• Title/Summary/Keyword: Traditional Warfare

Search Result 20, Processing Time 0.027 seconds

Preemptive Failure Detection using Contamination-Based Stacking Ensemble in Missiles

  • Seong-Mok Kim;Ye-Eun Jeong;Yong Soo Kim;Youn-Ho Lee;Seung Young Lee
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.18 no.5
    • /
    • pp.1301-1316
    • /
    • 2024
  • In modern warfare, missiles play a pivotal role but typically spend the majority of their lifecycle in long-term storage or standby mode, making it difficult to detect failures. Preemptive detection of missiles that will fail is crucial to preventing severe consequences, including safety hazards and mission failures. This study proposes a contamination-based stacking ensemble model, employing the local outlier factor (LOF), to detect such missiles. The proposed model creates multiple base LOF models with different contamination values and combines their anomaly scores to achieve a robust anomaly detection. A comparative performance analysis was conducted between the proposed model and the traditional single LOF model, using production-related inspection data from missiles deployed in the military. The experimental results showed that, with the contamination parameter set to 0.1, the proposed model exhibited an increase of approximately 22 percentage points in accuracy and 71 percentage points in F1-score compared to the single LOF model. This approach enables the preemptive identification of potential failures, undetectable through traditional statistical quality control methods. Consequently, it contributes to lower missile failure rates in real battlefield scenarios, leading to significant time and cost savings in the military industry.

The Development of Artificial Intelligence-Enabled Combat Swarm Drones in the Future Intelligent Battlefield (지능화 전장에서 인공지능 기반 공격용 군집드론 운용 방안)

  • Hee Chae;Kyung Suk Lee;Jung-Ho Eom
    • Convergence Security Journal
    • /
    • v.23 no.3
    • /
    • pp.65-71
    • /
    • 2023
  • The importance of combat drones has been highlighted through the recent outbreak of the Russia-Ukraine war. The combat drones play a significant role as a a game changer that alters the conventional wisdom of traditional warfare. Many pundits expect the role of combat swarm drones would be more crucial in the future warfare. In this regard, this paper aims to analyze the development of artificial intelligence-enabled combat swarm drones. To transform the human-operated swarm drones into fully autonomous weaponry system our suggestions are as follows. Developments of (1) AI algorithms for optimized swarm drone operations, (2) decentralized command and control system, (3) inter-drones' mission analysis and allocation technology, (4) enhanced drone communication security and (5) set up of ethical guideline for the autonomous system. Specifically, we suggest the development of AI algorithms for drone collision avoidance and moving target attacks. Also, in order to adjust rapidly changing military environment, decentralized command and control system and mission analysis allocation technology are necessary. Lastly, cutting-edging secure communication technology and concrete ethical guidelines are essential for future AI-enabled combat swarm drones.

An artificial neural network residual kriging based surrogate model for curvilinearly stiffened panel optimization

  • Sunny, Mohammed R.;Mulani, Sameer B.;Sanyal, Subrata;Kapania, Rakesh K.
    • Advances in Computational Design
    • /
    • v.1 no.3
    • /
    • pp.235-251
    • /
    • 2016
  • We have performed a design optimization of a stiffened panel with curvilinear stiffeners using an artificial neural network (ANN) residual kriging based surrogate modeling approach. The ANN residual kriging based surrogate modeling involves two steps. In the first step, we approximate the objective function using ANN. In the next step we use kriging to model the residue. We optimize the panel in an iterative way. Each iteration involves two steps-shape optimization and size optimization. For both shape and size optimization, we use ANN residual kriging based surrogate model. At each optimization step, we do an initial sampling and fit an ANN residual kriging model for the objective function. Then we keep updating this surrogate model using an adaptive sampling algorithm until the minimum value of the objective function converges. The comparison of the design obtained using our optimization scheme with that obtained using a traditional genetic algorithm (GA) based optimization scheme shows satisfactory agreement. However, with this surrogate model based approach we reach optimum design with less computation effort as compared to the GA based approach which does not use any surrogate model.

Attack Categorization based on Web Application Analysis (웹 어플리케이션 특성 분석을 통한 공격 분류)

  • 서정석;김한성;조상현;차성덕
    • Journal of KIISE:Information Networking
    • /
    • v.30 no.1
    • /
    • pp.97-116
    • /
    • 2003
  • Frequency of attacks on web services and the resulting damage continue to grow as web services become popular. Techniques used in web service attacks are usually different from traditional network intrusion techniques, and techniques to protect web services are badly needed. Unfortunately, conventional intrusion detection systems (IDS), especially those based on known attack signatures, are inadequate in providing reasonable degree of security to web services. An application-level IDS, tailored to web services, is needed to overcome such limitations. The first step in developing web application IDS is to analyze known attacks on web services and characterize them so that anomaly-based intrusion defection becomes possible. In this paper, we classified known attack techniques to web services by analyzing causes, locations where such attack can be easily detected, and the potential risks.

Improved AODV Routing Protocol Considering the Link Quality of Wireless Transmission Environments (무선 전송환경의 링크품질을 고려한 개선된 AODV 라우팅프로토콜)

  • Lee, Tae-Hoon;Jeun, Sung-Woo;Kim, Young-Ho
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.20 no.10
    • /
    • pp.1903-1911
    • /
    • 2016
  • As interest in MANET is increasing nowadays, research upon an efficient MANET routing protocol is actively under way. A LQA(Link Qualty Aware)-AODV routing protocol to deal with frequent changes of topology and wireless link variations under tactical operating conditions is proposed in this paper. The suggested LQA-AODV takes into account the channel capacity of each hop during the route request process of the traditional AODV protocol. In detail, LQA-AODV adds a channel capacity cost value to the RREQ message format that occurs during the routing process of the existing AODV Routing Protocol causing the accumulated channel capacity cost values of each sections to be compared before establishing a route. To verify the performance of LQA-AODV, NS2.35 was utilized and the Link-Quality Model was applied in order to reflect the tactical wireless environment. The simulation compares and analyzes LQA-AODV and the existing AODV, showing a large improvement over the traditional AODV in regards to the Packet Delivery Ratio, and End-to-End Delay.

A Study of Cyber Operation COP based on Multi-layered Visualization (멀티레이어드 시각화를 적용한 사이버작전 상황도 개발에 관한 연구)

  • Kwon, Koohyung;Kauh, Jang-hyuk;Kim, Sonyong;Kim, Jonghwa;Lee, Jaeyeon;Oh, Haengrok
    • Convergence Security Journal
    • /
    • v.20 no.4
    • /
    • pp.143-151
    • /
    • 2020
  • The cyber battlefield called the fifth battlefield, is not based on geological information unlike the existing traditional battlefiels in the land, sea, air and space, and has a characteristics that all information has tightly coupled correlation to be anlayized. Because the cyber battlefield has created by the network connection of computers located on the physical battlefield, it is not completely seperated from the geolocational information but it has dependency on network topology and software's vulnerabilities. Therefore, the analysis for cyber battlefield should be provided in a form that can recognize information from multiple domains at a glance, rather than a single geographical or logical aspect. In this paper, we describe a study on the development of the cyber operation COP(Common Operational Picture), which is essential for command and control in the cyber warfare. In particular, we propose an architecure for cyber operation COP to intuitively display information based on visualization techniques applying the multi-layering concept from multiple domains that need to be correlated such as cyber assets, threats, and missions. With this proposed cyber operation COP with multi-layered visualization that helps to describe correlated information among cyber factors, we expect the commanders actually perfcrm cyber command and control in the very complex and unclear cyber battlefield.

An active intrusion-confronting method using fake session and Honeypot (거짓 세션과 허니팟을 이용한 능동적 침입 대응 기법)

  • 이명섭;신경철;박창현
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.29 no.7C
    • /
    • pp.971-984
    • /
    • 2004
  • In the coming age of information warfare, information security patterns need to be changed such as to the active approach using offensive security mechanisms rather than traditional passive approach just protecting the intrusions. In an active security environment, it is essential that, when detecting an intrusion, the immediate confrontation such as analysing the intrusion situation in realtime, protecting information from the attacks, and even tracing the intruder. This paper presents an active intrusion-confronting system using a fake session and a honeypot. Through the fake session, the attacks like Dos(Denial of Service) and port scan can be intercepted. By monitoring honeypot system, in which the intruders are migrated from the protected system and an intrusion rule manager is being activated, new intrusion rules are created and activated for confronting the next intrusions.

Reverse Simulation Software Architecture for Required Performance Analysis of Defense System (국방 시스템의 요구 성능 분석을 위한 역 방향 시뮬레이션 소프트웨어 아키텍처)

  • Hong, Jeong Hee;Seo, Kyung-Min;Kim, Tag Gon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.40 no.4
    • /
    • pp.750-759
    • /
    • 2015
  • This paper focuses on reverse simulation methods to find and analyze the required performance of a defense system under a given combat effectiveness. Our approach is motivated that forward simulation, that traditionally employs the effectiveness analysis of performance alternatives, is not suitable for resolving the above issue because it causes a high computational cost due to repeating simulations of all possible alternatives. To this end, the paper proposes a reverse simulation software architecture, which consists of several functional sub-modules that facilitate two types of reverse simulations according to possibility of inverse model design. The proposed architecture also enable to apply various search algorithms to find required operational capability efficiently. With this architecture, we performed two case studies about underwater and anti-air warfare scenarios. The case studies show that the proposed reverse simulation incurs a smaller computational cost, while finding the same level of performance alternatives compared with traditional forward simulation. Finally we expect that this study provides a guide those who desire to make decisions about new defense systems development.

Research of Communication Coverage and Terrain Masking for Path Planning (경로생성 및 지형차폐를 고려한 통신영역 생성 방법)

  • Woo, Sang Hyo;Kim, Jae Min;Beak, InHye;Kim, Ki Bum
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.23 no.4
    • /
    • pp.407-416
    • /
    • 2020
  • Recent complex battle field demands Network Centric Warfare(NCW) ability to control various parts into a cohesive unit. In path planning filed, the NCW ability increases complexity of path planning algorithm, and it has to consider a communication coverage map as well as traditional parameters such as minimum radar exposure and survivability. In this paper, pros and cons of various propagation models are summarized, and we suggest a coverage map generation method using a Longley-Rice propagation model. Previous coverage map based on line of sight has significant discontinuities that limits selection of path planning algorithms such as Dijkstra and fast marching only. If there is method to remove discontinuities in the coverage map, optimization based path planning algorithms such as trajectory optimization and Particle Swarm Optimization(PSO) can also be used. In this paper, the Longley-Rice propagation model is used to calculate continuous RF strengths, and convert the strength data using smoothed leaky BER for the coverage map. In addition, we also suggest other types of rough coverage map generation using a lookup table method with simple inputs such as terrain type and antenna heights only. The implemented communication coverage map can be used various path planning algorithms, especially in the optimization based algorithms.

"Critical Application of Witness Commentaries: The Case of Guerrilla Warfare in the Korean War" ("증언자료의 비판적 활용 - 6.25전쟁 시기 유격대의 경우")

  • Cho, Sung Hun
    • The Korean Journal of Archival Studies
    • /
    • no.12
    • /
    • pp.137-178
    • /
    • 2005
  • The anticommunist guerrillas' activities that aretheconcern of this article took place largely in North Korea or behind the enemy-held lines. Verifying their history is accordingly difficult and requires careful attention, but despite their active operations the military as well as the scholarly community have been lax in studying them. The Korean War came to be perceived as a traditional, limited war with regular battles, so that the studies addressed mostly the regular operations, and guerrilla warfare is remembered as an almost 'exclusive property' of the communist invaders; a small wonder that the anticommunist guerrillas have not been studied much and the collection of materials neglected. Therefore, in contrast with the witness accounts concerning regular battles, witness resources were of a small volume about these "patriots without the service numbers." For the above reasons the guerrilla participants and their later-organized fellowships took to the task of leaving records and compiling the histories of their units. They became active preservers of history in order to inform later generations of their works and also to secure deserved benefits from the government, in a world where none recognized their achievements. For instance, 4th Donkey Unit published witness accounts in addition to a unit history, and left video-recordings of guerrilla witnesses before any institute systematized the oral history of the guerrillas. In the case of Kyulsa ("Resolved to Die") Guerrilla Unit, the unit history was 10 times revised and expanded upon for publication, contributing substantially to the recovery of anticommunist guerrilla history which had almost totally lacked documented resources. Now because the guerrilla-related witness accounts were produced through fellowship societies and not individually, it often took the form of 'collective memory.' As a result, though thousands of former guerrillas remain surviving, the scarcity of numerous versions of, or perspectives upon, an event renders difficult an objective approach to the historical truth. Even requests to verify the service of a guerrilla member or to apply for decoration or government benefits for those killed in action, the process is taken care of not at the hands of the first party but the veteran society, so that a variety of opinions are not available for consideration. Moreover, some accounts were taken by American military personnel, and since some historians, unaware of official documents or evaluation of achievements, tended to center the records around their own units and especially to exaggerate the units' performances, they often featured factual errors. Thefollowing is the means to utilize positively the aforementioned type of witness accounts in military history research. It involves the active use of military historical detachments (MHD). As in the examples of those dispatched by the American forces during the Korean War, experts should be dispatched during, and not just after, wartimes. By considering and investigating the differences among various perspectives on the same historical event, even without extra documented resources it is possibleto arrive at theerrors or questionable points of the oral accounts, supplementing the additional accounts. Therefore any time lapses between witness accounts must be kept in consideration. Moreover when the oral accounts come from a group such as participants in the same guerrilla unit or operation, a standardized list of items ought to be put to use. Education in oral history is necessary not just for the training of experts. In America wherethefield sees much activity, it is used not only in college or graduate programs but also in elementary and lifetime educational processes. In comparison in our nation, and especially in historical disciplines, methodological insistence upon documented evidences prevails in the main, and in the fields of nationalist movement or modern history, oral accounts do not receive adequate attention. Like ancient documents and monuments, oral history also needs to be made a regular part of diverse resource materials at our academic institutes for history. Courses in memory and history, such as those in American colleges, are available possibilities.