• Title/Summary/Keyword: Network Defense

Search Result 871, Processing Time 0.032 seconds

Design & Development of System Architecture for Wide Area Defense System (광역정전 Defense를 위한 System Architecture 설계 및 개발)

  • Kim, S.-Tae;Lee, Jeong-Hyun;Kim, Ji-Young;Lee, Dong-Chul;Moon, Young-Hwan;Kim, Tae-Hyun
    • Proceedings of the KIEE Conference
    • /
    • 2006.07a
    • /
    • pp.165-166
    • /
    • 2006
  • Recently, after Wide Area Outage of the North-Eastern United States occurred, many countries started to be concerned about WAMS (Wide Area Monitoring System), and Korean power system also experienced Wide Area outage according to typhoon Mae-Mi, and Haenam-Jeju HVDC line fault. Since it is too difficult to detect a symptom based on SCADA or EMS, a defense system of electric power infrastructure has required. In this research, the designed and developed system processes the time synchronized real time power system information based on GPS and shows the 2D/3D monitoring viewer using the phasor data and the results of three algorithms.

  • PDF

Influence Assessment Model of a Person within Heterogeneous Networks Based on Networked Community

  • Kim, Tae-Geon;Yoon, Soungwoong;Lee, Sang-Hoon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.23 no.10
    • /
    • pp.181-188
    • /
    • 2018
  • In this paper, we tried to investigate whether the influence of 'I' in a heterogeneous network of physical network and virtual network can be quantitatively measurable. To do this, we used Networked Community(NC) methodology to devise a concrete model of influence assessment in heterogeneous network. In order to test the model, we conducted an experiment with Donald J. Trump and his surroundings to evaluate the effectiveness of this influence assessment model. Experimentation included the measurement of impacts on the physical and virtual networks, and the impact on the networked community. Using Trump's case, we found that analyzing only one of the two networks can not accurately analyze the impact on others.

An Optimized Time-synchronization Method for Simulator Interworking

  • Kwon, Jaewoo;Kim, Jingyu;Woo, Sang Hyo Arman
    • Journal of Korea Multimedia Society
    • /
    • v.22 no.8
    • /
    • pp.887-896
    • /
    • 2019
  • In this paper, we discuss an optimization approach for time-synchronizations in networked simulators. This method is a sub-technology that is required to combine heterogeneous simulators into a single simulation. In previous time-synchronization studies, they had built a network system among networked simulators. The network system collects network packets and adds time-stamps to the networked packets based on the time that occurs in events of simulation objects in the individual simulators. Then, it sorts them in chronological order. Finally, the network system applies time-synchronization to each simulator participating in interworking sequentially. However, the previous approaches have a limitation in that other participating simulators should wait for while processing an event in a simulator in a time stamp order. In this paper, we attempt to solve the problem by optimizing time-synchronizations in networked simulation environments. In order to prove the practicality of our approach, we have conducted an experiment. Finally, we discuss the contributions of this paper.

Design of Mobbing Value Computation Algorithm and Classification Model based on Social Network (Social Network 기반 Mobbing 지수 산정 알고리즘 및 분류 모델 설계)

  • Kim, Guk-Jin;Park, Gun-Woo;Lee, Sang-Hoon
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2009.04a
    • /
    • pp.352-355
    • /
    • 2009
  • 본 논문에서는 Mobbing(집단 따돌림) 현상에 관련된 7개의 요소(Factor)와 그 하위에 포함된 60개의 속성(Attribute)들을 선정한다. 다음으로 선정한 속성들에 대해 나와 사용자들 사이에 관계가 있으면 '1', 관계가 없으면 '0'으로 표현하고, 나와 사용자들간의 유사도 산정을 위해 각 요소안에 포함된 속성들의 합에 유사도 함수를 적용한다. 다음으로 클레멘타인의 인공신경망 알고리즘을 통해 속성들을 포함한 요소들이 취할 최적의 가중치를 산출하고, 이 값들의 총합으로 Mobbing 지수를 산정한다. 마지막으로 Social Network 사용자들의 Mobbing 지수를 본 논문에서 설계한 G2 Mobbing 성향 분류 모델(4개의 그룹; Ideal Group of the Social Network, Bullies, Aggressive victimes, Victimes)에 매핑하여 사용자들의 Mobbing 성향을 알아본다.

The operational concept of the network based future airborne force power (네트워크 기반 미래 공중전력 운용개념)

  • Kim, Jong Yoel;Kwon, Yong Soo;Kim, Yun Kyu
    • Journal of the Korean Society of Systems Engineering
    • /
    • v.4 no.2
    • /
    • pp.45-54
    • /
    • 2008
  • This paper describes an operational concept of the network based future airborne force power using a systems engineering approach. The battlefield is changing to new system of systems that command and control by the network based BM/C4ISR. Also, it is composed of various sensors and shooters in an single theater. Future threats may be characterized as unmanned moving bodies that the strategic effect is great such as UAVs, cruise missile and tactical ballistic missiles. New threats such as low altitude stealth cruise missile may also appear. The implementation of future airborne force power network systems against these future threats is required to complex and integrated approach based on systems engineering. This work developed the operational concepts of the future airborne network system, and then derived the requirements for performing missions effectively. In addition, the scheme of future airborne force power network systems is presented.

  • PDF

Classification of Environmentally Distorted Acoustic Signals in Shallow Water Using Neural Networks : Application to Simulated and Measured Signal

  • Na, Young-Nam;Park, Joung-Soo;Chang, Duck-Hong;Kim, Chun-Duck
    • The Journal of the Acoustical Society of Korea
    • /
    • v.17 no.1E
    • /
    • pp.54-65
    • /
    • 1998
  • This study attempts to test the classifying performance of a neural network and thereby examine its applicability to the signals distorted in a shallow water environment. Linear frequency modulated(LFM) signals are simulated by using an acoustic model and also measured through sea experiment. The network is constructed to have three layers and trained on both data sets. To get normalized power spectra as feature vectors, the study considers the three transforms : shot-time Fourier transform (STFT), wavelet transform (WT) and pseudo Wigner-Ville distribution (PWVD). After trained on the simulated signals over water depth, the network gives over 95% performance with the signal to noise ratio (SNR) being up to-10 dB. Among the transforms, the PWVD presents the best performance particularly in a highly noisy condition. The network performs worse with the summer sound speed profile than with the winter profile. It is also expected to present much different performance by the variation of bottom property. When the network is trained on the measured signals, it gives a little better results than that trained on the simulated data. In conclusion, the simulated signals are successfully applied to training a network, and the trained network performs well in classifying the signals distorted by a surrounding environment and corrupted by noise.

  • PDF

On the Design of a Big Data based Real-Time Network Traffic Analysis Platform (빅데이터 기반의 실시간 네트워크 트래픽 분석 플랫폼 설계)

  • Lee, Donghwan;Park, Jeong Chan;Yu, Changon;Yun, Hosang
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.23 no.4
    • /
    • pp.721-728
    • /
    • 2013
  • Big data is one of the most spotlighted technological trends in these days, enabling new methods to handle huge volume of complicated data for a broad range of applications. Real-time network traffic analysis essentially deals with big data, which is comprised of different types of log data from various sensors. To tackle this problem, in this paper, we devise a big data based platform, RENTAP, to detect and analyse malicious network traffic. Focused on military network environment such as closed network for C4I systems, leading big data based solutions are evaluated to verify which combination of the solutions is the best design for network traffic analysis platform. Based on the selected solutions, we provide detailed functional design of the suggested platform.

A Study on the Use of Ubiquitous Technologies in Military Sector

  • Ju Min-Seong;Kim Seok-Soo
    • International Journal of Contents
    • /
    • v.2 no.2
    • /
    • pp.6-9
    • /
    • 2006
  • The style of war in the $21^{st}$ century became digitalized cooperative union tactic, which relies heavily on the system providing real time information. Critical information is provided during the war from sensing to shooting. Therefore, epochal development in observation, reconnaissance (ISR), commanding (C4I) and precision strike (PGM) are necessary. Application of ubiquitous computing and network technologies in national defense is necessary for carrying out with various types of wars in the $21^{st}$ century. Therefore, the author wants to research core technology sector that can be developed and applied in preparation of ubiquitous national defense era. Also plans for applying recent u-Defense technology to the military sector had been suggested. Particularly, the author have suggested plans for utilizing combined future information technologies such as ad-hoc network, RFID for the logistic supply in construction of u-Defense system. By utilizing these information technologies, combat power and strategic capabilities of the military can be enhanced greatly.

  • PDF

Analysis concerning the latest operating concept and status for Air Defense Identification Zone(ADIZ) (최근 방공식별구역 운영 개념과 현황 분석)

  • Kim, Dongsoo;Hong, Sungpyo;Chong, Mangseok
    • Journal of Aerospace System Engineering
    • /
    • v.8 no.4
    • /
    • pp.44-51
    • /
    • 2014
  • This thesis analyzes the latest operating concept and status for Air Defense Identification Zone (ADIZ) researching overseas ADIZ CONOPS, international legal basis for ADIZ, the intention & background of proclamation for China Air Defense Identification Zone(CADIZ). Firstly, ADIZ is lawful concerning international connivance for ADIZ where around 20 countries have operated, Article 56 "Rights, jurisdiction & duties of the coastal State" and Article 301 "Peaceful uses of the seas" on the United Nations Convention on the Law of the Sea(UNCLS). Secondly, ADIZ has been regarded as a support means for national interest & policy as well as military air defense one. Thirdly, Based on legal re-interpretation for UNCLS relating to ADIZ, China proclaimed CADIZ where can ensure national maritime policy and strategy including A2/AD(Anti-Access & Area Defence), inroad into the ocean, claim for Senkaku Islands possession, etc..

An Intelligent MAC Protocol Selection Method based on Machine Learning in Wireless Sensor Networks

  • Qiao, Mu;Zhao, Haitao;Huang, Shengchun;Zhou, Li;Wang, Shan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.11
    • /
    • pp.5425-5448
    • /
    • 2018
  • Wireless sensor network has been widely used in Internet of Things (IoT) applications to support large and dense networks. As sensor nodes are usually tiny and provided with limited hardware resources, the existing multiple access methods, which involve high computational complexity to preserve the protocol performance, is not available under such a scenario. In this paper, we propose an intelligent Medium Access Control (MAC) protocol selection scheme based on machine learning in wireless sensor networks. We jointly consider the impact of inherent behavior and external environments to deal with the application limitation problem of the single type MAC protocol. This scheme can benefit from the combination of the competitive protocols and non-competitive protocols, and help the network nodes to select the MAC protocol that best suits the current network condition. Extensive simulation results validate our work, and it also proven that the accuracy of the proposed MAC protocol selection strategy is higher than the existing work.