• Title/Summary/Keyword: 방어작전

Search Result 41, Processing Time 0.022 seconds

Development of the Data Communication based Future Air Base Defence Operation Model (데이터통신 기반 차세대 기지방어작전 모델 개발)

  • Pyo, Sang-Ho;Kim, Ki-Hyung;Lee, Tae-Gong
    • Journal of Information Technology and Architecture
    • /
    • v.11 no.2
    • /
    • pp.157-173
    • /
    • 2014
  • As Air Base Defence, Anti-Aircraft Defence and Nuclear-Biological-Chemical Protection model considered as ground operation models in Republic of Korea Air Force are designed as the voice-centered system between participant nodes, there is a problem communicating accurately. In recent years, the military is developing a command and control capability using data communication technology to solve the problem. Therefore, this paper proposes new model to maximize efficiency of performance improvement through the Data Communication-based Future Air Base Defence Model. We refer to a research paper that is related existing and developed new model. and then we really experimented under WiBro Network that is constructed to Air Base for maintenance control. Based on the analysis and the test result of new Air Base Defence Model, we have concluded that the performance improvement effect is reached.

Research on Cyber Kill Chain Models for Offensive Cyber Operations (공세적 사이버 작전을 위한 사이버 킬체인 모델 연구)

  • Seong Bae Jo;Wan Ju Kim;Jae Sung Lim
    • Convergence Security Journal
    • /
    • v.23 no.4
    • /
    • pp.71-80
    • /
    • 2023
  • Cyberspace has emerged as the fifth domain of warfare, alongside land, sea, air, and space. It has become a crucial focus for offensive and defensive military operations. Governments worldwide have demonstrated their intent to engage in offensive cyber operations within this domain. This paper proposes an innovative offensive cyber kill chain model that integrates the existing defensive strategy, the cyber kill chain model, with the joint air tasking order (ATO) mission execution cycle and joint target processing procedure. By combining physical and cyber operations within a joint framework, this model aims to enhance national cyber operations capabilities at a strategic level. The integration of these elements seeks to address the evolving challenges in cyberspace and contribute to more effective jointness in conducting cyber operations.

A Study on the Concept of Social Engineering Cyber Kill Chain for Social Engineering based Cyber Operations (사회공학 사이버작전을 고려한 사회공학 사이버킬체인 개념정립 연구)

  • Shin, Kyuyong;Kim, Kyoung Min;Lee, Jongkwan
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.5
    • /
    • pp.1247-1258
    • /
    • 2018
  • The Cyber Kill Chain originally proposed by Lockheed Martin defines the standard procedure of general cyber attacks and suggests tailored defensive actions per each step, eventually neutralizing the intent of the attackers. Defenders can effectively deal with Advanced Persistent Threat(APT)s which are difficult to be handled by other defensive mechanisms under the Cyber Kill Chain. Recently, however, social engineering techniques that exploits the vulnerabilities of humans who manage the target systems are prevail rather than the technical attacks directly attacking the target systems themselves. Under the circumstance, the Cyber Kill Chain model should evolve to encompass social engineering attacks for the improved effectiveness. Therefore, this paper aims to establish a definite concept of Cyber Kill Chain for social engineering based cyber attacks, called Social Engineering Cyber Kill Chain, helping future researchers in this literature.

Survival Analysis of Battalion-Level Commanders(leaders) Using Big Data as Results of Brigade-Level KCTC Training - Focused on Infantry Battalion Defensive Operations - (여단급 KCTC 훈련 결과 빅데이터를 활용한 대대급 이하 지휘관(자)의 생존분석 - 보병대대 방어작전을 중심으로 -)

  • Jinseong Yun;Hoseok Moon
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.27 no.1
    • /
    • pp.94-106
    • /
    • 2024
  • In this study, we conducted a survival analysis on battalion-level commanders(leaders), focusing on infantry battalion defensive operations using the big data of brigade-level KCTC(Korea Combat Training Center) training results. Unlike previous studies, we utilized the brigade-level KCTC training results data for the first time to conduct a survival analysis, and the research subjects were battalion-level commanders(leaders), which can affect the battle. At this time, the battle results were defined, and through cluster analysis, infantry battalions were divided into excellent, average, and insufficient units, and the difference in the survival rate of the commanders was analyzed through the Kaplan-Meier survival analysis. This provided an opportunity to objectively compare the differences between excellent and insufficient units. Subsequently, factors affecting the survival of commanders were derived using the Cox proportional hazard model, and it was possible to confirm the influencing factors from various angles by also using the survival tree model. Significance and limitations confirmed in the research process were presented as policy suggestions and future research directions.

A Study on the Operation Concept of Cyber Warfare Execution Procedures (사이버전 수행절차 운영개념에 관한 연구)

  • Kim, Sung-Joong;Yoo, JiHoon;Oh, HaengRok;Shin, Dongil;Shin, DongKyoo
    • Journal of Internet Computing and Services
    • /
    • v.21 no.2
    • /
    • pp.73-80
    • /
    • 2020
  • Due to the expansion of cyber space, war patterns are also changing from traditional warfare to cyber warfare. Cyber warfare is the use of computer technology to disrupt the activities of nations and organizations, especially in the defense sector. However, the defense against effective cyber threat environment is inadequate. To complement this, a new cyber warfare operation concept is needed. In this paper, we study the concepts of cyber intelligence surveillance reconnaissance, active defense and response, combat damage assessment, and command control in order to carry out cyber operations effectively. In addition, this paper proposes the concept of cyber warfare operation that can achieve a continuous strategic advantage in cyber battlefield.

Implementation and Evaluation of the Wibro-based Location Identification System for Air Base Protection Force (Wibro 기반 비행기지 방어전력 위치식별체계 구축 및 실험)

  • Pyo, Sang-Ho;Koo, Jung;Ko, Young-Bae;Kim, Ki-Hyung
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.15 no.3
    • /
    • pp.306-314
    • /
    • 2012
  • This paper proposes a new system to maximize efficiency of Air Base Protection Operations through the development of location identification software. The Wibro-based location identification system for Air Base Protection Force offers Blue Ground Force digitalized character message which is not exposed to enemy. Also, it is possible to automatically provide the location of Blue Ground Force to Air Base Ground Operations Center. The test result proves that this system is very helpful when Air Base Protection Force executes Air Base Protection Operations.

Russia's Naval Revival (러시아 해군의 부활)

  • Weitz, Richard
    • Strategy21
    • /
    • s.36
    • /
    • pp.241-265
    • /
    • 2015
  • 최근 몇 년 동안 나타난 러시아 해군의 부활(resurgence)은 우크라이나 사태로 본 러시아 군사력 증강을 대표하는 상징이다. 전통적으로 러시아 해양전략(Sea power)은 러시아 경제 및 안보 목표를 달성하는데 있어 핵심이었다. 러시아 해군은 주로 전략적 억제, 연안방어, 해상교통로 보호, 해외전개 그리고 군사력 투사 등의 임무를 수행한다. 특히 최근 들어 러시아 해군력이 양적 질적으로 증강되는 양상을 보이고 있으며, 이는 최근 잠수함, 수상함 그리고 해군항공 전력이 크게 증강되고 있는 현상에서 증명되고 있다. 이는 불과 몇 년 전까지 러시아 해군력에 대한 정비 및 작전 운용에 있어 많은 문제점을 보이던 부정적 사례와 현격히 다른 모습이다. 특히 푸틴 정부에 들어서 러시아 해군은 양적이며 질적인 증강뿐만이 아닌, 세계 해양에서의 원해 해군작전을 비록 지금은 간헐적이기는 하지만 활발히 실시하고 있으며, 러시아 주변국 해군과의 다양한 해군협력도 추진하고 있다. 궁극적으로 러시아 해군은 단기적으로 연안방어를 기본 임무로 수행할 것이나, 장기적으로는 과거 구소련 해군력 위상과 영향력을 부활시키기 위해 세계 무대에서의 군사적 영향력을 증진시키는 대양해군(Blue Water Navy)을 지향할 것이다.

네트워크 중심전에서의 정보보장

  • Kim Gwan-Ho
    • Review of KIISC
    • /
    • v.16 no.2
    • /
    • pp.13-17
    • /
    • 2006
  • 정보화의 선진국인 미국은 정보전 시대에서는 인적자원의 능력에 따라 전쟁의 승패가 좌우됨으로 교육을 통해 관련 개념을 통일시키고, 통일된 개념 하에 소요되는 인력을 분야별로 육성 및 관리하여 수행해야 할 작전 범위와 영역에 적합하게 조직화를 시키고, 수행절차를 각종 규정을 통해 강력하게 추진하고 있는데 우리도 이와 같은 선진국의 사례를 분석하여 단순히 소프트웨어나 하드웨어, 기술적인 도구를 확보하면 정보보호가 가능하다는 생각에서 벗어나 개념정립으로부터, 방어전략의 수립, 규정과 지침작성, 필요한 인적자원의 확보 및 관리, 작전수행 방법의 정립, 필요한 기술의 확보 등 체계적인 준비가 필요할 것으로 판단이 된다.

Analysis of the factors of the failure of the North Korean Army's Great Bypass Maneuver to Honam during the Korea War from an indirect approach strategy: Focusing on the Naval and Marine Corps' Tongyeong Amphibious Operation to Stop the "Dislocation" (간접접근전략으로 본 6·25전쟁기 북한군의 호남 방면 대우회기동 실패 요인 분석 -'교란'을 저지한 해군·해병대의 통영상륙작전을 중심으로-)

  • Choi, Ho-jae
    • Maritime Security
    • /
    • v.6 no.1
    • /
    • pp.109-135
    • /
    • 2023
  • The North Korean military's maneuver toward Honam was the fastest maneuver the North Korean army had demonstrated during the Korean War, and it was a threatening attack that forced the Korean and Allied forces to fully adjust the defenses of the Nakdong River. However, when this study analyzed the North Korean military's maneuver toward Honam in terms of indirect approach strategy, there were a number of factors that inevitably led to its failure. In terms of implementing the indirect approach strategy, the North Korean military cited a number of failure factors, including the dispersion of combat forces, the inflexibility of changing the line of operation, the maneuvering of ground forces, and the lack of psychological distaction. However, the North Koreans were preparing for a final "surprise attack," in which the 7th Division, which was following the North Korean 6th Division, took another diversion and attempted to attack in the direction of Tongyeong. With this, the North Koreans intended to break through the Nakdong River defenses and head for Pusan. However, the North Korean attack was ultimately thwarted by the Korean Navy and Marine Corps' Tongyeong Amphibious Operation. With a swift maneuver using the sea as a maneuvering space, the Navy and Marine Corps occupied key points first, creating an advantageous situation and fending off an attack by the North Korean 7th Division. The Navy and Marine Corps' Tongyeong Amphibious Operation finally thwarted the North Korean military's maneuver toward Honam, thus maintaining the Nakdong River defenses.

  • PDF

A study on Deep Operations Effect Analysis for Realization of Simultaneous Offense-Defence Integrated Operations (공방동시통합작전 구현을 위한 종심작전 효과분석 연구)

  • Cho, Jung Keun;Yoo, Byung Joo;Han, Do Heon
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.22 no.6
    • /
    • pp.116-126
    • /
    • 2021
  • Ground Component Command (GCC) has been developing operational planning and execution systems to implement "Decisive Integrated Operations", which is the concept of ground operations execution, and achieved remarkable results. In particular, "Simultaneous Offense-Defense Integrated Operations" is developed mainly to neutralize enemies in deep areas and develop favorable conditions for the allies early by simultaneously attacking and defending from the beginning of the war. On the other hand, it is limited to providing scientific and reasonable support for the commander's decision-making process because analyzing the effects of the deep operation with existing M&S systems is impossible. This study developed a model for analyzing the effects of deep operations that can be used in the KJCCS. Previous research was conducted on the effects of surveillance, physical strike, and non-physical strike, which are components of deep operations to find the characteristics and limitations and suggest a research direction. A methodology for analyzing the effects of deep operations reflecting the interactions of components using data was then developed by the GCC, and input data for each field was calculated through combat experiments and a literature review. Finally, the Deep operations Effect CAlculating Model(DECAM) was developed and distributed to the GCC and Corps battle staff during the ROK-US Combined Exercise. Through this study, the effectiveness of the methodology and the developed model were confirmed and contribute to the development of the GCC and Corps' abilities to perform deep operations.