• Title/Summary/Keyword: Defense Model

Search Result 1,790, Processing Time 0.031 seconds

SOCMTD: Selecting Optimal Countermeasure for Moving Target Defense Using Dynamic Game

  • Hu, Hao;Liu, Jing;Tan, Jinglei;Liu, Jiang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.10
    • /
    • pp.4157-4175
    • /
    • 2020
  • Moving target defense, as a 'game-changing' security technique for network warfare, realizes proactive defense by increasing network dynamics, uncertainty and redundancy. How to select the best countermeasure from the candidate countermeasures to maximize defense payoff becomes one of the core issues. In order to improve the dynamic analysis for existing decision-making, a novel approach of selecting the optimal countermeasure using game theory is proposed. Based on the signal game theory, a multi-stage adversary model for dynamic defense is established. Afterwards, the payoffs of candidate attack-defense strategies are quantified from the viewpoint of attack surface transfer. Then the perfect Bayesian equilibrium is calculated. The inference of attacker type is presented through signal reception and recognition. Finally the countermeasure for selecting optimal defense strategy is designed on the tradeoff between defense cost and benefit for dynamic network. A case study of attack-defense confrontation in small-scale LAN shows that the proposed approach is correct and efficient.

Test and Evaluation Procedures of Defense AI System linked to the ROK Defense Acquisition System (국방획득체계와 연계한 국방 인공지능(AI) 체계 시험평가 방안)

  • Yong-Bok Lee;Min-Woo Choi;Min-ho Lee
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.46 no.4
    • /
    • pp.229-237
    • /
    • 2023
  • In this research, a new Test and Evaluation (T&E) procedure for defense AI systems is proposed to fill the existing gap in established methodologies. This proposed concept incorporates a data-based performance evaluation, allowing for independent assessment of AI model efficacy. It then follows with an on-site T&E using the actual AI system. The performance evaluation approach adopts the project promotion framework from the defense acquisition system, outlining 10 steps for R&D projects and 9 steps for procurement projects. This procedure was crafted after examining AI system testing standards and guidelines from both domestic and international civilian sectors. The validity of each step in the procedure was confirmed using real-world data. This study's findings aim to offer insightful guidance in defense T&E, particularly in developing robust T&E procedures for defense AI systems.

Modeling and Simulation of A Small Hydraulic Actuation System for the Tactical Missile (전술유도무기용 소형 유압식 구동장치의 모델링 및 시뮬레이션)

  • Lee, Doyun;Lee, Hosung;An, Sungyong;Park, Yeonjung
    • Journal of the Korean Society for Aeronautical & Space Sciences
    • /
    • v.45 no.4
    • /
    • pp.349-357
    • /
    • 2017
  • If an actuation system of the tactical missile is required very fast response time on conditions of short operating time and big loads on the actuator, we would prefer to adopt a small hydraulic system. In this paper, a mathematical model is proposed to analyze and simulate the small hydraulic actuation system. The mathematical model consists of a high pressure vessel model, a pressure regulator model, a hydraulic reservoir model and a actuator model. The suggested model is validated by comparison of simulation results with experimental data. The simulation results show that the mathematical model could be useful for designing a hydraulic actuation system.

Bidirectional LSTM based light-weighted malware detection model using Windows PE format binary data (윈도우 PE 포맷 바이너리 데이터를 활용한 Bidirectional LSTM 기반 경량 악성코드 탐지모델)

  • PARK, Kwang-Yun;LEE, Soo-Jin
    • Journal of Internet Computing and Services
    • /
    • v.23 no.1
    • /
    • pp.87-93
    • /
    • 2022
  • Since 99% of PCs operating in the defense domain use the Windows operating system, detection and response of Window-based malware is very important to keep the defense cyberspace safe. This paper proposes a model capable of detecting malware in a Windows PE (Portable Executable) format. The detection model was designed with an emphasis on rapid update of the training model to efficiently cope with rapidly increasing malware rather than the detection accuracy. Therefore, in order to improve the training speed, the detection model was designed based on a Bidirectional LSTM (Long Short Term Memory) network that can detect malware with minimal sequence data without complicated pre-processing. The experiment was conducted using the EMBER2018 dataset, As a result of training the model with feature sets consisting of three type of sequence data(Byte-Entropy Histogram, Byte Histogram, and String Distribution), accuracy of 90.79% was achieved. Meanwhile, it was confirmed that the training time was shortened to 1/4 compared to the existing detection model, enabling rapid update of the detection model to respond to new types of malware on the surge.

Optimal Allocation Model for Ballistic Missile Defense System by Simulated Annealing Algorithm (탄도미사일 방어무기체계 배치모형 연구)

  • Lee, Sang-Heon
    • Proceedings of the Korean Operations and Management Science Society Conference
    • /
    • 2005.05a
    • /
    • pp.1020-1025
    • /
    • 2005
  • The set covering(SC) problem has many practical application of modeling not only real world problems in civilian but also in military. In this paper we study optimal allocation model for maximizing utility of consolidating old fashioned and new air defense weapon system like Patriot missile and develop the new computational algorithm for the SC problem by using simulated annealing(SA) algorithm. This study examines three different methods: 1) simulated annealing(SA); 2) accelerated simulated annealing(ASA); and 3) selection by effectiveness degree(SED) with SA. The SED is adopted as an enhanced SA algorithm that the neighboring solutions could be generated only in possible optimal feasible region at the PERTURB function. Furthermore, we perform various experiments for both a reduced and an extended scale sized situations depending on the number of customers(protective objective), service(air defense), facilities(air defense artillery), threat, candidate locations, and azimuth angles of Patriot missile. Our experiment shows that the SED obtains the best results than others.

  • PDF

Impact of KAAV's Essential Assemblies and Maintenance Float Inventory Levels on Operational Availability (시뮬레이션에 기반한 KAAV 주요 수리부속과 정비대체장비 재고수준이 운용가용도에 미치는 영향 연구)

  • Jeon, Hongjoo;Ma, Jungmok
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.21 no.4
    • /
    • pp.520-528
    • /
    • 2018
  • This paper studies the optimal inventory levels of Korea Assault Amphibious Vehicle(KAAV)'s assemblies in order to assure the required operational availability. The simulation model is built and implemented for the impact of the inventory levels on operational availability. Using regression analysis and integer programming, the optimal inventory levels of essential assemblies are suggested and analyzed. Finally, sensitivity analysis is conducted with recycling maintenance delay time.

Assignment Model of Attack Aircraft for Multi-Target Area (다수표적지역에 대한 공격 항공기 할당모형)

  • No Sang-Gi;Ha Seok-Tae
    • Journal of the military operations research society of Korea
    • /
    • v.17 no.1
    • /
    • pp.159-176
    • /
    • 1991
  • The probability of target survival is the most important factor in the target assignment, Most of the studies about it have assumed the case of one target and ane weapon type. Therefore, they can not be applied to the real situation. In this paper. the quantity and type of enemy assets of the friendly force are considered simultaneously. Considered defense type is the coordinated defense with no impact point prediction. The objective function is to minimize the expected total survival value of targets which are scattered in the defense area. The rules of aircraft assignment are as follows : first, classify targets into several groups, each of those has the same desired damage level secondly. select the critical group which has the least survival value in accordance with the additional aircraft assignment, and finally. assign the same number of attack assets against each target in the critical group. In this paper, the attack assets, the escort assets, and the defense assets are considered. The model is useful to not only the simple aircraft assignment problem but also the complicated wargame models.

  • PDF

Design of stepwise foam claddings subjected to air-blast based on Voronoi model

  • Liang, Minzu;Lu, Fangyun;Zhang, Guodong;Li, Xiangyu
    • Steel and Composite Structures
    • /
    • v.23 no.1
    • /
    • pp.107-114
    • /
    • 2017
  • Design of stepwise foam claddings subjected to air-blast is performed based on random Voronoialgorithm. FE models are constructed using the random Voronoialgorithm, and numerical analysis is carried out to simulate deformation mode and energy absorption of the cladding by the ABAQUS/Explicit software. The FE model is validated by test result, and good agreement is achieved. The deformation patterns are presented to give an insight into the influences of distribution on deformation mechanisms. The energy absorbed by the stepwise foam cladding is examined, and the parameter effects, including layer number, gradient, and blast loading, are discussed. Results indicate that the energy absorption capacity increases with the number of layer, gradient degree, and blast pressure increasing.

The Impact of P-3 Essential Assemblies on Operational Availability (해상초계기 주요 수리부속 재고수준이 운용가용도에 미치는 영향 연구)

  • Park, Jihoon;Ma, Jungmok
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.22 no.3
    • /
    • pp.416-424
    • /
    • 2019
  • This paper studies the optimal inventory levels of P-3 assemblies in order to assure the required operational availability. A simulation model is developed for identifying the impact of the inventory levels on operational availability. Based on the result of the simulation model, multiple regression analysis is performed. Finally, the optimal inventory levels of critical P-3 assemblies are determined with integer programming. Additionally, sensitivity analysis of depot maintenance period is also conducted for its impact on the operational availability.

Synthetic Image Generation for Military Vehicle Detection (군용물체탐지 연구를 위한 가상 이미지 데이터 생성)

  • Se-Yoon Oh;Hunmin Yang
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.26 no.5
    • /
    • pp.392-399
    • /
    • 2023
  • This research paper investigates the effectiveness of using computer graphics(CG) based synthetic data for deep learning in military vehicle detection. In particular, we explore the use of synthetic image generation techniques to train deep neural networks for object detection tasks. Our approach involves the generation of a large dataset of synthetic images of military vehicles, which is then used to train a deep learning model. The resulting model is then evaluated on real-world images to measure its effectiveness. Our experimental results show that synthetic training data alone can achieve effective results in object detection. Our findings demonstrate the potential of CG-based synthetic data for deep learning and suggest its value as a tool for training models in a variety of applications, including military vehicle detection.