• 제목/요약/키워드: Network Defense

검색결과 907건 처리시간 0.02초

Analysis of Iran's Air Defense Network and Implications for the Development of South Korea's Air Defense Network

  • Hwang Hyun-Ho
    • International Journal of Advanced Culture Technology
    • /
    • 제12권2호
    • /
    • pp.249-257
    • /
    • 2024
  • This study analyzes the current status and prospects of Iran's air defense network, focusing on the Russian-made S-300 system, and derives implications for the development of South Korea's air defense network. Iran's air defense network exhibits strengths such as long-range detection and interception capabilities, multi-target processing, high-altitude interception, and electronic warfare response. However, it also reveals weaknesses, including lack of mobility, difficulty in detecting low-altitude targets, obsolescence, training level of operating personnel, and vulnerability to electronic warfare. Real-world cases confirm these weaknesses, making the system susceptible to enemy evasion tactics, swarm drone attacks, and electronic warfare. Drawing from Iran's case, South Korea should establish a multi-layered defense system, strengthen low-altitude air defense and electronic warfare capabilities, foster the domestic defense industry for technological self-reliance, and enhance international cooperation. By addressing these aspects, South Korea can establish a robust air defense network and firmly protect its national security. Future research should aim to secure and analyze materials from the Iranian perspective for a more objective evaluation of Iran's air defense network and continuously track Iran's efforts to improve its air defense network and the trend of strengthening drone forces to predict changes in the Middle East security situation.

An Approach for Applying Network-based Moving Target Defense into Internet of Things Networks

  • Park, Tae-Keun;Park, Kyung-Min;Moon, Dae-Sung
    • 한국컴퓨터정보학회논문지
    • /
    • 제24권9호
    • /
    • pp.35-42
    • /
    • 2019
  • In this paper, we propose an approach to apply network-based moving target defense into Internet of Things (IoT) networks. The IoT is a technology that provides the high interconnectivity of things like electronic devices. However, cyber security risks are expected to increase as the interconnectivity of such devices increases. One recent study demonstrated a man-in-the-middle attack in the statically configured IoT network. In recent years, a new approach to cyber security, called the moving target defense, has emerged as a potential solution to the challenge of static systems. The approach continuously changes system's attack surface to prevent attacks. After analyzing IPv4 / IPv6-based moving target defense schemes and IoT network-related technologies, we present our approach in terms of addressing systems, address mutation techniques, communication models, network configuration, and node mobility. In addition, we summarize the direction of future research in relation to the proposed approach.

무선 IP 네트워크에서 전용선 모뎀 사용가능성 검증 (The Investigation of the Leased Line Modem Usability in the Wireless Internet Protocol Network)

  • 박민호;백해현;금동원;최형석;이종성
    • 한국군사과학기술학회지
    • /
    • 제18권4호
    • /
    • pp.423-431
    • /
    • 2015
  • A leased line modem usability was evaluated and investigated in the wireless internet protocol(IP) network. The signal of the modem in the circuit switching network was translated to IP packet by using several voice codecs (PCM, G.711A, $G.711{\mu}$, and etc.) and transmitted through the wireless IP network. The wireless IP network was simulated by the Tactical information and communication network Modeling and simulation Software(TMS). The performance and usability of the leased line modem are simulated using the system-in-the-loop(SITL) function of TMS with respect to packet delay, jitter, packet discard ratio, codecs, and wireless link BER.

Analyzing Knowledge Structure of Defense Area using Keyword Network Analysis

  • Lee, Yong-Kyu;Yoon, Soung-Woong;Lee, Sang-Hoon
    • 한국컴퓨터정보학회논문지
    • /
    • 제23권10호
    • /
    • pp.173-180
    • /
    • 2018
  • In this paper, we analyzed key keywords and research themes in the field of defense research using keyword network analysis and tried to grasp the whole knowledge structure. To do this, we extracted data from 2,165 research data from defense related research institutes from 2010 to 2017 and applied the Pareto rule to the number of abstracts of words and the number of links between words, We extracted a total of 2,303 words based on the criterion and extracted 204 final key words through component analysis. By analyzing the centrality and cohesiveness through these key words, we confirmed the concept of core research in the defense field and derived a total of 7 large groups and 16 small groups of each group in the knowledge structure of the defense area.

ONSU-MF(One Network Security Unit-Multi Function)기법과 OSD-MD(One Security Device-Multi Defense)기법 기반의 보안정책 구현 (Implementation of Security Policies of ONSU-MF(One Network Security Unit-Multi Function) and OSD-MD(One Security Device-Multi Defense))

  • 서우석;이규안;전문석
    • 정보처리학회논문지C
    • /
    • 제18C권5호
    • /
    • pp.317-326
    • /
    • 2011
  • 본 논문은 다양한 보안방어 정책과 기기들이 산재해 있으나, 이를 표준화하여, 각 방어정책의 특성과 방어기법을 새롭게 정의함으로써 기존 네트워크 인프라 구현을 포함한 새로운 보안정책 도입 및 추가 구현 시 관리자 또는 사용자가 손쉽게 정책을 추가하고 바로 적용 가능하도록 각 보안 분야별 정책과 기기를 명세 보고서화 하는데 의의가 있다. 따라서 하나의 네트워크 보안기기를 기반으로 부여 가능한 정책들을 분류하는 ONSU-MF(One Network Security Unit-Multi Function)기법과 하나의 보안기기로 다양한 보안방안을 구현하는 OSD-MD(One Security Device-Multi Defense)기법으로 구분하고 이를 통합한 표준화 구현기법을 통해 향후 네트워크 보안 인프라 개선 메커니즘을 제안코자 한다.

소셜 네트워크 분석과 지휘통제시간을 고려한 네트워크 영향력 요소 분석 (Analysis of Network Influence Factor considering Social Network Analysis and C2 Time)

  • 전진태;박건우;이상훈
    • 한국컴퓨터정보학회논문지
    • /
    • 제16권2호
    • /
    • pp.257-266
    • /
    • 2011
  • 사회 문화 전반에 걸쳐 각종 체계를 네트워크로 연결하여 정보를 공유하고 다양화하려는 시도가 지속적으로 이루어지고 있다. 이러한 변화에 부합하여, 군 전쟁 수행방식은 개별 전투체계를 기반으로 하는 플랫폼 중심 전쟁(Platform Centric Warfare)에서 정밀 화력 및 네트워크를 기반으로 하는 네트워크 중심 전쟁(Network Centric Warfare)으로 개념이 바뀌고 있다. 더불어, 이러한 네트워크로 연결된 체계들을 효율적으로 운영하여 최대의 효과를 달성하기 위한 노력이 지속적으로 이루어지고 있다. 그러나 이러한 분야의 연구는 민간분야에서는 활발히 진행 중이나, 아직까지 군 네트워크 체계 분석에 대한 연구는 상대적으로 미흡한 실정이다. 따라서 본 논문에서는 최근 사회, 과학적으로 폭 넓게 활용되고 있는 소셜 네트워크 분석(Social Network Analysis)방법을 군 네트워크 체계에 적용하여 네트워크 구조적 영향력 요소를 규명한다. 이때 지휘통제시간을 효과 측정수단으로 분석하여, 이와 소셜 네트워크 분석요소와 상관관계를 규명한다. 본 연구를 통해 향후 발전적인 네트워크 구성을 위한 네트워크 영향력 요소를 식별하였다는데 가치가 있다.

지상 무선 백본망과 위성 통신망 통합을 위한 동적 라우팅 연동 방안 (Dynamic Routing Interworking Method for Integrating Terrestrial Wireless Backbone Network and Satellite Communications System)

  • 최재원;조병각;김기영;박경열;이주형;한주희;한이수
    • 한국군사과학기술학회지
    • /
    • 제19권5호
    • /
    • pp.645-653
    • /
    • 2016
  • The terrestrial wireless backbone network and satellite communications system have been independently developed depending on their own purposes and operational concepts, which results in different characteristics in terms of network architecture and routing protocol operation. In this paper, we propose a method for structurally integrating them in consideration of routing mechanism in an autonomous system. Our approach is that the routers of satellite network operate the OSPF in PTP mode on their interfaces connected to the routers of terrestrial wireless backbone network with grid connectivity, whereas the OSPF in satellite network whose topology is of hub-spoke type runs in NBMA mode. We perform some simulations to verify that the satellite communications system can be integrated and interwork with the terrestrial wireless backbone network by our proposed approach. From simulation results, it is also found that the increases of network convergence time and routing overhead are acceptable.

IoT Sensor가 연결된 국방정보통신망의 사이버보안 연구 (Cybersecurity of The Defense Information System network connected IoT Sensors)

  • 한현진;박대우
    • 한국정보통신학회논문지
    • /
    • 제24권6호
    • /
    • pp.802-808
    • /
    • 2020
  • IoT(Internet of Things)는 센서 기술의 발전과 고속의 통신 인프라를 바탕으로 네트워크에 연결되는 단말의 수가 사람의 수보다 더 많아지고 있고 그 증가도 매우 빠르다. 기존 유선부터 무선네트워크까지 연결되는 IoT의 수가 증가하면서 동시에 사이버 위협도 증가하고 있다. 국방분야도 작전, 군수, 기지방어, 정보화 등 다양한 분야에서 IoT의 필요성은 증가하고 있다. PC/서버의 정보보호체계와는 다르게 정보보호가 취약한 IoT Sensor가 네트워크에 증가함에 따라 사이버 위협도 증가하고 있어 국방정보통신망(이하 국방망)을 보호하기 위한 플랫폼 연구가 필요하다. 본 연구에서는 유·무선 IoT를 국방망에 연결하는 사례를 알아보고 국방망과 접점을 최소화한 보안성이 강화된 IoT 통합 독립 네트워크의 효율적인 연동 설계 방안을 제시하였다.

Optimal Network Defense Strategy Selection Based on Markov Bayesian Game

  • Wang, Zengguang;Lu, Yu;Li, Xi;Nie, Wei
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제13권11호
    • /
    • pp.5631-5652
    • /
    • 2019
  • The existing defense strategy selection methods based on game theory basically select the optimal defense strategy in the form of mixed strategy. However, it is hard for network managers to understand and implement the defense strategy in this way. To address this problem, we constructed the incomplete information stochastic game model for the dynamic analysis to predict multi-stage attack-defense process by combining Bayesian game theory and the Markov decision-making method. In addition, the payoffs are quantified from the impact value of attack-defense actions. Based on previous statements, we designed an optimal defense strategy selection method. The optimal defense strategy is selected, which regards defense effectiveness as the criterion. The proposed method is feasibly verified via a representative experiment. Compared to the classical strategy selection methods based on the game theory, the proposed method can select the optimal strategy of the multi-stage attack-defense process in the form of pure strategy, which has been proved more operable than the compared ones.

SOCMTD: Selecting Optimal Countermeasure for Moving Target Defense Using Dynamic Game

  • Hu, Hao;Liu, Jing;Tan, Jinglei;Liu, Jiang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제14권10호
    • /
    • pp.4157-4175
    • /
    • 2020
  • Moving target defense, as a 'game-changing' security technique for network warfare, realizes proactive defense by increasing network dynamics, uncertainty and redundancy. How to select the best countermeasure from the candidate countermeasures to maximize defense payoff becomes one of the core issues. In order to improve the dynamic analysis for existing decision-making, a novel approach of selecting the optimal countermeasure using game theory is proposed. Based on the signal game theory, a multi-stage adversary model for dynamic defense is established. Afterwards, the payoffs of candidate attack-defense strategies are quantified from the viewpoint of attack surface transfer. Then the perfect Bayesian equilibrium is calculated. The inference of attacker type is presented through signal reception and recognition. Finally the countermeasure for selecting optimal defense strategy is designed on the tradeoff between defense cost and benefit for dynamic network. A case study of attack-defense confrontation in small-scale LAN shows that the proposed approach is correct and efficient.