulnerable to defense because there is no customized defense system against drones. As drones continue to develop, they are bound to pose a major threat to navy in the future. This paper proposes a way for the warfare software of naval combat management system sets a combat mode suitable for anti-drone battle, evaluates the threat priority in order to preemptively respond to drone threats and eliminate drone threats through automatic allocation of self-ship-mounted weapons and sensors, and through a test of the improved warfare software in a simulated environment, it was proved that the time to respond to the drone was improved by 62%.

Influence Factors of Effectively Executing NCW by User's Point of View (사용자 관점에서 본 효과적인 NCW 수행을 위한 영향요인)

  • Ou, Won-Suk;Chae, Myung-Sin;Yeum, Dae-Sung
    • Journal of Internet Computing and Services
    • /
    • v.11 no.2
    • /
    • pp.109-127
    • /
    • 2010
  • The Network Centric Warfare(NCW) is based on the linkage of forces by network to employ them as they are centralized, even though they are scattered. Also it can be used to overcome spatiotemporal obstacles. Under the concept of NCW, cognitive and social areas are getting more weight than information technology and physical ones. In this study we tried to investigate the affecting factors to execute NCW effectively by user's point of view to place the focus on cognitive and social aspects. We obtained some affirmative results that affect to conduct NCW in Korea. The advanced western NCW can be applicable in theoretically in Korea, however to employ NCW more effectively we need Korean style NCW which portrays the Korean realities and circumstances.

Study of the Bomb Hit Indication of Moving Target Using Weapon Data Link Message (무장데이터링크 메시지를 이용한 기동표적 타격평가 연구)

  • Baek, Inhye;Woo, Sang Hyo;Kim, Ki Bum
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.24 no.2
    • /
    • pp.187-196
    • /
    • 2021
  • The Network-Centric warfare over weapon data link networks has been developed for the recent decade. Since the US navy had begun to develop tactical digital information chain, it has gradually transformed into weapon data link technology. As data link network system and its protocol have been advanced into high-technology, focusing and targeting on moving targets become possible in net-enabled environments. However, it is difficult to identify the primary information from numerous battlefields and understanding approaches to damage a target in a timely manner. In this paper, to better understand the targeting assessment, we suggest a specific solution: Bomb Hit Indication(BHI) using information in weapon data link messages. In order to prove our suggestion, we implement the BHI solution and apply it into the weapon data link integrating system.

A Study on the Analysis of NCW(Network Centric Warfare) Combat Effectiveness Using Cellular Automata Simulation (세포 자동차(Cellular Automata) 시뮬레이션을 이용한 네트워크 중심전 전투효과도 평가 연구)

  • Jeong, Seong-Jin;Jo, Seong-Jin;Hong, Seong-Pil
    • Proceedings of the Korean Operations and Management Science Society Conference
    • /
    • 2005.10a
    • /
    • pp.3-9
    • /
    • 2005
  • The recent notion of Network Centric Warfare (NCW) emphasizes the ability to distribute right information at the right time to maximize the combat effectiveness. Accordingly, in the modern combat system the importance of non-physical element, such as communication system is increasing. However, an NCW-support communication network system is expensive. Therefore, it is essential to develop a proper combat system evaluation method to establish an efficient NCW-support combat system. Traditionally, combat system effectiveness is measured in terms of physical elements such as men and fire power. Obviously, such method is hardly applicable to a modern combat system To overcome this difficulty, we propose an evaluation model based on CA (Cellular Automata) simulation. A set of preliminary combat simulations show that CA simulation may be promising in evaluating non-physical element of a modem combat system.

  • PDF