• Title/Summary/Keyword: 국방 소프트웨어

Search Result 253, Processing Time 0.019 seconds

A Technology on the Framework Design of Virtual based on the Synthetic Environment Test for Analyzing Effectiveness of the Weapon Systems of Underwater Engagement Model (수중대잠전 교전모델의 무기체계 효과도 분석을 위한 합성환경기반 가상시험 프레임워크 설계 기술)

  • Hong, Jung-Wan;Park, Yong-Min;Park, Sang-C.;Kwon, Yong-Jin(James)
    • Journal of the Korea Society for Simulation
    • /
    • v.19 no.4
    • /
    • pp.291-299
    • /
    • 2010
  • As recent advances in science, technology and performance requirements of the weapons system are getting highly diversified and complex, the performance requirements also get stringent and strict. Moreover, the weapons system should be intimately connected with other systems such as watchdog system, command and control system, C4I system, etc. However, a tremendous amount of time, cost and risk being spent to acquire new weapons system, and not being diminished compared to the rapid pace of its development speed. Defense Modeling and Simulation(M&S) comes into the spotlight as an alternative to overcoming these difficulties as well as constraints. In this paper, we propose the development process of virtual test framework based on the synthetic environment as a tool to analyze the effectiveness of the weapons system of underwater engagement model. To prove the proposed concept, we develop the test-bed of virtual test using Delta3D simulation engine, which is open source S/W. We also design the High Level Architecture and Real-time Infrastructure(HLA/RTI) based Federation for the interoperation with heterogeneous simulators. The significance of the study entails (1)the rapid and easy development of simulation tools that are customized for the Korean Theater of War; (2)the federation of environmental entities and the moving equations of the combat entities to manifest a realistic simulation.

A Study on Constructing a RMF Optimized for Korean National Defense for Weapon System Development (무기체계 개발을 위한 한국형 국방 RMF 구축 방안 연구)

  • Jung keun Ahn;Kwangsoo Cho;Han-jin Jeong;Ji-hun Jeong;Seung-joo Kim
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.33 no.5
    • /
    • pp.827-846
    • /
    • 2023
  • Recently, various information technologies such as network communication and sensors have begun to be integrated into weapon systems that were previously operated in stand-alone. This helps the operators of the weapon system to make quick and accurate decisions, thereby allowing for effective operation of the weapon system. However, as the involvement of the cyber domain in weapon systems increases, it is expected that the potential for damage from cyber attacks will also increase. To develop a secure weapon system, it is necessary to implement built-in security, which helps considering security from the requirement stage of the software development process. The U.S. Department of Defense is implementing the Risk Management Framework Assessment and Authorization (RMF A&A) process, along with the introduction of the concept of cybersecurity, for the evaluation and acquisition of weapon systems. Similarly, South Korea is also continuously making efforts to implement the Korea Risk Management Framework (K-RMF). However, so far, there are no cases where K-RMF has been applied from the development stage, and most of the data and documents related to the U.S. RMF A&A are not disclosed for confidentiality reasons. In this study, we propose the method for inferring the composition of the K-RMF based on systematic threat analysis method and the publicly released documents and data related to RMF. Furthermore, we demonstrate the effectiveness of our inferring method by applying it to the naval battleship system.

Enhanced Security Measurement of Web Application Testing by Outsourcing (외주 개발 웹 어플리케이션 테스팅의 보안성 강화 방안)

  • Choi, Kyong-Ho;Lee, DongHwi
    • Convergence Security Journal
    • /
    • v.15 no.4
    • /
    • pp.3-9
    • /
    • 2015
  • A web application that allows a web service created by a internal developer who has security awareness show certain level of security. However, in the case of development by outsourcing, it is inevitable to implement the development centered on requested function rather than the issue of security. Thus in this paper, we improve the software testing process focusing on security for exclusion the leakage of important information and using an unauthorized service that results from the use of the vulnerable web application. The proposed model is able to consider security in the initial stage of development even when outsourced web application, especially, It can prevent the development schedule delay caused by the occurrence of modification for program created by programer who has low security awareness. This result shows that this model can be applied to the national defense area for increasing demand web application centered resource management system to be able to prevent service of web application with security vulnerability based on high test.

Development of the System Controller for the Airborne Small SAR (KOMSAR) (항공기탑재 소형 영상레이더 (KOMSAR) 시스템 제어기 개발)

  • Hwang, Yong-Chul;Lee, Cheol-Hoon
    • Journal of the Korean Society for Aeronautical & Space Sciences
    • /
    • v.33 no.3
    • /
    • pp.86-92
    • /
    • 2005
  • Synthetic Aperture Radar is an active sensor utilizing the microwaves in order to get the requested high resolution imageries day or night regardless of the weather conditions. In this paper, the architecture of a real-time system controller for the airborne small SAR system, KOrea Miniature SAR which was developed by Agency for Defense Development is proposed considering the embedded real-time environment. The main purpose of the system controller is to control the internal and the rest of subsystem within SAR system in real-time. The main characteristics of the proposed system controller were implemented using the real-time operating system and the distributed hardware architecture for the small, low weight and real-time operation. The system controller performance and real-time operation were verified and confirmed by the demo flight with the KT-1 airplane.

The Development of the Automatic Linkage Establishment System for the Long Range Communication (장거리 통신을 위한 주파수 자동탐색 시스템 개발)

  • No, Sangwan;Lee, Soonyoung;Kim, Minsoo
    • Journal of Aerospace System Engineering
    • /
    • v.13 no.5
    • /
    • pp.87-93
    • /
    • 2019
  • This study suggests the development of the ALE (Automatic Link Establishment) system for the long-range communication with a helicopter at the lands or marines by HF (High Frequency) radios. In the condition of LOS or more than 35 NM, the communication success rate is significantly lowered when the frequency is manually selected because of the reduced transmission power and various strong RF environment noise signals. In this paper, we make an effort to overcome the difficulties of choosing the optimal frequency when the operating frequency selection is manually operated in long-distance communication or LOS uncertain environment. The ALE system is designed based on the frequency analysis propagation software and is verified that the communication success rate is increased by applying the proposed system. The ALE system was applied to the helicopter system and the ground/flight test was conducted. As a result, the superiority and efficiency of the proposed system were verified.

A Proposal for Software Framework of Intelligent Drones Performing Autonomous Missions (지능형 드론의 자율 임무 수행을 위한 소프트웨어 프레임워크 제안)

  • Shin, Ju-chul;Kim, Seong-woo;Baek, Gyong-hoon;Seo, Min-gi
    • Journal of Advanced Navigation Technology
    • /
    • v.26 no.4
    • /
    • pp.205-210
    • /
    • 2022
  • Drones, which have rapidly grown along with the 4th industrial revolution, spread over industries and also widely used for military purposes. In recent wars in Europe, drones are being evaluated as a game changer on the battlefield, and their importance for military use is being highlighted. The Republic of Korea Army also planned drone-bot systems including various drones suitable for echelons and missions of the military as future defense forces. The keyword of these drone-bot systems is autonomy by artificial intelligence. In addition, common use of operating platforms is required for the rapid development of various types of drones. In this paper, we propose software framework that applies diverse artificial intelligence technologies such as multi-agent system, cognitive architecture and knowledge-based context reasoning for mission autonomy and common use of military drones.

A Study on Threat Detection Model using Cyber Strongholds (사이버 거점을 활용한 위협탐지모델 연구)

  • Inhwan Kim;Jiwon Kang;Hoonsang An;Byungkook Jeon
    • Convergence Security Journal
    • /
    • v.22 no.1
    • /
    • pp.19-27
    • /
    • 2022
  • With the innovative development of ICT technology, hacking techniques of hackers are also evolving into sophisticated and intelligent hacking techniques. Threat detection research to counter these cyber threats was mainly conducted in a passive way through hacking damage investigation and analysis, but recently, the importance of cyber threat information collection and analysis is increasing. A bot-type automation program is a rather active method of extracting malicious code by visiting a website to collect threat information or detect threats. However, this method also has a limitation in that it cannot prevent hacking damage because it is a method to identify hacking damage because malicious code has already been distributed or after being hacked. Therefore, to overcome these limitations, we propose a model that detects actual threats by acquiring and analyzing threat information while identifying and managing cyber bases. This model is an active and proactive method of collecting threat information or detecting threats outside the boundary such as a firewall. We designed a model for detecting threats using cyber strongholds and validated them in the defense environment.

통계 데이타베이스의 보호에 관한 조사 연구

  • Kim, Chul
    • Review of KIISC
    • /
    • v.4 no.1
    • /
    • pp.44-52
    • /
    • 1994
  • 정보화 사회에서는 가계, 기업, 정보 등의 정보 활동의 주체들이 가진 정보자산은 데이타 베이스(이하DB)와 소프트웨어(S/W)로 대변할 수 있으며, 이중 DB는 정보화 사회의 기반시설의 하나라고 볼 수 있다. 특별히 통계DB는 각 주체들에게는 필수적인 정보를 갖고 있다. 금융자산의 정보, 국방에 관련된 병력, 장비, 군수물자등의 정보, 회계정보 뿐 아니라 인구센서스, 경제계획수립 등등의 다양한 분야에 이 통계 DB는 사용되고 있다. 이러한 통계DB는 기존의DB에서의 데이타의 저장, 관리, 추출 기능외에 통계적인 데이타의 분석기능이 요구되고 있다. 통계 처리를 위한 데이타베이스관리 시스템(DBMS, database management system)은 주로 기존의 DBMS 에 통계처리를 위한 기능을 추가하거나 통계를 위한 DB를 따로 구축하는 방법을 사용하고 있다. 따라서 일반적인 DB 보호 기술과 더불어 통계 의 환경을 이해하는 보호 기술이 요구되고 있다. 일반적으로 DB 를 보호하는 방법으로는 물리적인 보안(physical security)과 운영체계 보안(operating system security) 이 있으며, 이들과 함께 데이타 암호화(data encryption)의 방법을 사용하고 있다. DB 의 보안 방법에 관한 연구 중 George I. Davida 등에 의한 방법은 중국인의 나머지 정리(chinese remainder thorem)를 사용하는 암호화 알고리즘을 이용하여 레코드(record) 단위의 암호화를 하며, Khamis A. Omar등에 의한 방법은 읽기, 쓰기, 갱신의 3단계의 사용자 등급을 부여하여 DB 접근의 제약을 가하는 기능을 갖고 있다. 본고에서는 특히 그 중요성이 더해가고 있는 통계 의 일반적인 개념을 살펴보며, 특성 지향형 질의 모델(characteristic-specified query model)의 보호기술을 살펴본다. 특별히 본고는 통계 DB의 보호에 대한 일반적인 조사 연구로서 잘 알려진 사실들을 많은 참고 문헌과 더불어 소개하는 내용으로 통계 DB의 보호에 관한 새로운 연구 결과는 아니다.

  • PDF

A Study on Vulnerability Analysis Techniques for Secure Weapon System Software (안전한 무기체계 소프트웨어를 위한 취약점 분석 기법에 관한 연구)

  • Kim, Jong-Bok;Jo, In-June
    • The Journal of the Korea Contents Association
    • /
    • v.18 no.8
    • /
    • pp.459-468
    • /
    • 2018
  • Cyberattacks on information systems used by applications related to weapon system and organizations associated with national defense put national security at risk. To reduce these threats, continuous efforts such as applying secure coding from the development stage or managing detected vulnerabilities systematically are being made. It also analyzes and detects vulnerabilities by using various analysis tools, eliminates at the development stage, and removes from developed applications. However, vulnerability analysis tools cause problems such as undetected, false positives, and overdetected, making accurate vulnerability detection difficult. In this paper, we propose a new vulnerability detection method to solve these problems, which can assess the risk of certain applications and create and manage secured application with this data.

An Information-Fusion based Intelligent Disaster Information System Framework (정보융합기반 지능형 재난방재시스템 프레임워크)

  • Chon, Ki-Cheon;Choi, Young-Yeol;Park, Choong-Shik
    • 한국IT서비스학회:학술대회논문집
    • /
    • 2008.11a
    • /
    • pp.486-489
    • /
    • 2008
  • 재난방재시스템은 재난에 대하여 예방, 대비, 대응, 복구 단계별 활동을 지원하기 위한 정보시스템이다. 재난방재시스템은 여러 형태의 재난에 대하여 여러 수준의 다양한 정보자원을 이용해야 하고 여러 임무를 맡고 있는 다양한 인적자원과 다양한 물적 자원을 활용하여 준비하고 빠르게 대응해야 한다. 기존의 재난방재시스템은 통합적인 상황분석이 부족하고, 지역재난상황에 따라 표준행동에 의한 자동적 실시간 임무부여와 실시간 보고의 처리, 재난관리자의 경험적 지식을 활용될 수 있는 정보시스템화는 미흡한 실정이다. 본 연구에서는 주로 국방, 경찰, 보안 분야에 적용되어온 정보융합(Information fusion)기술과 비즈니스 룰(BRMS)의 규칙기반 지능형 기술을 활용하여 여러 수준의 다양한 정보를 종합 분석하여 통합적인 상황정보를 제공하고, 표준행동 요령과 지역 재난관리자의 지식을 활용하여 인적자원과 물적 자원에 대한 대응계획을 제시하여 대응조치를 선택할 수 있도록 하며, 현장 상황에 따른 실시간 임무 부여와 상황 보고를 처리할 수 있는 정보융합기반 지능형 재난방재 프레임워크를 제안한다. 본 연구의 프레임워크는 지역단위 재난방재에 적용을 고려하고 있으며 오픈소스 소프트웨어를 같이 활용하는 프로토타입 구현을 계획하고 있다.

  • PDF