• Title/Summary/Keyword: Military Threat

Search Result 262, Processing Time 0.025 seconds

A Study on Command and Control Through Cyber Protection Function Analysis (사이버 방호기능 분석을 통한 지휘통제에 관한 연구)

  • Choi, Seho;Oh, Haengrok;Yun, Joobeom
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.24 no.5
    • /
    • pp.537-544
    • /
    • 2021
  • Cyber threats can bypass existing cyber-protection systems and are rapidly developing by exploiting new technologies such as artificial intelligence. In order to respond to such cyber threats, it is important to improve the ability to detect unknown cyber threats by correlating heterogeneous cyber protection systems. In this paper, to enhance cyber-attack response capabilities, we proposed command and control that enables rapid decision-making and response before the attack objectives are achieved, using Lockheed Martin's cyber kill chain and MITRE ATT&CK to analyze the purpose and intention of the attacker.

Development of a Simulator for Submarine Path Estimation and Optimization of Sonobuoy Deployment Patterns (잠수함 경로 추정 및 소노부이 투하 패턴 최적화를 위한 시뮬레이터 개발)

  • Jaeho Jeong
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.27 no.5
    • /
    • pp.567-580
    • /
    • 2024
  • Due to specificity in the underwater environment, the difficulty of detecting submarine and the threat of submarine are increasing. The probability of detecting a submarine can be increased by estimation submarine path and optimizing sonobuoy deployment. In this paper, marine data collection, dynamics of submarine, submarine tracking path modeling, acoustic wave propagation modeling, detection probability modeling are applied in the simulator as similar to reality as possible. A simulator is developed to design submarine path estimation and sonobuoy deployment optimization scenario and to check result according to the scenario.

A Study on the Application of the Cyber Threat Management System to the Future C4I System Based on Big Data/Cloud (빅데이터/클라우드 기반 미래 C4I체계 사이버위협 관리체계 적용 방안 연구)

  • Park, Sangjun;Kang, Jungho
    • Convergence Security Journal
    • /
    • v.20 no.4
    • /
    • pp.27-34
    • /
    • 2020
  • Recently, the fourth industrial revolution technology has not only changed everyday life greatly through technological development, but has also become a major keyword in the establishment of defense policy. In particular, Internet of Things, cloud, big data, mobile and cybersecurity technologies, called ICBMS, were selected as core leading technologies in defense information policy along with artificial intelligence. Amid the growing importance of the fourth industrial revolution technology, research is being carried out to develop the C4I system, which is currently operated separately by the Joint Chiefs of Staff and each military, including the KJCCS, ATCIS, KNCCS and AFCCS, into an integrated system in preparation for future warfare. This is to solve the problem of reduced interoperability for joint operations, such as information exchange, by operating the C4I system for each domain. In addition, systems such as the establishment of an integrated C4I system and the U.S. military's Risk Management Framework (RMF) are essential for efficient control and safe operation of weapons systems as they are being developed into super-connected and super-intelligent systems. Therefore, in this paper, the intelligent cyber threat detection, management of users' access to information, and intelligent management and visualization of cyber threat are presented in the future C4I system based on big data/cloud.

What has been going to clearing-operation the Somalian pirates? (소말리아 해적 퇴치작전 어떻게 진행되고 있나?)

  • Lee, Chae-Woo
    • Journal of the Korean Professional Engineers Association
    • /
    • v.44 no.2
    • /
    • pp.43-45
    • /
    • 2011
  • Somalian pirates with the onset of civil war in the early 1990s have caused a threat to international transportation. Various international organizations including the International Maritime Organization and the World Food Program are concerned about this problem. The cost of shipping is increasing and food-aid shipment is hindered by these ships are needed military escort. Since 2008, international society has deployed multinational naval vessel in the nearby Somalian sea and strengthen multinational naval operations to minimize damages from piracy.

  • PDF

North Korea's cyber attack threat analysis research (Based on the type of attack technology) (북한의 사이버 공격 위협 분석 연구 (공격 기술의 유형 중심으로))

  • Kim, Jin Gwang
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2020.07a
    • /
    • pp.107-110
    • /
    • 2020
  • 북한의 사이버 공격은 매년 증가하고 있으며 공격 수행인력 또한 6,800여 명으로 지속 늘어나고 있어 우리에게 큰 위협이 되고 있다. 그럼에도 불구하고 현재까지 북한의 사이버 공격사례 분석은 각각의 사건에 대한 개별 현황분석밖에 되지 않아 큰 시각에서의 공격 기술 유형이 어떻게 변화하였는지와 관련된 연구가 필요하다. 이에 따라 본 논문에서는 우선 사이버전의 일반사항 및 공격 기술을 확인하고 최근 3년간 발생한 북한의 사이버 공격사례를 조사하여 세부적으로 사용된 주요 공격 기술의 유형을 확인하고자 한다.

  • PDF

Corruption as a Threat to Economic Security of the Country

  • Samiilenko, Halyna;Ivanova, Nataliia;Shaposhnykova, Iryna;Vasylchenko, Lidiia;Solomakha, Iryna;Povna, Svitlana
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.12
    • /
    • pp.316-322
    • /
    • 2021
  • The problem of corruption and the spread of corruption crime today is not only one of the main social problems, but also an obstacle to the implementation of reforms in Ukraine. Given the complexity, scale and diversity of the impact of corruption, it is an undisputed threat to national security. At the state level, corruption threatens, firstly, state security as a result of its spread in public authorities and the combination of political and business spheres; secondly, in the domestic political sphere as a result of non-compliance and violation by officials of public authorities and local governments of the laws of Ukraine; thirdly, in the economic sphere as a result of the dominance of personal interests of civil servants over national ones; fourthly, in other spheres, namely, military, social, ecological, informational, foreign policy, etc. The origins of corruption are diverse and are formed not only in the country but also abroad. The current corruption threat is the result of the country's ineffective domestic and foreign anticorruption policies. Acceleration of the spread and manifestation of external corruption threats is associated with a number of unresolved foreign policy issues against the background of the development of globalization and integration processes, in particular: economic and financial dependence of the country on international financial institutions and organizations; as well as from foreign countries that pose a potential threat due to their ambitious plans to expand our country; unresolved issues regarding the international legal consolidation of borders, etc. It is noted that the current conditions for the development of state security, due to new challenges and threats, need to improve and implement new measures to prevent corruption as a negative impact of the main threats to national economic security. As a result of the study, the main measures to counter the main threats to the economic security of the state were identified.

A Study on the Design Methodology of SE-Based Military Force Construction in Defense Acquisition Process (Focusing on Influencing Factor Priorities) (국방획득 과정에서 SE개념 기반의 군사력건설 설계 방법론 연구(영향요인 우선순위 결정 중심으로))

  • Kim, Heung Bin;Seo, Je Hyeon
    • Journal of the Korean Society of Systems Engineering
    • /
    • v.15 no.2
    • /
    • pp.87-97
    • /
    • 2019
  • This paper focuses on the SE concept based on the weapon system design, which is the lack of systematic research at the stage of military requirements creation prior to acquisition management phase. Influence factors were derived by focusing on the core issues that were at issue in the process of requirements analysis, requirements verification, and business management in recent years. Next, the impact factor was prioritized using the AHP technique and then alternatives were suggested. As a result, through the hierarchical analysis process, 'substantiation of necessity' was found to be the most important factor in the large category, and 'satisfaction of the operating concept' was the most important factor. In addition, as a result of calculating the final weight for each nutritional factor, it was analyzed in order of 'enemy threat response ability', 'response to operational environment change', 'performance considering operational environment', and 'guaranteed power generation'. The results of this analysis suggest which factors should be focused on, firstly, based on the concept of SE by the military and JCS.

A Local Path Planning for Unmanned Aerial Vehicle on the Battlefield of Dynamic Threats (동적인 위협이 존재하는 전장에서의 무인 항공기 지역경로계획)

  • Kim, Ki-Tae;Nam, Yong-Keun;Cho, Sung-Jin
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.35 no.1
    • /
    • pp.39-46
    • /
    • 2012
  • An unmanned aerial vehicle (UAV) is a powered aerial vehicle that does not carry a human operator, uses aerodynamic forces to provide vehicle lift, can fly autonomously or be piloted remotely, can be expendable or recoverable, and can carry a lethal or non-lethal payload. An UAV is very important weapon system and is currently being employed in many military missions (surveillance, reconnaissance, communication relay, targeting, strike, etc.) in the war. To accomplish UAV's missions, guarantee of survivability should be preceded. The main objective of this study is a local path planning to maximize survivability for UAV on the battlefield of dynamic threats (obstacles, surface-to-air missiles, radar etc.). A local path planning is capable of producing a new path in response to environmental changes. This study suggests a $Smart$ $A^*$ (Smart A-star) algorithm for local path planning. The local path planned by $Smart$ $A^*$ algorithm is compared with the results of existing algorithms ($A^*$ $Replanner$, $D^*$) and evaluated performance of $Smart$ $A^*$ algorithm. The result of suggested algorithm gives the better solutions when compared with existing algorithms.

ROK's defense reform strategy for coping with the emerging North Korea's nuclear weapons. (북한의 임박한 핵무기 배치대비 국방전략 대개혁)

  • Kim, Jong-Min
    • Strategy21
    • /
    • s.41
    • /
    • pp.208-231
    • /
    • 2017
  • The balance of power in conventional forces between the two Koreas works in favor of the South Korea in the Korea peninsula. But, the balancing mechanism between the two Koreas in asymmetric forces like nuclear and missile forces works absolutely in favor of the North Korea. That's why it should be timely for the ROK military to review existing strategy and revise a new counter strategy against the threat posed by the North Korea's nuclear and missile forces. The ROK military is now developing 4D, KAMD, KILL Chain strategies as means to cope with the North Korea's nuclear and missile threats. Considering efforts and resources invested now, the strategies are expected to be in place in next five or more years. However, approaches to those strategies seem to be rather fragmentary and conceptual than comprehensive and pragmatic. The types of strategies against the North Korea's military threats need to be a deterrence in peace time and a fighting and winning in war time in the Korean theater. But, the most important element in the deterrence strategy is the credibility. This study concludes with an new strategic concept titled "ADAD(Assured Defense, Assured Destruction)" as an alternative to existing strategies to deal with the North Korea's nuclear and missile threats.

A Study on the Security System of the Web Based Defense Information Service Network (WEB 환경에서 국방정보통신망 정보보호체계 구축에 관한 연구)

  • 신유찬;남길현
    • Journal of the military operations research society of Korea
    • /
    • v.28 no.1
    • /
    • pp.115-135
    • /
    • 2002
  • The limits of current DN(Defense networks), private and closed network, become to reality; for Example, high expense of construction and maintenance of networks, restriction of new subscribers on DN. Therefore, a network using web environment that reflect fast development of If and IS(Information Security) technology is demanded for MND. Meeting the requirement of reliable IS system and extension and improvement of DN using common network, we can reduce the expense to extend, maintain, repair DN, form the environment that makes military business cooperate better with civil company and government agency, advance implementing Defense computing and networking service for field small size units that was a exception of Defense digitalization. But it is essential to construct DN based on common network that there are security requisites; confidentiality, integrity, availability, efficiency, log, backup, restoration, that have to be realized at demanding level for IS. This thesis suggested four measurements; replacement DN with common network to resolve the requirements of building new network and improvement of performance for private DN, linkage with common network for new requirement, distribution of traffic using common network, configuration of DN using Internet and Proposed a refinement of IS management organization to treat security threat of common network flexibly, and LAN IS standard model of DN based on the web environment.