• Title/Summary/Keyword: AT Command

Search Result 566, Processing Time 0.026 seconds

Intelligent Intrusion Detection and Prevention System using Smart Multi-instance Multi-label Learning Protocol for Tactical Mobile Adhoc Networks

  • Roopa, M.;Raja, S. Selvakumar
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.6
    • /
    • pp.2895-2921
    • /
    • 2018
  • Security has become one of the major concerns in mobile adhoc networks (MANETs). Data and voice communication amongst roaming battlefield entities (such as platoon of soldiers, inter-battlefield tanks and military aircrafts) served by MANETs throw several challenges. It requires complex securing strategy to address threats such as unauthorized network access, man in the middle attacks, denial of service etc., to provide highly reliable communication amongst the nodes. Intrusion Detection and Prevention System (IDPS) undoubtedly is a crucial ingredient to address these threats. IDPS in MANET is managed by Command Control Communication and Intelligence (C3I) system. It consists of networked computers in the tactical battle area that facilitates comprehensive situation awareness by the commanders for timely and optimum decision-making. Key issue in such IDPS mechanism is lack of Smart Learning Engine. We propose a novel behavioral based "Smart Multi-Instance Multi-Label Intrusion Detection and Prevention System (MIML-IDPS)" that follows a distributed and centralized architecture to support a Robust C3I System. This protocol is deployed in a virtually clustered non-uniform network topology with dynamic election of several virtual head nodes acting as a client Intrusion Detection agent connected to a centralized server IDPS located at Command and Control Center. Distributed virtual client nodes serve as the intelligent decision processing unit and centralized IDPS server act as a Smart MIML decision making unit. Simulation and experimental analysis shows the proposed protocol exhibits computational intelligence with counter attacks, efficient memory utilization, classification accuracy and decision convergence in securing C3I System in a Tactical Battlefield environment.

DGA-DNS Similarity Analysis and APT Attack Detection Using N-gram (N-gram을 활용한 DGA-DNS 유사도 분석 및 APT 공격 탐지)

  • Kim, Donghyeon;Kim, Kangseok
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.5
    • /
    • pp.1141-1151
    • /
    • 2018
  • In an APT attack, the communication stage between infected hosts and C&C(Command and Control) server is the key stage for intrusion into the attack target. Attackers can control multiple infected hosts by the C&C Server and direct intrusion and exploitation. If the C&C Server is exposed at this stage, the attack will fail. Therefore, in recent years, the Domain Generation Algorithm (DGA) has replaced DNS in C&C Server with a short time interval for making detection difficult. In particular, it is very difficult to verify and detect all the newly registered DNS more than 5 million times a day. To solve these problems, this paper proposes a model to judge DGA-DNS detection by the morphological similarity analysis of normal DNS and DGA-DNS, and to determine the sign of APT attack through it, then we verify its validity.

PowerShell-based Malware Detection Method Using Command Execution Monitoring and Deep Learning (명령 실행 모니터링과 딥 러닝을 이용한 파워셸 기반 악성코드 탐지 방법)

  • Lee, Seung-Hyeon;Moon, Jong-Sub
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.5
    • /
    • pp.1197-1207
    • /
    • 2018
  • PowerShell is command line shell and scripting language, built on the .NET framework, and it has several advantages as an attack tool, including built-in support for Windows, easy code concealment and persistence, and various pen-test frameworks. Accordingly, malwares using PowerShell are increasing rapidly, however, there is a limit to cope with the conventional malware detection technique. In this paper, we propose an improved monitoring method to observe commands executed in the PowerShell and a deep learning based malware classification model that extract features from commands using Convolutional Neural Network(CNN) and send them to Recurrent Neural Network(RNN) according to the order of execution. As a result of testing the proposed model with 5-fold cross validation using 1,916 PowerShell-based malwares collected at malware sharing site and 38,148 benign scripts disclosed by an obfuscation detection study, it shows that the model effectively detects malwares with about 97% True Positive Rate(TPR) and 1% False Positive Rate(FPR).

On a Suitable Frequency consideration of 700MHz Band for the disaster radiocommunication followed with DTV frequency reallocation (700MHz대역 DTV용전환에 따른 재난무선통신용 주파수 분배의 정책적 접근방안에 관한 연구)

  • Moon, Hun-Il;Yu, Seung-Duk;Hong, Wan-Pyo
    • Journal of Advanced Navigation Technology
    • /
    • v.13 no.1
    • /
    • pp.54-61
    • /
    • 2009
  • In this paper, Switching to digital TV broadcasting and mobile operators license expiration period of the frequency, time and 700MHz, 800MHz and 900MHz frequency band plan for the redistribution is actively being discussed. Redistribution policy direction of these frequency 800MHz (bandwidth 10MHz) integrated command frequency for wireless networks(i.e TETRA) is expected to be considered a redistribution. These Integrated Wireless Network Infrastructure configurations at the time and data communication capabilities of the system unwilling TETRA Release 2 standard for the system is presented. This system is analyzed that Release 1 of the existing system takes up more than 6 times the increase of frequency bands. Therefore, integration of the frequency band assigned to the command of a wireless network with the introduction of advanced systems will not be able to do. In this paper to the digital TV transition, and the policy based on analysis of trends in the 700MHz band for the integration of wireless networks, provides policy direction for the allocation plan.

  • PDF

Ways to apply the Strategic Communications to the ROK Navy (한국해군의 전략커뮤니케이션 (SC : Strategic Communication) 적용 방안)

  • Chung, Sam-Man
    • Strategy21
    • /
    • s.41
    • /
    • pp.294-332
    • /
    • 2017
  • The aim of this study is to find ways to apply the strategic communications to the Republic of Korea Navy. It may be a little bit late for the ROK Navy to accommodate the SC in these days because the adoption and implementation of the SC by the Combined Forces Command has already been begun. It was in 2007 when the SC was in place in the CFC. ROK's Ministry of National Defense and Joint Chiefs of Staff have also mulled over the SC and begun to apply it in part in the annual exercises such as Key Resolve command post drills and Foal Eagle field training exercise, etc. For the ROK Navy, in addition to those exercises, it is faced with further areas like North Korean maritime provocations and other maritime incidents where its version of SC is needed. As noted, the SC is not intended to deter or defend directly those provocations and incidents, but aims to create conditions favorable to the achievement of the navy's strategic objectives. The ROK Navy has to establish a SC planning center and implementing organizations within the Headquarters to be consistent with its above organizations such as MND, JCS, and CFC that have already applied the SC in part or in entirety. SC center and other related organizations need to be under the control of VCNO and the center needs to be located and administered by the policy division in N-5 at the HQs. The vision of the navy's SC is the winning without combats and the least damages in time of war. In other for the navy to reach the vision, the strategies to be executed are early establishment of SC implementing organizations, forming consensus over the need for the SC within the navy, strengthening core competencies to apply the SC, acquiring the SC experts and making doctrines on the SC. The SC, in addition, in the navy has to be planned and implemented in not only peace time and crisis time but also war time.

An Automatic Repeating Protocol in Cooperative Spectrum Sharing (협력적 스펙트럼 공유의 자동 반복 프로토콜)

  • Kong, Hyung-Yun
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.13 no.6
    • /
    • pp.101-108
    • /
    • 2013
  • In this paper, we propose a method in which the negative acknowledge (NACK) message is used as command for cooperation and spectrum sharing. This allows for an automatic request for cooperation and sharing when the direct link of the primary user is in outage, and also allows for saving the number of control messages in cooperation-spectrum sharing based paradigm. In the sharing phase, the selected relay shares a power fraction of $1-{\alpha}$ for secondary transmitted signal while the remaining of ${\alpha}$ is for primary retransmitted signal. In the case of no relay collected, primary transmitter uses NACK as a command to retransmit the signal with fully power fraction (${\alpha}=1$). Both systems are assumed to employ BPSK signals. In this scheme, we propose the joint optimal decoding in the secondary user. The frame error rate (FER) performance at both systems is then analyzed. The theoretical and simulation results validate the analysis and confirm the efficiency of the protocol.

A complete S-shape feed rate scheduling approach for NURBS interpolator

  • Du, Xu;Huang, Jie;Zhu, Li-Min
    • Journal of Computational Design and Engineering
    • /
    • v.2 no.4
    • /
    • pp.206-217
    • /
    • 2015
  • This paper presents a complete S-shape feed rate scheduling approach (CSFA) with confined jerk, acceleration and command feed rate for parametric tool path. For a Non-Uniform Rational B-Spline (NURBS) tool path, the critical points of the tool path where the radius of curvature reaches extreme values are found firstly. Then, the NURBS curve is split into several NURBS sub-curves or blocks by the critical points. A bidirectional scanning strategy with the limitations of chord error, normal/tangential acceleration/jerk and command feed rate is employed to make the feed rate at the junctions between different NURBS blocks continuous. To improve the efficiency of the feed rate scheduling, the NURBS block is classified into three types: short block, medium block and long block. The feed rate profile corresponding to each NURBS block is generated according to the start/end feed rates and the arc length of the block and the limitations of tangential acceleration/jerk. In addition, two compensation strategies are proposed to make the feed rate more continuous and the arc increment more precise. Once the feed rate profile is determined, a second-order Taylor's expansion interpolation method is applied to generate the position commands. Finally, experiments with two free-form NURBS curves are conducted to verify the applicability and accuracy of the proposed method.

The Direction for Development of Domestic Initial Response System for Chemical Terrorism (국내 화학테러 초기대응체제의 발전방향 (한·미 화학테러 초기대응체제 비교를 중심으로))

  • Eun, Chong-hwa
    • Journal of the Society of Disaster Information
    • /
    • v.5 no.2
    • /
    • pp.50-73
    • /
    • 2009
  • This paper is about the establishment of "Initial Response System." Initial response system is most important and should be treated urgently among all preparations for chemical terrorism. The objects of Initial response system are to protect civilians and the first responder who are exposed directly to chemical terrorism. Therefore, this paper suggests two main issues about Initial response system. One is to prepare immediate and exact information service system which assures the safety and survival of exposed people. The other is to build Scene Response System integrated with Command-Control Procedure for early finished situation. Compared to United States, overcoming the Chemical Terrorism requires to improve the contents of two categories: Counter Citizen Response part and Initial Scene Response part. For Counter citizen response part' s sake, the web-sites of Response leader agencies for searching information about chemical terrorism should be modified specifically. These web-sites have to be re-organized in detail. The existing Information service system which has been vaguely informed as "CBRNE Accident" needs to be divided as "CBRNE Accident" and "WMD terrorism." Further, each of them should be specialized in "Chemical', "Biological", and "Radiological" categories. There is a need to rearrange current Emergency Instruction for civilians against chemical terrorism in feasible way. At the same time, it should be applied consistently to all organizations through agreement between experts and related-organizations. For Initial Scene Response part's sake, "Initial scene response procedure (SOP)" and "Operational conception" should be produced through Simulated Exercises and workshops of all organizations related with initial response. These organizations have to cooperate with Ministry of Environment which is the main leader Agency as the center. Next, there is a need to develop a technology and Scene Response Equipments, and to standardize the response equipments which consider the capability of First Responders for chemical terrorism. Especially, improving capability of equipments is required to overcome the vulnerability of Scene Response Equipments.

  • PDF

A Development of The Remote Robot Control System with Virtual Reality Interface System (가상현실과 결합된 로봇제어 시스템의 구현방법)

  • 김우경;김훈표;현웅근
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2003.10a
    • /
    • pp.320-324
    • /
    • 2003
  • Recently, Virtual reality parts is applied in various fields of industry. In this paper we got under control motion of reality robot from interface manipulation in the virtual world. This paper created virtual robot using of 3D Graphic Tool. And we reappeared a similar image with reality robot put on texture the use of components of Direct 3D Graphic. Also a reality robot and a virtual robot is controlled by joystick. The developed robot consists of robot controller with vision system and host PC program. The robot and camera can move with 2 degree of freedom by independent remote controlling a user friendly designed joystick. An environment is recognized by the vision system and ultra sonic sensors. The visual mage and command data translated through 900MHz and 447MHz RF controller, respectively. If user send robot control command the use of simulator to control the reality robot, the transmitter/recever got under control until 500miter outdoor at the rate of 4800bps a second in Hlaf Duplex method via radio frequency module useing 447MHz frequency.

  • PDF

119 Reported the Ubiquitous System of Condition Evaluation Analysis and Measures to Improvement - Focused on the Perceptions of Fire Officials - (유비쿼터스 119시스템 실태분석과 개선방안 - 소방공무원의 인식을 중심으로 -)

  • Chae, Jin;Woo, Seong-Cheon
    • Fire Science and Engineering
    • /
    • v.24 no.2
    • /
    • pp.58-66
    • /
    • 2010
  • As the number of disaster-related damage has been continuously increased despite various effort of the government, it is essential that ubiquitous IT which is rapidly advancing in recent years be utilized to enhance the efficient, scientific and systematic disaster management system. Though the command control GPS system and the 119 report system were adopted in 2008 and have been in operation, the effectiveness of the systems are imperceptible. This study is aimed at suggesting an effective disaster management plan throughout precedent studies and empirical analysis of the ubiquitous 119 report system. According to the study, it is considered to apply UIT to expansive field for disaster management since it showed that applicability, suitability, readiness of information acquisition and interests in utilizing are highly recognized. The command control GPS system can be vastly effective if we secure swiftness of information delivery.