• Title/Summary/Keyword: Command and control (C2)

Search Result 85, Processing Time 0.034 seconds

The Synergic Effects of Combat Power on the Netted Battlefield (전장네트워크를 통한 전투력 상승효과)

  • 권용수;황인혁
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.4 no.2
    • /
    • pp.233-242
    • /
    • 2001
  • This paper is a analytical study on the synergic effects of combat power in the netted battlefield. In this work, the relation between the netted battlefield and the uncertainty are described by the command and control system. It is shown that the netted battlefield may reduce the uncertainty in battlefield and increase the combat power

  • PDF

A Development of the Operational Architecture of a Low Altitude Air Defense Automation System (저고도 방공자동화체계의 운용아키덱처 개발)

  • Son, Hyun-Sik;Kwon, Yong-Soo
    • Journal of the military operations research society of Korea
    • /
    • v.34 no.1
    • /
    • pp.31-45
    • /
    • 2008
  • This paper describes a development of the operational architecture of a low altitude air defense automation system using a systems engineering approach. The future battlefield is changing to new system of systems that command and control by the network based BM/C4I. Also, it is composed of various sensors and shooters in an single theater. Future threats may be characterized as unmanned mewing bodies that the strategic effect is great such as UAVs, cruise missiles or tactical ballistic missiles. New threats such as low altitude stealth cruise missiles may also appear. The implementation of a low altitude air defense against these future threats is required to complex and integrated approach based on systems engineering. In this view, this work established an operational scenario and derived operational requirements by identifying mission and future operational environments. It is presented the operational architecture of the low altitude air defense automation system by using the CORE 5.0.

정보 융합체계 현황 분석 (2)

  • Jo, Dong-Rae;Choe, Jeung-Won;Ju, Jae-U
    • Defense and Technology
    • /
    • no.1 s.275
    • /
    • pp.58-67
    • /
    • 2002
  • 미래 전쟁에 대비하기 위하여, 미국은 합동참모본부의 Joint Vision 2020에서 정보에서의 우월성을 기초로 압도적인 기동, 정확한 공격, 집중된 군수지원, 전면적인 방어를 이룩하여 전체적인 우위전력 확보를 도모하며, 정보에서의 우월성 확 보 를 위 해 $C^4ISR$(Command, Control, Communication and Computer, Intelligence, Surveillance, Reconnaissance) 개념에 의한 통합체계의 구축을 목표로 제시하고 있다.

  • PDF

Vacuum Gauge Control System Using MSCC for PLS (MSCC를 이용한 가속기 진공장치 감시 시스템 개발)

  • Yoon, J.C.;Lee, T.Y.;Hang, J.Y.;Nam, S.Y.
    • Proceedings of the KIEE Conference
    • /
    • 2001.07d
    • /
    • pp.2169-2171
    • /
    • 2001
  • The vacuum gauge control system has been designed and implemented using multi-serial communication controllers (MSCC) for the 2.5 Gev storage ring at the Pohang Accelerator Laboratory (PAL). There are 20 Balzers vacuum gauges and 17 Granville-Phillips vacuum gauges at the storage ring. A MSCC have two RS485 (max speed 460.8Kbps) field network port, 8 channel serial communication ports (max speed 460.8Kbps) connected to gauge controller for serial communication control. 12 MSCCs are connected to a personal computer (PC) through the RS485 field network. The PC can automatically control the MSCCs by sending set of commands through the network. The commands specify the duration of the MODBUS protocol. Upon receiving a command from a PC running under Windows2000 through the network, the MSCC communicate through the serial output ports to gauge controller. In this paper, we describe control structure and scheme of the vacuum gauge control system.

  • PDF

A Combat Effectiveness Evaluation Algorithm Considering Technical and Human Factors in C4I System (NCW 환경에서 C4I 체계 전투력 상승효과 평가 알고리즘 : 기술 및 인적 요소 고려)

  • Jung, Whan-Sik;Park, Gun-Woo;Lee, Jae-Yeong;Lee, Sang-Hoon
    • Journal of Intelligence and Information Systems
    • /
    • v.16 no.2
    • /
    • pp.55-72
    • /
    • 2010
  • Recently, the battlefield environment has changed from platform-centric warfare(PCW) which focuses on maneuvering forces into network-centric warfare(NCW) which is based on the connectivity of each asset through the warfare information system as information technology increases. In particular, C4I(Command, Control, Communication, Computer and Intelligence) system can be an important factor in achieving NCW. It is generally used to provide direction across distributed forces and status feedback from thoseforces. It can provide the important information, more quickly and in the correct format to the friendly units. And it can achieve the information superiority through SA(Situational Awareness). Most of the advanced countries have been developed and already applied these systems in military operations. Therefore, ROK forces also have been developing C4I systems such as KJCCS(Korea Joint Command Control System). And, ours are increasing the budgets in the establishment of warfare information systems. However, it is difficult to evaluate the C4I effectiveness properly by deficiency of methods. We need to develop a new combat effectiveness evaluation method that is suitable for NCW. Existing evaluation methods lay disproportionate emphasis on technical factors with leaving something to be desired in human factors. Therefore, it is necessary to consider technical and human factors to evaluate combat effectiveness. In this study, we proposed a new Combat Effectiveness evaluation algorithm called E-TechMan(A Combat Effectiveness Evaluation Algorithm Considering Technical and Human Factors in C4I System). This algorithm uses the rule of Newton's second law($F=(m{\Delta}{\upsilon})/{\Delta}t{\Rightarrow}\frac{V{\upsilon}I}{T}{\times}C$). Five factors considered in combat effectiveness evaluation are network power(M), movement velocity(v), information accuracy(I), command and control time(T) and collaboration level(C). Previous researches did not consider the value of the node and arc in evaluating the network power after the C4I system has been established. In addition, collaboration level which could be a major factor in combat effectiveness was not considered. E-TechMan algorithm is applied to JFOS-K(Joint Fire Operating System-Korea) system that can connect KJCCS of Korea armed forces with JADOCS(Joint Automated Deep Operations Coordination System) of U.S. armed forces and achieve sensor to shooter system in real time in JCS(Joint Chiefs of Staff) level. We compared the result of evaluation of Combat Effectiveness by E-TechMan with those by other algorithms(e.g., C2 Theory, Newton's second Law). We can evaluate combat effectiveness more effectively and substantially by E-TechMan algorithm. This study is meaningful because we improved the description level of reality in calculation of combat effectiveness in C4I system. Part 2 will describe the changes of war paradigm and the previous combat effectiveness evaluation methods such as C2 theory while Part 3 will explain E-TechMan algorithm specifically. Part 4 will present the application to JFOS-K and analyze the result with other algorithms. Part 5 is the conclusions provided in the final part.

Construction of an Audio Steganography Botnet Based on Telegram Messenger (텔레그램 메신저 기반의 오디오 스테가노그래피 봇넷 구축)

  • Jeon, Jin;Cho, Youngho
    • Journal of Internet Computing and Services
    • /
    • v.23 no.5
    • /
    • pp.127-134
    • /
    • 2022
  • Steganography is a hidden technique in which secret messages are hidden in various multimedia files, and it is widely exploited for cyber crime and attacks because it is very difficult for third parties other than senders and receivers to identify the presence of hidden information in communication messages. Botnet typically consists of botmasters, bots, and C&C (Command & Control) servers, and is a botmasters-controlled network with various structures such as centralized, distributed (P2P), and hybrid. Recently, in order to enhance the concealment of botnets, research on Stego Botnet, which uses SNS platforms instead of C&C servers and performs C&C communication by applying steganography techniques, has been actively conducted, but image or video media-oriented stego botnet techniques have been studied. On the other hand, audio files such as various sound sources and recording files are also actively shared on SNS, so research on stego botnet based on audio steganography is needed. Therefore, in this study, we present the results of comparative analysis on hidden capacity by file type and tool through experiments, using a stego botnet that performs C&C hidden communication using audio files as a cover medium in Telegram Messenger.

Development of TPF Generation SIW for KOMPSAT-2 X-Band Antenna Motion Control

  • Kang C. H.;Park D. J.;Seo S. B.;Koo I. H.;Ahn S. I.;Kim E. K.
    • Proceedings of the KSRS Conference
    • /
    • 2005.10a
    • /
    • pp.485-488
    • /
    • 2005
  • The 2nd KOrea Multi-Purpose Satellite (KOMPSAT -2) has been developed by Korea Aerospace Research Institute (KARI) since 2000. Multi Spectral Camera (MSC) is the payload for KOMPSAT -2, which will provide the observation imagery around Korean peninsula with high resolution. KOMPSAT-2 has adopted X-band Tracking System (XTS) for transmitting earth observation data to ground station. For this, data which describes and controls the pre-defined motion of each on-board X-Band antenna in XTS, must be transmitted to the spacecraft as S-Band command and it is called as Tracking Parameter Files (TPF). In this paper, the result of the development of TPF Generation S/W for KOMPSAT-2 X-Band Antenna Motion Control.

  • PDF

An Assessment of Combat Effectiveness for C4I System Considering Network Effect (네트워크 효과를 고려한 C4I 체계 전투력 상승효과 평가)

  • Jung, Whan-Sik;Lee, Jae-Yeong;Kim, Yong-Heup
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.33 no.2
    • /
    • pp.23-32
    • /
    • 2010
  • In this paper, we proposed the modified method of Metcalfe's law that is "Modfied law" in evaluating the network power for the measurement of combat effectiveness in C4I system. It is applied to JFOS-K (Joint Fire Operating System-Korea) C4I system that can connect KJCCS (Korea Joint Command and Control System) of Korea armed forces with JADOCS (Joint Automated Deep Operations Coordination System) of U.S. armed forces and achieve sensor to shooter system in real time in JCS (Joint Chiefs of Staff) level. The result of combat effectiveness using Modified law is compared to the one by C2 theory and found that both is similar. This study is meaningful because we improved the description level of reality in calculation of combat effectiveness in C4I system.

Detection of systems infected with C&C Zeus through technique of Windows API hooking (Windows API 후킹 기법을 통한 C&C Zeus에 감염된 시스템의 탐지)

  • Park, Chul-Woo;Son, Ji-Woong;Hwang, Hyun-Ki;Kim, Ki-Chang
    • Asia-pacific Journal of Multimedia Services Convergent with Art, Humanities, and Sociology
    • /
    • v.5 no.2
    • /
    • pp.297-304
    • /
    • 2015
  • Zeus is one of the will-published malwares. Generally, it infects PC by executing a specific binary file downloaded on the internet. When infected, try to hook a particular Windows API of the currently running processes. If process runs hooked API, this API executes a particular code of Zeus and your private information is leaked. This paper describes techniques to detect and hook Windows API. We believe the technique should be able to detect modern P2P Zeus.

Study on Outbound Traffic Monitoring with Bloom Filter (블룸필터를 이용한 아웃바운드 트래픽 모니터링 방안 연구)

  • Kang, Seong-Jung;Kim, Hyoung-Joong
    • Journal of Digital Contents Society
    • /
    • v.19 no.2
    • /
    • pp.327-334
    • /
    • 2018
  • When a PC is infected with a malicious code, it communicates with the control and command (C&C) server and, by the attacker's instructions, spreads to the internal network and acquires information. The company focuses on preventing attacks from the outside in advance, but malicious codes aiming at APT attacks are infiltrated into the inside somehow. In order to prevent the spread of the damage, it is necessary to perform internal monitoring to detect a PC that is infected with malicious code and attempts to communicate with the C&C server. In this paper, a destination IP monitoring method is proposed in this paper using Bloom filter to quickly and effectively check whether the destination IP of many packets is in the blacklist.