• Title/Summary/Keyword: Moving target defense

Search Result 75, Processing Time 0.021 seconds

Trends in Network Address Moving Technology (네트워크 주소 이동 기술 동향)

  • Park, K.M.;Woo, S.;Moon, D.S.;Kim, I.K.
    • Electronics and Telecommunications Trends
    • /
    • v.32 no.6
    • /
    • pp.73-82
    • /
    • 2017
  • Moving Target Defense(MTD) is a novel security technology concept in which the IT infrastructure changes its form actively and prevents various types of cyber attacks. Network address moving technology is the field that has been most actively researched in terms of MTD. A number of studies on network address moving published over the last decade have suggested a virtual address-based network address moving technology for efficiency in the implementation. However, virtual address-based network address moving technology has serious vulnerabilities in terms of security and availability. This paper examines the technological characteristics of the existing studies and analyzes their limitations. It suggests security requirements to be considered when designing the network address moving technology through a technological analysis.

Performance Improvement for Tracking Small Targets (고기동 표적 추적 성능 개선을 위한 연구)

  • Jung, Yun-Sik;Kim, Kyung-Su;Song, Taek-Lyul
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.16 no.11
    • /
    • pp.1044-1052
    • /
    • 2010
  • In this paper, a new realtime algorithm called the RTPBTD-HPDAF (Recursive Temporal Profile Base Target Detection with Highest Probability Data Association Filter) is presented for tracking fast moving small targets with IIR (Imaging Infrared) sensor systems. Spatial filter algorithms are mainly used for target in IIR sensor system detection and tracking however they often generate high density clutter due to various shapes of cloud. The TPBTD (Temporal Profile Base Target Detection) algorithm based on the analysis of temporal behavior of individual pixels is known to have good performance for detection and tracking of fast moving target with suppressing clutter. However it is not suitable to detect stationary and abruptly maneuvering targets. Moreover its computational load may not be negligible. The PTPBTD-HPDAF algorithm proposed in this paper for real-time target detection and tracking is shown to be computationally cheap while it has benefit of tracking targets with abrupt maneuvers. The performance of the proposed RTPBTD-HPDAF algorithm is tested and compared with the spatial filter with HPDAF algorithm for run-time and track initiation at real IIR video.

Survey on the use of security metrics on attack graph

  • Lee, Gyung-Min;Kim, Huy-Kang
    • Journal of the Korea Society of Computer and Information
    • /
    • v.23 no.12
    • /
    • pp.95-105
    • /
    • 2018
  • As the IT industry developed, the information held by the company soon became a corporate asset. As this information has value as an asset, the number and scale of various cyber attacks which targeting enterprises and institutions is increasing day by day. Therefore, research are being carried out to protect the assets from cyber attacks by using the attack graph to identify the possibility and risk of various attacks in advance and prepare countermeasures against the attacks. In the attack graph, security metric is used as a measure for determining the importance of each asset or the risk of an attack. This is a key element of the attack graph used as a criterion for determining which assets should be protected first or which attack path should be removed first. In this survey, we research trends of various security metrics used in attack graphs and classify the research according to application viewpoints, use of CVSS(Common Vulnerability Scoring System), and detail metrics. Furthermore, we discussed how to graft the latest security technologies, such as MTD(Moving Target Defense) or SDN(Software Defined Network), onto the attack graphs.

A Study on the Video Compression Pre-processing Method for Video Transmission and Target Detection in Ultra-narrowband Environment (초협대역 환경에서 영상전송 및 표적탐지를 위한 영상압축 전처리 방법에 대한 연구)

  • Im, Byungwook;Baek, Seungho;Jun, Kinam;Kim, Dokyoung;Jung, Juhyun;Kim, Daesik
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.23 no.1
    • /
    • pp.28-36
    • /
    • 2020
  • Due to the continued demand for high-definition video, video compression technology is steadily developing and the High Efficiency Video Coding standard was established in 2013. However, despite the development of this compression technology, it is very difficult to smoothly transmit VGA-level videos in Ultra-narrowband environments. In this paper, the target information preprocessing algorithm is presented for smooth transmission of target images moving in forest or open-terrain in Ultra-narrowband environment. In addition, for algorithm verification, the target information preprocessing algorithm was simulated and the simulated results were compared with the video compression result without the algorithm being applied.

VTG based Moving Target Tracking Performance Improvement Method using MITL System in a Maritime Environment (해상환경에서 MITL 시스템을 활용한 VTG 기반 기동표적 추적성능 개선 기법)

  • Baek, Inhye;Woo, S.H. Arman
    • Journal of Korea Multimedia Society
    • /
    • v.22 no.3
    • /
    • pp.357-365
    • /
    • 2019
  • In this paper, we suggest the tracking method of moving multi-objects in maritime environments. The image acquisition is conducted using IR(InfraRed) camera sensors on an airborne platform. Under the circumstance of maritime, the qualities of IR images can be significantly degraded due to the clutter influence, which directly gives rise to a tracking loss problem. In order to reduce the effects from the clutters, we introduce a technical approach under Man-In-The-Loop(MITL) system for enhancing the tracking performance. To demonstrate the robustness of the proposed approach based on VTG(Valid Tracking Gate), the simulations are conducted utilizing the airborne IR video sequences: Then, the tracking performances are compared with the existing Kalman Filter tracking techniques.

Polynomial-time Greedy Algorithm for Anti-Air Missiles Assignment Problem (지대공 미사일 배정 문제의 다항시간 탐욕 알고리즘)

  • Lee, Sang-Un
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.19 no.3
    • /
    • pp.185-191
    • /
    • 2019
  • During the modern battlefields of multi-batches flight formation attack situation, it is an essential task for a commander to make a proper fire distribution of air defense missile launch platforms for threat targets with effectively and quickly. Pan et al. try to solve this problem using genetic algorithm, but they are fails. This paper gets the initial feasible solution using high threat target first destroying strategy only use 75% available fire of each missile launch platform. Then, the assigned missile is moving to another target in the case of decreasing total threat. As a result of experiment, while the proposed algorithm is polynomial-time complexity greedy algorithm but this can be improve the solution than genetic algorithm.

Analysis of Detection Performance of Radar Signal Processor with Relation to Target Doppler Velocity and Clutter Spectrum Characteristics (표적 도플러 속도와 클러터 스펙트럼 특성에 따른 레이더 신호 처리기의 탐지 성능 분석)

  • Yang, Jin-Mo;Shin, Sang-Jin;Lee, Min-Joon;Kim, Whan-Woo
    • The Journal of Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.22 no.1
    • /
    • pp.47-58
    • /
    • 2011
  • MTI filter is used to separate target signal from clutter in many radar signal processing. By suppressing clutter before CFAR detection, the detection performance can be improved. As a radar system designed, a design engineer generally takes averaged SNR and CNR into account and does not include the effect of MTI filter's frequency response. In practice, when the signals including clutter are pass through the filter, SNR is widely varying according to target velocity and CNR is also varying according to clutter center frequency and spectrum spreading. In this paper, we have derived the relationship between the MTI filter's frequency response and a target's velocity and a clutter's spectrum characteristics. With the variation of SNR and CNR at the filter output, the detection performance of CFAR has been analyzed by the simulation and has made certain of their influences on the performance.

DPW-RRM: Random Routing Mutation Defense Method Based on Dynamic Path Weight

  • Hui Jin;Zhaoyang Li;Ruiqin Hu;Jinglei Tan;Hongqi Zhang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.17 no.11
    • /
    • pp.3163-3181
    • /
    • 2023
  • Eavesdropping attacks have seriously threatened network security. Attackers could eavesdrop on target nodes and link to steal confidential data. In the traditional network architecture, the static routing path and the important nodes determined by the nature of network topology provide a great convenience for eavesdropping attacks. To resist monitoring attacks, this paper proposes a random routing mutation defense method based on dynamic path weight (DPW-RRM). It utilizes network centrality indicators to determine important nodes in the network topology and reduces the probability of important nodes in path selection, thereby distributing traffic to multiple communication paths, achieving the purpose of increasing the difficulty and cost of eavesdropping attacks. In addition, it dynamically adjusts the weight of the routing path through network state constraints to avoid link congestion and improve the availability of routing mutation. Experimental data shows that DPW-RRM could not only guarantee the normal algorithmic overhead, communication delay, and CPU load of the network, but also effectively resist eavesdropping attacks.

Tracking Error Extraction Algorithm in Monopulse Active Homing Radar System

  • Kwon, Jun-Beom;Kim, Do-Hyun;Kim, Lee-Han;Byun, Young-Jin
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2001.10a
    • /
    • pp.158.5-158
    • /
    • 2001
  • Monopulse active homing radar requires velocity and angle information of target to track fast moving target. Target velocity can be estimated by measuring the frequency shift between transmitted and received frequencies. Angle information is obtained by measuring boresight error. Measurement of doppler frequency component in received signal is done through FFT analysis and interpolation algorithm for fine tuning. Boresight errors in azimuth and elevation axes are proportional to the power of each difference channel relative to sum channel. The target signal power in difference channel is estimated more precisely by measuring the power of FFT result cell of maximum ...

  • PDF

A Study on Receiving Beam Pointing Error and MTI(Moving Target Indication) Performance in a Bistatic Radar Using Pulse Chasing (펄스 체이싱을 이용한 바이스태틱 레이더에서 수신 빔 조향 오차와 MTI(Moving Target Indication) 성능에 대한 연구)

  • Yang, Jin-Mo;Lee, Min-Joon;Kim, Whan-Woo
    • The Journal of Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.21 no.12
    • /
    • pp.1412-1422
    • /
    • 2010
  • A bistatic radar using the pulse chasing can detect a target to track successive transmitted pulses using a receive beam for effectively scanning the cosite search area. When tracking a transmitted pulse with the receive beam, some beam pointing errors within pulse-to-pulse can cause the timing error in received pulse and the variation of the signal strength. In this paper, we have proposed that some errors due to the receive beam pointing error could limit the MTI filter's performance and derived that the relationship between the MTI performance and the geometric factors which are the inherent properties in bistatic configuration. Through the simulation, we have considered the limitations of the improvement performance restricted by the receiving beam pointing error and confirmed the contribution to the performance improvement in maintaining the receiving beam pointing error of under 0.5 degrees.