• Title/Summary/Keyword: warfare information system

Search Result 200, Processing Time 0.023 seconds

M&S Software Design of Multiple Radio Positioning Integration System (다중 전파측위 융복합 시스템의 M&S 소프트웨어 설계)

  • Koo, Moonsuk;Kim, YoungJoon;Choi, Kwang-Ho;So, Hyoungmin;Oh, Sang Heon;Kim, Seong-Cheol;Lee, Hyung-Keun;Hwang, Dong-Hwan
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.18 no.5
    • /
    • pp.602-611
    • /
    • 2015
  • Even though GNSS provides highly accurate navigation information all over the world, it is vulnerable to jamming in the electronic warfare due to its weak signal power. The United States and Korea have plans to use terrestrial navigation systems as back-up systems during outage of GNSS. In order to develop back-up systems of GNSS, an M&S software platform is necessary for performance evaluation of various vehicle trajectories and integrated navigation systems. In this paper a design method of an M&S software is proposed for evaluation of multiple radio positioning integration systems. The proposed M&S software consists of a navigation environment generation part, a navigation algorithm part, a GUI part and a coverage analysis part. Effectiveness of the proposed design method is shown by implementing an M&S software for the GPS, DME and eLoran navigation systems.

Attack Modeling for an Internet Security Simulation (인터넷 보안 시뮬레이션을 위한 공격 모델링)

  • Seo, Jung-Kuk;Choi, Kyung-Hee;Jung, Gi-Hyun;Park, Seung-Kyu;Sim, Jae-Hong
    • The KIPS Transactions:PartC
    • /
    • v.11C no.2
    • /
    • pp.183-192
    • /
    • 2004
  • As the use of the Internet has explosively increased, it is likely for the Internet to be exposed to various attacks. Modeling the Internet attacks is essential to simulate the attacks. However, the existing studies on attack modeling have mainly focused on classifying and categorizing the attacks and consequently they are not suitable to representing attack scenarios in the Internet security simulation. In this paper, we introduce the existing methods of attack modeling, and propose an adapted attack modeling to properly express the properties for the Internet security simulator. The adapted attack modeling suggests a solution to the problems of the existing attack tree modelings, such as difficulty of composing complex scenarios ambiguity of attack sequence, lack of system state information. And it can represent simultaneous, precise time-dependent attack, and attack period, which are nearly impossible to be represented in many other existing methods.

A Scheme on applying IT technology for TLCSM improvements (TLCSM 개선을 위한 IT기술의 적용방안)

  • Choi, Myoungjin;Kwon, Daeil;Yang, Jeakyung
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.17 no.12
    • /
    • pp.26-33
    • /
    • 2016
  • The cost of preparing munitions in weapon system operation and management has been rapidly increasing and current weapon systems have become complicated and diverse due to new warfare pattern changes and the rapid growth of advanced scientific technology. Moreover, as a part of the execution plans of creative economics, the Korean government is actively reviewing how to minimize the costs of preparing munitions. Accordingly, this study derived the issues of munitions management for decreasing munitions preparing costs. First, the issues of munitions management were introduced through review and analysis with respect to the munitions classification criteria, regulations and systems, and equipment maintenance information systems. Second, we proposed the application and necessity for the real-name system which is responsible for munitions management and the fragmentation of the maintenance instructions status classification criteria.. Also, we were analyzed that the effects depending on the application. Finally, we proposed that the linkage system which is currently military active with equipment maintenance information systems as well as the total life-cycle management system (TLCSM) improvements to the itemized data and records management system by utilizing IT technology CMB that must be done in order to improve the issues.

Efficient Feature Selection Based Near Real-Time Hybrid Intrusion Detection System (근 실시간 조건을 달성하기 위한 효과적 속성 선택 기법 기반의 고성능 하이브리드 침입 탐지 시스템)

  • Lee, Woosol;Oh, Sangyoon
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.5 no.12
    • /
    • pp.471-480
    • /
    • 2016
  • Recently, the damage of cyber attack toward infra-system, national defence and security system is gradually increasing. In this situation, military recognizes the importance of cyber warfare, and they establish a cyber system in preparation, regardless of the existence of threaten. Thus, the study of Intrusion Detection System(IDS) that plays an important role in network defence system is required. IDS is divided into misuse and anomaly detection methods. Recent studies attempt to combine those two methods to maximize advantagesand to minimize disadvantages both of misuse and anomaly. The combination is called Hybrid IDS. Previous studies would not be inappropriate for near real-time network environments because they have computational complexity problems. It leads to the need of the study considering the structure of IDS that have high detection rate and low computational cost. In this paper, we proposed a Hybrid IDS which combines C4.5 decision tree(misuse detection method) and Weighted K-means algorithm (anomaly detection method) hierarchically. It can detect malicious network packets effectively with low complexity by applying mutual information and genetic algorithm based efficient feature selection technique. Also we construct upgraded the the hierarchical structure of IDS reusing feature weights in anomaly detection section. It is validated that proposed Hybrid IDS ensures high detection accuracy (98.68%) and performance at experiment section.

Methodology of Interoperating Link-K Track Number in Multi TDLs (다중 전술데이터링크 간 Link-K 트랙 번호 상호운용 기술)

  • Lee, Youn-Jeong;Kim, Sang-Jun;Lim, Man-Yeob
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.38C no.12
    • /
    • pp.1186-1195
    • /
    • 2013
  • In modern warfare, the main factor of triumph is superior situation awareness which leads rapid command decision and precisely guided munition, and TDL(Tactical Data Link) is the main communicational enabler. ROK forces currently operate Link-16 with allied forces and are also developing Korean national data link, Link-K which is also planned to be cooperated with Link-16. Assigning participant and track numbers needs agreement between ROK and allied forces, but ROK forces have exclusive authority in assigning numbers in Link-K. This paper proposes the effective method of exchange participant and track numbers between Link-16 and Link-K, and applicability verification in operational test and evaluation will be also presented.

The Multi-Net Performance Evaluation of Link-16 in the L-Band Sharing with Radars (L-대역 내 레이더 주파수 공동사용 환경에서 멀티넷을 통한 Link-16 운용 가능성 성능 평가)

  • Choi, Seonjoo;Yu, Jepung;Lim, Jaesung;Baek, Hoki;Kim, Jaewon;Choi, Hyogi
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.41 no.7
    • /
    • pp.738-746
    • /
    • 2016
  • As the trend of future war has been changed to network centric warfare, tactical data link should be needed for fast and accurate situation awareness. Nowadays, Korean air force conducts military operations by using aircrafts equipped with Link-16. The Link-16 can conduct multiple mission at the same time because it supports multi-net capability. Due to lack of frequency resource, the way to share the frequency with other systems has been studied and using L band with radar is considered as one of the candidates bands. However, the data link can be affected by the interference from radars when it shares the L-band because the L-band in Korea is already assigned to long-range detection radars. In this paper, we evaluate operational possibilities of tactical data link in the L-band based on Link-16.

A Study on the Informatization and Intelligent Strategy of Education and Training based on 4th Industrial Revolution Technology (4 산업혁명 기술 기반 교육훈련 정보화 및 지능화 전략)

  • Lee, Hee Nam
    • Journal of Information Technology Services
    • /
    • v.20 no.1
    • /
    • pp.67-79
    • /
    • 2021
  • The advent of the 4th Industrial Revolution is also causing many changes in defense operations. Defense reform and the fourth industrial revolution promoted smart defense innovation, and attempts are being made to incorporate cutting-edge science and technology into various fields such as weapons systems and defense operations. Education and training is one of the areas in which information and intelligence are urgently needed in the spirit of defense operations. Due to the nature of defense education and training, which aims to fight against the enemy, there is no emphasis on psychological training in the field rather than informatization, but in developed countries with various experiences of modern warfare, investment and vitalization of education and training are vital. Through this, efforts are being made to foster soldiers with problem-solving skills in uncertain battlefields. The informatization and intelligence of defense education and training is no longer a matter that can be delayed, and the innovation of education and training using cutting-edge science and technology can be said to be an age-old task to improve the results of education and training in the fourth industrial revolution. The purpose of this is because the application of related technologies is not the goal itself as the 4th Industrial Revolution arrives, but it has been made possible through the rapid advancement of science and technology that has made it difficult to realize education and training, even though it has long been desired. Ultimately, education and training data will be integrated and artificial intelligence-based intelligent learning systems will maximize the performance of education and training, thereby improving the combat readiness.

A Study on Quality Assurance of Embedded Software Source Codes for Weapon Systems by Improving the Reliability Test Process (신뢰성 시험 프로세스 개선을 통한 무기체계 내장형 소프트웨어 소스코드 품질확보에 관한 연구)

  • Kwon, Kyeong Yong;Joo, Joon Seok;Kim, Tae Sik;Oh, Jin Woo;Baek, Ji Hyun
    • Journal of KIISE
    • /
    • v.42 no.7
    • /
    • pp.860-867
    • /
    • 2015
  • In the defense field, weapon systems are increasing in importance, as well as the weight of the weapon system embedded software development as an advanced technology. As the development of a network-centric warfare has become important to secure the reliability and quality of embedded software in modern weapons systems in battlefield situations. Also, embedded software problems are transferred to the production stage in the development phase and the problem gives rise to an enormous loss at the national level. Furthermore, development companies have not systematically constructed a software reliability test. This study suggests that approaches about a qualityverification- system establishment of embedded software, based on a variety of source code reliability test verification case analysis.

A Method to Verify the Reachability of Real-Time Systems using Abstract Timed Machines (추상 시간 기계를 이용한 실시간 시스템의 도달성에 대한 검증 방법)

  • Park, Ji-Yeon;Lee, Mun-Geun
    • Journal of KIISE:Software and Applications
    • /
    • v.28 no.3
    • /
    • pp.224-238
    • /
    • 2001
  • 본 논문은 ATM(Abstract Timed Machine)으로 명세된 실시간 시스템을 검증하기 위한 방법을 기술한다. ATM은 임무 위급 시스템인 실시간 시스템을 명세, 분석, 검증하기 위한 정형기법이다. ATM은 모드와 전이, 포트로 구성되어 있으며 모드는 머신의 압축된 상태를 표현한다. 전이는 하나의 모드에서 다른 모드로의 전환을 나타내며 조건과 이벤트로 구성되어 있다. 포트는 ATM간의 상호작용을 위한 진입을 표현한다. 다른 정형기법과 비교하여 ATM은 소프트웨어의 순환공학 과정에서 사용하기 위해 설계되었다. 역공학 측면에서 볼 때 ATM은 계산 논리뿐만 아니라 실시간 시스템의 실제 소스코드에 있는 설계나 환경정보를 표현할 수 있다. 이러한 목적을 위해 ATM의 모드는 계산모드, 추상화 모드, 주제모드로 구분된다. 계산 모드는 코드 상에서의 논리와 계산을 나타내며 추상화 모드는 모드와 전이의 블록을 하나의 ATM으로써 표현한다. 대개의 경우, 이것은 코드 상에서의 블록을 ATM내 하나의 모드로 나타낼 때 사용한다. 주제 모드는 예외나 주기적 동작 등과 같은 다수의 ATM의 주제를 표현한다. 실시간 시스템을 검증하기 위해 시스템의 소스 코드는 역명세 과정을 통하여 ATM으로 표현된다. 검증은 ATM에 대한 도달성 그래프를 생성하는 것에 의해 수행된다. 도달성 그래프는 상태와 시간을 추상화되고 압축된 형태로 표현할 수 있으며 그 결과 시간 속성을 지닌 상태 공간을 감소시킬 수 있다. 또한 시스템의 교착상태를 쉽게 발견할 수 있다. 본 논문은 ATM과 실행 모델, 도달성 그래프, 검증을 위한 속성 등을 기술하며 이들을 다른 정형 방법들과 예제를 통하여 비교한다.수 있다. 모피우스는 헤더나 광고와 같은 불필요한 정보들을 제거하는 별도의 단계를 거치지 않으므로 wrapper를 빠르게 생성한다. 궁극적으로 모피우스는 새로운 웹 상점을 사용자가 자유롭게 추가, 삭제할 수 있는 환경을 제공한다.X>와 반응시킬 경우에는 반응식 c에 의거 진행됨을 예측할 수 있었다.의거 진행됨을 예측할 수 있었다.이 거의 산화되지 않았고, $700^{\circ}C$에서도 ZnS와 ZnO 상이 공존한 것으로 보아 SnO$_2$코팅이 ZnS의 산화를 억제하는 것으로 나타났다.pplied not only to the strike system in the RSC circle, but also to the logistics system in the SLC circle. Thus, the RSLC model can maximize combat synergy effects by integrating the RSC and the SLC. With a similar logic, this paper develops "A Revised System of Systems with Logistics (RSSL)" which combines "A New system of Systems" and logistics. These tow models proposed here help explain several issues such as logistics environment in future warfare, MOE(Measure of Effectiveness( on logistics performance, and COA(Course of Actions)

  • PDF

Signal Processing Algorithm to Reduce RWR Electro-Magnetic Interference with Tail Rotor Blade of Helicopter

  • Im, Hyo-Bin;Go, Eun-Kyoung;Jeong, Un-Seob;Lyu, Si-Chan
    • International Journal of Aeronautical and Space Sciences
    • /
    • v.10 no.2
    • /
    • pp.117-124
    • /
    • 2009
  • In the environment where various and complicated threat signals exist, RWR (Radar Warning Receiver), which can warn pilot of the existence of threats, has long been a necessary electronic warfare (EW) system to improve survivability of aircraft. The angle of arrival (AOA) information, the most reliable sorting parameter in the RWR, is measured by means of four-quadrant amplitude comparison direction finding (DF) technique. Each of four antennas (usually spiral antenna) of DF unit covers one of four quadrant zones, with 90 degrees apart with nearby antenna. According to the location of antenna installed in helicopter, RWR is subject to signal loss and interference by helicopter body and structures including tail bumper, rotor blade, and so on, causing a difficulty of detecting hostile emitters. In this paper, the performance degradation caused by signal interference by tail rotor blades has been estimated by measuring amplitude video signals into which RWR converts RF signals in case a part of antenna is screened by real tail rotor blade in anechoic chamber. The results show that corruption of pulse amplitude (PA) is main cause of DF error. We have proposed two algorithms for resolving the interference by tail rotor blades as below: First, expand the AOA group range for pulse grouping at the first signal analysis phase. Second, merge each of pulse trains with the other, that signal parameter except PRI and AOA is similar, after the first signal analysis phase. The presented method makes it possible to use RWR by reducing interference caused by blade screening in case antenna is screened by tail rotor blades.