• Title/Summary/Keyword: Information Warfare

Search Result 372, Processing Time 0.024 seconds

The Study of Data Recorder for Mission Replay (임무 재생을 위한 데이터 기록장치 연구)

  • Lee, Sang-Myung;Kim, Young-Kil
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.16 no.8
    • /
    • pp.1817-1823
    • /
    • 2012
  • On the matter in line with NCW(Network Centric Warfare) and information age, the military is on an efficient-expanding trend as sharing with status and information promptly through the various and complex exchange of messages and the voice communication between operators, using a highly efficient operating console. The recording devices that record an operational situation to plan a new operation through the mission analysis and result reviews after finishing military operation or training are developed and operated. Recording method is classified into two groups. one is the direct recording of video data for screen, another is the recording of an exchange of data. This study proposes the new data-oriented recording method to reduce the readiness time for replay and the improvement scheme.

Method for Finding Related Object File for a Computer Forensics in a Log Record of $LogFile of NTFS File System (NTFS 파일시스템의 $LogFile의 로그레코드에 연관된 컴퓨터 포렌식 대상 파일을 찾기 위한 방법)

  • Cho, Gyu-Sang
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.49 no.4
    • /
    • pp.1-8
    • /
    • 2012
  • The NTFS journaling file($LogFile) is used to keep the file system clean in the event of a system crash or power failure. The operation on files leaves large amounts of information in the $LogFile. Despite the importance of a journal file as a forensic evidence repository, its structure is not well documented. The researchers used reverse engineering in order to gain a better understanding of the log record structures of address parts, and utilized the address for identifying object files to gain forensic information.

The Study of Data Recorder for Mission Replay (임무 재생을 위한 데이터기록장치 연구)

  • Lee, Sang-Myung;Kim, Young-Kil
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2011.10a
    • /
    • pp.357-360
    • /
    • 2011
  • On the matter in line with NCW(Network Centric Warfare) and information age, the military is on an efficient-expanding trend as sharing with status and information promptly through the various and complex exchange of messages and the phone communication between operators, using a highly efficient operating console. The recording devices that record an operational situation to plan a new operation through the mission analysis and result reviews after finishing military operation or training are developed and operated. Recording method is classified into two groups. one is the recording of display shots, another is the recording of an exchange of messages. This study proposes the new data-oriented recording method to reduce the readiness time of replay and the improvement scheme.

  • PDF

A Study on the Application of the Cyber Threat Management System to the Future C4I System Based on Big Data/Cloud (빅데이터/클라우드 기반 미래 C4I체계 사이버위협 관리체계 적용 방안 연구)

  • Park, Sangjun;Kang, Jungho
    • Convergence Security Journal
    • /
    • v.20 no.4
    • /
    • pp.27-34
    • /
    • 2020
  • Recently, the fourth industrial revolution technology has not only changed everyday life greatly through technological development, but has also become a major keyword in the establishment of defense policy. In particular, Internet of Things, cloud, big data, mobile and cybersecurity technologies, called ICBMS, were selected as core leading technologies in defense information policy along with artificial intelligence. Amid the growing importance of the fourth industrial revolution technology, research is being carried out to develop the C4I system, which is currently operated separately by the Joint Chiefs of Staff and each military, including the KJCCS, ATCIS, KNCCS and AFCCS, into an integrated system in preparation for future warfare. This is to solve the problem of reduced interoperability for joint operations, such as information exchange, by operating the C4I system for each domain. In addition, systems such as the establishment of an integrated C4I system and the U.S. military's Risk Management Framework (RMF) are essential for efficient control and safe operation of weapons systems as they are being developed into super-connected and super-intelligent systems. Therefore, in this paper, the intelligent cyber threat detection, management of users' access to information, and intelligent management and visualization of cyber threat are presented in the future C4I system based on big data/cloud.

A Study on the Concept of Social Engineering Based Cyber Operations (사회공학 사이버작전 개념정립 연구)

  • Shin, Kyuyong;Kang, Jungho;Yoo, Jincheol;Kim, Jeewon;Kang, Sungrok;Lim, Hyunmyung;Kim, Yongju
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.3
    • /
    • pp.707-716
    • /
    • 2018
  • Recently, instead of technical cyber operations that directly attack the target information system by using cyber attack techniques, social engineering techniques that indirectly invade the system by exploiting the vulnerabilities of persons who manage the system are being watched. Despite this trend, there is a lot of confusion because there is no clear concept about the relationship between cyber operations and social engineering techniques. Therefore, this paper aims at establishing a clear concept of a social engineering cyber operation, helping future researchers in this literature.

The Diagnosis and Prescription for Cybersecurity in Korea: Focusing on Policy and System

  • Park, Sangdon;Kim, Il Hwan;Kim, Jaehyoun;Lee, Kyung Lyul
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.2
    • /
    • pp.843-859
    • /
    • 2018
  • Cybersecurity has emerged as a serious problem in Korea and there have been relevant movements to improve domestic cybersecurity policy and system. However, discussions have yet to result in actual progress and the legislation for improvement of cybersecurity policy and system have been stagnant until now. As evidenced by the introduction of primary government legislation bill for national cybersecurity in 2017, the preparations for improvements to the policy and system are still in progress. However, we cannot be positive about the possibility of implementing these improvements during the process. Recognition of the importance of cybersecutiry has gradually risen and is more prevalent than in years past, however, in-depth discussions are not being made. In principle, misunderstandings about cybersecurity itself and insufficient understandings of the relevant legislation seem to cause such problems. Therefore, it is necessary to review key issues related to the improvement of cybersecurity policy and system and reconsider tasks for the future. Such issues include the relationship between cybersecurity and fundamental rights, establishing responsibility and capability of each of entities for cybersecurity, and the role of the military in cybersecurity. This type of in-depth discussion will be helpful for finding ways to improve upon cybersecurity policy and system. Moreover, this study aims to key issues with questionnaire survey and political and normative inquiry.

A Design of the Safe Zone Managing Algorithm with the Variable Interval Sensing Scheme for the Sensor Networks

  • Cha, Hyun-Chul
    • Journal of the Korea Society of Computer and Information
    • /
    • v.21 no.10
    • /
    • pp.29-35
    • /
    • 2016
  • In this paper, we propose a scheme to prolong the lifetime of the sensor network by reducing the power consumption of the sensor node. The proposed algorithm reduces the number of transmissions and sensing at the application layer. We combine the VIS scheme with the MSZ algorithm and call it as the SZM/VIS algorithm. The actual temperature data was collected using the sensor nodes to assess the performance of the proposed algorithm. The proposed algorithm was implemented through the programming and was evaluated under various setting values. Experimental results show that the SZM/VIS has a slightly improved transmission ratio than that of the MSZ while has the periodic transmission capability like as the MSZ. Also the SZM/VIS can significantly reduces the sensing ratio like that of the VIS. Our algorithm has the advantages of instantaneous, simplicity, small overhead and robustness. Our algorithm has just negligible side effects by controlling the parameter properly depending on the application types. The SZM/VIS algorithm will be able to be used effectively for the applications that need to be managed within a certain range of specific properties, such like crop management.

Dynamic TDMA Protocol for Transmission of Tactical Information in Wireless Network (무선통신망에서 전술정보 전송을 위한 동적 시분할 다중접속프로토콜)

  • Park, Chang-Un;Kim, Tae-Kon;Lim, Man-Yeob;Lee, Youn-Jeong;Kim, Ho
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.35 no.11B
    • /
    • pp.1640-1650
    • /
    • 2010
  • To prepare for the network centric warfare, Korea Joint Tactical Data Link System(KJTDLS) has been developed by the South Korean military recently and its development is divided into two phases: basic and complete ones. Due to the limited bandwidth and low transmission efficiency of the developing KJTDLS (basic), lots of problems could be occurred when the TDMA protocol in Link-16 is applied. In this paper, a new dynamic TDMA frame structure for KJTDLS(basic) is proposed and the performance of the proposed is evaluated through the implementation of simulation.

Construction Cost Estimation on the Initial Design Stage of Naval Ships based on a Product Configuration Model (Product Configuration Model 개념 기반의 함정 건조공수 추정 연구)

  • Oh, Dae-Kyun;Jeong, Yeon-Hwan;Shin, Jong-Gye;Choi, Yang-Ryul
    • Journal of the Society of Naval Architects of Korea
    • /
    • v.46 no.3
    • /
    • pp.351-361
    • /
    • 2009
  • Many manufacturers define the system of a new product flexibility, and take advantage of previous-product information using the product configuration concept. Product configuration is an approach that defines the system of a new product centered on the product structure by referring to the previous-product information. In this paper, it is established how to apply the concept of a product configuration utilizing previous-ships information in construction cost estimation process systematically and effectively. For this, we define the advanced-construction cost estimation process based on a naval ship product model, and design construction cost estimating model. It is validated that this process and model have the applicability through the case study of the construction cost estimating of the mine-warfare ship.

Attack Categorization based on Web Application Analysis (웹 어플리케이션 특성 분석을 통한 공격 분류)

  • 서정석;김한성;조상현;차성덕
    • Journal of KIISE:Information Networking
    • /
    • v.30 no.1
    • /
    • pp.97-116
    • /
    • 2003
  • Frequency of attacks on web services and the resulting damage continue to grow as web services become popular. Techniques used in web service attacks are usually different from traditional network intrusion techniques, and techniques to protect web services are badly needed. Unfortunately, conventional intrusion detection systems (IDS), especially those based on known attack signatures, are inadequate in providing reasonable degree of security to web services. An application-level IDS, tailored to web services, is needed to overcome such limitations. The first step in developing web application IDS is to analyze known attacks on web services and characterize them so that anomaly-based intrusion defection becomes possible. In this paper, we classified known attack techniques to web services by analyzing causes, locations where such attack can be easily detected, and the potential risks.