• 제목/요약/키워드: National defense information network

검색결과 231건 처리시간 0.023초

An Efficient Detection And Management Of False Accusation Attacks In Hierarchical Ad-Hoc Networks

  • Lee, Yun-Ho;Yoo, Sang-Guun;Lee, Soo-Jin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제6권7호
    • /
    • pp.1874-1893
    • /
    • 2012
  • An approach to detect abnormal activities based on reputations created individually by each node is vulnerable to a false accusation since intrusion detection in ad-hoc networks is done in a distributed and cooperative manner. Detection of false accusation is considered important because the efficiency or survivability of the network can be degraded severely if normal nodes were excluded from the network by being considered as abnormal ones in the intrusion detection process. In this paper, we propose an improved reputation-based intrusion detection technique to efficiently detect and manage false accusations in ad-hoc networks. Additionally, we execute simulations of the proposed technique to analyze its performance and feasibility to be implemented in a real environment.

Constellation Multi-Objective Optimization Design Based on QoS and Network Stability in LEO Satellite Broadband Networks

  • Yan, Dawei;You, Peng;Liu, Cong;Yong, Shaowei;Guan, Dongfang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제13권3호
    • /
    • pp.1260-1283
    • /
    • 2019
  • Low earth orbit (LEO) satellite broadband network is a crucial part of the space information network. LEO satellite constellation design is a top-level design, which plays a decisive role in the overall performance of the LEO satellite network. However, the existing works on constellation design mainly focus on the coverage criterion and rarely take network performance into the design process. In this article, we develop a unified framework for constellation optimization design in LEO satellite broadband networks. Several design criteria including network performance and coverage capability are combined into the design process. Firstly, the quality of service (QoS) metrics is presented to evaluate the performance of the LEO satellite broadband network. Also, we propose a network stability model for the rapid change of the satellite network topology. Besides, a mathematical model of constellation optimization design is formulated by considering the network cost-efficiency and stability. Then, an optimization algorithm based on non-dominated sorting genetic algorithm-II (NSGA-II) is provided for the problem of constellation design. Finally, the proposed method is further evaluated through numerical simulations. Simulation results validate the proposed method and show that it is an efficient and effective approach for solving the problem of constellation design in LEO satellite broadband networks.

A Weighted Block-by-Block Decoding Algorithm for CPM-QC-LDPC Code Using Neural Network

  • Xu, Zuohong;Zhu, Jiang;Zhang, Zixuan;Cheng, Qian
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제12권8호
    • /
    • pp.3749-3768
    • /
    • 2018
  • As one of the most potential types of low-density parity-check (LDPC) codes, CPM-QC-LDPC code has considerable advantages but there still exist some limitations in practical application, for example, the existing decoding algorithm has a low convergence rate and a high decoding complexity. According to the structural property of this code, we propose a new method based on a CPM-RID decoding algorithm that decodes block-by-block with weights, which are obtained by neural network training. From the simulation results, we can conclude that our proposed method not only improves the bit error rate and frame error rate performance but also increases the convergence rate, when compared with the original CPM-RID decoding algorithm and scaled MSA algorithm.

소셜 네트워크 분석과 지휘통제시간을 고려한 네트워크 영향력 요소 분석 (Analysis of Network Influence Factor considering Social Network Analysis and C2 Time)

  • 전진태;박건우;이상훈
    • 한국컴퓨터정보학회논문지
    • /
    • 제16권2호
    • /
    • pp.257-266
    • /
    • 2011
  • 사회 문화 전반에 걸쳐 각종 체계를 네트워크로 연결하여 정보를 공유하고 다양화하려는 시도가 지속적으로 이루어지고 있다. 이러한 변화에 부합하여, 군 전쟁 수행방식은 개별 전투체계를 기반으로 하는 플랫폼 중심 전쟁(Platform Centric Warfare)에서 정밀 화력 및 네트워크를 기반으로 하는 네트워크 중심 전쟁(Network Centric Warfare)으로 개념이 바뀌고 있다. 더불어, 이러한 네트워크로 연결된 체계들을 효율적으로 운영하여 최대의 효과를 달성하기 위한 노력이 지속적으로 이루어지고 있다. 그러나 이러한 분야의 연구는 민간분야에서는 활발히 진행 중이나, 아직까지 군 네트워크 체계 분석에 대한 연구는 상대적으로 미흡한 실정이다. 따라서 본 논문에서는 최근 사회, 과학적으로 폭 넓게 활용되고 있는 소셜 네트워크 분석(Social Network Analysis)방법을 군 네트워크 체계에 적용하여 네트워크 구조적 영향력 요소를 규명한다. 이때 지휘통제시간을 효과 측정수단으로 분석하여, 이와 소셜 네트워크 분석요소와 상관관계를 규명한다. 본 연구를 통해 향후 발전적인 네트워크 구성을 위한 네트워크 영향력 요소를 식별하였다는데 가치가 있다.

A Study on the Use of Ubiquitous Technologies in Military Sector

  • Ju Min-Seong;Kim Seok-Soo
    • International Journal of Contents
    • /
    • 제2권2호
    • /
    • pp.6-9
    • /
    • 2006
  • The style of war in the $21^{st}$ century became digitalized cooperative union tactic, which relies heavily on the system providing real time information. Critical information is provided during the war from sensing to shooting. Therefore, epochal development in observation, reconnaissance (ISR), commanding (C4I) and precision strike (PGM) are necessary. Application of ubiquitous computing and network technologies in national defense is necessary for carrying out with various types of wars in the $21^{st}$ century. Therefore, the author wants to research core technology sector that can be developed and applied in preparation of ubiquitous national defense era. Also plans for applying recent u-Defense technology to the military sector had been suggested. Particularly, the author have suggested plans for utilizing combined future information technologies such as ad-hoc network, RFID for the logistic supply in construction of u-Defense system. By utilizing these information technologies, combat power and strategic capabilities of the military can be enhanced greatly.

  • PDF

Influence Assessment Model of a Person within Heterogeneous Networks Based on Networked Community

  • Kim, Tae-Geon;Yoon, Soungwoong;Lee, Sang-Hoon
    • 한국컴퓨터정보학회논문지
    • /
    • 제23권10호
    • /
    • pp.181-188
    • /
    • 2018
  • In this paper, we tried to investigate whether the influence of 'I' in a heterogeneous network of physical network and virtual network can be quantitatively measurable. To do this, we used Networked Community(NC) methodology to devise a concrete model of influence assessment in heterogeneous network. In order to test the model, we conducted an experiment with Donald J. Trump and his surroundings to evaluate the effectiveness of this influence assessment model. Experimentation included the measurement of impacts on the physical and virtual networks, and the impact on the networked community. Using Trump's case, we found that analyzing only one of the two networks can not accurately analyze the impact on others.

An Intelligent MAC Protocol Selection Method based on Machine Learning in Wireless Sensor Networks

  • Qiao, Mu;Zhao, Haitao;Huang, Shengchun;Zhou, Li;Wang, Shan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제12권11호
    • /
    • pp.5425-5448
    • /
    • 2018
  • Wireless sensor network has been widely used in Internet of Things (IoT) applications to support large and dense networks. As sensor nodes are usually tiny and provided with limited hardware resources, the existing multiple access methods, which involve high computational complexity to preserve the protocol performance, is not available under such a scenario. In this paper, we propose an intelligent Medium Access Control (MAC) protocol selection scheme based on machine learning in wireless sensor networks. We jointly consider the impact of inherent behavior and external environments to deal with the application limitation problem of the single type MAC protocol. This scheme can benefit from the combination of the competitive protocols and non-competitive protocols, and help the network nodes to select the MAC protocol that best suits the current network condition. Extensive simulation results validate our work, and it also proven that the accuracy of the proposed MAC protocol selection strategy is higher than the existing work.

소셜 네트워크 분석 기반 C2 체계 네트워크 파워 평가 알고리즘 (Evaluating Algorithm for Network Power Using Social Network Analysis in C2 System)

  • 김동석;박건우;이상훈
    • 한국정보과학회:학술대회논문집
    • /
    • 한국정보과학회 2012년도 한국컴퓨터종합학술대회논문집 Vol.39 No.1(B)
    • /
    • pp.80-82
    • /
    • 2012
  • 전쟁수행 패러다임이 변화하면서 NCW 환경에서 발생하는 네트워크 파워를 측정하려는 많은 연구들이 수행되고 있다. 그러나 기존의 연구는 현실의 전장환경내 구축되어 있는 C2 체계의 네트워크 구조와 각 시스템간의 상호운용성 요소를 평가에 반영하지 못하고 있다. 따라서 본 연구에서는 최근 다양한 분야에서 활용되고 있는 소셜 네트워크 분석 기법을 적용하여 다수의 지휘통제체계에 의해 구축되는 네트워크 구조를 평가할 수 있는 알고리즘을 제안한다. 제안한 알고리즘을 통해 진화하는 군 C2 체계의 네트워크 구조를 대상으로 평가 결과를 분석해보았으며, 연결성에 근거한 네트워크 구조에 상호운용성 가치를 반영함으로써 보다 실질적인 네트워크 파워를 제시함에 그 목적이 있다.

A Blockchain-enabled Multi-domain DDoS Collaborative Defense Mechanism

  • Huifen Feng;Ying Liu;Xincheng Yan;Na Zhou;Zhihong Jiang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제17권3호
    • /
    • pp.916-937
    • /
    • 2023
  • Most of the existing Distributed Denial-of-Service mitigation schemes in Software-Defined Networking are only implemented in the network domain managed by a single controller. In fact, the zombies for attackers to launch large-scale DDoS attacks are actually not in the same network domain. Therefore, abnormal traffic of DDoS attack will affect multiple paths and network domains. A single defense method is difficult to deal with large-scale DDoS attacks. The cooperative defense of multiple domains becomes an important means to effectively solve cross-domain DDoS attacks. We propose an efficient multi-domain DDoS cooperative defense mechanism by integrating blockchain and SDN architecture. It includes attack traceability, inter-domain information sharing and attack mitigation. In order to reduce the length of the marking path and shorten the traceability time, we propose an AS-level packet traceability method called ASPM. We propose an information sharing method across multiple domains based on blockchain and smart contract. It effectively solves the impact of DDoS illegal traffic on multiple domains. According to the traceability results, we designed a DDoS attack mitigation method by replacing the ACL list with the IP address black/gray list. The experimental results show that our ASPM traceability method requires less data packets, high traceability precision and low overhead. And blockchain-based inter-domain sharing scheme has low cost, high scalability and high security. Attack mitigation measures can prevent illegal data flow in a timely and efficient manner.