• Title/Summary/Keyword: Network Defense

Search Result 906, Processing Time 0.024 seconds

Statistical Approach for the Prediction of Improper Businessman in Defense Procurement

  • Han, Hongkyu;Choi, Seokcheol
    • Journal of the Korean Society of Systems Engineering
    • /
    • v.7 no.2
    • /
    • pp.21-30
    • /
    • 2011
  • The contractor management for the effective defense project is essential factor in the modern defense acquisition project. The occurrence of Improper Businessman causes the reason in which defense acquisition project is unable to be reasonably fulfilled and setback to the deployment of defense weapon system. In this paper, we develop a prediction model for the effective defense project by using the Discriminant Analysis, the Logistic Regression & Artificial Neural Network and analyse the core variables that determine the Improper Businessman in many variables. It is expected that our model can be used to improve the project management capability of defense acquisition and contribute to the establishment of efficient procurement procedure through entry of the reliable domestic manufacturer.

Defense Strategy of Network Security based on Dynamic Classification

  • Wei, Jinxia;Zhang, Ru;Liu, Jianyi;Niu, Xinxin;Yang, Yixian
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.12
    • /
    • pp.5116-5134
    • /
    • 2015
  • In this paper, due to the network security defense is mainly static defense, a dynamic classification network security defense strategy model is proposed by analyzing the security situation of complex computer network. According to the network security impact parameters, eight security elements and classification standard are obtained. At the same time, the dynamic classification algorithm based on fuzzy theory is also presented. The experimental analysis results show that the proposed model and algorithm are feasible and effective. The model is a good way to solve a safety problem that the static defense cannot cope with tactics and lack of dynamic change.

A Study on the Security System of the Web Based Defense Information Service Network (WEB 환경에서 국방정보통신망 정보보호체계 구축에 관한 연구)

  • 신유찬;남길현
    • Journal of the military operations research society of Korea
    • /
    • v.28 no.1
    • /
    • pp.115-135
    • /
    • 2002
  • The limits of current DN(Defense networks), private and closed network, become to reality; for Example, high expense of construction and maintenance of networks, restriction of new subscribers on DN. Therefore, a network using web environment that reflect fast development of If and IS(Information Security) technology is demanded for MND. Meeting the requirement of reliable IS system and extension and improvement of DN using common network, we can reduce the expense to extend, maintain, repair DN, form the environment that makes military business cooperate better with civil company and government agency, advance implementing Defense computing and networking service for field small size units that was a exception of Defense digitalization. But it is essential to construct DN based on common network that there are security requisites; confidentiality, integrity, availability, efficiency, log, backup, restoration, that have to be realized at demanding level for IS. This thesis suggested four measurements; replacement DN with common network to resolve the requirements of building new network and improvement of performance for private DN, linkage with common network for new requirement, distribution of traffic using common network, configuration of DN using Internet and Proposed a refinement of IS management organization to treat security threat of common network flexibly, and LAN IS standard model of DN based on the web environment.

A study on the AC and PMI model for the Defense computer network

  • Yoon, H.S.;Kim, S.C.;Song, J.S.
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2001.10b
    • /
    • pp.977-980
    • /
    • 2001
  • This paper is a study on the AC and PMI model for the defense computer network. It is suggested that the organization plan of PMI model is a proper model for the characteristics of military system and military defense network security demands based on defense PKI system. Futhermore, it will be presented both various types of defense AC and AC according to the role and clearance in PMI. Defense AC will provide strong users' authentication and Role Based Access Control to give more secured and trusted authentication service by using users' attribute such as role and clearance.

  • PDF

Flexible camera series network for deformation measurement of large scale structures

  • Yu, Qifeng;Guan, Banglei;Shang, Yang;Liu, Xiaolin;Li, Zhang
    • Smart Structures and Systems
    • /
    • v.24 no.5
    • /
    • pp.587-595
    • /
    • 2019
  • Deformation measurement of large scale structures, such as the ground beds of high-rise buildings, tunnels, bridge, and railways, are important for insuring service quality and safety. The pose-relay videometrics method and displacement-relay videometrics method have already presented to measure the pose of non-intervisible objects and vertical subsidence of unstable areas, respectively. Both methods combine the cameras and cooperative markers to form the camera series networks. Based on these two networks, we propose two novel videometrics methods with closed-loop camera series network for deformation measurement of large scale structures. The closed-loop camera series network offers "closed-loop constraints" for the camera series network: the deformation of the reference points observed by different measurement stations is identical. The closed-loop constraints improve the measurement accuracy using camera series network. Furthermore, multiple closed-loops and the flexible combination of camera series network are introduced to facilitate more complex deformation measurement tasks. Simulated results show that the closed-loop constraints can enhance the measurement accuracy of camera series network effectively.

Design of a Protected Server Network with Decoys for Network-based Moving Target Defense

  • Park, Tae-Keun;Park, Kyung-Min;Moon, Dae-Sung
    • Journal of the Korea Society of Computer and Information
    • /
    • v.23 no.9
    • /
    • pp.57-64
    • /
    • 2018
  • In recent years, a new approach to cyber security, called the moving target defense, has emerged as a potential solution to the challenge of static systems. In this paper, we design a protected server network with a large number of decoys to anonymize the protected servers that dynamically mutate their IP address and port numbers according to Hidden Tunnel Networking, which is a network-based moving target defense scheme. In the network, a protected server is one-to-one mapped to a decoy-bed that generates a number of decoys, and the decoys share the same IP address pool with the protected server. First, the protected server network supports mutating the IP address and port numbers of the protected server very frequently regardless of the number of decoys. Second, it provides independence of the decoy-bed configuration. Third, it allows the protected servers to freely change their IP address pool. Lastly, it can reduce the possibility that an attacker will reuse the discovered attributes of a protected server in previous scanning. We believe that applying Hidden Tunnel Networking to protected servers in the proposed network can significantly reduce the probability of the protected servers being identified and compromised by attackers through deploying a large number of decoys.

Arms Value Algorithm: Identifying Core Node using Social Network Analysis in C2 System (Arms Value Algorithm: 소셜 네트워크 분석 기반 C2 체계 핵심노드 식별)

  • Won, Jong-Hyun;Park, Gun-Woo;Lee, Sang-Hoon
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2011.06a
    • /
    • pp.13-16
    • /
    • 2011
  • 최근 들어 네트워크1로 연결된 체계들을 효율적으로 운영하여 최대의 효과를 달성하기 많은 연구들이 수행되고 있다. 하지만 지휘통제체계 네트워크 구조 분석에 관한 연구는 상대적으로 미흡한 실정이다. 따라서 본 연구에서는 지휘통제체계 중 육군의 SPIDER체계를 대상으로 소설 네트워크 분석 (Social Network analysis)기법을 이용하여 중앙성분석과 시각화(Visualization)를 통해 핵심노드를 식별하는 arms value 알고리즘을 제안하고 분석 결과를 기반으로 TICN체계 전력화시 기초 연구자료로 활용하고자 한다.

Research of Small Fixed-Wing Swarm UAS (소형 고정익 무인기 군집비행 기술 연구)

  • Myung, Hyunsam;Jeong, Junho;Kim, Dowan;Seo, Nansol;Kim, Yongbin;Lee, Jaemoon;Lim, Heungsik
    • Journal of the Korean Society for Aeronautical & Space Sciences
    • /
    • v.49 no.12
    • /
    • pp.971-980
    • /
    • 2021
  • Recently popularized drone technologies have revealed that low-cost small unmanned aerial vehicles(UAVs) can be a significant threat to prevailing power by operating in group or in swarms. Researchers in many countries have tried to utilize integrated swarm unmanned aerial system(SUAS) in the battlefield. Agency for Defense Development also identified four core technologies in developing SUAS: swarm control, swarm network, swarm information, and swarm collaboration, and the authors started researches on swarm control and network technologies in order to be able to operate vehicle platforms as the first stage. This paper introduces design and integration of SUAS consisting of small fixed-wing UAVs, swarm control and network algorithms, a ground control system, and a launcher, with which swarm control and network technologies have been verified by flight tests. 19 fixed-wing UAVs succeeded in swarm flight in the final flight test for the first time as a domestic research.

A Study on Networks of Defense Science and Technology using Patent Mining (특허 마이닝을 이용한 국방과학기술 연결망 연구)

  • Kim, Kyung-Soo;Cho, Nam-Wook
    • Journal of Korean Society for Quality Management
    • /
    • v.49 no.1
    • /
    • pp.97-112
    • /
    • 2021
  • Purpose: The purpose of this paper is to analyze the technology convergence and its characteristics, focusing on the defense technologies in South Korea. Methods: Patents applied by the Agency for Defense Development (ADD) during 1979~2019 were utilized in this paper. Information Entropy analysis has been conducted on the patents to analyze the usability and potential for development. To analyze the trend of technology convergence in defense technologies, Social Network Analysis(SNA) and Association Rule Mining Analysis were applied to the co-occurrence networks of International Patent Classification (IPC) codes. Results: The results show that sensor, communication, and aviation technologies played a key role in recent development of defense science and technology. The co-occurrence network analysis also showed that the convergence has gradually enhanced over time, and the convergence between different technology sectors largely emerged, showing that the convergence has been diversified. Conclusion: By analyzing the patents of the defense technologies during the last 30 years, this study presents the comprehensive perspectives on trends and characteristics of technology convergence in defense industry. The results of this study are expected to be used as a guideline for decision making in the government's R&D policies in defence industry.

SAR Recognition of Target Variants Using Channel Attention Network without Dimensionality Reduction (차원축소 없는 채널집중 네트워크를 이용한 SAR 변형표적 식별)

  • Park, Ji-Hoon;Choi, Yeo-Reum;Chae, Dae-Young;Lim, Ho
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.25 no.3
    • /
    • pp.219-230
    • /
    • 2022
  • In implementing a robust automatic target recognition(ATR) system with synthetic aperture radar(SAR) imagery, one of the most important issues is accurate classification of target variants, which are the same targets with different serial numbers, configurations and versions, etc. In this paper, a deep learning network with channel attention modules is proposed to cope with the recognition problem for target variants based on the previous research findings that the channel attention mechanism selectively emphasizes the useful features for target recognition. Different from other existing attention methods, this paper employs the channel attention modules without dimensionality reduction along the channel direction from which direct correspondence between feature map channels can be preserved and the features valuable for recognizing SAR target variants can be effectively derived. Experiments with the public benchmark dataset demonstrate that the proposed scheme is superior to the network with other existing channel attention modules.