• Title/Summary/Keyword: information warfare

Search Result 374, Processing Time 0.023 seconds

A Study on the Preparation of National Cyber Warfare (국가 사이버전 대비방안 연구)

  • J. Kim, Kui-Nam
    • Convergence Security Journal
    • /
    • v.6 no.4
    • /
    • pp.141-151
    • /
    • 2006
  • The destructive power of cyber threat arrived to until the phase which it threatens to direct and seriously in national security undergoes an important national institutuin hacking event of 2004 and Internet paralysis accidents of 2003. 1. 25. So Cyber terror and Cyber warfare is not the hypothetical enemy situation. It is more actual security situation and identify as magnification of warfare concept of incapacitation national important ability include military command system of the adversary, communication, energy, finance and transportation system. consequently, with the progress of cyber threat, it is necessary that looking at a number of general plan to make up for the weak points in cyber warfare operation system. Thus, the focus of this study is to examine new ways of developing a comprehensive cyber security management system.

  • PDF

A Study on the Operation Concept of Cyber Warfare Execution Procedures (사이버전 수행절차 운영개념에 관한 연구)

  • Kim, Sung-Joong;Yoo, JiHoon;Oh, HaengRok;Shin, Dongil;Shin, DongKyoo
    • Journal of Internet Computing and Services
    • /
    • v.21 no.2
    • /
    • pp.73-80
    • /
    • 2020
  • Due to the expansion of cyber space, war patterns are also changing from traditional warfare to cyber warfare. Cyber warfare is the use of computer technology to disrupt the activities of nations and organizations, especially in the defense sector. However, the defense against effective cyber threat environment is inadequate. To complement this, a new cyber warfare operation concept is needed. In this paper, we study the concepts of cyber intelligence surveillance reconnaissance, active defense and response, combat damage assessment, and command control in order to carry out cyber operations effectively. In addition, this paper proposes the concept of cyber warfare operation that can achieve a continuous strategic advantage in cyber battlefield.

Comparison Study between the Cyber Weapon System and the Conventional Weapons Systems on Their Core Technologies Levels and Features (국방 사이버 무기체계와 기존 재래식 무기체계의 핵심기술 수준 및 특성 비교 연구)

  • Lee, Ho-gyun;Lim, Jong-in;Lee, Kyung-ho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.4
    • /
    • pp.985-994
    • /
    • 2016
  • Since the inauguration of Defense Acquisition Program Administration(DAPA) in 2006, the national defense core technology research & development business has not only pertained to the weapons systems development but also to the improvement of the national science & technology capability via the acquisition of cutting-edge technologies. Furthermore, it has been closely related to the promotion of the defense industry and the mutual improvements of defense and civil technologies. The cyber warfare weapon system, a newly added national defense weapon system field since 2015, has become a promising weapon system branch for improving the national defense power as well as the national defense industry as shown in the case of Israel. By utilizing the existing result of the national defense core technology level, in order to establish the direction of technology planning of the cyber warfare weapon system, this paper analyzes the technology level and features of the cyber warfare weapon system in various aspects via comparisons with other weapons systems. The result of these analyses shows that the cyber warfare weapon system possesses a relatively high technology level due to the technology accumulation in the civilian sector while the relatively slow inclusion to the national weapons systems and the lack of the correspondence case regarding aggressive cyber responses in the defense sector yields a relatively low national rank. However, the technological gap between South Korea and the most advanced country in the field of cyber warfare technology is analyzed to be among the lowest, which indicates that with efficient and effective pursuits in terms of pthe weapons systems acquisitions as well as the core technologies research & development business, an outstanding cyber warfare capacity can be obtained in a short time.

Approaches to Applying Social Network Analysis to the Army's Information Sharing System: A Case Study (육군 정보공유체계에 사회관계망 분석을 적용하기 위한방안: 사례 연구)

  • GunWoo Park
    • The Journal of the Convergence on Culture Technology
    • /
    • v.9 no.5
    • /
    • pp.597-603
    • /
    • 2023
  • The paradigm of military operations has evolved from platform-centric warfare to network-centric warfare and further to information-centric warfare, driven by advancements in information technology. In recent years, with the development of cutting-edge technologies such as big data, artificial intelligence, and the Internet of Things (IoT), military operations are transitioning towards knowledge-centric warfare (KCW), based on artificial intelligence. Consequently, the military places significant emphasis on integrating advanced information and communication technologies (ICT) to establish reliable C4I (Command, Control, Communication, Computer, Intelligence) systems. This research emphasizes the need to apply data mining techniques to analyze and evaluate various aspects of C4I systems, including enhancing combat capabilities, optimizing utilization in network-based environments, efficiently distributing information flow, facilitating smooth communication, and effectively implementing knowledge sharing. Data mining serves as a fundamental technology in modern big data analysis, and this study utilizes it to analyze real-world cases and propose practical strategies to maximize the efficiency of military command and control systems. The research outcomes are expected to provide valuable insights into the performance of C4I systems and reinforce knowledge-centric warfare in contemporary military operations.

Layered Authoring of Cyber Warfare Training Scenario (계층적 사이버전 훈련 시나리오 저작)

  • Song, Uihyeon;Kim, Donghwa;Ahn, Myung Kil
    • Journal of Internet Computing and Services
    • /
    • v.21 no.1
    • /
    • pp.191-199
    • /
    • 2020
  • Cyber warfare training is a key factor for boosting cyber warfare competence. In general, cyber warfare training is conducted by scenarios, and the effects of training can be enhanced by including various elements in the scenarios that can improve the quality of training. In this paper, we introduce the training information, network map, traffic generation policy, threat/defense behavior identified as elements to be included in training scenarios, and propose a method of authoring training scenarios by layering and combining them. We also propose a database design for integrated management of each scenario layer. The layered training scenario authoring method has the advantage of increasing convenience of authoring by reusing existing layers and extending training scenarios based on various combinations between the layers.

Research on System Architecture and Methodology based on MITRE ATT&CK for Experiment Analysis on Cyber Warfare Simulation

  • Ahn, Myung Kil;Lee, Jung-Ryun
    • Journal of the Korea Society of Computer and Information
    • /
    • v.25 no.8
    • /
    • pp.31-37
    • /
    • 2020
  • In this paper, we propose a system architecture and methodology based on cyber kill chain and MITRE ATT&CK for experiment analysis on cyber warfare simulation. Threat analysis is possible by applying various attacks that have actually occurred with continuous updates to reflect newly emerging attacks. In terms of cyber attack and defense, the current system(AS-IS) and the new system(TO-BE) are analyzed for effectiveness and quantitative results are presented. It can be used to establish proactive cyber COA(Course of Action) strategy, and also for strategic decision making. Through a case study, we presented the usability of the system architecture and methodology proposed in this paper. The proposed method will contribute to strengthening cyber warfare capabilities by increasing the level of technology for cyber warfare experiments.

Performance Analysis on Digital Phase Difference Measurement Techniques for Interferometer Direction Finder (인터페로미터 방향 탐지기의 디지털 위상차 측정 기법 성능 분석)

  • Kang, Jong-jin;Park, Sung-kyun;Roh, Ji-hyun
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.22 no.8
    • /
    • pp.1076-1082
    • /
    • 2018
  • This paper describes interferometer direction finder which measures the angle of arrival based on calculation of the phase difference of received radio signal from different antennas. Modern Electronic Warfare direction finder uses digital phase difference measuring techniques which have less effect on temperature variation and better performance under low Signal to Noise Ratio environment. In this paper, we analyze acceptable phase difference error for requirement of system's direction finding accuracy and introduce digital phase difference calculation techniques. We have investigated quantitative analysis on phase difference calculation according to sample number, SNR, interference injection. Through the simulation, frequency domain measurement technique is better performance than the time domain one at the environment of low SNR and interference injection. Proposed method can be used to determine the performance of interferometer direction finder.

Identification Algorithm for Up/Down Sliding PRIs of Unidentified RADAR Pulses With Enhanced Electronic Protection (우수한 전자 보호 기능을 가진 미상 레이더 펄스의 상/하 슬라이딩 PRI 식별 알고리즘)

  • Lee, Yongsik;Kim, Jinsoo;Kim, Euigyoo;Lim, Jaesung
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.41 no.6
    • /
    • pp.611-619
    • /
    • 2016
  • Success in modern war depends on electronic warfare. Therefore, It is very important to identify the kind of Radar PRI modulations in a lot of Radar electromagnetic waves. In this paper, I propose an algorithm to identify Linear up Sliding PRI, Non-Linear up Sliding PRI and Linear Down Sliding PRI, Non-Linear Down Sliding PRI among many Radar pulses. We applied not only the TDOA(Time Difference Of Arrival) concept of Radar pulse signals incoming to antennas but also a rising and falling curve characteristics of those PRI's. After making a program by such algorithm, we input each 40 data to those PRI's identification programs and as a result, those programs fully processed the data in according to expectations. In the future, those programs can be applied to the ESM, ELINT system.

Building an Analysis Model for Social Engineering Based Cyberspace Operations (사회공학 사이버작전 분석모델 정립연구)

  • Shin, Kyuyong;Kim, Jeewon;Lim, Hyun-myung;Kim, Yongju;Yoo, Jincheol
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.6
    • /
    • pp.1595-1606
    • /
    • 2018
  • Recently, there has been an increase in the number of social engineering techniques that indirectly attack the target system administrators or organizational weaknesses rather than the traditional technical cyber attacks that directly attacked the target systems. Accordingly, the type analysis and case study of social engineering techniques are being actively conducted. There has been, however, little effort to derive an analysis model that systematically analyzes social engineering based cyberspace operations. Therefore, this paper aims at building a Social Engineering Based Cyberspace Operations Analysis Model, which can be used as a reference framework for a case study or attack scenario generation of social engineering based cyberspace operations.

Naval Warfare and the Development of the Weapon System in History (역사속 해전과 무기체계 발달양상)

  • Kim, Jeong-hyun
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2013.05a
    • /
    • pp.144-150
    • /
    • 2013
  • From ancient times to the present day, naval warfare in history is deeply connected with the rise and fall of countries. This study examines which countries won wars by tracing naval warfare that they had carried out. Seven Cases are traced for the analysis including the battle of Salamis and the Poeni War in the ancient period, the battle of Calais in the medieval and modern periods, the Russo-Japanese War in the modern period, and the Falklands War in the present age. The results show three fundamental characteristics. First, countries that won naval warfare were armed with the state-of-the-art weapon systems and conducted joint operations effectively. Second, countries that fought in the usual ways were defeated by challengers. Third, countries such as Athens, Rome, Britain and the United States ascended to the hegemony by winning major naval warfare and then commanding or controlling the sea at their own free will. Countries defeated in these naval warfare, however, descended to the weak powers. In general, countries that won warfare have a tendency to make light of defeated countries, not to introduce new weapon systems from abroad, and to stick to their traditional ways of fighting. These lessons indicate that the ROK military needs to continue the development of new weapon systems at peacetime. In addition, they show that it needs to focus more on the articulation of military doctrines and training systems so that warriors on the battlefield can fight better.

  • PDF