• 제목/요약/키워드: Military threats

검색결과 231건 처리시간 0.027초

다수 표적을 공격하는 편대항공기의 최적작전시간 결정 모형 (A Model for Determining Optimal Operating Time of Aircrafts Attacking Multiple Targets)

  • 김용복;민계료
    • 한국국방경영분석학회지
    • /
    • 제18권1호
    • /
    • pp.61-73
    • /
    • 1992
  • Up to the present, the operating time has been studied on only a single aircraft attacking a single target or multiple targets under enemy threats. This study is to determine optimal operating time and appropriate size of aircrafts attacking multiple targets. Measures of mission effectiveness is defined through derivation of the probability of the various events associated with operating. By using these measures, the expected benefit of operating and the expected cost of operating are generated as a function of time. To formulate operating time determination model, the expected gain of operating is defined as the difference between the expected benefit of operating and the expected cost of operating. The model can be used to determine optimal operating time which maximizes the expected gain of operating, and can be used as the basis for determining the appropriate size of aircrafts.

  • PDF

딥러닝을 적용한 영상기반 군함 식별정보 획득에 관한 연구 (A Study on the Acquisition of Identification Information from Warship Image with Deep Learning)

  • 강지영;김우주
    • 한국군사과학기술학회지
    • /
    • 제25권1호
    • /
    • pp.55-64
    • /
    • 2022
  • Identifying warships contacted at sea is important to prepare for threats. It is necessary to obtain a basis to identify warships. In this study, we propose a 2-step model that acquires the warship's type and hullnumber with identification information from the warship images. The model classifies the warship's type and detects its hullnumber area by applying object detection, then recognizes hullnumber through text recognition algorithms. Proposed model achieved high performance by using state-of-the-art deep learning algorithms.

국방 네트워크 환경에서 ATT&CK 기반 취약점 완화 체계 구축 방안 (Vulnerability Mitigation System Construction Method Based on ATT&CK in M ilitary Internal Network Environment)

  • 안광현;이한희;박원형;강지원
    • 융합보안논문지
    • /
    • 제20권4호
    • /
    • pp.135-141
    • /
    • 2020
  • 국방부는 주기적인 사이버방호 훈련을 실시함에 따라 사이버작전의 전력과 역량을 보강하고 있다. 하지만 적 사이버공격 능력 수준을 고려할 때 군의 사이버방호 능력 수준은 현저히 낮으며 군용 네트워크망에 대한 사이버위협을 대응할 수 있는 보호대책과 대응체계가 명확하게 설계되어 있지 않아 민·관의 사이버보안 능력 수준에도 못 미치고 있는 실태이다. 따라서 본 논문에서는 국내·외 사이버보안 프레임워크를 참조하여 국방 네트워크망 취약점 완화 체계를 구축할 수 있는 요소로 군 특수성을 지닌 군 내부망 주요 위협 정보 및 국방정보시스템 보안 요구사항을 파악하고, 공격자의 의도파악과 전술, 기법 및 절차 정보(ATT&CK)를 적용하여 국방 네트워크 환경에 대한 사이버공격을 효율적으로 보호 해주는 군 내부망 취약점 완화 체계 구축 방안을 제안한다.

국방정보시스템 사이버복원력 수준 평가를 위한 성숙도모델에 관한 연구 (A Study on Maturity Model for the Assessment of Cyber Resilience Level in the Defence Information System)

  • 최재혁;김완주;임재성
    • 정보보호학회논문지
    • /
    • 제29권5호
    • /
    • pp.1153-1165
    • /
    • 2019
  • 최근 국방 분야를 포함한 국가정보통신망 및 주요 기반시설 등에 대한 해킹 위협이 증가하고 있다. 국방정보시스템은 망분리를 통해 외부로부터의 위협에 대응하고 있으나, 해킹 성공시 전 평시 군사작전에 큰 영향을 미치게 된다. 오늘날 사이버 공격과 위협은 예측 불가능한 수준으로 높아지고 있어 해킹 위협을 완전히 차단하고 예방하는 것은 현실적으로 불가능하다. 따라서 본 연구에서는 국방정보시스템의 사이버 공격 징후가 예상되거나 발생했을 경우 신속한 대응 및 시스템의 생존성을 보장하고 지속성을 유지할 수 있는 능력인 '사이버복원력(Cyber Resilience)'의 수준을 평가할 수 있는 성숙도모델을 제시하였다. 제시된 성숙도모델을 통해 국방정보시스템의 사이버복원력 수준을 평가하고 부족한 분야를 식별 및 보완함으로써 국방정보시스템의 사이버보안 수준을 향상시키는데 기여할 수 있을 것으로 기대된다.

Corruption as a Threat to Economic Security of the Country

  • Samiilenko, Halyna;Ivanova, Nataliia;Shaposhnykova, Iryna;Vasylchenko, Lidiia;Solomakha, Iryna;Povna, Svitlana
    • International Journal of Computer Science & Network Security
    • /
    • 제21권12호
    • /
    • pp.316-322
    • /
    • 2021
  • The problem of corruption and the spread of corruption crime today is not only one of the main social problems, but also an obstacle to the implementation of reforms in Ukraine. Given the complexity, scale and diversity of the impact of corruption, it is an undisputed threat to national security. At the state level, corruption threatens, firstly, state security as a result of its spread in public authorities and the combination of political and business spheres; secondly, in the domestic political sphere as a result of non-compliance and violation by officials of public authorities and local governments of the laws of Ukraine; thirdly, in the economic sphere as a result of the dominance of personal interests of civil servants over national ones; fourthly, in other spheres, namely, military, social, ecological, informational, foreign policy, etc. The origins of corruption are diverse and are formed not only in the country but also abroad. The current corruption threat is the result of the country's ineffective domestic and foreign anticorruption policies. Acceleration of the spread and manifestation of external corruption threats is associated with a number of unresolved foreign policy issues against the background of the development of globalization and integration processes, in particular: economic and financial dependence of the country on international financial institutions and organizations; as well as from foreign countries that pose a potential threat due to their ambitious plans to expand our country; unresolved issues regarding the international legal consolidation of borders, etc. It is noted that the current conditions for the development of state security, due to new challenges and threats, need to improve and implement new measures to prevent corruption as a negative impact of the main threats to national economic security. As a result of the study, the main measures to counter the main threats to the economic security of the state were identified.

비전통 위협에 대한 국방 업무수행체계 유지방안 (감염병 위협 중심으로) (Consideration for defense preparedness against non-traditional security threats (focused on the threat of infectious diseases))

  • 권혁진;신동규;신용주
    • 인터넷정보학회논문지
    • /
    • 제23권1호
    • /
    • pp.105-112
    • /
    • 2022
  • 국방은 감염병과 같은 비전통 위협에 대한 직·간접적인 영향에서도 중단없는 의사결정 업무 수행이 필요하다. 모든 업무는 정보시스템을 활용하기에 정보시스템의 가용성을 보장하는 것이 매우 중요하다. 특히, 국방업무는 보안관리 측면에서 네트워크를 국방망과 상용인터넷망으로 이원화하여 수행되고 있다. 본 연구는 효과적인 국방정보체계 운용을 통해서 인터넷에서 수행되는 업무의 효율성과 보안의 효과성을 고려한 업무수행 방안을 제시하였다. 국방망과 상용인터넷이 연결되는 네트워크 접점을 최소화하고 다양한 업무 중 우선순위가 높은 것을 선정하여 효율적으로 운용하는 방안이 필요하디. 이를 위해 A기관을 대상으로 실제 사례를 조사하고 특성을 제시하였다. 본 논문에서 제시한 국방업무의 효과성을 향상하고 보안성을 보장하기 위한 대상 업무와 운용방안을 통해 감염병과 같은 비전통 위협에서도 업무수행의 가용성을 높일 수 있을 것이다.

예비역 간부 활용이 군에 미치는 효과 연구 (A Study on the Effect of the Use of Reserve Officers on the Military)

  • 한봉규;양금용;김각규
    • 한국군사과학기술학회지
    • /
    • 제23권2호
    • /
    • pp.147-158
    • /
    • 2020
  • Korea Ministry of National Defense has directed the state-of-the-art technology Forces troops structures that can respond to security threats in all directions through the Defense Innovation 2.0, which aims to reorganize the personnel and organizations in response to population decline. An implement of effective analysis to maintain combat power is necessary due to possible restrictions on combat power, especially in division of mobilization where reserve manpower is operated frequently. In this study, the normal operations of the reserve officers were investigated, the direct effects of the combat forces of the reserve officers was analyzed using ARENA modeling, and the budget required to operate the innovation and indirect effects of employment of veterans were studied. The result of the simulation proved to be effective in demonstrating unit combat power when the reserve officer was in full-time operations and economic benefits were also significant in terms of efficiency of defense budget management.

사이버 안보를 위한 군(軍) 정보보호 전문인력 양성방안 (Measures for Training Military Information Security Professional Personnel for Cyber Security)

  • 이광호;김흥택
    • 융합보안논문지
    • /
    • 제17권2호
    • /
    • pp.145-151
    • /
    • 2017
  • 우리 군의 사이버 공간은 적으로부터 지속적인 위협을 받고 있다. 이 같은 사이버 위협에 대응하는 수단은 결국 군(軍) 정보보호 전문인력이다. 하지만 현재 우리군의 고급 정보보호 전문인력은 소수에 불과하며 체계적인 양성계획은 미비한 상태이다. 따라서 본 논문에서는 세계 주요국인 미국, 영국, 이스라엘, 그리고 일본의 사이버 전문인력 양성정책을 조사하였다. 그리고 국내 정보보호 전문인력 양성정책을 조사하여 간략하게 제시하였다. 그리고 국방 사이버안보 전문인력 양성을 위해 4단계 전문인력 양성 및 중장기 계획 수립, 단계별 교육체계 정립, 인증제 도입을 제시하였다.

전술정보통신체계(TICN)에 적합한 침입탐지 기법 (An Intrusion Detection Technique Suitable for TICN)

  • 이윤호;이수진
    • 한국군사과학기술학회지
    • /
    • 제14권6호
    • /
    • pp.1097-1106
    • /
    • 2011
  • Tactical Information Communication Network(TICN), a concept-type integrated Military Communication system that enables precise command control and decision making, is designed to advance into high speed, large capacity, long distance wireless relay transmission. To support mobility in battlefield environments, the application of Ad-hoc networking technology to its wireless communication has been examined. Ad-hoc network works properly only if the participating nodes cooperate in routing and packet forwarding. However, if selfish nodes not forwarding packets of other nodes and malicious nodes making the false accusation are in the network, it is faced to many threats. Therefore, detection and management of these misbehaving nodes is necessary to make confident in Ad-hoc networks. To solve this problem, we propose an efficient intrusion detection technique to detect and manage those two types of attacks. The simulation-based performance analysis shows that our approach is highly effective and can reliably detect a multitude of misbehaving node.

동아시아 정세와 한국해군의 잠수함 운용방안 - 미국의 대중(對中) 전략과 일본의 전력 증강을 중심으로 - (Environments in the East Asia and the way to Utilize Submarines for ROKN: Focused the issue on both American Strategy against China and Japanese Arms Race)

  • 허송
    • Strategy21
    • /
    • 통권42호
    • /
    • pp.318-346
    • /
    • 2017
  • Currently, security environmental instability is getting worse than ever in the East Asia including to Republic of Korea(ROK). Unlike several conventional issues such as maritime dispute -sometimes with islands- and competitions for getting natural resources, contemporary security dilemma issues followed by arms races among states deepens the power gap between strong and weak state within the region. It is notable that the arms races is the East Asia are mainly focused on naval power. As navy is the very possible force that influences neighboring states, submarine power is usually valued for its nature of stealth, mobile and aggression. Moreover, the submarine power is believed to be one of the highest valued weapon system since it shows actual effectiveness for influencing the other states while avoiding direct military conflicts compared to surface power. As a result, all states within the region are accelerating for getting such power these days. Japan, Most of all, is one of the leading state that aims to ensure self-survival and enlarge military influences under the US-Japan alliance by decisively supporting its power to the American containment strategy against China. In this regard, such movement surely sill influence on ROK both directly and indirectly as we sue the common field, the sea. Though, it has lots of restrictions for us to confront them with military forces as such confrontations within US-led alliances is not desirable upon considering current China and nK threats. As a result, ROK needs to limit the realm of alliance within the region while maintaining ROK-US alliance for getting national interests with both legal and justice superiority against Japan. This paper, as a result, is focused on suggesting the way to utilize submarines as a mean of naval power for both current security environments and the rising maritime threats in the East Asia. I concluded to participate ROK submarines in US-led military strategy against China by dispatching them into the East-China Sea and the North-East area of the Korean peninsula to protect both national interests and justice at the same tome. It should be one of the preemptive measure for confronting with neighboring states by utilizing strategic benefits of submarines while strengthening ROK-US alliances upon participating American Containment Strategy against China.