• Title/Summary/Keyword: National defense information network

Search Result 230, Processing Time 0.032 seconds

A Study on the Explainability of Inception Network-Derived Image Classification AI Using National Defense Data (국방 데이터를 활용한 인셉션 네트워크 파생 이미지 분류 AI의 설명 가능성 연구)

  • Kangun Cho
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.27 no.2
    • /
    • pp.256-264
    • /
    • 2024
  • In the last 10 years, AI has made rapid progress, and image classification, in particular, are showing excellent performance based on deep learning. Nevertheless, due to the nature of deep learning represented by a black box, it is difficult to actually use it in critical decision-making situations such as national defense, autonomous driving, medical care, and finance due to the lack of explainability of judgement results. In order to overcome these limitations, in this study, a model description algorithm capable of local interpretation was applied to the inception network-derived AI to analyze what grounds they made when classifying national defense data. Specifically, we conduct a comparative analysis of explainability based on confidence values by performing LIME analysis from the Inception v2_resnet model and verify the similarity between human interpretations and LIME explanations. Furthermore, by comparing the LIME explanation results through the Top1 output results for Inception v3, Inception v2_resnet, and Xception models, we confirm the feasibility of comparing the efficiency and availability of deep learning networks using XAI.

A Discovery System of Malicious Javascript URLs hidden in Web Source Code Files

  • Park, Hweerang;Cho, Sang-Il;Park, Jungkyu;Cho, Youngho
    • Journal of the Korea Society of Computer and Information
    • /
    • v.24 no.5
    • /
    • pp.27-33
    • /
    • 2019
  • One of serious security threats is a botnet-based attack. A botnet in general consists of numerous bots, which are computing devices with networking function, such as personal computers, smartphones, or tiny IoT sensor devices compromised by malicious codes or attackers. Such botnets can launch various serious cyber-attacks like DDoS attacks, propagating mal-wares, and spreading spam e-mails over the network. To establish a botnet, attackers usually inject malicious URLs into web source codes stealthily by using data hiding methods like Javascript obfuscation techniques to avoid being discovered by traditional security systems such as Firewall, IPS(Intrusion Prevention System) or IDS(Intrusion Detection System). Meanwhile, it is non-trivial work in practice for software developers to manually find such malicious URLs which are hidden in numerous web source codes stored in web servers. In this paper, we propose a security defense system to discover such suspicious, malicious URLs hidden in web source codes, and present experiment results that show its discovery performance. In particular, based on our experiment results, our proposed system discovered 100% of URLs hidden by Javascript encoding obfuscation within sample web source files.

Efficient Multicast Routing on BCube-Based Data Centers

  • Xie, Junjie;Guo, Deke;Xu, Jia;Luo, Lailong;Teng, Xiaoqiang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.8 no.12
    • /
    • pp.4343-4355
    • /
    • 2014
  • Multicast group communication has many advantages in data centers and thus is widely used by many applications. It can efficiently reduce the network traffic and improve the application throughput. For the multicast application in data centers, an essential problem is how to find a minimal multicast tree, which has been proved to be NP-hard. In this paper, we propose an approximation tree-building method for the minimal multicast problem, named HD(Hamming Distance)-based multicast tree. Consider that many new network structures have been proposed for data centers. We choose three representative ones, including BCube, FBFLY, and HyperX, whose topological structures can be regarded as the generalized hypercube. Given a multicast group in BCube, the HD-based method can jointly schedule the path from each of receiver to the only sender among multiple disjoint paths; hence, it can quickly construct an efficient multicast tree with the low cost. The experimental results demonstrate that our method consumes less time to construct an efficient multicast tree, while considerably reduces the cost of the multicast tree compared to the representative methods. Our approach for BCube can also be adapted to other generalized hypercube network structures for data centers after minimal modifications.

Online Hop Timing Detection and Frequency Estimation of Multiple FH Signals

  • Sha, Zhi-Chao;Liu, Zhang-Meng;Huang, Zhi-Tao;Zhou, Yi-Yu
    • ETRI Journal
    • /
    • v.35 no.5
    • /
    • pp.748-756
    • /
    • 2013
  • This paper addresses the problem of online hop timing detection and frequency estimation of multiple frequency-hopping (FH) signals with antenna arrays. The problem is deemed as a dynamic one, as no information about the hop timing, pattern, or rate is known in advance, and the hop rate may change during the observation time. The technique of particle filtering is introduced to solve this dynamic problem, and real-time frequency and direction of arrival estimates of the FH signals can be obtained directly, while the hop timing is detected online according to the temporal autoregressive moving average process. The problem of network sorting is also addressed in this paper. Numerical examples are carried out to show the performance of the proposed method.

Expert Exploration Using Social Network Analysis (사회연결망 분석 이용 전문가 탐색)

  • Kim, Jin-Gwang;Yoon, Soung-Woong;Lee, Sang-Hoon
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2019.01a
    • /
    • pp.171-174
    • /
    • 2019
  • 본 논문에서는 사회연결망 분석을 이용하여 군 장비정비정보체계의 정비데이터를 분석하고 이를 통해 정비 분야 전문가를 파악하고자 하였다. 장비정비정보체계는 군에서 장비를 효율적으로 정비하고 관리하기 위해 2009년부터 운용하고 있는 체계로 해군한 정비부대에 대한 2017년 정비데이터(00,000건)의 일부(0,000건)를 페이지랭크 중심성 분석을 통해 정비 분업화 수준과 참여도를 확인함으로써 전문분야를 확인하였다.

  • PDF

An Encrypted Botnet C&C Communication Method in Bitcoin Network (비트코인 네크워크에서의 암호화된 봇넷 C&C 통신기법)

  • Kim, Kibeom;Cho, Youngho
    • Journal of Internet Computing and Services
    • /
    • v.23 no.5
    • /
    • pp.103-110
    • /
    • 2022
  • Botnets have been exploited for a variety of purposes, ranging from monetary demands to national threats, and are one of the most threatening types of attacks in the field of cybersecurity. Botnets emerged as a centralized structure in the early days and then evolved to a P2P structure. Bitcoin is the first online cryptocurrency based on blockchain technology announced by Satoshi Nakamoto in 2008 and is the most widely used cryptocurrency in the world. As the number of Bitcoin users increases, the size of Bitcoin network is also expanding. As a result, a botnet using the Bitcoin network as a C&C channel has emerged, and related research has been recently reported. In this study, we propose an encrypted botnet C&C communication mechanism and technique in the Bitcoin network and validate the proposed method by conducting performance evaluation through various experiments after building it on the Bitcoin testnet. By this research, we want to inform the possibility of botnet threats in the Bitcoin network to researchers.

An Algorithm for evaluating Combat Power Effectiveness by considering the Influence of Human Factors (인적요소의 영향력을 고려한 전투효과 평가 알고리즘)

  • Kwon, Oh-Sang;Park, Gun-Woo;Lee, Sang-Hoon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.16 no.1
    • /
    • pp.201-210
    • /
    • 2011
  • Each area of society has changed because of the development of information technology. Especially, the advent of NCW based on the technology of network has become a new paradigm for executing warfare. Effectiveness of NCW can be maximized by building the C4I system which is a core system of NCW. However, if we don't consider the influence in term of human dimension, we can't expect the effect of C4I system, since the key factor in C4I is human. In this paper, we propose an algorithm for evaluating Combat Power Effectiveness by considering the Influence of Human Factors that wasn't reflected in the past. Based on experimental validation our algorithm is more substantial than baseline algorithms. In addition, we proved that the Influence of Human Factors(e.g. collaboration) is the most important in battlefield. Therefore, proposed algorithm can be used for enhancing not only mission effectiveness in terms of military field but also work performance by effective Human Resource Management in terms of an enterprise.

A proposal of new MOE to assess the combat power synergistic effect of warfare information system. (전장 정보체계의 전투력 상승효과 측정을 위한 새로운 MOE 제안)

  • Lee, Yong-Bok;Kim, Yong-Heup;Lee, Jae-Yeong
    • Proceedings of the Korean Operations and Management Science Society Conference
    • /
    • 2008.10a
    • /
    • pp.104-112
    • /
    • 2008
  • In modern war information system development makes battlefield materialize, and combat factors can maximize combat power exhibition as that apply synchronization. Information system is the core of combat power operation under NCW(Network centric Warfare). This paper proposed a new MOE(Measure of Effectiveness) that can assess the combat power synergistic effect of information system at the theater joint fire operation in NCW environment. This methodology applied the rule of Newton's second law $F=(m{\Delta}{\upsilon})/t{\Rightarrow}(M{\upsilon}I)/T$) Details factor in combat power evaluation is as following. (1) M : Network power; (2) v : Movement velocity; (3) I : Information superiority; (4) T : C2(command and control) time. We applied this methodology to the "JFOS-K(Joint Fire Operating System-Korea) in Joint Chief of Staff" in the real military affair section.

  • PDF

Improving the Backbone Architecture of the National Defence Information System Network (국방정보통신망 백본구조 개선 방안)

  • Kim, HanKwan;Lee, KilSup;Lee, SungJong
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2004.05a
    • /
    • pp.1295-1298
    • /
    • 2004
  • 국내 정보화 서비스 수준의 향상과 멀티미디어 유형의 자료의 증가로 초고속 광 네트워크 기술에 대한 관심이 높아지고 있다. 한편, 국방정보통신망은 ATM 기술을 기반으로 한 백본 망을 구성하여 운영 중이나 최근에는 매년 평균 1.5배 규모로 통화량이 증가하고 있는 추세이다. 이에 따라 수년 내에 현 백본 망에서 수용할 수 있는 통화량의 한계점에 도달할 것으로 예측되어 백본구조의 개선이 필요한 시점이다. 따라서 본 논문에서는 초고속 광 네트워크 기술을 이용하여 국방정보통신망의 백본구조를 개선하는 방안을 제시하고자 한다. 이를 위하여 최신 광 전송 및 네트워크 기술을 살펴보고, 실행 가능한 2가지 대안을 제시한다. 이어서 이들 대안들에 대한 장점, 제한사항 그리고 정량적인 비용분석을 통하여 최적안을 제안한다. 그 결과 국방정보통신망의 5년간 증설 및 운용유지 비용에서 28% 정도를 절감하면서 통화량 수용능력을 최소 1.7배 이상 확대하여 차후 망의 증설에 대비한 유연성을 확보하는 효과가 기대된다.

  • PDF

Stationary Distribution for the Mobilities in Catastrophe Rescue Scenario

  • Wang, Yong;Peng, Wei;Dou, Qiang;Gong, Zhenghu
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.7 no.2
    • /
    • pp.308-326
    • /
    • 2013
  • Mobility Model has drawn more and more attentions since its critical role in Mobile Wireless Networks performance evaluation. This paper analyzes the mobility patterns in the catastrophe rescue scenario, and proposes the Random Waypoint with Base Point mobility model to model these characteristics. We mathematically analyze the speed and spatial stationary distributions of the nodes and derive explicit expressions for the one dimensional case. In order to keep the stationary distribution through the entire simulation procedure, we provide strategies to initialize the speed, location and destination of the nodes at the beginning of the simulation. The simulation results verify the derivations and the proposed methods in this paper. This work gives a deep understanding of the properties of the Random Waypoint with Base Point mobility model and such understanding is necessary to avoid misinterpretation of the simulation results. The conclusions are of practical value for performance analysis of mobile wireless networks, especially for the catastrophe rescue scenario.