• Title/Summary/Keyword: Network Defense

Search Result 907, Processing Time 0.03 seconds

Survivability Assessment using DMKB for IT infrastructure (DMKB를 이용한 IT 기반구조의 생존성 평가 시스템)

  • Choi Eun-Jung;Kim Myuhng-Joo
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.33 no.9
    • /
    • pp.608-614
    • /
    • 2006
  • The popularization of high-speed networks and the innovation of high-performance hardware/servers have enlarged the role of large-scale, highly distributed IT infrastructure. Though many criteria on the assessment of IT infrastructure can be considered, the survivability assessment is treated as the most important one due to the essential role as an infrastructure. While assessing the survivability of some given IT infrastructures, we can not only choose the best one among them but also improve their survivability by modifying their structure and security policies. In this paper, we propose a DMKB-based assessment system on the survivability of IT infrastructures, where DMKB is a kind of database which provides the known vulnerabilities and defense mechanism for many system components.

Identification of Steganographic Methods Using a Hierarchical CNN Structure (계층적 CNN 구조를 이용한 스테가노그래피 식별)

  • Kang, Sanghoon;Park, Hanhoon;Park, Jong-Il;Kim, Sanhae
    • Journal of the Institute of Convergence Signal Processing
    • /
    • v.20 no.4
    • /
    • pp.205-211
    • /
    • 2019
  • Steganalysis is a technique that aims to detect and recover data hidden by steganography. Steganalytic methods detect hidden data by analyzing visual and statistical distortions caused during data embedding. However, for recovering the hidden data, they need to know which steganographic methods the hidden data has been embedded by. Therefore, we propose a hierarchical convolutional neural network (CNN) structure that identifies a steganographic method applied to an input image through multi-level classification. We trained four base CNNs (each is a binary classifier that determines whether or not a steganographic method has been applied to an input image or which of two different steganographic methods has been applied to an input image) and connected them hierarchically. Experimental results demonstrate that the proposed hierarchical CNN structure can identify four different steganographic methods (LSB, PVD, WOW, and UNIWARD) with an accuracy of 79%.

Analysis of Relative Combat Power with Expert System (전문가 시스템을 이용한 상대적 전투력 분석)

  • Han, Seung-Jo
    • Journal of Digital Convergence
    • /
    • v.14 no.6
    • /
    • pp.143-150
    • /
    • 2016
  • This paper's aim is to suggest the Expert System for analyzing relative combat power in ground operations. Since relative combat power analysis in terms of comparing combat power of friendly forces with one of the enemy can determine how the commander and staffs operate their unit afterwards, it requires fast and rational decision-making process. However, it has relied on manual method so far though Tactical Information Communications Network(TICN) into which numbers of applications can be loaded has been developed over a decade. 3 methods for analyzing relative combat power were expressed as mathematic rules to be used knowledge in the expert system after reviewing previous studies, and it studied how intangible power as well as tangible were reflected on total combat power. The expert system that will be built using EXSYS Corvid tool is expected to lessen error rate, provide faster decision-making, and reflect both intangible combat power and tangible one by using an appropriate weights in analyzing relative combat power. Next research filed includes how to build expert systems related with military personnel and intelligence areas for fast and rational decision-making processes.

Study on Crisis Conflict Culture Communication : Focusing on Information Specificity in SNS (위기갈등문화에 대한 소통방식 연구 :SNS 메시지 구체성을 중심으로)

  • Li, Xiao-Fan;Kim, Jung Kyu
    • The Journal of the Convergence on Culture Technology
    • /
    • v.6 no.2
    • /
    • pp.251-256
    • /
    • 2020
  • Based on the development of SNS in Mobile and Internet, crisis management is regarded as an important issue that determines the rise and fall of businesses. This study aims to contribute to more efficient implementation of crisis management messages by examining the relationship between the strategy of crisis management communication and the level of specificity of the message. The study found that consumers evaluated the crisis-hit company's acceptance communication strategy to show a higher level of integrity, reliability and appropriateness than the defensive strategy. However, this main effect is mediated by the specificity (high specificity vs. low). Specifically, consumers' assessment of crisis management messages and information-seeking behavior were found to be most favorable when used in a mixture of acceptance strategies and high specificity. Conversely, the lowest effect was the combination of defense strategy and high specificity. Based on these results, the theoretical discussions is described for crisis management practitioners of enterprises and organizations.

A Survey Study of the Combat Effectiveness Analysis Models and Future Research Areas (전투체계 효과분석에 대한 주요 연구 리뷰 및 향후 연구방향)

  • Kim, Jun-Soo;Park, Keon-Young;Lee, Jae-Yeong;Bae, Sung-Min;Pyun, Jai-Jeong;Kim, Chong-Man
    • Korean Journal of Computational Design and Engineering
    • /
    • v.19 no.4
    • /
    • pp.305-315
    • /
    • 2014
  • It is important to predict and measure the combat effectiveness (CE) of weapons system in battlefield for acquiring efficient weapon system. Moreover, quantitative calculation of weapon effectiveness under complicated and uncertain battlefield environment is also difficult based on the future network centric warfare. Many papers used the term of combat effectiveness and tried to study a lot of related issues about it. However, there is no paper dealing with the classification of study issue about CE and what will happen in this study field. In this paper, we proposed how to classify the study issue about CE and forecast future direction of this study field. Conceptually, CE is nothing but the assessment results to measure the ability of a military weapon system to accomplish its objective. We believe that it is an appropriate time to review the literature extensively on CE analysis because the research interests and the papers of CE are rapidly growing in these days. This paper reviewed many CE analysis papers, classified them according to their research content and the research methodology applied. Additionally, a comprehensive list of future research areas is also given.

Study on the Performance Enhancement of Radar Target Recognition Using Combining of Feature Vectors (특성 벡터 융합을 이용한 레이더 표적 인식 성능 향상에 관한 연구)

  • Lee, Seung-Jae;Choi, In-Sik;Chae, Dae-Young
    • The Journal of Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.24 no.9
    • /
    • pp.928-935
    • /
    • 2013
  • This paper proposed a combining technique of feature vectors which improves the performance of radar target recognition. The proposed method obtains more information than monostatic or bistatic case by combining extracted feature vectors from two receivers. For verifying the performance of the proposed method, we calculated monostatic and bistatic RCS(BRCS) of three full-scale fighters by changing the receiver position. Then, the scattering centers are extracted using 1-D FFT-based CLEAN from the calculated RCS data. Scattering centers are used as feature vectors for neural network classifier. The results show that our method has the better performance than the monostatic or bistatic case.

Study on Policies for National Cybersecurity (국가 사이버안보를 위한 정책 연구)

  • Ham, Seung-hyeon;Park, Dea-woo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.21 no.9
    • /
    • pp.1666-1673
    • /
    • 2017
  • Republic of Korea is divided into South Korea and North Korea, creating military conflicts and social conflicts. North Korea is conducting cyberattacks against South Korea and has hacked South Korea's defense network. In the world of cyberspace, the boundaries of the borders are becoming obscured, and cyberattacks and cyberterrorism for cyberwarfare operate with digital computing connected to points, time and space. Agenda and manual are needed for national cybersecurity. Also, it is necessary to study national cybersecurity laws and policies that can create and implement nationalcyber security policy. This paper investigates cyberterrorism situation in North and South Korean confrontation situation and damage to cyberwarfare in the world. We also study cybersecurity activities and cyberwarfare response agendas, manuals and new technologies at home and abroad. And propose national cybersecurity policy and propose policies so that '(tentative) The National Cybersecurity Law' is established. This study will be used as basic data of national cybersecurity law and policy.

The Analysis of the APT Prelude by Big Data Analytics (빅데이터 분석을 통한 APT공격 전조 현상 분석)

  • Choi, Chan-young;Park, Dea-woo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2016.05a
    • /
    • pp.317-320
    • /
    • 2016
  • The NH-NongHyup network and servers were paralyzed in 2011, in the 2013 3.20 cyber attack happened and Classified documents of Korea Hydro & Nuclear Power Co. Ltd were leaked on December in 2015. All of them were conducted by a foreign country. These attacks were planned for a long time compared to the script kids attacks and the techniques used were very complex and sophisticated. However, no successful solution has been implemented to defend an APT attack thus far. Therefore, we will use big data analytics to analyze whether or not APT attack has occurred in order to defend against the manipulative attackers. This research is based on the data collected through ISAC monitoring among 3 hierarchical Korean defense system. First, we will introduce related research about big data analytics and machine learning. Then, we design two big data analytics models to detect an APT attack and evaluate the models' accuracy and other results. Lastly, we will present an effective response method to address a detected APT attack.

  • PDF

A Study on Automatic Generation Method of DDS Communication Class to Improve the Efficiency of Development of DDS-based Application Software (DDS 기반 응용 SW 개발의 효율성 향상을 위한 DDS 통신 클래스 자동생성 방법 연구)

  • Kim, Keun-hee;Kim, Ho-nyun
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2017.05a
    • /
    • pp.93-96
    • /
    • 2017
  • DDS (Data Distribution Serivce) communication middleware is spreading to various private sector as well as the defense sector because it can obtain a very high application effect in a complex system environment in which a plurality of data producers and data consumers are connected by a network. However, application development using DDS middleware is an inefficient structure with a lot of repetitive codes because most users perform 1: 1 mapping with the message they want to exchange. Accordingly, the user has to perform unnecessary repetitive tasks as the topic increases. Therefore, a development support tool that identifies a series of processes required for using DDS middleware and automatically generates the classes that are repeated by Topic is required. In this paper, we propose a method for DDS communication by automatically generating a common class for efficient use of DDS middleware.

  • PDF

SOA-based Video Service Platform Model Design for Military e-Learning Service (군 원격교육체계를 위한 SOA기반 동영상서비스 플랫폼모델 설계)

  • Kim, Kyung-Rog;Moon, Nam-Mee
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.48 no.5
    • /
    • pp.24-32
    • /
    • 2011
  • According to accelerate the convergence of defense and information technology, there is a need for innovative change in Military e-Learning service system. In other words, It has increased the need for system integration based on standards and interoperability to develop into a network-centric information and knowledge. In this study, It would like to introduce an integrated direction Military e-Learning service system on the SOA-based video content services in the operating system for the operating model. SOA is taking advantage in integration and expansion of the unit with a process. Using it, define of video services platform architecture and define of business model based on the Imprimatur model. Based on this, it define the role of actors for video content service in each step of the operating model, that is Production model, Brokerage model and consumption model. In the operating system, it define the functions and data to control and handle the needed functionality for video content services based on the operational model.