• Title/Summary/Keyword: Situational awareness

Search Result 164, Processing Time 0.026 seconds

A Study on the Air Traffic Situation Variables which Influence the Job Performance of Military Air Traffic Controllers (군관제사의 직무 수행과 항공교통상황 변인의 영향 연구)

  • Sin, Hyon-Sam;Jang, Jung-Ha;Ahn, Jae-Mo
    • Journal of the Korean Society for Aviation and Aeronautics
    • /
    • v.20 no.1
    • /
    • pp.19-25
    • /
    • 2012
  • The air traffic situation variables were emphasized in this research to review the awareness level of job performance of military air traffic controllers in application of air traffic situation variables such as detection of aircraft identification, type of aircraft, position ,speed, altitude, determination of separation between departing and arriving in-trail aircraft, physical airport conditions, adverse weather conditions, NAVAID outage and ATC facilities' operational status. In this respect, This study was conducted under the auspice of ATC facility operating agencies and devoting air force air traffic controller's participation by answering the questionnaires from nine radar approach control facilities and other air traffic control towers.

A Collaborative Approach to Situational Awareness for Endpoint Personal Data Protection (엔드포인트 개인정보보호를 위한 복합적 상황인지 방식)

  • Yong, SeungLim;Kim, Sangoh
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2018.07a
    • /
    • pp.173-174
    • /
    • 2018
  • EU의 GDPR(General Data Protection Regulation) 발효로 인해 유럽국가의 개인 정보 데이터를 활용하는 다국적 기업들이 규정에 맞는 데이터 보호정책을 수립하고 보안 투자를 강화하고 있다. 그러나 대다수의 기업들은 해커 등에 의한 사이버 보안을 위해서는 천문학적인 투자를 하고 있지만 기업 내 많은 직원들에 의한 실수나 고의에 의한 개인 정보 유출 방지에 대해서는 대처를 하고 있지 않다. 본 논문에서는 디지털 포렌식 기반의 앤드 포인트 실시간 모니터링 및 인간 행위 분석을 통한 앤드 포인트 개인 정보 보호 기능을 제공하여 기존의 사이버 보안에 국한된 통합 보안 관제의 효율성을 높이는 방안을 제안한다.

  • PDF

Network Security Situational Awareness using Traffic Pattern-Map (트래픽 패턴-맵을 이용한 네트워크 보안 상황 인지 기술)

  • Chang Beom-Hwan;Na Jung-Chan;Jang Jong-Su
    • Proceedings of the Korea Society for Industrial Systems Conference
    • /
    • 2006.05a
    • /
    • pp.397-401
    • /
    • 2006
  • 트래픽 패턴-맵(PatternMap)은 전체/세부 도메인별 보안 상황을 근원지/목적지 IP 주소 범위로 이루어진 그리드 상에 표현하여 관리자에게 네트워크 보안상황을 실시간으로 인지시키는 도구이다. 각각의 그리드는 근원지-목적지 간의 연결을 의미하며, 최다 점유를 차지하는 트래픽의 포트를 식별력을 갖는 색으로 표현한다. 이상 트래픽 현상의 검출은 가로 및 세로 열에 나타난 동일 색의 막대그래프(포트)의 개수와 그것의 합에 따라 결정되며, 그 결과로 선택된 세로 열과 가로 열을 활성화시켜 관리자에게 그 현상을 인지시킨다. 일반적으로 인터넷 웜이 발생할 경우에는 특정 근원지 열이 활성화되고, DDoS와 같은 현상은 목적지 열이 활성화되는 특징이 있다.

  • PDF

Implementation of the Tactical Data Link System of Helicopters-Ground Units Using SEP (SEP를 이용한 헬기와 지상부대 간 전술데이터링크체계 구현)

  • Jeong, Jaehyung;Kwon, Taehwan;Kwon, Yongsoo
    • Journal of the Korean Society of Systems Engineering
    • /
    • v.1 no.1
    • /
    • pp.46-52
    • /
    • 2005
  • The Tactical Data Link System(TDLS) is a standardized communication link to exchange and interface positional, situational information, command and control in real time. It has been evalua ted that the link would play an important role for tactical interoperability, situation awareness, and execution of joint operations in the future war. But considering the rapidly changing war situations, even though being admitted the necessity of the TDLS of Army helicopter, one of superpowers in the Army, it is not yet built the detailed operational concept. Therefore, this work presents how to embody the TDLS through the systems engineering approach based on the TDLS operating concept analysis of helicopters-ground units.

  • PDF

A Improved Method of the Interoperability through the Improvement of Interoperation System when Operating KVMF-based Weapon System (KVMF 기반하 무기체계 운용시 연동방식 개선을 통한 상호운용성 향상)

  • Kwon, Dong-Ho;Lee, Sang-Ho;Kim, Seung-Chun
    • Journal of Information Technology and Architecture
    • /
    • v.10 no.3
    • /
    • pp.305-313
    • /
    • 2013
  • Ground troops as part of the implementation of the real-time visualization of battlefield tactics to ensure the exchange of information sharing and situational awareness for the ground tactical data link system development is underway. However, with the existing inorganic KVMFbased weapon systems and tactics Quarterly problem occurs because the information has not been in development or in the development of future weapons systems based KVMF share battlefield information to enable interoperability building measures is presented.

An Efficient Network Attack Visualization Using Security Quad and Cube

  • Chang, Beom-Hwan;Jeong, Chi-Yoon
    • ETRI Journal
    • /
    • v.33 no.5
    • /
    • pp.770-779
    • /
    • 2011
  • Security quad and cube (SQC) is a network attack analyzer that is capable of aggregating many different events into a single significant incident and visualizing these events in order to identify suspicious or illegitimate behavior. A network administrator recognizes network anomalies by analyzing the traffic data and alert messages generated in the security devices; however, it takes a lot of time to inspect and analyze them because the security devices generate an overwhelming amount of logs and security events. In this paper, we propose SQC, an efficient method for analyzing network security through visualization. The proposed method monitors anomalies occurring in an entire network and displays detailed information of the attacks. In addition, by providing a detailed analysis of network attacks, this method can more precisely detect and distinguish them from normal events.

Open Standard Based 3D Urban Visualization and Video Fusion

  • Enkhbaatar, Lkhagva;Kim, Seong-Sam;Sohn, Hong-Gyoo
    • Journal of the Korean Society of Surveying, Geodesy, Photogrammetry and Cartography
    • /
    • v.28 no.4
    • /
    • pp.403-411
    • /
    • 2010
  • This research demonstrates a 3D virtual visualization of urban environment and video fusion for effective damage prevention and surveillance system using open standard. We present the visualization and interaction simulation method to increase the situational awareness and optimize the realization of environmental monitoring through the CCTV video and 3D virtual environment. New camera prototype was designed based on the camera frustum view model to project recorded video prospectively onto the virtual 3D environment. The demonstration was developed by the X3D, which is royalty-free open standard and run-time architecture, and it offers abilities to represent, control and share 3D spatial information via the internet browsers.

A Study for the new Technologies applying to the Next Generation Warship (차세대 군함에 응용될 새로운 기술에 관한 고찰)

  • Koo, Jong-Do
    • Proceedings of the Korea Committee for Ocean Resources and Engineering Conference
    • /
    • 2002.10a
    • /
    • pp.61-67
    • /
    • 2002
  • The joint warfighting environment, arranged by the net work-centrics, consists, with the situational awareness, the battlespace deconfliction, the joint force ID/location/allocation, and the ordnance on targets, considered by the concepts evolving In meet the future scenarios and threats. And then, the next generation warships have the operational requirements, such as the major offensive capability, the low operating cost, the ability to operate in net. centric forces, the revolutionary stealth, the in-stride mine avoidance, and the revolutionary manning. Therefore, the proposal discussed at this paper will be accepted in order to resolve only the portion of the afore-mentioned problems.

  • PDF

Echelons Scale Identification Scheme of Surveillance and Reconnaissance Sensor Network (감시정찰 센서네트워크에서 제대규모 식별 기법)

  • Choi, Ji-Hye;Kwon, Tae-Wook
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.13 no.3
    • /
    • pp.438-444
    • /
    • 2010
  • Surveillance and reconnaissance sensor network system is an application system based on ubiquitous sensor network technology. This technique is to avoid accidental close combat, to minimize the consumption of limited military resources and personnel, and to provide battlefield situational awareness information for the unit's future combat missions. In this paper, we have proposed a echelons scale identification scheme based on information obtained from surveillance and reconnaissance sensor network system.

Situational Awareness and User Intention system with Behavior patterns Analysis of Voice Phishing (보이스 피싱 행동 패턴 분석을 통한 상황 인지 및 사용자 의도 파악 시스템)

  • Cho, Dan-Bi;Kang, Seung-Shik
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2019.10a
    • /
    • pp.855-857
    • /
    • 2019
  • 개인 정보의 확산 및 유출의 문제점으로 인해 보이스 피싱의 피해 건수가 증가하고 있다. 이러한 보이스 피싱의 사회적 문제에 대하여 상황 인지 및 사용자 의도 파악 시스템을 적용하여 해결책으로 제안하고자 한다. 이 시스템은 음성 전화로 이루어지는 순차 정보를 텍스트 데이터에 기반하여 사기범의 문맥적 흐름에서 행위 동사를 추출한다. 추출된 행위 동사의 순차 정보를 통해 보이스 피싱의 상황임을 인지하고, 흐름의 행동 패턴을 분석하여 사기범의 의도를 파악한다. 이러한 상황 인지 및 사용자 의도 파악 시스템은 개인 정보의 문제뿐만 아니라 경제적 피해 규모를 축소시킬 것으로 예상된다.