• Title/Summary/Keyword: Defense Technology Protection

Search Result 114, Processing Time 0.022 seconds

Resaerch Trend and Cocentualization of Defense Industry Security From Convergence Security Perspective (융합보안 관점에서 방위산업보안 개념 정립과 연구동향 분석)

  • Woo, Kwang Jea
    • Convergence Security Journal
    • /
    • v.15 no.6_1
    • /
    • pp.69-78
    • /
    • 2015
  • Methods that industrial spies use to smuggle core technology out are becoming more intelligent, technological, and complex, thus resulting in more serious damages. In particular, defense industries in which involve national core technology as well as institutions including labor force are industries that are in a greater need of the convergence security. Defense Industry develops, experiments, and produces defense security supplies for national security protection. Defense industry involves a number of security elements such as military secret, industrial secret, core technology labor force, defense industry supply, critical national facility, and information communication system. Defense industry security is a complex of military security and industrial security which is convergence security that integrates all security elements of defense industry. Therefore, defense industry security is a typical ideal model for convergence security. Research on defense industry security is relatively insufficient compared to research of security in other industrial fields. In order to prevent core technology of denfese industry from leaking and to protect technical professionals and institutions, research and action on defense industry security from convergence security perspective are therefore essential at this point of time.

Planing Avoidance Control for a Supercavitating Underwater Vehicle Based on Potential Functions (포텐셜함수 기반 초공동 수중운동체 플레이닝 회피 제어 연구)

  • Kim, Seonhong;Kim, Nakwan;Kim, Minjae;Kim, Jonghoek;Lee, Kurnchul
    • Journal of Ocean Engineering and Technology
    • /
    • v.32 no.3
    • /
    • pp.208-212
    • /
    • 2018
  • In this paper, we focus on planing avoidance control for a supercavitating underwater vehicle based on the potential function method. The planing margin can be calculated using the relative position between the cavity center and vehicle center at the end of the vehicle. The planing margin was transformed into a limit variable such as the pitch angle and yaw angle limit. To prevent the vehicle attitude from exceeding the limit variable, a potential function based planing envelope protection method was proposed. The planing envelope protection system overrides commands from the tracking controller, and the vehicle attitude converges to a desired angle, in which the potential function is minimized. Numerical simulations were performed to analyze the physical feasibility and performance of the proposed method. The results showed that the proposed methods eliminated the planing, allowing the vehicle to follow tracking commands.

A Study on Improvement of Test & Evaluation of Vehicle Part in Mixed Equipment and Defense Industrial Technology (혼성장비 차량부 시험평가 및 방위산업기술 보호 제도 개선에 관한 연구)

  • Yoon, Heung-Soo;Ryu, Yeon-Seung
    • Journal of the Korea Convergence Society
    • /
    • v.9 no.7
    • /
    • pp.241-249
    • /
    • 2018
  • The military purpose vehicles are developed by using the platform of civil vehicles according to the commercial vehicle expansion plan and military supplied product commercialization policy. But the information related to the military purpose vehicle which adopts the same platform with the civil vehicle is forced to be exposed because its information is revealed by containing into the maintenance manual and electric circuit diagram. Especially, the information disclosure should be blocked by reviewing the application of technology protection because the military vehicle becomes combating purposed mixed equipment when the missile and radar are mounted. The mixed equipment means the one configured with more than 2 types of equipment, and it is categorized into the main and sub equipment. This study was performed to derive the problems in Korean system for vehicle part test evaluation on the mixed equipment and the defense industry technology protection system, and to derive the methods for improving through interviews with the specialists. The conflicts between the civil laws and army regulation were reduced by adding a clause that the engine reflected with the newest emission gas standard should be mounted based on the time of force integration, and the commercialized military supplies were designated as element technology of defense industry technology in consideration of its roles and functions.

Conceptualization of Defense Industrial Security in Relation to National Security (국가 안보와 연계한 방위산업 보안 개념 정립)

  • Go, Hee-Jae;Lee, Yong-Joon
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.20 no.12
    • /
    • pp.265-270
    • /
    • 2019
  • In order to protect the advancement of defense technology that has a tremendous e?ect on both the national security and the economy, the Republic of Korea established the Defense Technology Security Act in 2015. As the new enactment brought changes to the landscape of the defense industry and defense industrial security, a new examination of the concept of the defense industrial security has now become necessary. Even after taking into consideration the undisclosed nature of defense industrial security research, and the fact that only the limited number of firms participates in the subject matter, scientific studies related to the topic have not been active. However, with the new enactment of the Defense Technology Security Act, it is necessary to expand the scope of security and to redefine the concept of defense industrial security. In this paper, we analyzed the research works on related technology protection policies and our environment of the defense industry in order to conceptualize defense industrial security. The established concepts are expected to provide a systematic way to protect the confidential and defense technology.

Cybersecurity of The Defense Information System network connected IoT Sensors (IoT Sensor가 연결된 국방정보통신망의 사이버보안 연구)

  • Han, Hyun-Jin;Park, Dea-Woo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.24 no.6
    • /
    • pp.802-808
    • /
    • 2020
  • The IoT(Internet of Things) is based on the development of sensor technology and high-speed communication infrastructure, and the number of IoT connected to the network is increasing more than the number of people, and the increase is also very fast. In the field of defense, IoT is being deployed in various fields such as operations, military, base defense, and informatization, and the need is also increasing. Unlike the existing PC/server information protection system, cyber threats are also increasing as IoT sensors, which are vulnerable to information protection, are increasing in the network, so it is necessary to study the platform to protect the defense information and communication network. we investigated the case of connecting wired and wireless IoT to the defense network, and presented an efficient interlocking design method of the IoT integrated independent network with enhanced security by minimizing the contact point with the defense network.

A Study of Environment & Bullet-Proof Capability Test Method for KLTV's Transparent Armour (한국형 전술차량 방탄유리 환경 및 방호력 시험 적용 기법 연구)

  • Park, Jinwon;Park, Youngchan;Kim, Seonjin
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.21 no.1
    • /
    • pp.69-73
    • /
    • 2018
  • Korean-peacekeeper's transparent armors in Iraq showed delamination, cracking and clouding a decade ago. And there were also similar deterioration recurrences in KLTV during the operational test a few years ago. Also, the differences between operational capability & lab Bullet-proof test condition, and insufficiency of military protection spec resulted in incomplete bullet-proof results. Moreover, although so many ground weapon systems have been developed, there were not secure test & evaluation codes to verify transparent armoured glasses equal to advanced-overseas products. So in this study, first, environmental test codes were established that all tests should be carried out as the application of only one specimen with newly adopted thermal shock test instead of completing each test with different one. Second, protection standards were integrated through the analysis of global developed country's specifications and reinforced as adding to the real mock-up condition if vehicle's glasses are smaller than standard specimen. Hereby, by applying to test-codes which including actual operational & vehicular conditions, the gap between development test and operational environment was minimized.

A High-Speed Image Processing Algorithm Based on Facet Filter for Small Missile Detection (소형 미사일 탐지를 위한 Facet 기반의 고속 영상처리 기법)

  • Kim, Ji-Eun
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.12 no.4
    • /
    • pp.500-507
    • /
    • 2009
  • This paper presents a novel method which can detect a target in IR image for active protection system. The target in IR image for the active protection system is small, moreover it moves with enormous speed. The proposed algorithm is comprised of robust clutter rejection methods and target optimized detection algorithms for small target, and an advanced method of selecting a final target position in target area, it can work in some milliseconds. The proposed algorithm provides the active protective system with more correct positions than those of radar, so that helps the active protection system can defense all threats with the utmost precision.

A Study on Command and Control Through Cyber Protection Function Analysis (사이버 방호기능 분석을 통한 지휘통제에 관한 연구)

  • Choi, Seho;Oh, Haengrok;Yun, Joobeom
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.24 no.5
    • /
    • pp.537-544
    • /
    • 2021
  • Cyber threats can bypass existing cyber-protection systems and are rapidly developing by exploiting new technologies such as artificial intelligence. In order to respond to such cyber threats, it is important to improve the ability to detect unknown cyber threats by correlating heterogeneous cyber protection systems. In this paper, to enhance cyber-attack response capabilities, we proposed command and control that enables rapid decision-making and response before the attack objectives are achieved, using Lockheed Martin's cyber kill chain and MITRE ATT&CK to analyze the purpose and intention of the attacker.

A Study on the Impact of Applying Network Address Mutation Technology within the Network Protection System (네트워크 보호체계에서 네트워크 주소변이 기술 적용에 대한 영향성 연구)

  • Suwon Lee;Seyoung Hwang;SeukGue Hong
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.33 no.6
    • /
    • pp.939-946
    • /
    • 2023
  • In the hyper-connected network, which network equipment is diverse and network structure is complex, the attack surface has also increased. In this environment, MTD(Moving Target Defense) technology is being researched as a method to fundamentally defend against cyber attacks by actively changing the attack surface. network-based MTD technologies are being widely studied. However, in order for network address mutation technology to be applied within the existing fixed IP-based system, research is needed to determine what impact it will have. In this paper, we studied the impact of applying network address mutation technology to the existing network protection system. As a result of the study, factors to be considered when firewall, NAC, IPS, and network address mutation technologies are operated together were derived, and elements that must be managed in network address mutation technology for interoperability with the network analysis system were suggested.

Research about Chemical-Biological Protection Capability of Selectively Permeable Membrane Materials Based on Polyvinyl Alcohol (폴리비닐알코올 기반 선택투과막 재료의 화생방호성능 연구)

  • Kang, Jae-Sung;Seo, Hyeon-Kwan;Kwon, Tae-Geun;Park, Hyen-Bae;Lee, Hae-Wan
    • Membrane Journal
    • /
    • v.23 no.3
    • /
    • pp.237-244
    • /
    • 2013
  • We fabricated several composite membranes with selectively permeable performance designed to facilitate water vapor transport and resist DMMP vapor permeation. Materials for selective permeable membrane were based on polyvinyl alcohol and functional polymer containing basic functional group. With these materials, we characterized selectively permeable performance to identify next-generation material with chemical-biological protective capability. Results showed that polyvinyl alcohol (PVA)/polyethyleneimine (PEI) materials possessed performance with superior water vapor permeation ($2,200{\sim}2,900g/m^2/day$) and protective capability against DMMP vapor ($47g/m^2/day$).