• Title/Summary/Keyword: Defense Technology Security

Search Result 345, Processing Time 0.023 seconds

Industrial Security Crime's Realities and Counter-Measure (산업보안범죄의 실태 및 대응방안)

  • Seo, Bong Sung;Lim, You Seok
    • Convergence Security Journal
    • /
    • v.15 no.6_2
    • /
    • pp.141-149
    • /
    • 2015
  • Modern society is to have an significant impact on the competitiveness of the country in which the economic value is very high occupancy and ensure a state-of-the-art science and technology. The country's core technology or industry security crimes going seized state-of-the-art technology firms can threat of damage to the country's economic security. In particular, the defense industry serious crime that is directly related to national security. The company's core technology and trade secrets leaked once the industrial countries must prevent security breaches and offenses of strict punishment measures because it is impossible to recover. Also, some advanced countries directly has been operating industrial security crime for the country's economy and national security. In recent years, Nation core technology infringement cases are rapidly increasing in the country. In addition, industrial security crime threat to national security. Therefore, the industry security crimes damage to the national security that infringe on the business secrets of core technologies and businesses. It is necessary to identify that industry security crime associated with the visibility of the broad scope of intellectual property protection.

WORM-HUNTER: A Worm Guard System using Software-defined Networking

  • Hu, Yixun;Zheng, Kangfeng;Wang, Xu;Yang, Yixian
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.1
    • /
    • pp.484-510
    • /
    • 2017
  • Network security is rapidly developing, but so are attack methods. Network worms are one of the most widely used attack methods and have are able to propagate quickly. As an active defense approach to network worms, the honeynet technique has long been limited by the closed architecture of traditional network devices. In this paper, we propose a closed loop defense system of worms based on a Software-Defined Networking (SDN) technology, called Worm-Hunter. The flexibility of SDN in network building is introduced to structure the network infrastructures of Worm-Hunter. By using well-designed flow tables, Worm-Hunter is able to easily deploy different honeynet systems with different network structures and dynamically. When anomalous traffic is detected by the analyzer in Worm-Hunter, it can be redirected into the honeynet and then safely analyzed. Throughout the process, attackers will not be aware that they are caught, and all of the attack behavior is recorded in the system for further analysis. Finally, we verify the system via experiments. The experiments show that Worm-Hunter is able to build multiple honeynet systems on one physical platform. Meanwhile, all of the honeynet systems with the same topology operate without interference.

Smartphone Forensic of Military Data Information Leakage (군사자료 정보유출의 스마트폰 포렌식 연구)

  • Kim, Yong-youn;Park, Dea-woo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2022.05a
    • /
    • pp.238-241
    • /
    • 2022
  • North Korea launched an ICBM and declared Moratorium for the September 19 military talks. The Armed Forces must protect military security for national defense and security. The Ministry of National Defense, which received a hacking attack from North Korea, must protect its military security even more. Recently, the leakage of military data through smartphones is occurring through smartphones. Officers and non-commissioned officers can use smartphones while working. Therefore, smartphone forensics is required to check information leakage of military data from smartphones. In this study, forensic leaks of military data from the Galaxy S20 model of S company. Research integrity verification for securing smartphone forensic evidence, securing metadata, and adopting evidence. This study will contribute to the development of military security and forensic technology.

  • PDF

Honeypot game-theoretical model for defending against APT attacks with limited resources in cyber-physical systems

  • Tian, Wen;Ji, Xiao-Peng;Liu, Weiwei;Zhai, Jiangtao;Liu, Guangjie;Dai, Yuewei;Huang, Shuhua
    • ETRI Journal
    • /
    • v.41 no.5
    • /
    • pp.585-598
    • /
    • 2019
  • A cyber-physical system (CPS) is a new mechanism controlled or monitored by computer algorithms that intertwine physical and software components. Advanced persistent threats (APTs) represent stealthy, powerful, and well-funded attacks against CPSs; they integrate physical processes and have recently become an active research area. Existing offensive and defensive processes for APTs in CPSs are usually modeled by incomplete information game theory. However, honeypots, which are effective security vulnerability defense mechanisms, have not been widely adopted or modeled for defense against APT attacks in CPSs. In this study, a honeypot game-theoretical model considering both low- and high-interaction modes is used to investigate the offensive and defensive interactions, so that defensive strategies against APTs can be optimized. In this model, human analysis and honeypot allocation costs are introduced as limited resources. We prove the existence of Bayesian Nash equilibrium strategies and obtain the optimal defensive strategy under limited resources. Finally, numerical simulations demonstrate that the proposed method is effective in obtaining the optimal defensive effect.

An Analysis of the US 3rd Offset Strategy (미국의 제3차 국방과학기술 상쇄전략에 대한 분석)

  • Kim, Jong Ryul
    • Convergence Security Journal
    • /
    • v.16 no.3_1
    • /
    • pp.27-35
    • /
    • 2016
  • This thesis analyzes the backgrounds of the third offset strategy of the US Department of Defense. The key technology areas to be developed and the implications of the 3rd strategy are also examined. The potential great powers, China and Russia have catched up with US in the certain areas of military technologies. The technological superiority of US military is found to have been eroded. The US DOD needs a new defense policy called the 3rd offset strategy to meet this new challenge. The 5 basic technology areas were identified; learning machines, human-machine collaboration, machine-assisted human operations, human-machine combat teaming, and autonomous weapons. The 3rd offset strategy should be managed not to move to the new arms race with rivalries. The defense acquisition system also needs to be improved for the smooth flow of the advanced commercial technologies to the defense sector. Korea needs to figure out the possible technologies of co-research and development with US.

Design of Free-space Optical Communication Terminal Considering for Korean Domestic Weather Conditions (국내 기상 조건을 고려한 자유공간 광통신 단말기 설계)

  • Hajun Song;Heesuk Jang;Taehyun Yoon
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.27 no.2
    • /
    • pp.238-246
    • /
    • 2024
  • Modern military operations rely heavily on broadband communication and data transmission. Recently, the rising use of intelligent unmanned technology necessitates more frequencies. Free-space optical(FSO) communication can offer high-data-rate communications with high security and no need for licensing. Therefore, the FSO communication holds significant interest and potential in the defense industry. In this paper, we present design of a FSO communication terminal taking Korean domestic weather conditions into account. The domestic atmospheric attenuation is analyzed using several models and two-year meteorological information for a city in Korea, and this analysis is utilized to design the FSO communication terminal. The design results were verified using an FSO communication test bed, and we achieved an Ethernet bandwidth of approximately 1.86 Gbps at a distance of 1.3 km with the optical amplifier output power of the test bed set to about 20 dBm.

Performance Analysis of Spiral Axicon Wavefront Coding Imaging System for Laser Protection

  • Haoqi Luo;Yangliang Li;Junyu Zhang;Hao Zhang;Yunlong Wu;Qing Ye
    • Current Optics and Photonics
    • /
    • v.8 no.4
    • /
    • pp.355-365
    • /
    • 2024
  • Wavefront coding (WFC) imaging systems can redistribute the energy of an interference laser spot on an image plane sensor by wavefront phase modulation and reduce the peak intensity, realizing laser protection while maintaining imaging functionality by leveraging algorithmic post-processing. In this paper, a spiral axicon WFC imaging system is proposed, and the performance for laser protection is investigated by constructing a laser transmission model. An Airy disk on an image plane sensor is refactored into a symmetrical hollow ring by a spiral axicon phase mask, and the maximum intensity can be reduced to lower than 1% and single-pixel power to 1.2%. The spiral axicon phase mask exhibits strong robustness to the position of the interference laser source and can effectively reduce the risk of sensor damage for an almost arbitrary lase propagation distance. Moreover, we revealed that there is a sensor hazard distance for both conventional and WFC imaging systems where the maximum single-pixel power reaches a peak value under irradiation of a power-fixed laser source. Our findings can offer guidance for the anti-laser reinforcement design of photoelectric imaging systems, thereby enhancing the adaptability of imaging systems in a complex laser environment. The laser blinding-resistant imaging system has potential applications in security monitoring, autonomous driving, and intense-laser-pulse experiments.

Study on Emerging Security Threats and National Response

  • Il Soo Bae;Hee Tae Jeong
    • International Journal of Advanced Culture Technology
    • /
    • v.11 no.4
    • /
    • pp.34-41
    • /
    • 2023
  • The purpose of this paper is to consider the expansion of non-traditional security threats and the national-level response to the emergence of emerging security threats in ultra-uncertain VUCA situations. As a major research method for better analysis, the theoretical approach was referred to papers published in books and academic journals, and technical and current affairs data were studied through the Internet and literature research. The instability and uncertainty of the international order and security environment in the 21st century brought about a change in the security paradigm. Human security emerged as the protection target of security was expanded to individual humans, and emerging security was emerging as the security area expanded. Emerging security threatsthat have different characteristicsfrom traditionalsecurity threats are expressed in various ways, such as cyber threats, new infectious disease threats, terrorist threats, and abnormal climate threats. First, the policy and strategic response to respond to emerging security threats is integrated national crisis management based on artificial intelligence applying the concept of Foresight. Second, it is to establish network-based national crisis management smart governance. Third, it is to maintain the agile resilience of the concept of Agilience. Fourth, an integrated response system that integrates national power elements and national defense elements should be established.

Trends in Network Address Moving Technology (네트워크 주소 이동 기술 동향)

  • Park, K.M.;Woo, S.;Moon, D.S.;Kim, I.K.
    • Electronics and Telecommunications Trends
    • /
    • v.32 no.6
    • /
    • pp.73-82
    • /
    • 2017
  • Moving Target Defense(MTD) is a novel security technology concept in which the IT infrastructure changes its form actively and prevents various types of cyber attacks. Network address moving technology is the field that has been most actively researched in terms of MTD. A number of studies on network address moving published over the last decade have suggested a virtual address-based network address moving technology for efficiency in the implementation. However, virtual address-based network address moving technology has serious vulnerabilities in terms of security and availability. This paper examines the technological characteristics of the existing studies and analyzes their limitations. It suggests security requirements to be considered when designing the network address moving technology through a technological analysis.

The Global Distribution Direction of Defense Industry in Eastern Europe under the New Cooperation Strengthened (신 협력 강화에 따른 동유럽 방위산업의 국제유통방향)

  • Seo, Dae-Sung;Coo, Byung-Mo
    • Journal of Distribution Science
    • /
    • v.15 no.1
    • /
    • pp.83-93
    • /
    • 2017
  • Purpose - After the transition, the development of defense industry in Eastern Europe has been regressed. Recently, they have internationally recognized that new products have been exported and contributed to the Innovation-Based Manufacturing of national economy such as unmanned reconnaissance aircraft, water purification technology, and mobile chemical laboratory, etc. The military forces in Eastern Europe are re-armed by the localization of self-produced munitions in their own defense industry, and then emphasize fostering their own defense industry. Thus, if they make a collaboration with other nations as a industrial cluster, it will gain a competitive edge on the defense industry. Research design, data, and methodology - The study was designed with the data of each national defense department. The research of the subject was reviewed before and after the transition. Thousands of workers have worked in defense industries before the transition, however, the defense industry and experts left after the transition. The Hungarian defense spending on GDP also dropped sharply from 1.72% in 2000 to 0.85% in 2013. But, due to the crisis in Ukraine and the crisis of Syrian refugees, the Viségrad Group (V4) member countries have also increased their interest in a defense and industries as well as the confidence in the EU and NATO. Results - On the whole, the joint of military training and purchase of defense materials were found in order to form the EU cooperative combat troops in CEE. There are the implementation of a joint manual plan for strengthening V4 security policy and the joint military exercises for V4 every year, and the others are electronic warfare and innovation of V4 national forces. Through such a performance analysis methodology, we found that the defense industry is developed through the national cluster cooperation among CEEs and spreading global distribution. Conclusions - Eastern Europe and Balkan countries have been looking forward to cooperating with the non-EU countries such as Korea and other defense industries. There are a lot of potential development into a new civilian cooperation defense industry for global-distribution. Thus, Korea should develop electronic commercial applications, not just as a weapon exporting region.