• Title/Summary/Keyword: Defense software

Search Result 475, Processing Time 0.021 seconds

Design to Realtime Test Data Topic Utilize of Data Distribution Service (데이터 분산 서비스를 활용한 실시간 시험자료 토픽 설계)

  • Choi, Won-gyu
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.21 no.7
    • /
    • pp.1447-1454
    • /
    • 2017
  • The realtime test data topic means that process for the data efficiently from many kinds of measurement device at the test range. There are many measurement devices in test range. The test range require accurate observation and determine on test object. In this realtime test data slaving framework system, the system can produce variety of test informations and all these data also must be transmitted to test information management or display system in realtime. Using RTI DDS(Data Distribution Service) middle ware Ver 5.2, we can product the efficiency of system usability and QoS(Quality of Service) requirements. So the application user enables to concentrate on applications, not middle ware. As the reason, Complex function is provided by the DDS, not the application such as Visualization Software. In this paper, I suggest the realtime test data topic on slaving framework of realtime test data based on DDS at the test range system.

Prevention Methods of Cyber-crimes using the Private Security (민간경비를 활용한 사이버범죄 예방 방안)

  • Kim, Sang-Woon;Jo, Hyun-Bin
    • The Journal of the Korea Contents Association
    • /
    • v.13 no.3
    • /
    • pp.141-151
    • /
    • 2013
  • With the spread of Personal Computers(PC) in the 1980's, many people started to deal businesses with PC. From late 1990's, the Internet age with PC have started and many people have showed keen interest in cyber-space and now they are utilizing it. Since 2000's the use of cyber-space have skyrocketed and it caused significant changes to humans' life. There was a huge prosperity to us but the new kind of crime, cyber-crime, was raised. Unlike past physical type of crimes, those cyber-crimes take place in the cyber-space and they have special features of non-facing, anonymity, specialty, technologic, repetition, continuation. Those cyber-crimes are continually growing since 2003 and in 2010 it almost doubled compared to 2003. General cyber-crimes like phishing-scam pornography circulation was most of them and notably perpetrators of them are younger generation. Recently cyber-crimes are showing the trend of advancing more and more and cyber-bullying, fraud like phishing scam are on the rise. The police are responding by making 'Cyber Terror Response Center', but it does not work effectively with the problems of breakup of prevention and investigation unit, procedure of investigation and the system itself. So, I suggest practical use of private security to remedy our police's weakness and to prevent cyber-crimes. Preventing solutions of cyber-crime with private security are physical defense of large-scale servers and vital computers, building of Back-up system to prevent vital data loss, and building of cyber-crime preventing system combining software and hardware.

Technology Analysis on Automatic Detection and Defense of SW Vulnerabilities (SW 보안 취약점 자동 탐색 및 대응 기술 분석)

  • Oh, Sang-Hwan;Kim, Tae-Eun;Kim, HwanKuk
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.18 no.11
    • /
    • pp.94-103
    • /
    • 2017
  • As automatic hacking tools and techniques have been improved, the number of new vulnerabilities has increased. The CVE registered from 2010 to 2015 numbered about 80,000, and it is expected that more vulnerabilities will be reported. In most cases, patching a vulnerability depends on the developers' capability, and most patching techniques are based on manual analysis, which requires nine months, on average. The techniques are composed of finding the vulnerability, conducting the analysis based on the source code, and writing new code for the patch. Zero-day is critical because the time gap between the first discovery and taking action is too long, as mentioned. To solve the problem, techniques for automatically detecting and analyzing software (SW) vulnerabilities have been proposed recently. Cyber Grand Challenge (CGC) held in 2016 was the first competition to create automatic defensive systems capable of reasoning over flaws in binary and formulating patches without experts' direct analysis. Darktrace and Cylance are similar projects for managing SW automatically with artificial intelligence and machine learning. Though many foreign commercial institutions and academies run their projects for automatic binary analysis, the domestic level of technology is much lower. This paper is to study developing automatic detection of SW vulnerabilities and defenses against them. We analyzed and compared relative works and tools as additional elements, and optimal techniques for automatic analysis are suggested.

Thermal and Flow Analysis of a Driving Controller for Active Destruction Protections (능동 파괴 방호 구동제어기의 열 유동 해석)

  • Ryu, Bong-Jo;Oh, Bu-Jin;Kim, Youngshik
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.18 no.2
    • /
    • pp.235-242
    • /
    • 2017
  • A driving controller for active destruction protections can be applied to machinery, aerospace and military fields. In particular, this controller can be used to track and attack enemy flying objects through the active control. It is important to ensure reliability of the driving controller since its operation should be kept with precision to the target point. The temperature of the environment where the driving controller is used is about -32 C ~ 50 C (241~323 ). Heat generated in the driving controller should be maintained below a certain threshold (85 C (358 )) to ensure reliability; therefore, the study and analysis of the heat flow characteristics in the driving controller are required. In this research, commercial software Solid-Works Flow Simulation was used for the numerical simulation assuming a low Reynolds number turbulence model and an incompressible viscous flow. The goal of this paper is to design the driving controller safely by analyzing the characteristics of the heat flow inside of the controller composed of chips or boards. Our analysis shows temperature distributions for boards and chips below a certain threshold.

Importance of Selecting The characterized Housekeeping Genes as Reference Genes in Various Species (다양한 종에서 하우스키핑 유전자 선택의 중요성)

  • Chai, Han-Ha;Noh, Yun Jeong;Roh, Hee-Jong;Lim, Dajeong
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.21 no.8
    • /
    • pp.417-428
    • /
    • 2020
  • Housekeeping genes are expressed in cells of all organisms and perform basic cellular functions such as energy generation, substance synthesis, cell death, and cell defense. Accordingly, the expression levels of housekeeping genes are relatively constant, and thus they are used as reference genes in gene expression studies, such as protein expression and mRNA expression analysis of target genes. However, the levels of expression of these genes may be different among various tissues or cells and may change under certain circumstances. Therefore, it is important to select the best reference gene for specific gene expression research by exploring the stability of housekeeping gene expression. This review summarizes housekeeping genes found in humans, chickens, pigs, and rats in the literature and estimates expression stability using geNorm, NormFinder, and BestKeeper software. The most suitable reference housekeeping gene can selected based on expression stability according to the experimental conditions of the gene expression study and can thus be applied to data normalization.

Process Alignment between MND-AF and ADDMe for Products Reusability (산출물 재사용성을 위한 MND-AF와 ADDMe 프로세스 정렬)

  • Bu, Yong-Hee;Lee, Tae-Gong
    • Journal of the military operations research society of Korea
    • /
    • v.32 no.2
    • /
    • pp.131-142
    • /
    • 2006
  • Nowadays, most enterprises have introduced both EA methodology to optimize an entire enterprise and CBD methodology to improve a software reusability. The Korea Government not only have developed many EA guiding products such as EA framework, Reference Model, Guideline, etc. but also have instituted a law to optimize a government-wide enterprise. The Minister of National Defense(MND) have developed the MND-AF as a standard methodology for EA and the ADDMe as a standard methodology for CBD. But it is possible to develop products of WD-AF and ADDMe redundantly because the process of MND-AF and ADDMe is not quitely aligned. The purpose of this paper is to present a scheme that ADDMe can reuse the artifacts of MND-AF by analyzing the relationships between two processes. In order to identify the relationships between two processes, we first identify the relation of a 'definition' part of two processes and then identify the relation of an 'attribute' part based on the relation of a 'detailed definition' part. As a result we found that 113 attributes of MND-AF are related to 49 attributes of ADDMe. Therefore the proposed study will decrease the development cost and time and will be a good example for aligning the process of EA and CBD methodology.

Numerical Analysis of the Complex Permittivity of MWNT added Epoxy Depending on Agglomeration Size (에폭시 내부의 MWNT 응집 크기에 따른 복소유전율 변화의 해석적 관찰)

  • Shin, Jae-Hwan;Jang, Hong-Kyu;Choi, Won-Ho;Song, Tae-Hoon;Kim, Chun-Gon;Lee, Woo-Yong
    • Composites Research
    • /
    • v.27 no.5
    • /
    • pp.190-195
    • /
    • 2014
  • This paper predicts the complex permittivity of MWNT added epoxy depending on agglomeration by numerical analysis. 1wt% MWNT added epoxy specimen is prepared using 3-roll-mill method and its complex permittivity is measured in X-band (8.2~12.4 GHz) using freespace measurement system. The analytic model is comprised of cube epoxy and perfect sphere agglomeration. The complex permittivity of the agglomeration model is predicted by complex permittivity mixing rule using the measured complex permittivity of epoxy and 1 wt% MWNT added epoxy. Commercial electromagnetic analysis software, CST, is used to obtain S-parameter of the analytic model and MATLAB code is used to calculate complex permittivity from the S-parameter. It is confirmed that the complex permittivity increases when the agglomeration size decreases.

Design and Implementation of Security System Based on Intrusion Tolerance Technology : Focus on Wargame System (침입감내기술 기반의 보안시스템 설계 및 구현 : 워게임체계를 중심으로)

  • Lee, Gang-Tack;Lee, Dong-Hwi;J. Kim, Kui-Nam
    • Convergence Security Journal
    • /
    • v.5 no.4
    • /
    • pp.41-48
    • /
    • 2005
  • Objective of this study is to design and implement security system based on intrusion tolerance technology for the improvement of dependability in defense system. In order to do so, I identify and extract core technologies through the research and analysis into characteristics, structures, main functions, and technologies of intrusion tolerance architecture. And I accomplish a design of security system through the redundant system based on these core technologies. To implement and verify intrusion tolerance system, I chose 'wargame system' as a subjected system, and accomplished 'Wargame Intrusion Tolerance System' and verified security required functions through a performance test. By applying showed security system into the development of application software based on intrusion tolerance, systematic and efficient system could be developed. Also applying 'WITDS' can solve the current security problems, and this will be basic model for design of security architecture in the federation system after.

  • PDF

A Study on the Initial Design Method for an Effective Acquisition of Future Ground Combat Vehicles (미래지상전투차량의 효과적 획득을 위한 초기설계기법에 관한 연구)

  • Kim, Hee-young;Kwon, Seung Man;Lee, Kyu Noh
    • Journal of the Korea Society for Simulation
    • /
    • v.26 no.2
    • /
    • pp.41-49
    • /
    • 2017
  • In the acquisition program, the conceptual design is the most important step toward specifying the military objectives, establishing requirements and determining future developmental directions, of a target system. However, if both the requirements and directions are incorrectly set due to the lack of development experiences and literature backgrounds in the target systems, such as future ground combat vehicles, it may become a major risk in the future design phases and the entire acquisition program. In order to correct these errors in the future phases, time, effort and cost are required. Therefore, it is necessary to reduce the errors that occur in the initial stages to effectively acquire the future ground combat vehicles. This paper describes the initial design method for verifying the requirements and the developmental directions and estimating the system performance at the conceptual design through the system-level physical modeling and simulation (M&S) and the target system performance analysis. The system-level physical M&S use cutting-edge design tools, model-based designs and geometric-based designs. The system performance estimation is driven from the results of the system-level physical M&S and the specialized system analysis software.

North Korea's Cyber Attack Patterns and Behaviors : An Analysis Based on Cyber Power and Coercion Theory (북한의 대남 사이버공격 양상과 행태 : 사이버파워와 강압이론을 통한 분석)

  • Yoon, Taeyoung;Woo, Jeongmin
    • Convergence Security Journal
    • /
    • v.18 no.1
    • /
    • pp.117-128
    • /
    • 2018
  • The purpose of this paper is to analyze the behavior of North Korea's cyber attack against South Korea since 2009 based on major international security theories and suggest South Korea's policy option. For this purpose, this paper applied the behavioral domain and characteristics of 'cyber power' and 'coercion dynamics' model, which are attracting attention in international security studies. The types of cyber attacks from North Korea are classified into the following categories: power-based incarceration, leadership attacks and intrusions, military operations interference, and social anxiety and confusion. In terms of types and means of cyber power, North Korean GPS disturbance, the Ministry of Defense server hacking and EMP are hard power with high retaliation and threat and cyber money cashing and ransomware are analyzed by force in the act of persuasion and incentive in the point of robbing or asking for a large amount of money with software pawns. North Korea 's cyber attack has the character of escape from realistic sanctions based on the second nuclear test. It is important for South Korea to clearly recognize that the aggressive cyberpower of North Korea is changing in its methods and capabilities, and to ensure that North Korea's actions result in far greater losses than can be achieved. To do this, it is necessary to strengthen the cyber security and competence to simultaneously attack and defend through institutional supplement and new establishment such as cyber psychological warfare, EMP attack preparation, and enhancement of security expertise against hacking.

  • PDF