• Title/Summary/Keyword: Network Defense

Search Result 895, Processing Time 0.043 seconds

A Study on the Design of an Underwater Distributed Sensor Network for the Shallow Water by An Effectiveness Analysis (효과도 분석을 통한 천해용 수중분산 센서망 설계 연구)

  • Kim, Wan-Jin;Bae, Ho Seuk;Kim, Woo Shik;Lee, Sang Kug;Choi, Sang Moon
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.17 no.5
    • /
    • pp.591-603
    • /
    • 2014
  • In this paper, we have described the characteristics of the Underwater Distributed Sensor Network (UDSN) and proposed the conceptual design guideline by an effectiveness analysis. To perform the effectiveness analysis, we defined an battlefield environment, and then analyzed principal components which compose the UDSN to find out simulation parameters and system constraints. We have chosen a measure of effectiveness based on a target trajectory, which could enhance intuitive understanding about current status, and performed various simulations to reveal critical design parameters in terms of sensor node types, arrangement, cost and combination of detection information.

Simulation and Analysis of the Network Traffic of a Power Infrastructure Defense System (광역 방어시스템의 통신 트래픽 모사와 분석)

  • Baek, Yoon-Ki;Yi, Keon-Young
    • Proceedings of the KIEE Conference
    • /
    • 2006.07a
    • /
    • pp.179-180
    • /
    • 2006
  • The real time monitoring of the power systems covering wide area are essential for the stable operation and control of the power system. Synchronized phasor measurement is a key for the precise monitoring and control of the power systems. In this paper, to suggest an appropriate network topology of Power Infrastructure Defense System(PIDS) and to estimate the maximum network bandwidth with using the network analyzer, we simulate a PIDS and analyze the network traffic.

  • PDF

Constellation Multi-Objective Optimization Design Based on QoS and Network Stability in LEO Satellite Broadband Networks

  • Yan, Dawei;You, Peng;Liu, Cong;Yong, Shaowei;Guan, Dongfang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.3
    • /
    • pp.1260-1283
    • /
    • 2019
  • Low earth orbit (LEO) satellite broadband network is a crucial part of the space information network. LEO satellite constellation design is a top-level design, which plays a decisive role in the overall performance of the LEO satellite network. However, the existing works on constellation design mainly focus on the coverage criterion and rarely take network performance into the design process. In this article, we develop a unified framework for constellation optimization design in LEO satellite broadband networks. Several design criteria including network performance and coverage capability are combined into the design process. Firstly, the quality of service (QoS) metrics is presented to evaluate the performance of the LEO satellite broadband network. Also, we propose a network stability model for the rapid change of the satellite network topology. Besides, a mathematical model of constellation optimization design is formulated by considering the network cost-efficiency and stability. Then, an optimization algorithm based on non-dominated sorting genetic algorithm-II (NSGA-II) is provided for the problem of constellation design. Finally, the proposed method is further evaluated through numerical simulations. Simulation results validate the proposed method and show that it is an efficient and effective approach for solving the problem of constellation design in LEO satellite broadband networks.

An Attack Graph Model for Dynamic Network Environment (동적 네트워크 환경에 적용 가능한 Attack Graph 모델 연구)

  • Moon, Joo Yeon;Kim, Taekyu;Kim, Insung;Kim, Huy Kang
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.2
    • /
    • pp.485-500
    • /
    • 2018
  • As the size of the system and network environment grows and the network structure and the system configuration change frequently, network administrators have difficulty managing the status manually and identifying real-time changes. In this paper, we suggest a system that scans dynamic network information in real time, scores vulnerability of network devices, generates all potential attack paths, and visualizes them using attack graph. We implemented the proposed algorithm based attack graph; and we demonstrated that it can be applicable in MTD concept based defense system by simulating on dynamic virtual network environment with SDN.

Dynamic Simulation on a Network Security Simulator using SSFNet (SSFNet을 이용한 네트워크 보안 시뮬레이터에서 동적 시뮬레이션 방법)

  • 박응기;윤주범;임을규
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.14 no.3
    • /
    • pp.101-106
    • /
    • 2004
  • Recently, a network defense simulator becomes essential in studying cyber incidents because the cyber terror become more and more interesting. The network defense simulator is a tool to estimate damages and an effectiveness of a defense mechanism by modeling network intrusions and defense mechanisms. Using this tool, users can find efficient ways of preventing a cyber terror and recovering from the damage. Previous simulators start the simulation after entire scenario has made and been loaded to simulation engine. However, in this way it can't model human judgement and behavior, and it can't simulate the real cyber terror very well. In this paper, we have added a dynamic simulation component to our previous network security simulator. This component improved accurate modeling of network intrusions and defense behaviors. We have also proposed new modified architecture of the simulation system. Finally we have verified correct simulation results from stammer worn simulation.

A Blockchain-enabled Multi-domain DDoS Collaborative Defense Mechanism

  • Huifen Feng;Ying Liu;Xincheng Yan;Na Zhou;Zhihong Jiang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.17 no.3
    • /
    • pp.916-937
    • /
    • 2023
  • Most of the existing Distributed Denial-of-Service mitigation schemes in Software-Defined Networking are only implemented in the network domain managed by a single controller. In fact, the zombies for attackers to launch large-scale DDoS attacks are actually not in the same network domain. Therefore, abnormal traffic of DDoS attack will affect multiple paths and network domains. A single defense method is difficult to deal with large-scale DDoS attacks. The cooperative defense of multiple domains becomes an important means to effectively solve cross-domain DDoS attacks. We propose an efficient multi-domain DDoS cooperative defense mechanism by integrating blockchain and SDN architecture. It includes attack traceability, inter-domain information sharing and attack mitigation. In order to reduce the length of the marking path and shorten the traceability time, we propose an AS-level packet traceability method called ASPM. We propose an information sharing method across multiple domains based on blockchain and smart contract. It effectively solves the impact of DDoS illegal traffic on multiple domains. According to the traceability results, we designed a DDoS attack mitigation method by replacing the ACL list with the IP address black/gray list. The experimental results show that our ASPM traceability method requires less data packets, high traceability precision and low overhead. And blockchain-based inter-domain sharing scheme has low cost, high scalability and high security. Attack mitigation measures can prevent illegal data flow in a timely and efficient manner.

Estimating Qualitative Intimacy among Users in Social Networks (Social Networks 사용자간의 친밀도 산정)

  • Oh, Jung-Woon;Yoon, Soung-Woong;Lee, Sang-Hoon
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2008.06c
    • /
    • pp.31-35
    • /
    • 2008
  • Social Network는 웹 환경에서 개인을 중심으로 뻗어 나가는 연결로서 사용자별 프로필을 탐색하고 새로운 연결 및 정보의 소통을 지원한다. 이러한 상호신뢰를 바탕으로 구축된 Social Network 환경 내 구성원들이 가지고 있는 속성(Feature)을 이용하여 사용자간 친밀도를 산정한다면 친구 및 동호회 추천 등 Social Network 내부의 효율 향상 뿐만 아니라 웹 검색 등 다양한 사용자간의 공통 활동에도 응용할 수 있다. 본 논문에서는 Social Network 사용자간 친밀도를 산정하기 위한 방법을 제시한다. 기존의 친밀도가 없이 구성되어 있는 사용자간의 관계를 사용자의 속성(Feature)에 내재된 정보를 이용하여 주제의 유사성과 접근성을 이용하여 산정하였으며, 이는 Social Network 성격의 규명과 사용자의 정보 요구에 대한 판단의 척도로 사용될 수 있다.

  • PDF

The Effect of Centralities of Alliance Network on Innovation Performace in Korean Defense Industry (한국 방위산업 제휴네트워크 중심성이 혁신성과에 미치는 영향)

  • Ahn, Hoil;Kim, Changone;Lee, Heesang
    • Journal of Korea Technology Innovation Society
    • /
    • v.18 no.2
    • /
    • pp.292-317
    • /
    • 2015
  • As modern science and technology and warfare become to be advanced and precise, the weapon systems becomes more complex based on state-of-the-art technology. Therefore, firms in the defense industry continue to accelerate research and development for up-to-date weapon systems with high complexity which urge the firms to collaborate with the external organizations to obtain the knowledge required and eventually to reduce costs and risk. This study tries an empirical study about the effect of collaboration on the innovation performances from the network analysis perspective. By surveying collaboration relationships among 530 firms in the Korean defense industry, we analyzed the alliance network of the defense industry. Network centrality including degree, closeness, and betweenness centralities is investigated and then the relationship among the network centrality property, internal R&D capabilities and innovation is analysed. The results show that firms with high internal R&D capabilities place the firm at center of the network. On the other hand, except for the firms with highly connected centrality, no relationship was found between the internal R&D capabilities and its performance and in turn. these capabilities had both direct and indirect effects on innovation performances through mediated collaboration among firms. This study implied that Korean firms with a high internal R&D capabilities in the defense industry which utilize knowledge, information and resources within the network more frequently show more innovative performance. This result claims the policy makers to participate more firms in fostering open innovation for the defense industry.

Study on Trends and Strategies for Defense Blockchain and ICT Technologies (국방 블록체인 기술 동향 및 국방 ICT 융합 전략 연구)

  • Lee, K.Hyu;Park, H.Sook
    • Electronics and Telecommunications Trends
    • /
    • v.35 no.1
    • /
    • pp.12-24
    • /
    • 2020
  • To keep pace with other powerful nations in this era of the era of digitalization and to emerge stronger in the world, the defense forces of South Korea aim to innovate and prepare themselves for digital battlefields of possible wars in the future. The resources in the defense sector, which is the core of defense intelligence, is based on an intelligent mission collaboration tactical network system via cyber, command, control, communication, and computer (C4), and military and non-human weapons. Defense intelligence depends on the degree of the convergence of advanced Information and communication technologies (ICTs). Considering this aspect of defense intelligence, We plan to determine the application status of defense blockchain technology and examine the feasibility of applying blockchain technology and the core of applied technology. Generally, a key feature of blockchain technology is its data integrity in untrusted environments. There are various types of core technologies for the blockchain depending on the target areas of application in the defense sector, and it is also essential to derive new application strategies for core technologies that are applied in combination with other ICT technologies. We plan to demonstrate new defense ICT converged technologies (DNAB2: Data, Network, AI, BigData, Blockchain) and DNAB2-As-Services in the defense strategy.