• Title/Summary/Keyword: Threat Intelligence

Search Result 123, Processing Time 0.025 seconds

A Research on Adversarial Example-based Passive Air Defense Method against Object Detectable AI Drone (객체인식 AI적용 드론에 대응할 수 있는 적대적 예제 기반 소극방공 기법 연구)

  • Simun Yuk;Hweerang Park;Taisuk Suh;Youngho Cho
    • Journal of Internet Computing and Services
    • /
    • v.24 no.6
    • /
    • pp.119-125
    • /
    • 2023
  • Through the Ukraine-Russia war, the military importance of drones is being reassessed, and North Korea has completed actual verification through a drone provocation towards South Korea at 2022. Furthermore, North Korea is actively integrating artificial intelligence (AI) technology into drones, highlighting the increasing threat posed by drones. In response, the Republic of Korea military has established Drone Operations Command(DOC) and implemented various drone defense systems. However, there is a concern that the efforts to enhance capabilities are disproportionately focused on striking systems, making it challenging to effectively counter swarm drone attacks. Particularly, Air Force bases located adjacent to urban areas face significant limitations in the use of traditional air defense weapons due to concerns about civilian casualties. Therefore, this study proposes a new passive air defense method that aims at disrupting the object detection capabilities of AI models to enhance the survivability of friendly aircraft against the threat posed by AI based swarm drones. Using laser-based adversarial examples, the study seeks to degrade the recognition accuracy of object recognition AI installed on enemy drones. Experimental results using synthetic images and precision-reduced models confirmed that the proposed method decreased the recognition accuracy of object recognition AI, which was initially approximately 95%, to around 0-15% after the application of the proposed method, thereby validating the effectiveness of the proposed method.

Artificial Intelligence Strategy for Advertising and Media Industries: Focused on In-depth Interviews (광고 및 미디어 산업 분야의 인공지능(AI) 활용 전략 : 심층인터뷰를 중심으로)

  • Cha, Young Ran
    • The Journal of the Korea Contents Association
    • /
    • v.18 no.9
    • /
    • pp.102-115
    • /
    • 2018
  • The world's major countries carry forward strategies for enhancing industrial competitiveness, resulting in the fourth industrial revolution while a new growth engine is required to deal with the slow growth of global economy and declining productivity. Artificial intelligence (AI) is regarded as a core technology of the fourth industrial revolution. AI is expected to be implemented rapidly in advertising and media industries. However, it is hard to find an effective way to implement AI in these industries, especially because of how quickly the AI market changes and develops. Therefore, this study seeks the possible industrial influence of AI in advertising and media industries and invigoration plan for AI, by an in-depth interview with 10 professionals who lead the AI market. First, it was analyzed to explore the macroscopic side of the AI market through P (Politics), E (Economy), S (Society), and T (Technology). Also, the applicability of AI in advertising and media industries was explored by analyzing its S (Strength), W (Weakness), O (Opportunity), and T (Threat).The result indicates that it is necessary to build up a nation-wide construction of infrastructure for the fourth industrial revolution to invigorate AI in advertising and media industries. Moreover, a social environment capable of overcoming a hyper-connected society and social risks should be fostered. Lastly, it is urgent for both the industrial and academic world to diagnose the influence of AI in advertising and media industries, to anticipate the future in accordance with technological advance, set a proper direction, to invest actively for technical development of AI, and to formulate innovative policies.

Development and Assessment of LSTM Model for Correcting Underestimation of Water Temperature in Korean Marine Heatwave Prediction System (한반도 고수온 예측 시스템의 수온 과소모의 보정을 위한 LSTM 모델 구축 및 예측성 평가)

  • NA KYOUNG IM;HYUNKEUN JIN;GYUNDO PAK;YOUNG-GYU PARK;KYEONG OK KIM;YONGHAN CHOI;YOUNG HO KIM
    • The Sea:JOURNAL OF THE KOREAN SOCIETY OF OCEANOGRAPHY
    • /
    • v.29 no.2
    • /
    • pp.101-115
    • /
    • 2024
  • The ocean heatwave is emerging as a major issue due to global warming, posing a direct threat to marine ecosystems and humanity through decreased food resources and reduced carbon absorption capacity of the oceans. Consequently, the prediction of ocean heatwaves in the vicinity of the Korean Peninsula is becoming increasingly important for marine environmental monitoring and management. In this study, an LSTM model was developed to improve the underestimated prediction of ocean heatwaves caused by the coarse vertical grid system of the Korean Peninsula Ocean Prediction System. Based on the results of ocean heatwave predictions for the Korean Peninsula conducted in 2023, as well as those generated by the LSTM model, the performance of heatwave predictions in the East Sea, Yellow Sea, and South Sea areas surrounding the Korean Peninsula was evaluated. The LSTM model developed in this study significantly improved the prediction performance of sea surface temperatures during periods of temperature increase in all three regions. However, its effectiveness in improving prediction performance during periods of temperature decrease or before temperature rise initiation was limited. This demonstrates the potential of the LSTM model to address the underestimated prediction of ocean heatwaves caused by the coarse vertical grid system during periods of enhanced stratification. It is anticipated that the utility of data-driven artificial intelligence models will expand in the future to improve the prediction performance of dynamical models or even replace them.

Lessons learned from Operation Iraqi Freedom(OIF) for ROK forces (이라크전쟁의 군사적 교훈)

  • Mun, Gwang-Geon
    • Journal of National Security and Military Science
    • /
    • s.1
    • /
    • pp.71-111
    • /
    • 2003
  • The key lessons of the very complex modern war can be dangerously misleading to the outsiders. The efforts trying to draw lessons learned from the Iraq War (OIF : Operation Iraqi Freedom) may be biased by the view of point by Americans, because most of war episodes have been come from the Western media coverage. More serious bias can be committed thanks to the differences of warfighting doctrines and military technology between US forces and ROK forces. However, OIF-fought allied commanders and outside military experts said this campaign exemplified 21st-century warfare: swift, agile and decisive, employing overpowering technology to bring relentless violence to bear in many places at once. Even though the campaign evolved differently than anticipated, allied forces regrouped and regained the initiative remarkably quickly, thanks in large part to a new command flexibility, tied to new technology that made possible the more rapid sharing of data. These factors permitted "new air-land dynamic". The things that compel that are good sensors networked with good intelligence disseminated through a robust networking system, which then yields speed. Speed turns out to be a very important factor for conducting "Rapid Decisive Operations" relied on joint "Mass of Effects". ROK forces facing the heaviest ground threat in the world may learn more from Cold War era-typed US Army 3rd Infantry Division (3ID), which operating considerably beyond existing doctrine. 3ID flew its personnel into Kuwait to meet up with equipment already located in the region as pre-positioned stock. During OIF, the division conducted continuous offensive operations over 230km deep battlespace for 21 days. The lessons learned for ROK army to prepare tomorrow's war may be found from 3ID in its training, command and control, task organization, firepower and battlespace management, and logistics.

  • PDF

The Composition and Analytical Classification of Cyber Incident based Hierarchical Cyber Observables (계층적 침해자원 기반의 침해사고 구성 및 유형분석)

  • Kim, Young Soo;Mun, Hyung-Jin;Cho, Hyeisun;Kim, Byungik;Lee, Jin Hae;Lee, Jin Woo;Lee, Byoung Yup
    • The Journal of the Korea Contents Association
    • /
    • v.16 no.11
    • /
    • pp.139-153
    • /
    • 2016
  • Cyber incident collected from cyber-threat-intelligence sharing Center is growing rapidly due to expanding malicious code. It is difficult for Incident analysts to extract and classify similar features due to Cyber Attacks. To solve these problems the existing Similarity Analysis Method is based on single or multiple cyber observable of similar incidents from Cyber Attacks data mining. This method reduce the workload for the analysis but still has a problem with enhancing the unreality caused by the provision of improper and ambiguous information. We propose a incident analysis model performed similarity analysis on the hierarchically classified cyber observable based on cyber incident that can enhance both availability by the provision of proper information. Appling specific cyber incident analysis model, we will develop a system which will actually perform and verify our suggested model.

A Study on the Operation Concept of Cyber Warfare Execution Procedures (사이버전 수행절차 운영개념에 관한 연구)

  • Kim, Sung-Joong;Yoo, JiHoon;Oh, HaengRok;Shin, Dongil;Shin, DongKyoo
    • Journal of Internet Computing and Services
    • /
    • v.21 no.2
    • /
    • pp.73-80
    • /
    • 2020
  • Due to the expansion of cyber space, war patterns are also changing from traditional warfare to cyber warfare. Cyber warfare is the use of computer technology to disrupt the activities of nations and organizations, especially in the defense sector. However, the defense against effective cyber threat environment is inadequate. To complement this, a new cyber warfare operation concept is needed. In this paper, we study the concepts of cyber intelligence surveillance reconnaissance, active defense and response, combat damage assessment, and command control in order to carry out cyber operations effectively. In addition, this paper proposes the concept of cyber warfare operation that can achieve a continuous strategic advantage in cyber battlefield.

Analysis and Study on Invasion Threat and Security Measures for Smart Home Services in IoT Environment (사물인터넷 환경에서의 스마트홈 서비스 침해위협 분석 및 보안 대책 연구)

  • Lee, Myongyeal;Park, Jaepyo
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.16 no.5
    • /
    • pp.27-32
    • /
    • 2016
  • In general, IoT(Internet of things) designate the intelligence technologies and services which interact all necessity information between human and things, things and thing and things and systems with all things connecting through the internet based. The smart home in present of IoT environment fuses the daily supplies/equipment which needs to use for the private life with the internet of things that is the fruit of the converged business through all most private consumption related in vastly. The concept of smart home has been built around early 2000s due to the spread of high speed internet and advanced of smart electronics and internet, furthermore influencing by the enhancement of wireless network and smart devices, it is advanced as a smart home within the internet of things environment. Smart home service inside the house which most closely implemented with personal life is being developed and advanced in various forms. These developments may exert a positive effect, but if it does not resolve the security issues for the smart home service, then it may cause a big plague of privacy and personal life.

Prospects about Nuclear Electro Magnetic Pulse developed by North Korea (북한의 핵전자기파(NEMP)탄 개발에 대한 전망)

  • Lee, Dae Sung
    • Convergence Security Journal
    • /
    • v.17 no.2
    • /
    • pp.159-164
    • /
    • 2017
  • The international community recognizes North Korea's nuclear and missile provocation as a real threat. This is due to the analysis and evaluation that has developed nuclear electro magnetic pulse of domestic and overseas North Korea experts, intelligence agencies related to electro magnetic pulse. Electro magnetic pulse experts are concerned about North Korea's nuclear electro magnetic pulse in the following aspects. First, industrial, military, medical, and living facilities in modern society are constructed with electrical and electronic systems. So, All electrical and electronic appliances will become neutralization if North Korea's nuclear electro magnetic pulse was set off over the world(i.e. Korean Peninsula, United States etc). Second, North Korea will judge that possibility of criticism by the international community is low from the point of view of an attacker. Because nuclear electro magnetic pulse aim to destroy only the electronic equipment of the opposite nation and cause damage rather than taking life. Finally, nuclear electro magnetic pulse is more threatening than weapons like mass destruction because it does not need to hit targets accurately and can strike a wide area with nuclear weapon of the low technology levels. In this respect, we will analyze and evaluate nuclear and missile development and make a prospects about nuclear electro magnetic pulse developed by North Korea.

A Study on the Effects of Influencing Factors in the Security Environment of Military Organizational Members on Information Security Stress and Security Compliance Behavior Intention (군(軍) 조직구성원의 보안환경 영향요인이 보안 스트레스와 보안준수행동에 미치는 영향 연구)

  • Park, Eui Cheon;Jeon, Ki Seok
    • Convergence Security Journal
    • /
    • v.21 no.3
    • /
    • pp.93-104
    • /
    • 2021
  • Today, due to the development of the 4th industrial revolution such as artificial intelligence, the security threat of the military organization is increasing. A study that can contribute to complying with military security is needed by studying the effects of influence factors occurring in this changing or newly emerging security environment on information security stress and security compliance behavior intention. In previous studies, task overload, task complexity, task uncertainty, and task conflict were extracted among environmental influencing factors that cause security stress. We empirically analyzed how these influencing factors affect security stress and whether they play a mediating role in security stress. As a result of the analysis, it was analyzed that the security stress was affected in the order of task overload, task conflict, and task uncertainty. Information security stress did not significantly affect security compliance behavior intention, but it was found to mediate the effect of task overload on security compliance behavior intention. This causes information security stress due to heavy security work in the military organization, which ultimately leads to lower security compliance behavior. Therefore, the security policy to manage this situation should be promoted first.

Clasification of Cyber Attack Group using Scikit Learn and Cyber Treat Datasets (싸이킷런과 사이버위협 데이터셋을 이용한 사이버 공격 그룹의 분류)

  • Kim, Kyungshin;Lee, Hojun;Kim, Sunghee;Kim, Byungik;Na, Wonshik;Kim, Donguk;Lee, Jeongwhan
    • Journal of Convergence for Information Technology
    • /
    • v.8 no.6
    • /
    • pp.165-171
    • /
    • 2018
  • The most threatening attack that has become a hot topic of recent IT security is APT Attack.. So far, there is no way to respond to APT attacks except by using artificial intelligence techniques. Here, we have implemented a machine learning algorithm for analyzing cyber threat data using machine learning method, using a data set that collects cyber attack cases using Scikit Learn, a big data machine learning framework. The result showed an attack classification accuracy close to 70%. This result can be developed into the algorithm of the security control system in the future.