• Title/Summary/Keyword: comprehensive defense

Search Result 110, Processing Time 0.03 seconds

CacheSCDefender: VMM-based Comprehensive Framework against Cache-based Side-channel Attacks

  • Yang, Chao;Guo, Yunfei;Hu, Hongchao;Liu, Wenyan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.12
    • /
    • pp.6098-6122
    • /
    • 2018
  • Cache-based side-channel attacks have achieved more attention along with the development of cloud computing technologies. However, current host-based mitigation methods either provide bad compatibility with current cloud infrastructure, or turn out too application-specific. Besides, they are defending blindly without any knowledge of on-going attacks. In this work, we present CacheSCDefender, a framework that provides a (Virtual Machine Monitor) VMM-based comprehensive defense framework against all levels of cache attacks. In designing CacheSCDefender, we make three key contributions: (1) an attack-aware framework combining our novel dynamic remapping and traditional cache cleansing, which provides a comprehensive defense against all three cases of cache attacks that we identify in this paper; (2) a new defense method called dynamic remapping which is a developed version of random permutation and is able to deal with two cases of cache attacks; (3) formalization and quantification of security improvement and performance overhead of our defense, which can be applicable to other defense methods. We show that CacheSCDefender is practical for deployment in normal virtualized environment, while providing favorable security guarantee for virtual machines.

A Study on the Mechanism between 'National Crisis Management' and 'National Defense Elements'in the Perspective of Comprehensive Security - Focusing on the Principles, Problems, and Altenatives of'Integrated Defense'- (포괄안보 관점의 국가위기관리와 국가방위 요소간의 관계 연구 - 통합방위의 원칙, 문제, 그리고 대안을 중심으로 -)

  • Kim Tai Jin
    • Convergence Security Journal
    • /
    • v.22 no.5
    • /
    • pp.115-126
    • /
    • 2022
  • This study studied the working relationship between national crisis management and national defense elements from a comprehensive security perspective. The elements of national defense are presented in the Integrated Defense Act. Therefore, by presenting the principles, problems, and alternatives of integrated defense, the study was conducted with the aim of protecting the lives and property of the people in the event of a national crisis and strengthen national security. As a theoretical background, an analysis frame was envisioned based on the four stages of crisis management in the 'Comprehensive Crisis Management Model' and the 'Basic Guidelines for National Crisis Management'. Through this, four domestic and foreign case studies were conducted. As a result of the study, it can be confirmed that related laws, organizations, and public awareness must be provided in order for the national defense elements at each stage of national crisis management to work well. For the completeness of national crisis management, it was suggested that the enactment of the Framework Act on National Crisis Management, the establishment of an integrated defense plan, linked training, C4I for communication, strengthening the capabilities of local government heads, and national defense elements of firefighters.

Innovative Management Strategy and Methodologies for Acquisition Programs of the Defense Weapon System (국방무기체계 획득사업의 혁신적 추진전략과 방법론)

  • Lee, Sang-Heon;Yoon, Bong-Kyoo
    • IE interfaces
    • /
    • v.20 no.3
    • /
    • pp.363-375
    • /
    • 2007
  • Under the fast technology changes and budget constraints, the organizations related to national defense face increased demands to develop innovative strategy and methodology to maximize performance with drastically reduced cost. In this context, the management of innovation and change in the defense acquisition area is vital to the Ministry of National Defense, related organizations and industries. In this paper, we discuss three comprehensive innovation strategies and methodologies for the defense acquisition area preparing for next-generation warfare; EVMS (earned value management system), PBL (performance based logistics) and SBA (simulation based acquisition). These collaborating innovative efforts enable us to tackle defense challenges for government and industries with a flexible and optimistic approach that maximizes productivity and performance with minimum cost.

Development of the Information Security Methodology for Defense Organization (국방조직의 정보보호 평가 방법론 개발)

  • Cho, Sung Rim;Choi, In Soo;Park, Ji Hoon;Shin, Woo Chang
    • Journal of Information Technology Services
    • /
    • v.12 no.4
    • /
    • pp.77-90
    • /
    • 2013
  • As Cyber threats are rising, the scope of information Security (IS) is extending from technical protection of a single information system to organizational comprehensive IS capability. The ministry of National Defense (MND) has established the IS evaluation for defense organization in 'the Directive for Defense Informatization Affairs.' However, no information about an evaluation method, process and organization is provided. We surveyed information security management system (ISMS) and related best practices in public sector and other countries, and analysed the military information security affairs. Thus, this paper recommends the IS evaluation method and process. The trial IS evaluation is in progress this year and the MND will expand this IS evaluation to the entire organization.

A Study on the Improvement of the Defense-related International Patent Classification using Patent Mining (특허 마이닝을 이용한 국방관련 국제특허분류 개선 방안 연구)

  • Kim, Kyung-Soo;Cho, Nam-Wook
    • Journal of Korean Society for Quality Management
    • /
    • v.50 no.1
    • /
    • pp.21-33
    • /
    • 2022
  • Purpose: As most defense technologies are classified as confidential, the corresponding International Patent Classifications (IPCs) require special attention. Consequently, the list of defense-related IPCs has been managed by the government. This paper aims to evaluate the defense-related IPCs and propose a methodology to revalidate and improve the IPC classification scheme. Methods: The patents in military technology and their corresponding IPCs during 2009~2020 were utilized in this paper. Prior to the analysis, patents are divided into private and public sectors. Social network analysis was used to analyze the convergence structure and central defense technology, and association rule mining analysis was used to analyze the convergence pattern. Results: While the public sector was highly cohesive, the private sector was characterized by easy convergence between technologies. In addition, narrow convergence was observed in the public sector, and wide convergence was observed in the private sector. As a result of analyzing the core technologies of defense technology, defense-related IPC candidates were identified. Conclusion: This paper presents a comprehensive perspective on the structure of convergence of defense technology and the pattern of convergence. It is also significant because it proposed a method for revising defense-related IPCs. The results of this study are expected to be used as guidelines for preparing amendments to the government's defense-related IPC.

A Study on Readiness Assessment for The Acquisition of High Quality Weapon System (고품질 무기체계 획득을 위한 성숙도평가 방안 소개)

  • Kim, Hyun Woo;Woo, Soon;Jang, Bong Ki
    • Journal of Korean Society for Quality Management
    • /
    • v.41 no.3
    • /
    • pp.395-404
    • /
    • 2013
  • Purpose: Technology readiness assessment(TRA) used as a standard readiness assessment tool in the acquisition program of weapon system has some limitations in the comprehensive understanding of the complex system. Therefore, this research is intended to suggest a holistic maturity assessment method for the acquisition of high quality weapon system. Methods: Technology readiness level(TRL), manufacturing readiness level(MRL), integration readiness level(IRL) and system readiness level(SRL) developed to assess system maturities in the various aspects are compared and analyzed to draw an improvement avenue for the current readiness assessment method. Results: TRL, MRL, IRL and SRL have large differences in their maturity targets during the acquisition life cycle: technological performance, manufacturing capability, interface between components and total system, respectively. They complement one another's shortcomings Conclusion: To achieve a successful acquisition of high quality weapon system, multi-dimensional readiness assessment is required. Therefore, comprehensive readiness assessment using TRL, MRL, IRL and SRL will contribute to the acquisition of high quality weapon system through the accurate maturity information of overall system.

Proposed CCPS model for comprehensive security management of CCTV (영상정보처리기기(CCTV)의 포괄적 보안관리를 위한 암호·인증·보호·체계(CCPS) 모델 제안)

  • Song, Won-Seok;Cho, Jun-Ha;Kang, Seong-Moon;Lee, MinWoo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2021.05a
    • /
    • pp.657-660
    • /
    • 2021
  • A video information processing system (CCTV) requires comprehensive administrative, physical, and technical security management to collect, transmit and store sensitive information. However, there are no regulations related to video information processing, certification methods for the technology used, and application standards suitable for security technology. In this paper, we propose a cryptography, certification, protection, system (CCPS) model that can protect the system by including encryption technology for application to the video information processing system and authentication measures for the technology used in the system configuration.

  • PDF

Age-dependent root canal instrumentation techniques: a comprehensive narrative review

  • Solomonov, Michael;Kim, Hyeon-Cheol;Hadad, Avi;Levy, Dan Henry;Itzhak, Joe Ben;Levinson, Oleg;Azizi, Hadas
    • Restorative Dentistry and Endodontics
    • /
    • v.45 no.2
    • /
    • pp.21.1-21.12
    • /
    • 2020
  • The aim of this article was to review age-dependent clinical recommendations for appropriate root canal instrumentation techniques. A comprehensive narrative review of canal morphology, the structural characteristics of dentin, and endodontic outcomes at different ages was undertaken instead of a systematic review. An electronic literature search was carried out, including the Medline (Ovid), PubMed, and Web of Science databases. The searches used controlled vocabulary and free-text terms, as follows: 'age-related root canal treatment,' 'age-related instrumentation,' 'age-related chemo-mechanical preparation,' 'age-related endodontic clinical recommendations,' 'root canal instrumentation at different ages,' 'geriatric root canal treatment,' and 'pediatric root canal treatment.' Due to the lack of literature with practical age-based clinical recommendations for an appropriate root canal instrumentation technique, a narrative review was conducted to suggest a clinical algorithm for choosing the most appropriate instrumentation technique during root canal treatment. Based on the evidence found through the narrative review, an age-related clinical algorithm for choosing appropriate instrumentation during root canal treatment was proposed. Age affects the morphology of the root canal system and the structural characteristics of dentin. The clinician's awareness of root canal morphology and dentin characteristics can influence the choice of instruments for root canal treatment.

A Study on the Application of Defense IoT for the Implementation of Common Service in the Army, Navy, and Air Force (전군 공통 서비스 구현을 위한 국방 IoT 적용방향 연구)

  • Bae, Young-Min
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.45 no.3
    • /
    • pp.31-39
    • /
    • 2022
  • The Army, Navy, and Air Force are currently making various efforts to apply defense IoT technology by reflecting the characteristics of each military. However, there are concerns that comprehensive collection, management, and analysis may be limited because each military has no overlapping system or guaranteed interoperability of data, and there are inefficient aspects in terms of using and investing a limited defense budget. In this study, evaluation items and priorities for pilot projects were selected by applying Delphi technique and AHP method to determine which projects are preferentially effective when commonly applied in terms of Army, Navy, and Air force. As a result of the analysis, the project basis and driving force, project feasibility, performance and ripple effect, redundancy and connection were identified in the order of IoT-based small detachment units and unmanned base construction, intelligent smart unit, smart ground ammunition depot, and smart training management system. According to the comprehensive results reflecting the weights of each evaluation item, the fact that small detachment units and unmanned base construction project are recognized as the first project to be applied to the Army, Navy, and Air Force is a valid approach to be effective while each military is burdened with personnel management because of the reduction of manpower. Through the research results, it is expected that the direction of application to the policy of the defense IoT project can be confirmed in terms of efficient use of limited budgets.

A Study on Networks of Defense Science and Technology using Patent Mining (특허 마이닝을 이용한 국방과학기술 연결망 연구)

  • Kim, Kyung-Soo;Cho, Nam-Wook
    • Journal of Korean Society for Quality Management
    • /
    • v.49 no.1
    • /
    • pp.97-112
    • /
    • 2021
  • Purpose: The purpose of this paper is to analyze the technology convergence and its characteristics, focusing on the defense technologies in South Korea. Methods: Patents applied by the Agency for Defense Development (ADD) during 1979~2019 were utilized in this paper. Information Entropy analysis has been conducted on the patents to analyze the usability and potential for development. To analyze the trend of technology convergence in defense technologies, Social Network Analysis(SNA) and Association Rule Mining Analysis were applied to the co-occurrence networks of International Patent Classification (IPC) codes. Results: The results show that sensor, communication, and aviation technologies played a key role in recent development of defense science and technology. The co-occurrence network analysis also showed that the convergence has gradually enhanced over time, and the convergence between different technology sectors largely emerged, showing that the convergence has been diversified. Conclusion: By analyzing the patents of the defense technologies during the last 30 years, this study presents the comprehensive perspectives on trends and characteristics of technology convergence in defense industry. The results of this study are expected to be used as a guideline for decision making in the government's R&D policies in defence industry.