• Title/Summary/Keyword: Defense Security

Search Result 923, Processing Time 0.026 seconds

Effect of Hypersonic Missiles on Maritime Strategy: Focus on Securing and Exploiting Sea Control (극초음속 미사일이 해양전략에 미치는 영향: 해양통제의 확보와 행사를 중심으로)

  • Cho, Seongjin
    • Maritime Security
    • /
    • v.1 no.1
    • /
    • pp.241-271
    • /
    • 2020
  • The military technology currently receiving the most attention is the hypersonic missile. hypersonic is faster than the speed of sound or Mach 5+. The vast majority of the ballistic missiles that it inspired achieved hypersonic speeds as they fell from the sky. Rather than speed, today's renewed attention to hypersonic weapons owes to developments that enable controlled flight. These new systems have two sub-varieties: hypersonic glide vehicles and hypersonic cruise missiles. Hypersonic weapons could challenge detection and defense due to their speed, maneuverability, and low altitude of flight. The fundamental question of this study is: 'What effect will the hypersonic missile have on the maritime strategy?' It is quite prudent to analyze and predict the impact of technology in the development stage on strategy in advance. However, strategy is essential because it affect future force construction. hypersonic missiles act as a limiting factor in securing sea control. The high speed and powerful destructive power of the hypersonic missile are not only difficult to intercept, but it also causes massive ship damage at a single shot. As a result, it is analyzed that the Securing sea control will be as difficult as the capacity of sea denial will be improved geographically and qualitatively. In addition, the concept of Fortress Fleet, which was criticized for its passive strategy in the past, could be reborn in a modern era. There are maritime power projection/defence, SLOC attack/defence in exploiting sea control. The effects of hypersonic missiles on exploiting sea control could be seen as both limiting and opportunity factors.

  • PDF

Development Plan of R.O.K. Naval forces to prepare Tasks in the Arctic Ocean: Based on Operational Environment(SWOT) Analysis (한국 해군의 북극해 진출과 발전방안에 대한 고찰: 작전환경(SWOT) 분석을 중심으로)

  • Ji, Young
    • Maritime Security
    • /
    • v.1 no.1
    • /
    • pp.311-343
    • /
    • 2020
  • Because of the global warming, the Arctic Ocean is expected to be ice-free by the year 2035. When the Arctic Ocean will be opened, a number of national interests will become more salient as experiencing a shortened sailing distance and decreasing navigation expense, possibility of natural resources transport by sea from Arctic Circle, and indirect-profit making by building a herb port in Asia. To secure the national interests and support the free activities of people in this region, R.O.K government is trying to make advanced policies. In order to carry out the naval tasks in the Arctic Ocean, using the operational characteristics(mobility, flexibility, sustainability, presence of capabilities, projection) is necessary. To this end, ROK Navy should analyze the operational environment (O.E.) by its capability(weakness and strength), opportunity, and threat. R.O.K. Navy should make an effort over the following issues to implement the tasks in the Arctic Ocean: first, Navy needs to map out her own plan (Roadmap) under the direction of government policies and makes crews participate in the education·training programs in home and abroad for future polar experts. Third, to develop the forces and materials for the tasks in cold, far operations area, Navy should use domestic well-experienced shipbuilding skills and techniques of the fourth industrial revolution. Next, improving the combined operations capabilities and military trust with other countries in the Arctic region to cover the large area with lack of forces' number and to resolve the ports of call issues. Lastly, preparation in advance to execute a variety of missions against military and non-traditional threats such as epidemics, HA/DR, SOLAS, in the future operation area is required.

  • PDF

A Comparative Study of Machine Learning Algorithms Using LID-DS DataSet (LID-DS 데이터 세트를 사용한 기계학습 알고리즘 비교 연구)

  • Park, DaeKyeong;Ryu, KyungJoon;Shin, DongIl;Shin, DongKyoo;Park, JeongChan;Kim, JinGoog
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.10 no.3
    • /
    • pp.91-98
    • /
    • 2021
  • Today's information and communication technology is rapidly developing, the security of IT infrastructure is becoming more important, and at the same time, cyber attacks of various forms are becoming more advanced and sophisticated like intelligent persistent attacks (Advanced Persistent Threat). Early defense or prediction of increasingly sophisticated cyber attacks is extremely important, and in many cases, the analysis of network-based intrusion detection systems (NIDS) related data alone cannot prevent rapidly changing cyber attacks. Therefore, we are currently using data generated by intrusion detection systems to protect against cyber attacks described above through Host-based Intrusion Detection System (HIDS) data analysis. In this paper, we conducted a comparative study on machine learning algorithms using LID-DS (Leipzig Intrusion Detection-Data Set) host-based intrusion detection data including thread information, metadata, and buffer data missing from previously used data sets. The algorithms used were Decision Tree, Naive Bayes, MLP (Multi-Layer Perceptron), Logistic Regression, LSTM (Long Short-Term Memory model), and RNN (Recurrent Neural Network). Accuracy, accuracy, recall, F1-Score indicators and error rates were measured for evaluation. As a result, the LSTM algorithm had the highest accuracy.

Research on the Necessity of Building the Second Space Rocket Launching Sites for Breakthrough Development of R.O.K National Space Power (도약적 국가 우주력 발전을 선도할 제2 우주센터 구축 필요성 연구)

  • Park, Ki-tae
    • Journal of Space Technology and Applications
    • /
    • v.2 no.2
    • /
    • pp.146-168
    • /
    • 2022
  • Witnessing current military conflicts in South China Sea and Eastern Europe, most defense analysts evaluate one of the most serious security threat toward the US is coming from the superpower competitions with Russia and China. The main means for such super power hegemonic competitions is military power and space power is a key enabler to maximize the efficiency and effectiveness of military employment. Reflecting above circumstances, the space hegemonic competition between the Unites States and China is spreading into all aspects of national powers. Under such an environment, R.O.K needs to significantly develop national space power to preserve life and assets of people in space. On the other hand, the R.O.K has a lot of limitations in launching space assets into orbits by land-based space rockets due to its geographic locations. The limitation of rocket launching direction, the failure to secure a significant area enough to secure safety and the limitation to secure open area enough to build associated facilities are among them. On this paper, I will suggest the need to build the 2nd space rocket launching site after analyzing a lot of short-falls the current 'Naro' space center face, compared to those of advanced space powers around the world.

Detecting Adversarial Examples Using Edge-based Classification

  • Jaesung Shim;Kyuri Jo
    • Journal of the Korea Society of Computer and Information
    • /
    • v.28 no.10
    • /
    • pp.67-76
    • /
    • 2023
  • Although deep learning models are making innovative achievements in the field of computer vision, the problem of vulnerability to adversarial examples continues to be raised. Adversarial examples are attack methods that inject fine noise into images to induce misclassification, which can pose a serious threat to the application of deep learning models in the real world. In this paper, we propose a model that detects adversarial examples using differences in predictive values between edge-learned classification models and underlying classification models. The simple process of extracting the edges of the objects and reflecting them in learning can increase the robustness of the classification model, and economical and efficient detection is possible by detecting adversarial examples through differences in predictions between models. In our experiments, the general model showed accuracy of {49.9%, 29.84%, 18.46%, 4.95%, 3.36%} for adversarial examples (eps={0.02, 0.05, 0.1, 0.2, 0.3}), whereas the Canny edge model showed accuracy of {82.58%, 65.96%, 46.71%, 24.94%, 13.41%} and other edge models showed a similar level of accuracy also, indicating that the edge model was more robust against adversarial examples. In addition, adversarial example detection using differences in predictions between models revealed detection rates of {85.47%, 84.64%, 91.44%, 95.47%, and 87.61%} for each epsilon-specific adversarial example. It is expected that this study will contribute to improving the reliability of deep learning models in related research and application industries such as medical, autonomous driving, security, and national defense.

Changes in the Law Regulating Contraband of war under the Law of Neutrality and Implications for the Korean Peninsula (중립법상 전시금제품 제도의 변천과 한반도에서의 함의)

  • Park, Ji-hong
    • Maritime Security
    • /
    • v.8 no.1
    • /
    • pp.41-71
    • /
    • 2024
  • In international armed conflict, 'the contraband of war' under 'the law of neutrality' was developed to balance the interests of belligerents' belligerent rights and neutrals' economic interests and it began to change and evolve with the development of trade in the 19th century. The scope of material control expanded during the First and Second World Wars and continues to this day. In particular, a trend toward preventing the military use of 'conditional contraband' that could be used for both military and civilian purposes. In the process, the law regulating contraband of war expanded conceptually to become an 'international export control system' led by international organizations. Today, the contraband of war is still in effect, but there are no laws or guidelines related to the contraband of war in Korea in case of an emergency for the Korean Peninsula. Considering that it is an international practice to create and publicize a list of the contraband of war, it is necessary for Korea to prepare for it. Therefore, this paper examines the historical origins and development of the law regulating of war under the law of neutrality and examines the state practice of the contraband of war control over time. In doing so, this paper will examine the implications of the law regulating contraband of war for the Korean Peninsula through changing in the law regulating contraband of war and state practice.

  • PDF

Analyzing Research Trends in Blockchain Studies in South Korea Using Dynamic Topic Modeling and Network Analysis (다이나믹 토픽모델링 및 네트워크 분석 기법을 통한 블록체인 관련 국내 연구 동향 분석)

  • Kim, Donghun;Oh, Chanhee;Zhu, Yongjun
    • Journal of the Korean Society for information Management
    • /
    • v.38 no.3
    • /
    • pp.23-39
    • /
    • 2021
  • This study aims to explore research trends in Blockchain studies in South Korea using dynamic topic modeling and network analysis. To achieve this goal, we conducted the university & institute collaboration network analysis, the keyword co-occurrence network analysis, and times series topic analysis using dynamic topic modeling. Through the university & institute collaboration network analysis, we found major universities such as Soongsil University, Soonchunhyang University, Korea University, Korea Advanced Institute of Science and Technology (KAIST) and major institutes such as Ministry of National Defense, Korea Railroad Research Institute, Samil PricewaterhouseCoopers, Electronics and Telecommunications Research Institute that led collaborative research. Next, through the analysis of the keyword co-occurrence network, we found major research keywords including virtual assets (Cryptocurrency, Bitcoin, Ethereum, Virtual currency), blockchain technology (Distributed ledger, Distributed ledger technology), finance (Smart contract), and information security (Security, privacy, Personal information). Smart contracts showed the highest scores in all network centrality measures showing its importance in the field. Finally, through the time series topic analysis, we identified five major topics including blockchain technology, blockchain ecosystem, blockchain application 1 (trade, online voting, real estate), blockchain application 2 (food, tourism, distribution, media), and blockchain application 3 (economy, finance). Changes of topics were also investigated by exploring proportions of representative keywords for each topic. The study is the first of its kind to attempt to conduct university & institute collaboration networks analysis and dynamic topic modeling-based times series topic analysis for exploring research trends in Blockchain studies in South Korea. Our results can be used by government agencies, universities, and research institutes to develop effective strategies of promoting university & institutes collaboration and interdisciplinary research in the field.

A Study on the Governance of U.S. Global Positioning System (미국 글로벌위성항법시스템(GPS)의 거버넌스에 관한 연구 - 한국형위성항법시스템 거버넌스를 위한 제언 -)

  • Jung, Yung-Jin
    • The Korean Journal of Air & Space Law and Policy
    • /
    • v.35 no.3
    • /
    • pp.127-150
    • /
    • 2020
  • A Basic Plan for the Promotion of Space Development (hereinafter referred to as "basic plan"), which prescribes mid- and long-term policy objectives and basic direction-setting on space development every five years, is one of the matters to be deliberated by the National Space Committee. Confirmed February 2018 by the Committee, the 3rd Basic Plan has a unique matter, compared to the 2nd Basic Plan. It is to construct "Korean Positioning System(KPS)". Almost every country in the world including Korea has been relying on GPS. On the occasion of the shooting down of a Korean Air flight 007 by Soviet Russia, GPS Standard Positioning Service has been open to the world. Due to technical errors of GPS or conflict of interests between countries in international relations, however, the above Service can be interrupted at any time. Such cessation might bring extensive damage to the social, economic and security domains of every country. This is why some countries has been constructing an independent global or regional satellite navigation system: EU(Galileo), Russia(Glonass), India(NaVic), Japan(QZSS), and China(Beidou). So does South Korea. Once KPS is built, it is expected to make use of the system in various areas such as transportation, aviation, disaster, construction, defense, ocean, distribution, telecommunication, etc. For this, a pan-governmental governance is needed to be established. And this governance must be based on the law. Korea is richly experienced in developing and operating individually satellite itself, but it has little experience in the simultaneous development and operation of the satellites, ground, and users systems, such as KPS. Therefore we need to review overseas cases, in order to minimize trial and error. U.S. GPS is a classic example.

Data Mining Approaches for DDoS Attack Detection (분산 서비스거부 공격 탐지를 위한 데이터 마이닝 기법)

  • Kim, Mi-Hui;Na, Hyun-Jung;Chae, Ki-Joon;Bang, Hyo-Chan;Na, Jung-Chan
    • Journal of KIISE:Information Networking
    • /
    • v.32 no.3
    • /
    • pp.279-290
    • /
    • 2005
  • Recently, as the serious damage caused by DDoS attacks increases, the rapid detection and the proper response mechanisms are urgent. However, existing security mechanisms do not effectively defend against these attacks, or the defense capability of some mechanisms is only limited to specific DDoS attacks. In this paper, we propose a detection architecture against DDoS attack using data mining technology that can classify the latest types of DDoS attack, and can detect the modification of existing attacks as well as the novel attacks. This architecture consists of a Misuse Detection Module modeling to classify the existing attacks, and an Anomaly Detection Module modeling to detect the novel attacks. And it utilizes the off-line generated models in order to detect the DDoS attack using the real-time traffic. We gathered the NetFlow data generated at an access router of our network in order to model the real network traffic and test it. The NetFlow provides the useful flow-based statistical information without tremendous preprocessing. Also, we mounted the well-known DDoS attack tools to gather the attack traffic. And then, our experimental results show that our approach can provide the outstanding performance against existing attacks, and provide the possibility of detection against the novel attack.

Space Development and Law in Asia (아시아의 우주개발과 우주법)

  • Cho, Hong-Je
    • The Korean Journal of Air & Space Law and Policy
    • /
    • v.28 no.2
    • /
    • pp.349-384
    • /
    • 2013
  • The Sputnik 1 launching in 1957 made the world recognize the necessity of international regulations on space development and activities in outer space. The United Nations established COPUOS the very next year, and adopted the mandate to examine legal issues concerning the peaceful uses of outer space. At the time, the military sector of the U.S.A. and the Soviet Union were in charge of the space development and they were not welcomed to discuss the prohibition of the military uses of outer space at the legal section in the COPUOS. Although both countries had common interests in securing the freedom of military uses in outer space. As the social and economic benefits derived from space activities have become more apparent, civil expenditures on space activities have continued to increase in several countries. Virtually all new spacefaring states explicitly place a priority on space-based applications to support social and economic development. Such space applications as satellite navigation and Earth imaging are core elements of almost every existing civil space program. Likewise, Moon exploration continues to be a priority for such established spacefaring states as China, Russia, India, and Japan. Recently, Companies that manufacture satellites and ground equipment have also seen significant growth. On 25 February 2012 China successfully launched the eleventh satellite for its indigenous global navigation and positioning satellite system, Beidou. Civil space activities began to grow in China when they were allocated to the China Great Wall Industry Corporation in 1986. China Aerospace Corporation was established in 1993, followed by the development of the China National Space Administration. In Japan civil space was initially coordinated by the National Space Activities Council formed in 1960. Most of the work was performed by the Institute of Space and Aeronautical Science of the University of Tokyo, the National Aerospace Laboratory, and, most importantly, the National Space Development Agency. In 2003 all this work was assumed by the Japanese Aerospace Exploration Agency(JAXA). Japan eases restrictions on military space development. On 20 June 2012 Japan passed the Partial Revision of the Cabinet Establishment Act, which restructured the authority to regulate Japanese space policy and budget, including the governance of the JAXA. Under this legislation, the Space Activities Commission of the Ministry of Education, Culture, Sports, Science, and Technology, which was responsible for the development of Japanese space program, will be abolished. Regulation of space policy and budget will be handed over to the Space Strategy Headquarter formed under the Prime Minister's Cabinet. Space Strategy will be supported by a Consultative Policy Commission as an academics and independent observers. By revoking Article 4 (Objectives of the Agency) of a law that previously governed JAXA and mandated the development of space programs for "peaceful purposes only," the new legislation demonstrates consistency with Article 2 of the 2008 Basic Space Law. In conformity with the principles laid down in the 1967 Outer Space Treaty JAXA is now free to pursue the non-aggressive military use of space. New legislation is the culmination of a decade-long process that sought ways to "leverage Japan's space development programs and technologies for security purposes, to bolster the nation's defenses in the face of increased tensions in East Asia." In this connection it would also be very important and necessary to create an Asian Space Agency(ASA) for strengthening cooperation within the Asian space community towards joint undertakings.

  • PDF