• Title/Summary/Keyword: Information Warfare

Search Result 370, Processing Time 0.027 seconds

A study on the Application of Effects-based Operation in Cyberspace (사이버공간에서의 효과중심작전 적용방안 연구)

  • Jang, Won-gu;Lee, Kyun-ho
    • Journal of Internet Computing and Services
    • /
    • v.21 no.1
    • /
    • pp.221-230
    • /
    • 2020
  • The effects-based operation, which would reduce unnecessary efforts and meaningless sacrifices incurred during a war and simultaneously reach the will of the enemy leadership by strategic attacks, was discarded for the reason that it was difficult to apply it to military power except for airpower. However, cyberspace, which can be thoroughly logical and calculated, can be suitable for conducting effects-based operations. This study examined a way to carry out effects-based operations in such cyberspaces. It laid the foundation for overcoming the limitations of effects-based operations revealed in previous battle cases and executing the operations in cyber battlespace where the boundary between physical and cyberspaces gradually disappeared. Futhermore, it demonstrated that effects-based operations could be carried out in cyberspace by establishing a military strategy, which could conduct the operations through an analysis of previous cyber-attack cases.

A Study on the Terrain Information Effects in Combat Simulation (전투 시뮬레이션에서의 지형정보효과에 관한 고찰)

  • Kim, Gak-Gyu;Choi, Kyung-Hwan;Lee, Sang-Heon
    • Journal of the Korea Society for Simulation
    • /
    • v.21 no.2
    • /
    • pp.11-17
    • /
    • 2012
  • The past combats depended often on a number of firepower and manpower. However, integrated decision support viewpoint from communications, surveillance, reconnaissance, intelligence and so forth in combats witnessed in the Gulf, the Middle East, and Afghanistan have changed the trends of combat. That is, the force multipliers which many support systems enhance the combat potential of the fighting forces significantly become big issues to win or not in that combat. According to changing recent combat trend, Lanchester's combat model is being challenged to develop keeping pace with the new trend. We approach this paper as mathematical modeling about how the effect of terrain affects in the combat. Terrain information is invisible, but it is necessary to consider for analysis of warfare. Additionally, tangible or intangible elements affecting to attrition coefficients are continuely reflected to the combat model from decision-makers, then it will be a model closer to the reality and very suggestive to the actual world.

Cost-Effective, Real-Time Web Application Software Security Vulnerability Test Based on Risk Management (위험관리 기반의 비용 효율적인 실시간 웹 애플리케이션 소프트웨어 보안취약점 테스팅)

  • Kumi, Sandra;Lim, ChaeHo;Lee, SangGon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.1
    • /
    • pp.59-74
    • /
    • 2020
  • The web space where web applications run is the cyber information warfare of attackers and defenders due to the open HTML. In the cyber attack space, about 84% of worldwide attacks exploit vulnerabilities in web applications and software. It is very difficult to detect web vulnerability attacks with security products such as web firewalls, and high labor costs are required for security verification and assurance of web applications. Therefore, rapid vulnerability detection and response in web space by automated software is a key and effective cyber attack defense strategy. In this paper, we establish a security risk management model by intensively analyzing security threats against web applications and software, and propose a method to effectively diagnose web and application vulnerabilities. The testing results on the commercial service are analyzed to prove that our approach is more effective than the other existing methods.

A Development of Weapon System Test Set's Display Using an Ecological Interface Design Methodology (생태학적 인터페이스 디자인(EID) 기법을 활용한 무기체계점검장비(WSTS) 디스플레이 개발)

  • Park, Jae-Eun;Seo, Yang-Woo;Kim, Ko-Kyun
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.16 no.6
    • /
    • pp.4147-4157
    • /
    • 2015
  • The weapon system has developed by adding various functions because of the warfare change. And, an weapon system test set (WSTS) that is used to test and judge the condition of weapon system also deal with a lot of complex information. However, almost WSTS is developed on the basis of developer-centric. Because of it, it is hard to make a result by apprehending information on WSTS's display. Thus, I proposed a new display of WSTS by adapting the Ecological Interface Design(EID) Methodology to reduce operator's cognitive workload and assure safe testing. WSTS's Display is developed through Information Requirement and Work Domain Model as a result of Work Domain Analysis. The most powerful thing in the new display is that operator can identify his testing and status of WSTS directly. I expect that it reduces operator's cognitive workload and helps safe testing.

Design of Ubiquitous Multi-Static Sonobuoy System with Smart Phone Control Function (스마트 폰 제어기능을 갖는 유비쿼터스 다중상태 소노부이 시스템 설계)

  • Kim, Jong-In;Lee, Seok-Won;Han, Min-Seok
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.14 no.2
    • /
    • pp.140-148
    • /
    • 2021
  • In this paper, we intend to improve the availability by integrating Sonobuoy, the most essential detection system used in anti-submarine operations, with LTE communication of smart devices. Anti-submarine capability to respond to the threat of North Korean submarine forces is becoming increasingly important, and continuous research and development is required. This paper aims to enhance the ability of acoustic tactics by using a military-only LTE communication system installed on a ship, smart devices that can be linked to it, and a multi-static sonobuoy controlled by them. The proposed system can increase the visual effect by not only displaying coordinate values by receiving accurate coordinate information of each sonobuoy to a smart device, but also displaying a marker on a map.

Methodology of Interoperating Link-K Track Number in Multi TDLs (다중 전술데이터링크 간 Link-K 트랙 번호 상호운용 기술)

  • Lee, Youn-Jeong;Kim, Sang-Jun;Lim, Man-Yeob
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.38C no.12
    • /
    • pp.1186-1195
    • /
    • 2013
  • In modern warfare, the main factor of triumph is superior situation awareness which leads rapid command decision and precisely guided munition, and TDL(Tactical Data Link) is the main communicational enabler. ROK forces currently operate Link-16 with allied forces and are also developing Korean national data link, Link-K which is also planned to be cooperated with Link-16. Assigning participant and track numbers needs agreement between ROK and allied forces, but ROK forces have exclusive authority in assigning numbers in Link-K. This paper proposes the effective method of exchange participant and track numbers between Link-16 and Link-K, and applicability verification in operational test and evaluation will be also presented.

A Super-Wideband Dipole Antenna With a Self-Complementary Structure (자기상보 구조를 갖는 초광대역 다이폴 안테나)

  • Park, Won Bin;Kwon, Oh Heon;Lee, Sungwoo;Lee, Jong Min;Park, Young Mi;Hwang, Keum Cheol
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.41 no.11
    • /
    • pp.1414-1416
    • /
    • 2016
  • In this paper, a SWB (Super-WideBand) dipole antenna with self-complementary structure is proposed for signal intelligence. The proposed antenna consists of a self-complementary dipole antenna and a tapered balun for balanced feeding. The measured -10 dB reflection bandwidth of the proposed antenna is more than 28:1 (0.73-20 GHz) and 3 dB axial ratio bandwidth is 3.25:1 (1.91-6.22 GHz) with RHCP (Right Hand Circular Polarization) at +z direction. The measured radiation patterns are omni-directional in lower frequency band and bi-directional in higher frequency band. The measured peak gain within -10 dB reflection bandwidth varies from 2.83 dBi to 7.66 dBi.

Threat Unification using Multi-Sensor Simulator of Battlefield Helicopter and Its Implementation (전장 헬기의 다중센서 시뮬레이터를 통한 위협통합 및 구현)

  • Park, Hun-Woo;Kang, Shin-Bong;Noh, Sang-Uk;Jeong, Un-Seob
    • Journal of Internet Computing and Services
    • /
    • v.10 no.3
    • /
    • pp.35-49
    • /
    • 2009
  • In electronic warfare settings, battlefield helicopters identify various threats based upon threat data, which are acquired using their multi-sensors of aircraft survivability equipment (ASE). To continually function despite of potential threats and successfully execute their missions, the battlefield helicopters have to repeatedly report threats in simulated battlefield situations. Toward this ends, the paper presents threat unification using multi-sensor simulator and its implementation. The simulator consists of (1) threat attributes generator, which models threats against battlefield helicopters and defines their specific attributes, (2) threat data generator, which generates threats, being similar to real ones, using normal, uniform, and exponential distributions, and (3) graphic display for threat analysis and unification, which shows unified threat information, for example, threat angle and its level. We implement a multi-sensor threat simulator that can be repeatedly operable in various simulated battlefield settings. Further, we report experimental results that, in addition to tangibly modeling the threats to battlefield helicopters, test the capabilities of threat unification using our simulator.

  • PDF

Development of Information Technology for Smart Defense (Smart Defense 를 위한 IT 기술 개발)

  • Chung, Kyo-Il;Lee, So Yeon;Park, Sangjoon;Park, Jonghyun;Han, Sang-Cheol
    • Transactions of the Korean Society of Mechanical Engineers A
    • /
    • v.38 no.3
    • /
    • pp.323-328
    • /
    • 2014
  • Recently, there has been demand for the convergence of IT (Information and communication Technologies, ICT) with defense, as has already been achieved in civilian fields such as healthcare and construction. It is expected that completely new and common requirements would emerge from the civilian and military domains and that the shape of war field would change rapidly. Many military scientists forecast that future wars would be network-centric and be based on C4I(Command, Control, Communication & Computer, Intelligence), ISR(Intelligence, Surveillance & Reconnaissance), and PGM(Precision Guided Munitions). For realizing the smart defense concept, IT should act as a baseline technology even for simulating a real combat field using virtual reality. In this paper, we propose the concept of IT-based smart defense with a focus on accurate detection in real and cyber wars, effective data communication, automated and unmanned operation, and modeling and simulation.

The Multi-Net Performance Evaluation of Link-16 in the L-Band Sharing with Radars (L-대역 내 레이더 주파수 공동사용 환경에서 멀티넷을 통한 Link-16 운용 가능성 성능 평가)

  • Choi, Seonjoo;Yu, Jepung;Lim, Jaesung;Baek, Hoki;Kim, Jaewon;Choi, Hyogi
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.41 no.7
    • /
    • pp.738-746
    • /
    • 2016
  • As the trend of future war has been changed to network centric warfare, tactical data link should be needed for fast and accurate situation awareness. Nowadays, Korean air force conducts military operations by using aircrafts equipped with Link-16. The Link-16 can conduct multiple mission at the same time because it supports multi-net capability. Due to lack of frequency resource, the way to share the frequency with other systems has been studied and using L band with radar is considered as one of the candidates bands. However, the data link can be affected by the interference from radars when it shares the L-band because the L-band in Korea is already assigned to long-range detection radars. In this paper, we evaluate operational possibilities of tactical data link in the L-band based on Link-16.