• Title/Summary/Keyword: Military security

Search Result 926, Processing Time 0.032 seconds

The Design and Implementation of Simulated Threat Generator based on MITRE ATT&CK for Cyber Warfare Training (사이버전 훈련을 위한 ATT&CK 기반 모의 위협 발생기 설계 및 구현)

  • Hong, Suyoun;Kim, Kwangsoo;Kim, Taekyu
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.22 no.6
    • /
    • pp.797-805
    • /
    • 2019
  • Threats targeting cyberspace are becoming more intelligent and increasing day by day. To cope with such cyber threats, it is essential to improve the coping ability of system security officers. In this paper, we propose a simulated threat generator that automatically generates cyber threats for cyber defense training. The proposed Simulated Threat Generator is designed with MITRE ATT & CK(Adversarial Tactics, Techniques and Common Knowledge) framework to easily add an evolving cyber threat and select the next threat based on the threat execution result.

The Possibility of Naval Cooperation between the Republic of Korea and Japan and Its Influence on Peripheral States (${\cdot}$일 해군협력의 가능성과 주변국에 미치는 영향)

  • Kim Hyeon-Gi
    • Journal of the military operations research society of Korea
    • /
    • v.16 no.1
    • /
    • pp.35-55
    • /
    • 1990
  • This research paper examines the Navy of the Republic of Korea (ROK) and the Japanese Maritime Self-Defense Force (JMSDF) to determine if the two navies can cooperate to enhance the security of Northeast Asia. This paper reviews the advantages and limitations of naval cooperation between the ROK and Japan, describes the threats to both, and evaluates domestic, regional and international factors to answer the questions : Is naval cooperation possible? How would might it take? what secunity burdens might the ROK Nayy and the JMSDF be reasonably expected to assume from the United States? Paper conclusions are based on the studies within the framework of today's realities. Consequently, the conclusions may seem undramatic. However, they are based on not what could happen if all parties agreed to accept radical change, but rather upon the assumption that all parties will want to change the least for the greatest benefit.

  • PDF

A Study on Smartcard-based Certification System using Kerberos and X.509 (Kerberos와 X.509를 이용한 스마트카드 기반 인증시스템에 관한 연구)

  • 박정용;남길현
    • Journal of the military operations research society of Korea
    • /
    • v.26 no.1
    • /
    • pp.115-124
    • /
    • 2000
  • In this paper, we are introduced a certification system for open network environment. The Kerberos which was developed by MIT uses a secret key cryptosystem for authentication. It is secure and efficient for closed network users to authenticate each others. However, the kerberos has a disadvantage of managing a lot of secret keys for In this paper, we are introduced a certification system for open network environment. users in the open network environment. This paper suggests a method that uses X.509 to provide public keys with certification to Kerberos users for authentication in the X.500 directory standard. And we also suggest the smartcard as data storage device to enhance the security and availability.

  • PDF

Virtualization based high efficiency naval combat management system design and performance analysis

  • Kwon, Sang-Min;Jung, Seung-Mo
    • Journal of the Korea Society of Computer and Information
    • /
    • v.23 no.11
    • /
    • pp.9-15
    • /
    • 2018
  • The Ministry of National Defense announced 'Defense Reform 2.0' that aims to strengthen the country's security for decrease of regional uncertainties, growing requirements for advanced technologies, and a need for more efficiency in the Republic of Korea(RoK) Armed Forces this year. It said RoK Armed Forces have to change efficiently in preparation for rapid decline in military service resources as demographic cliff turning into reality, and the rapid evolution of the "battlefield environment" caused by developments in military science and technologies. RoK Navy combat Management System(CMS) made by domestic proprietary technology since 2000s and development centered on Agency for Defense Development require design changes for added requirements. So in this paper, I propose method of design a low cost and high efficiency navy CMS architecture based on high performance server and virtualization technology. And I create a test environment for analysis performance and compare the performance of proposed navy CMS and existing navy CMS.

A Study on Defense Robot Combat Concepts Using Fourth Industrial Revolution Technologies

  • Sang-Hyuk Park;Jae-Geon Lee;Moo-Chun Kim
    • International Journal of Advanced Culture Technology
    • /
    • v.12 no.1
    • /
    • pp.249-253
    • /
    • 2024
  • The ultimate purpose of this study is as follows: The current primary concern in the defense sector revolves around how to strategically utilize Fourth Industrial Revolution technologies in combat. The Fourth Industrial Revolution denotes a shift towards an environment where automation and connectivity are maximized, driven by technologies such as artificial intelligence. Coined by Klaus Schwab in the 2015 Davos Forum, this term highlights the significant role of machine learning and artificial intelligence. Particularly, the military application of Fourth Industrial Revolution technologies is expected to be actively researched and implemented. Combat involves military actions between units, typically conducted as part of a larger war, with units striving to achieve one or more objectives. The concept of combat refers to the fundamental ideas of how units should engage with the enemy, both presently and in future scenarios, to achieve assigned objectives.

Point Ahead Angle(PAA) Estimation and a Control Algorithm for Satellite-Pointing of the Ground Terminal in Satellite-to-Ground Optical Communication (위성-지상간 광통신용 지상단말기의 위성 지향을 위한 PAA 도출 및 제어 알고리즘)

  • Taehyun Yoon
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.27 no.3
    • /
    • pp.329-337
    • /
    • 2024
  • Free-space optical communication technology enables the high-speed data transmission and excellent anti-jamming security. We conduct research on satellite-to-ground free-space optical communication links for high-speed transmission of large-capacity surveillance and reconnaissance data. Since the satellite continues to move along its orbit while the optical signal is transmitted between the satellite and the ground, the pointing angle of the beam from the ground terminal needs to be corrected by Point Ahead Angle(PAA) so that the transmitted light reaches the expected location of the satellite. In this paper, we present the algorithm for PAA estimation and control.

A Method for Preemptive Intrusion Detection and Protection Against DDoS Attacks (DDoS 공격에 대한 선제적 침입 탐지·차단 방안)

  • Kim, Dae Hwan;Lee, Soo Jin
    • Journal of Information Technology Services
    • /
    • v.15 no.2
    • /
    • pp.157-167
    • /
    • 2016
  • Task environment for enterprises and public institutions are moving into cyberspace-based environment and structing the LTE wireless network. The applications "App" operated in the LTE wireless network are mostly being developed with Android-based. But Android-based malwares are surging and they are the potential DDoS attacks. DDoS attack is a major information security threat and a means of cyber attacks. DDoS attacks are difficult to detect in advance and to defense effectively. To this end, a DMZ is set up in front of a network infrastructure and a particular server for defensive information security. Because There is the proliferation of mobile devices and apps, and the activation of android diversify DDoS attack methods. a DMZ is a limit to detect and to protect against DDoS attacks. This paper proposes an information security method to detect and Protect DDoS attacks from the terminal phase using a Preemptive military strategy concept. and then DDoS attack detection and protection app is implemented and proved its effectiveness by reducing web service request and memory usage. DDoS attack detection and protecting will ensure the efficiency of the mobile network resources. This method is necessary for a continuous usage of a wireless network environment for the national security and disaster control.

A situation-Flexible and Action-Oriented Cyber Response Mechanism against Intelligent Cyber Attack (지능형 사이버공격 대비 상황 탄력적 / 실행 중심의 사이버 대응 메커니즘)

  • Kim, Namuk;Eom, Jungho
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.16 no.3
    • /
    • pp.37-47
    • /
    • 2020
  • The In the 4th industrial revolution, cyber space will evolve into hyper-connectivity, super-convergence, and super-intelligence due to the development of advanced information and communication technologies, which will connect the nation's core infrastructure into a single network. As applying the 4th industrial revolution technology to the cyber attack technique, it is evolving in an intelligent and sophisticate method. In order to response intelligent cyber attacks, it is difficult to guarantee self-defense in cyberspace by policy-oriented, preplanned-centric and hierarchical cyber response strategies. Therefore, this research aims to propose a situation-flexible & action-oriented cyber response mechanism that can respond flexibly by selecting the most optimal smart security solution according to changes in the cyber attack steps. The proposed cyber response mechanism operates the smart security solutions according to the action-oriented detailed strategies. In addition, artificial intelligence-based decision-making systems are used to select the smart security technology with the best responsiveness.

Security Improvement of ID-based Multiple Key Management Scheme for t Scalable Ad Hoc Networks

  • Park, Yo-Han;Park, Young-Ho;Moon, Sang-Jae
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.16 no.2
    • /
    • pp.13-18
    • /
    • 2011
  • Security supports are a significant factor in mobile ad hoc networks. Especially in dynamic topologies, considering cluster, key management is essential to provide a secure system. Recently, Li-Liu proposed iD-based multiple key management scheme for cluster-based ad hoc networks. However, we found the security weakness of their scheme. In this paper, we analyze the security of Li-Liu's scheme and show that master secret key and fragment of the master secret key can be revealed to compromised CHs and nodes. Furthermore, we propose a solution to improve the scheme against disclosure of the share key and the master secret key even though system parameters are opened to compromised nodes and modify the Li-Liu's scheme fitted for a scalable networks. The improved IMKM scheme could be usefully applied in dynamic cluster-based MANETs such as the military battlefields, mobile marketplace and VANETs.

Videogames in Cybersecurity: Philosophical and Psychological Review of Possible Impact

  • Bogdan, Levyk;Maletska, Mariia;Khrypko, Svitlana;Leonid, Kryvyzyuk;Olga, Dobrodum;Pasko, Katerina
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.7
    • /
    • pp.249-256
    • /
    • 2021
  • An issue of security and threat is urgent as well as it concerns everyone: a person, community, state, etc. Today, the question of cybersecurity has become especially relevant due to general digitalization and the spread of the cyberculture. In terms of it, the growing popularity of videogames can be observed. Their impact on society differs significantly, therefore, it needs thorough consideration. The purpose of the article is to disclose the role of videogames in cybersecurity. To achieve the stated purpose, such methods as analysis, synthesis, systematization and practical involvement of videogames have been used. As a result, three levels of possible threat of videogames has been distinguished: videogames as a possibly dangerous software, as a tool of propaganda and spread of stereotypes, as a space for the creation of virtual communities. In conclusion, it is stated that videogames can be not only a threat, but also a tool for strengthening the cybersecurity.