• Title/Summary/Keyword: 방어목표

Search Result 123, Processing Time 0.028 seconds

A Study on the Optimal Allcation of Aircrafts to Defensive Counter Air by Goal Programming (목표계획법을 이용한 방어제공 임부의 항공기 최적할당에 관한 연구)

  • 김선하;강성진
    • Journal of the military operations research society of Korea
    • /
    • v.28 no.2
    • /
    • pp.20-33
    • /
    • 2002
  • This paper deals with assigning defensive counter air aircraft to the moving target in the air. Recently various kinds of allocation problems have been researched for fixed targets using offensive aircrafts. However, the counter air allocation problems for attacking aircrafts with considering the time and the threat have not been studied much. The main objective of this study is to mininize the time to intercept and the threat values simultaneously by using goal programming. The optimal solution by using an integer goal programming and a branch and bound algorithm is found and analyzed. By applying this model to real situation, we expect to reduce the time and number of sorties for destroying enemy aircraft, respectively.

An APT Malicious Traffic Detection Method with Considering of Trust Model (신뢰모형을 고려한 APT 악성 트래픽 탐지 기법)

  • Yun, Kyung-mi;Cho, Gi-hwan
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2014.10a
    • /
    • pp.937-939
    • /
    • 2014
  • Recently, an intelligent APT(Advanced Persistent Threat) attack which aims to a special target is getting to be greatly increased. It is very hard to protect with existing intrusion detection methods because of the difficulties to protect the initial intrusion of malicious code. In this paper, we analyze out-bound traffics to prevent call-back step after malicious code intrusion, and propose an APT malicious traffic detection method with considering of trust. The proposed method is expected to provide a basement to improve the detection rate in comparing with that of existing detection methods.

  • PDF

Improving the Robustness of Deepfake Detection Models Against Adversarial Attacks (적대적 공격에 따른 딥페이크 탐지 모델 강화)

  • Lee, Sangyeong;Hou, Jong-Uk
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2022.11a
    • /
    • pp.724-726
    • /
    • 2022
  • 딥페이크(deepfake)로 인한 디지털 범죄는 날로 교묘해지면서 사회적으로 큰 파장을 불러일으키고 있다. 이때, 딥러닝 기반 모델의 오류를 발생시키는 적대적 공격(adversarial attack)의 등장으로 딥페이크를 탐지하는 모델의 취약성이 증가하고 있고, 이는 매우 치명적인 결과를 초래한다. 본 연구에서는 2 가지 방법을 통해 적대적 공격에도 영향을 받지 않는 강인한(robust) 모델을 구축하는 것을 목표로 한다. 모델 강화 기법인 적대적 학습(adversarial training)과 영상처리 기반 방어 기법인 크기 변환(resizing), JPEG 압축을 통해 적대적 공격에 대한 강인성을 입증한다.

Analysis of Memory Allocator Call sites Used Only Within The Stack Using SVF (SVF를 활용한 스택 내에서만 사용되는 메모리 할당자 호출 지점 분석)

  • Seon Ha;Chanyoung Park;Yeongjun Kwak;Hyungon Moon
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2024.05a
    • /
    • pp.248-250
    • /
    • 2024
  • 해제 후 재사용 (Use-After-Free, UAF)는 오랜 시간 동안 소프트웨어 보안에서 중요한 문제로 인식되어 왔다. 이 문제를 해결하기 위해 다양한 완화 방법과 방어 연구가 활발히 진행되고 있다. 이러한 연구들은 대부분 기존 벤치마크 성능과 비교했을 때 낮은 성능을 보인다. 이는 메타 데이터와 코드 계측 정보가 증가하여 포인터를 많이 사용하는 벤치마크의 메모리 사용량이 증가하기 때문이다. 이 연구는 SVF를 활용하여 스택에서만 메모리 할당자 호출 지점을 분석한다. 추후 이 분석 정보를 여러 UAF 연구에 적용하여 런타임 오버헤드를 줄이는 것을 목표로 한다.

A Study on Fire Protection in Nuclear Power Plants and Application of the Code and Standards for Fire Protection Systems (원자력발전소 화재방호와 소방시설 기술기준 적용에 대한 고찰)

  • Kim, Wee-Kyong;Jeong, Kee-Sin
    • Fire Science and Engineering
    • /
    • v.26 no.6
    • /
    • pp.38-44
    • /
    • 2012
  • The purpose of fire protection for the nuclear power plants (NPPs) is to ensure safe shutdown state of the reactor, to minimize the release of radioactive materials to the environment, to provide physical safety of the on-site personnel, and to limit the property damage. Fire protection and extinguishing equipments are one of the important protection measures based on the defense-in-depth concept, which can promptly detect and control and extinguish those fires that do occur, thereby limiting fire damage. However, a separate evaluation process might be additionally necessary for the construction permit and operating license because the fire protection laws of the NEMA for installation standards of the fire protection systems is not fully characterized for the NPPs. It is also not easy to implement the regulations such as the performance based design concept for fire protection system of the NPPs which are characterized for a relatively low density of employee. This study suggests a guideline for the improvement of the technical standards for fire protection systems of the NPPs by evaluating the fundamental problems drawn by reviewing laws and regulatory guides relevant to fire protection and by evaluating the applicability of the KEPIC FPN in domestic nuclear power plants.

Design and Simulation of Policy Based Integrated Server System Capable to Provide Real-time Internet Security Service (실시간 인터넷 보안 서비스 제공을 위한 정책기반 통합 서버 설계 및 시뮬레이션)

  • Kim, Gi-Yeong;An, Gae-Il;Jang, Jong-Su;Lee, Sang-Ho
    • The KIPS Transactions:PartC
    • /
    • v.8C no.5
    • /
    • pp.565-572
    • /
    • 2001
  • Recently, due to the open architecture of the internet and wide spread of internet users, the cyber terror threatens to the network\`s weak point are tending grow. Until now, information security solutions are passive on security host and particular security system. This passive information security solution is weak from the attacks through the networks connected worldwide internet systems, and has limitation on the defense against cyber terror attacks. Therefore, network level integrated security function must be provided. In this paper, we consider technology limitations on the information security problems and its environment. Then we present the architecture and functions of policy-based information security services for network level active information security function. This paper also includes design of target system, which provide information security services. Finally, we discuss network level system deployment direction and discuss with Network Security Simulation.

  • PDF

Distributed Task Assignment Algorithm for SEAD Mission of Heterogeneous UAVs Based on CBBA Algorithm (CBBA 기반 SEAD 임무를 위한 이종무인기의 분산형 임무할당 알고리듬 연구)

  • Lee, Chang-Hun;Moon, Gun-Hee;Yoo, Dong-Wan;Tahk, Min-Jea;Lee, In-Seok
    • Journal of the Korean Society for Aeronautical & Space Sciences
    • /
    • v.40 no.11
    • /
    • pp.988-996
    • /
    • 2012
  • This paper presents a distributed task assignment algorithm for the suppression of enemy air defense (SEAD) mission of heterogeneous UAVs, based on the consensus-based bundle algorithm (CBBA). SEAD mission can be modeled as a task assignment problem of multiple UAVs performing multiple air defense targets, and UAVs performing SEAD mission consist of the weasel for destruction of enemy's air defense system and the striker for the battle damage assessment (BDA) or other tasks. In this paper, a distributed task assignment algorithm considering path-planning in presence of terrain obstacle is developed for heterogeneous UAVs, and then it is applied to SEAD mission. Through numerical simulations the performance and the applicability of the proposed method are tested.

The Effectiveness of the Short-term Intensive Intervention Program: Case Report (감각통합기능장애 아동에게 적용한 단기집중치료프로그램의 효과)

  • Choi, Hyun-Ae;Kang, Eun-A
    • The Journal of Korean Academy of Sensory Integration
    • /
    • v.6 no.1
    • /
    • pp.25-33
    • /
    • 2008
  • Objective : To identify the effectiveness of a short-term intensive intervention program on the improvement of adaptive response of a child with mixed sensory integration disorder. Method : Four and half years old boy who has been diagnosed of PDD received 40 min of one intervention session and 50 min of 3 intervention sessions. The intervention was a part of the 2008 Sensory Integration Treatment Course developed by the Korean Academy of Sensory Integration (KASI) and all sessions were implemented under supervision by experts. Result : Adaptive responses of the child were enhanced throughout the intervention process in terms of postural response and peer interaction. His oral defensiveness is improved. As the intervention progressed, he exhibited more active movements, louder voice, and coherence within peer group. Conclusion : This case report demonstrates effectiveness of a short-term intensive intervention program in terms of improving adaptive response. To enrich the effectiveness, tt is suggested to educate parents about neurological base of the child's behaviors so the they understand the importance of various sensory experience within play.

  • PDF

종계의 생산성 향상을 위한 질병.위생 관리

  • 송창선
    • Proceedings of the Korea Society of Poultry Science Conference
    • /
    • 2003.05a
    • /
    • pp.73-82
    • /
    • 2003
  • 본 연구에서는 국내 종계의 생산성 저하요인들을 평가·분석하였으며, 국내사육 종계의 실질적인 생산성을 극대화 시킬 수 있는 방안을 제시하고자 시험을 수행하여 다음과 같은 결론을 얻었다. 1. 혈청검색에 의한 품종별 종게군 질병 모니터링을 실시 한 결과, SE, MS 등 2종의 난계대성 세균성 질병과 REV, APV, CAV, ORT, REO 등 5종의 만성소모성 질병을 유발하는 질병이 종계군의 산란기에 감염되어 이들이 단독 또는 중복감염되어 나타나는 피해가 예상되었으며, 이들의 감염을 효과적으로 예방 할 수 있는 백신의 개발 및 도입의 필요성이 대두되었다. 2. 집중관리 모니터링 대상농장에 대한 ND, IB, IBD 등 3종의 생독백신에 대한 접종효능을 평가해 본 결과 산란종계, 육용종계를 막론하고 전반적으로 니플급수기를 이용한 음수접종법 적용시 5주령 이하 계군에 2내지 3회의 음수접종을 실시하였음에도 불구하고 항체가 거의 형성되지 못하거나 매우 불균일한 면역반응이 나타나는 것으로 조사되어 국내 야외농장에 대한 분무접종 유도 등 기존의 백신접종법에 대한 시급한 개선대책 마련이 요구되었다. 3. 육성기 및 산란기 종계 질병·위생관리 프로그램 확립을 위하여 ND, IB, IBD에 대한 개선된 백신접종 프로그램을 모델계군에 적용한 후, 주령별로 생독백신 접종효능을 조사한 결과 백신접종 후 ND, IB, IBD에 대한 평균 항체가와 항체의 균일도 (%CV)가 표준 목표치 이상 상승하여 개선의 효과를 볼 수 있었다. 4. 산란기 종계 질병·위생관리 프로그램 확립을 위하여 실시된 변이형 IB에 대한 방어능 시험결과 정기적인 Mass type IB 생독백신의 분무접종은 국내 유행 호흡기형 IBV 유전형 VI에 대한 방어효과는 다소 떨어지는 것으로 조사되어 국내분리주를 이용한 IB 생독백신의 개발이 요구되었다. 5. 종계장 살모넬라 및 마이코플라즈마 조기 검출을 위하여 실시한 종계장 살모넬라 및 마이코플라즈마 환경 모니터링 실시 결과 기존의 평판응집반응이나 ELISA에 의한 혈청검색법에 비하여 검출효율이 매우 높은 것으로 조사되어 향후 국내 종게군에 대한 살모넬라 및 마이코플라즈마 조기검출과 방제연구에 큰 도움이 될 것으로 사료되었다.

  • PDF

A Study of Administration of Cyber Range (사이버 레인지 운용 방안 연구)

  • Kim, Daesik;Kim, Yonghyun
    • Journal of Internet Computing and Services
    • /
    • v.18 no.5
    • /
    • pp.9-15
    • /
    • 2017
  • In the whole world the Attack Technologies of cyber warfare in modern society are growing faster and complicated. The frequency of the new attacks is shorter than before day by day. The defense technologies and experts against these attacks are very few. One of answers to solve these problems is the cyber range as a test-bed to prepare the cyber warfare considered by many countries. This paper examines the foreign cases and similar systems, collects and analyzes various attributes for cyber range. Finally it refines them through system engineering processes. In these processes missions and concepts for administration are set with architecture framework. The logical architecture is designed. Based on designed architecture two goals, defense technologies and procurement of experts, are established. And it shows effective and persistent administration of cyber range.