• Title/Summary/Keyword: unified threats management system

Search Result 6, Processing Time 0.019 seconds

A Study on Appropriate Military Strength of Unified Korea (Focused on relative balance strategy and conflict scenario) (통일 한국의 적정 군사력에 관한 연구 - 분쟁 시나리오와 상대적 균형전략을 중심으로 -)

  • Hong, Bong-Gi
    • Journal of National Security and Military Science
    • /
    • s.13
    • /
    • pp.687-738
    • /
    • 2016
  • To prepare for the complicated international relationship regarding Korean Peninsula after reunification, this thesis started off with the awareness that Unified Korea should build its international posture and national security at an early stage by determining its appropriate military strength for independent defense and military strategies that Unified Korea should aim. The main theme of this thesis is 'The research on appropriate military strength of the Unified Korean military'. To derive appropriate military strength of Unified Korea, this research focuses on conflict scenario and relative balance strategy based on potential threats posed by neighboring countries, and this is the part that differentiates this research from other researches. First of all, the main objective of the research is to decide appropriate military strength for Unified Korea to secure defense sufficiency. For this, this research will decide efficient military strategy that Unified Korea should aim. Than by presuming the most possible military conflict scenario, this research will judge the most appropriate military strength for Unified Korea to overcome the dispute. Second, after deciding appropriate military strength, this research will suggest how to operate presumed military strength in each armed force. The result of this thesis is as in the following. First, Unified Korea should aim 'relative balance strategy'. 'Relative balance strategy' is a military strategy which Unified Korea can independently secure defense sufficiency by maintaining relative balance when conflicts occur between neighboring countries. This strategy deters conflicts in advance by relative balance of power in certain time and place. Even if conflict occurs inevitably, this strategy secures initiative. Second, when analyzing neighboring countries interest and strategic environment after unification, the possibility of all-out war will be low in the Korean Peninsula because no other nation wants the Korean Peninsula to be subordinated to one single country. Therefore appropriate military strength of the Unified Korean military would be enough when Unified Korea can achieve relative balance in regional war or limited war. Third, Northeast Asia is a region where economic power and military strength is concentrated. Despite increasing mutual cooperation in the region, conflicts and competition to expand each countries influence is inherent. Japan is constantly enhancing their military strength as they aim for normal statehood. China is modernizing their military strength as they aspire to become global central nation. Russia is also enhancing their military strength in order to hold on to their past glory of Soviet Union as a world power. As a result, both in quality and quantity, the gap between military strength of Unified Korea and each neighboring countries is enlarged at an alarming rate. Especially in the field of air-sea power, arms race is occurring between each nation. Therefore Unified Korea should be equipped with appropriate military strength in order to achieve relative balance with each threats posed by neighboring countries. Fourth, the most possible conflicts between Unified Korea and neighboring countries could be summarized into four, which are Dokdo territorial dispute with Japan, Leodo jurisdictional dispute with China, territorial dispute concerning northern part of the Korea Peninsula with China and disputes regarding marine resources and sea routes with Russia. Based on those conflict scenarios, appropriate military strength for Unified Korea is as in the following. When conflict occurs with Japan regarding Dokdo, Japan is expected to put JMSDF Escort Flotilla 3, one out of four of its Japan Maritime Self-Defense Force Escort Fleet, which is based in Maizuru and JMSDF Maizuru District. To counterbalance this military strength, Unified Korea needs one task fleet, comprised with three task flotilla. In case of jurisdictional conflict with China concerning Leodo, China is expected to dispatch its North Sea fleet, one out of three of its naval fleet, which is in charge of the Yellow Sea. To response to this military action, Unified Korea needs one task fleet, comprised with three task flotilla. In case of territorial dispute concerning northern part of the Korean Peninsula with China, it is estimated that out of seven Military Region troops, China will dispatch two Military Region troops, including three Army Groups from Shenyang Military Region, where it faces boarder with the Korean Peninsula. To handle with this military strength, Unified Korea needs six corps size ground force strength, including three corps of ground forces, two operational reserve corps(maneuver corps), and one strategic reserve corps(maneuver corps). When conflict occurs with Russia regarding marine resources and sea routes, Russia is expected to send a warfare group of a size that includes two destroyers, which is part of the Pacific Fleet. In order to balance this strength, Unified Korea naval power requires one warfare group including two destroyers. Fifth, management direction for the Unified Korean military is as in the following. Regarding the ground force management, it would be most efficient to deploy troops in the border area with china for regional and counter-amphibious defense. For the defense except the border line with china, the most efficient form of force management would be maintaining strategic reserve corps. The naval force should achieve relative balance with neighboring countries when there is maritime dispute and build 'task fleet' which can independently handle long-range maritime mission. Of the three 'task fleet', one task fleet should be deployed at Jeju base to prepare for Dokdo territorial dispute and Leodo jurisdictional dispute. Also in case of regional conflict with china, one task fleet should be positioned at Yellow Sea and for regional conflict with Japan and Russia, one task fleet should be deployed at East Sea. Realistically, Unified Korea cannot possess an air force equal to neither Japan nor China in quantity. Therefore, although Unified Korea's air force might be inferior in quantity, they should possess the systematic level which Japan or China has. For this Unified Korea should build air base in island areas like Jeju Island or Ullenong Island to increase combat radius. Also to block off infiltration of enemy attack plane, air force needs to build and manage air bases near coastal areas. For landing operation forces, Marine Corps should be managed in the size of two divisions. For island defense force, which is in charge of Jeju Island, Ulleung Island, Dokdo Island and five northwestern boarder island defenses, it should be in the size of one brigade. Also for standing international peace keeping operation, it requires one brigade. Therefore Marine Corps should be organized into three divisions. The result of the research yields a few policy implications when building appropriate military strength for Unified Korea. First, Unified Korea requires lower number of ground troops compared to that of current ROK(Republic of Korea) force. Second, air-sea forces should be drastically reinforced. Third, appropriate military strength of the Unified Korean military should be based on current ROK military system. Forth, building appropriate military strength for Unified Korea should start from today, not after reunification. Because of this, South Korea should build a military power that can simultaneously prepare for current North Korea's provocations and future threats from neighboring countries after reunification. The core of this research is to decide appropriate military strength for Unified Korea to realize relative balance that will ensure defense sufficiency from neighboring countries threats. In other words, this research should precisely be aware of threats posed by neighboring countries and decide minimum level of military strength that could realize relative balance in conflict situation. Moreover this research will show the path for building appropriate military strength in each armed force.

  • PDF

Privacy Inferences and Performance Analysis of Open Source IPS/IDS to Secure IoT-Based WBAN

  • Amjad, Ali;Maruf, Pasha;Rabbiah, Zaheer;Faiz, Jillani;Urooj, Pasha
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.12
    • /
    • pp.1-12
    • /
    • 2022
  • Besides unexpected growth perceived by IoT's, the variety and volume of threats have increased tremendously, making it a necessity to introduce intrusion detections systems for prevention and detection of such threats. But Intrusion Detection and Prevention System (IDPS) inside the IoT network yet introduces some unique challenges due to their unique characteristics, such as privacy inference, performance, and detection rate and their frequency in the dynamic networks. Our research is focused on the privacy inferences of existing intrusion prevention and detection system approaches. We also tackle the problem of providing unified a solution to implement the open-source IDPS in the IoT architecture for assessing the performance of IDS by calculating; usage consumption and detection rate. The proposed scheme is considered to help implement the human health monitoring system in IoT networks

Implementation of a security system using the MITM attack technique in reverse (MITM 공격기법을 역이용한 보안시스템 구현)

  • Rim, Young-woo;Kwon, Jung-jang
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2021.01a
    • /
    • pp.79-80
    • /
    • 2021
  • 본 논문은 MITM 공격기법을 역이용한 네트워크 보안 기술 및 구현 방안을 제시한다. MITM(Man In The Middle) 공격은 통신 경로 중간에 개입하여 양 단간의 통신 내용을 가로채거나 행위 제어를 수행하는 전통적인 해킹 방법으로 그 공격 기법을 역이용하여 네트워크 공격을 방어하는 보안기술 및 시스템 구현에 대해 기술한다. Linux 시스템을 이용하여 ARP Poisoning을 통해 양단간 통신 트래픽에 개입하며, Netfilter 및 Suricata를 이용하여 Network IDS/IPS 및 Firewall을 구현하였고, Contents 필터링 및 Anti-Virus 구현이 가능하며, 여러 기능을 확장하여 UTM(Unified Threats Management) 시스템을 구현하였다.

  • PDF

Device Identification System for Corporate Internal Network Visibility in IoT Era (IoT 시대 기업 내부 네트워크의 가시성 확보를 위한 단말 식별 시스템 설계)

  • Lee, Dae-Hyo;Kim, Yong-Kwon;Lee, Dong-Bum;Kim, Hyeob
    • Convergence Security Journal
    • /
    • v.19 no.3
    • /
    • pp.51-59
    • /
    • 2019
  • In this paper, we propose a device identification system for network visibility that can maintain the secure internal network environment in the IoT era. Recently, the area of enterprise network is getting huge and more complicated. Not only desktops and smartphones but also business pads, barcode scanners, APs, Video Surveillance, digital doors, security devices, and lots of Internet of Things (IoT) devices are rapidly pouring into the business network, and there are highly risk of security threats. Therefore, in this paper, we propose the device identification system that includes the process and module-specific functions to identify the exploding device in the IoT era. The proposed system provides in-depth visibility of the devices and their own vulnerabilities to the IT manager in company. These information help to mitigate the risk of the potential cyber security threats in the internal network and offer the unified security management against the business risks.

Design and Implementation of a Web Application Firewall with Multi-layered Web Filter (다중 계층 웹 필터를 사용하는 웹 애플리케이션 방화벽의 설계 및 구현)

  • Jang, Sung-Min;Won, Yoo-Hun
    • Journal of the Korea Society of Computer and Information
    • /
    • v.14 no.12
    • /
    • pp.157-167
    • /
    • 2009
  • Recently, the leakage of confidential information and personal information is taking place on the Internet more frequently than ever before. Most of such online security incidents are caused by attacks on vulnerabilities in web applications developed carelessly. It is impossible to detect an attack on a web application with existing firewalls and intrusion detection systems. Besides, the signature-based detection has a limited capability in detecting new threats. Therefore, many researches concerning the method to detect attacks on web applications are employing anomaly-based detection methods that use the web traffic analysis. Much research about anomaly-based detection through the normal web traffic analysis focus on three problems - the method to accurately analyze given web traffic, system performance needed for inspecting application payload of the packet required to detect attack on application layer and the maintenance and costs of lots of network security devices newly installed. The UTM(Unified Threat Management) system, a suggested solution for the problem, had a goal of resolving all of security problems at a time, but is not being widely used due to its low efficiency and high costs. Besides, the web filter that performs one of the functions of the UTM system, can not adequately detect a variety of recent sophisticated attacks on web applications. In order to resolve such problems, studies are being carried out on the web application firewall to introduce a new network security system. As such studies focus on speeding up packet processing by depending on high-priced hardware, the costs to deploy a web application firewall are rising. In addition, the current anomaly-based detection technologies that do not take into account the characteristics of the web application is causing lots of false positives and false negatives. In order to reduce false positives and false negatives, this study suggested a realtime anomaly detection method based on the analysis of the length of parameter value contained in the web client's request. In addition, it designed and suggested a WAF(Web Application Firewall) that can be applied to a low-priced system or legacy system to process application data without the help of an exclusive hardware. Furthermore, it suggested a method to resolve sluggish performance attributed to copying packets into application area for application data processing, Consequently, this study provide to deploy an effective web application firewall at a low cost at the moment when the deployment of an additional security system was considered burdened due to lots of network security systems currently used.

Some Issues on China General Aviation Legislation (中國通用航空立法若干問題研究)

  • Shuang, Luan
    • The Korean Journal of Air & Space Law and Policy
    • /
    • v.31 no.2
    • /
    • pp.99-143
    • /
    • 2016
  • General aviation and air transport are two wings of the civil aviation industry. Chinese air transport is developing rapidly, and has become the world second air transport system only second to US since 2005. However, Chinese civil aviation is far behind the world average level, and cannot meet requirements of economic construction and social development. The transition and structural adjustment of Chinese economy provide the general aviation with a unprecedented broad market. The prospect of general aviation is promising and anticipated. The development of general aviation industry needs the legislative supports, and the current legislative conditions of Chinese general aviation are undoubtedly far behind the realistic requirements. Accelerating the legislation in Chinese general aviation industry requires scientific legislation concept. First, Legislation must promote development of general aviation industry. The general aviation will serves as a Chinese emerging industry that boosts domestic demand, promotes employment and expedite domestic economic development. We should, based on both the concept of promoting the industrial development of general aviation and national industrial planning, enact and rectify relative laws and regulations. And we should also straighten out the relationship between aviation security and industrial development and promote the revolution of low-altitude airspace management in an all-round way, in order to improve the utilization rate of airspace resources, classify and establish airspace, simplify examination and approval procedure and intensify operation management. In addition, what we should do is to expedite the infrastructure layout construction, guide the differentiated but coordinated development of general aviation industries in various areas, establish a united supervision mechanism of general aviation, redistrict the responsibilities of Chinese Air Control Agency and set up legislation, law enforcement and judicial systems with clarified institutions, clear positioning and classified responsibilities, so as to usher in a new era of the legislative management of Chinese general aviation industry. Second, shift the focus from regulations to both regulations and services. Considering the particularity of the general aviation, we should use American practices for reference and take into account both regulation and service functions when enacting general aviation laws. For example, we should reduce administrative licensing and market supervision, and adopt "criteria" and "approval" management systems for non-commercial and commercial aviation. Furthermore, pay attention to social benefits. Complete social rescuing mechanism through legislation. It should be clarified in legislation that general aviation operators should take the responsibilities of, and ensure to realize social benefits of environmental protection and ecological balance .Finally, rise in line with international standards. Modify Chinese regulations which is inconsistent with international ones to remove barriers to international cooperation. Specify basic legislative principles. One is the principle of coordination. Realize coordination between the civil aviation and general aviation, between military aviation and civil aviation, and among departments. Two is the principle of pertinence. The general aviation has its own rules and specialties, needing to be standardized using specialized laws and regulations. Three is the principle of efficiency. To realize time and space values of general aviation, we should complete rules in aerospace openness, general aviation airport construction, general aviation operations, and regulation enforcement. Four is the principle of security. Balance the maximum use of resources of Chinese airspace and the according potential threats to Chinese national interests and social security, and establish a complete insurance system which functions as security defense and indemnificatory measure. Establish a unified legal system. Currently, the system of Chinese general aviation laws consists of national legislation, administrative laws and regulations and civil aviation regulations (CAR). Some problems exist in three components of the system, including too general content, unclear guarantee measures, incomplete implementation details, and lacking corresponding pertinence and flexibility required by general aviation regulations, stringency of operation management and standards, and uniformity of standards. A law and regulation system, centered on laws and consisting of administrative laws regulations, industrial regulations, implementation details, industrial policies and local laws and regulations, should be established. It is suggested to modify the Civil Aviation Law to make general aviation laws complete, enact the Regulations of General Aviation Development, and accelerate the establishment, modification and abolition of Chinese general aviation laws to intensify the coordination and uniformity of regulations.