• Title/Summary/Keyword: National defense information network

Search Result 232, Processing Time 0.033 seconds

Defense Strategy of Network Security based on Dynamic Classification

  • Wei, Jinxia;Zhang, Ru;Liu, Jianyi;Niu, Xinxin;Yang, Yixian
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.12
    • /
    • pp.5116-5134
    • /
    • 2015
  • In this paper, due to the network security defense is mainly static defense, a dynamic classification network security defense strategy model is proposed by analyzing the security situation of complex computer network. According to the network security impact parameters, eight security elements and classification standard are obtained. At the same time, the dynamic classification algorithm based on fuzzy theory is also presented. The experimental analysis results show that the proposed model and algorithm are feasible and effective. The model is a good way to solve a safety problem that the static defense cannot cope with tactics and lack of dynamic change.

Analyzing Knowledge Structure of Defense Area using Keyword Network Analysis

  • Lee, Yong-Kyu;Yoon, Soung-Woong;Lee, Sang-Hoon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.23 no.10
    • /
    • pp.173-180
    • /
    • 2018
  • In this paper, we analyzed key keywords and research themes in the field of defense research using keyword network analysis and tried to grasp the whole knowledge structure. To do this, we extracted data from 2,165 research data from defense related research institutes from 2010 to 2017 and applied the Pareto rule to the number of abstracts of words and the number of links between words, We extracted a total of 2,303 words based on the criterion and extracted 204 final key words through component analysis. By analyzing the centrality and cohesiveness through these key words, we confirmed the concept of core research in the defense field and derived a total of 7 large groups and 16 small groups of each group in the knowledge structure of the defense area.

Provider's Mobility Supporting Proactive Neighbor Pushing Scheme in CCN (CCN에서 정보제공자의 이동성 지원을 위한 푸싱 기법)

  • Woo, Taehee;Kwon, Taewook
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.19 no.6
    • /
    • pp.721-729
    • /
    • 2016
  • CCN(Content-Centric Network) enables users to retrieve content using the content's name. Researchers face critical challenges in terms of mobility. Since the routing information is part of the content name, when the provider moves, it is necessary to update all the routers routing information. However, this requires significant costs. In this paper, we propose PNPCCN(Proactive Neighbor Pushing CCN), considering the popularity and rarity of mobility support, for providers in CCN environments. Via simulation studies, we demonstrate that our solutions are effective in terms of shorter numbers of retransmitted Interest packets, and average download times and higher delivery ratios during mobility.

Estimating Qualitative Intimacy among Users in Social Networks (Social Networks 사용자간의 친밀도 산정)

  • Oh, Jung-Woon;Yoon, Soung-Woong;Lee, Sang-Hoon
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2008.06c
    • /
    • pp.31-35
    • /
    • 2008
  • Social Network는 웹 환경에서 개인을 중심으로 뻗어 나가는 연결로서 사용자별 프로필을 탐색하고 새로운 연결 및 정보의 소통을 지원한다. 이러한 상호신뢰를 바탕으로 구축된 Social Network 환경 내 구성원들이 가지고 있는 속성(Feature)을 이용하여 사용자간 친밀도를 산정한다면 친구 및 동호회 추천 등 Social Network 내부의 효율 향상 뿐만 아니라 웹 검색 등 다양한 사용자간의 공통 활동에도 응용할 수 있다. 본 논문에서는 Social Network 사용자간 친밀도를 산정하기 위한 방법을 제시한다. 기존의 친밀도가 없이 구성되어 있는 사용자간의 관계를 사용자의 속성(Feature)에 내재된 정보를 이용하여 주제의 유사성과 접근성을 이용하여 산정하였으며, 이는 Social Network 성격의 규명과 사용자의 정보 요구에 대한 판단의 척도로 사용될 수 있다.

  • PDF

Finding Naval Ship Maintenance Expertise Through Text Mining and SNA

  • Kim, Jin-Gwang;Yoon, Soung-woong;Lee, Sang-Hoon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.24 no.7
    • /
    • pp.125-133
    • /
    • 2019
  • Because military weapons systems for special purposes are small and complex, they are not easy to maintain. Therefore, it is very important to maintain combat strength through quick maintenance in the event of a breakdown. In particular, naval ships are complex weapon systems equipped with various equipment, so other equipment must be considered for maintenance in the event of equipment failure, so that skilled maintenance personnel have a great influence on rapid maintenance. Therefore, in this paper, we analyzed maintenance data of defense equipment maintenance information system through text mining and social network analysis(SNA), and tried to identify the naval ship maintenance expertise. The defense equipment maintenance information system is a system that manages military equipment efficiently. In this study, the data(2,538cases) of some naval ship maintenance teams were analyzed. In detail, we examined the contents of main maintenance and maintenance personnel through text mining(word cloud, word network). Next, social network analysis(collaboration analysis, centrality analysis) was used to confirm the collaboration relationship between maintenance personnel and maintenance expertise. Finally, we compare the results of text mining and social network analysis(SNA) to find out appropriate methods for finding and finding naval ship maintenance expertise.

Design of Mobbing Value Computation Algorithm and Classification Model based on Social Network (Social Network 기반 Mobbing 지수 산정 알고리즘 및 분류 모델 설계)

  • Kim, Guk-Jin;Park, Gun-Woo;Lee, Sang-Hoon
    • Annual Conference of KIPS
    • /
    • 2009.04a
    • /
    • pp.352-355
    • /
    • 2009
  • 본 논문에서는 Mobbing(집단 따돌림) 현상에 관련된 7개의 요소(Factor)와 그 하위에 포함된 60개의 속성(Attribute)들을 선정한다. 다음으로 선정한 속성들에 대해 나와 사용자들 사이에 관계가 있으면 '1', 관계가 없으면 '0'으로 표현하고, 나와 사용자들간의 유사도 산정을 위해 각 요소안에 포함된 속성들의 합에 유사도 함수를 적용한다. 다음으로 클레멘타인의 인공신경망 알고리즘을 통해 속성들을 포함한 요소들이 취할 최적의 가중치를 산출하고, 이 값들의 총합으로 Mobbing 지수를 산정한다. 마지막으로 Social Network 사용자들의 Mobbing 지수를 본 논문에서 설계한 G2 Mobbing 성향 분류 모델(4개의 그룹; Ideal Group of the Social Network, Bullies, Aggressive victimes, Victimes)에 매핑하여 사용자들의 Mobbing 성향을 알아본다.

Arms Value Algorithm: Identifying Core Node using Social Network Analysis in C2 System (Arms Value Algorithm: 소셜 네트워크 분석 기반 C2 체계 핵심노드 식별)

  • Won, Jong-Hyun;Park, Gun-Woo;Lee, Sang-Hoon
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2011.06a
    • /
    • pp.13-16
    • /
    • 2011
  • 최근 들어 네트워크1로 연결된 체계들을 효율적으로 운영하여 최대의 효과를 달성하기 많은 연구들이 수행되고 있다. 하지만 지휘통제체계 네트워크 구조 분석에 관한 연구는 상대적으로 미흡한 실정이다. 따라서 본 연구에서는 지휘통제체계 중 육군의 SPIDER체계를 대상으로 소설 네트워크 분석 (Social Network analysis)기법을 이용하여 중앙성분석과 시각화(Visualization)를 통해 핵심노드를 식별하는 arms value 알고리즘을 제안하고 분석 결과를 기반으로 TICN체계 전력화시 기초 연구자료로 활용하고자 한다.

Performance analysis of information propagation in DTN-like scale-free mobile social network

  • Wang, Zhifei;Deng, Su;Huang, Hongbin;Wu, Yahui
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.8 no.11
    • /
    • pp.3984-3996
    • /
    • 2014
  • Mobile social network can be seen as a specific application of the DTN (Delay Tolerant Network), in which the information propagation can be impacted by many social behaviors of the nodes. For a specific node, its social behaviors are various. For example, the node may not be interested in the information before receiving it and may also discard the information after getting it. On the other hand, people are more willing to forward the message to his friends. These interactive behaviors between nodes can be seen as social behaviors. It is easy to see that the impact of the social behaviors is related to the social ties, which can be manifested by the structure of the social network. State of the art works often simply assumes that the social networks can be divided into some communities. At present, some works find that the structure of some social networks is scale-free. To overcome this problem, this paper proposes a theoretical model to evaluate the impact of above social behaviors in the DTN-like scale-free network. Simulation shows the accuracy of the model. Numerical results show that both social behaviors and scale-free character have significant impact on information propagation. Moreover, the impact of social behaviors is related to the scale-free character of the networks.

Consideration for defense preparedness against non-traditional security threats (focused on the threat of infectious diseases) (비전통 위협에 대한 국방 업무수행체계 유지방안 (감염병 위협 중심으로))

  • Kwon, Hyukjin;Shin, Donggyu;Shin, Youngjoo
    • Journal of Internet Computing and Services
    • /
    • v.23 no.1
    • /
    • pp.105-112
    • /
    • 2022
  • The national defense requires uninterrupted decision-making, even under direct or indirect impacts on non-traditional threats such as infectious diseases. Since all work utilizes the information system, it is very important to ensure the availability of the information system. In particular, in terms of security management, defense work is being performed by dividing the network into a national defense network and a commercial Internet network. This study suggests a work execution plan that takes into account the efficiency of work performed on the Internet and the effectiveness of security through effective defense information system operation. It is necessary to minimize the network contact point between the national defense network and the commercial Internet, and to select a high-priority one among various tasks and operate it efficiently. For this purpose, actual cases were investigated for "A" institution and characteristics were presented. Through the targeted tasks and operation plans to improve the effectiveness of defense tasks and ensure security, presented in this paper, it will be possible to increase the availability of task performance even in non-traditional threats such as infectious diseases.