• Title/Summary/Keyword: Space Threat

Search Result 146, Processing Time 0.03 seconds

Evaluation of the Combat Aircraft Susceptibility Against Surface-Based Threat Using the Weighted Score Algorithm

  • Kim, Joo-Young;Kim, Jin-Young;Lee, Kyung-Tae
    • International Journal of Aeronautical and Space Sciences
    • /
    • v.12 no.4
    • /
    • pp.396-402
    • /
    • 2011
  • Aircraft combat survivability is an essential factor in the design of combat aircrafts that operate in an enemy air defense area. The combat aircrafts will be confronted with anti-aircraft artillery and/or surface-to-air missiles (SAM) from the ground, and their survivability can be divided into two categories: susceptibility and vulnerability. This article studies the prediction of susceptibility in the case of a one-on-one engagement between the combat aircraft and a surface-based threat. The weighted score method is suggested for the prediction of susceptibility parameters, and Monte Carlo simulations are carried out to draw qualitative interpretation of the susceptibility characteristics of combat aircraft systems, such as the F-16 C/D, and the hypersonic aircraft, which is under development in the United States, versus ground threat from the SAM SA-10.

North Korean Cyber Warfare Threat and South Korean Action (북한의 사이버전 위협분석과 대응방안 고찰)

  • Kim, Doo-Hyun
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.14 no.2
    • /
    • pp.1-10
    • /
    • 2014
  • In this study, I analyzed the increased threat of cyber warfare and the threat of reality about what is happening around the currently. And to prepare for it, I proposed the fact how main developed countries deal with cyber warfare. Also, I presented North Korea's cyber warfare threat which is equipped with world's top 3 cyber warfare performance and the way how their strategy influence to South Korea's national security. Moreever, I studied the existing North Korea's cyber warfare threat and the way how, how South Korea deal with it and prepare to against expected threat of cyber warfare in future.

Threat Classification Schemes for Effective Management based on W-TMS(Wireless-Threat Management System) (W-TMS(Wireless-Threat Management System)에서의 효율적 관리를 위한 위협 분류기법)

  • Seo, Jong-Won;Jo, Je-Gyeong;Lee, Hyung-Woo
    • The Journal of the Korea Contents Association
    • /
    • v.7 no.3
    • /
    • pp.93-100
    • /
    • 2007
  • Internet had spread in all fields with the fast speed during the last 10 years. Lately, wireless network is also spreading rapidly. Also, number of times that succeed attack attempt and invasion for wireless network is increasing rapidly TMS system was developed to overcome these threat on wireless network. Existing TMS system supplies active confrontation mechanism on these threats. However, existent TMS has limitation that new form of attack do not filtered efficiently. Therefor this paper proposes a new method that it automatically compute the threat from the imput packets with vector space model and detect anomaly detection of wireless network. Proposed mechanism in this research analyzes similarity degree between packets, and detect something wrong symptom of wireless network and then classify these threats automatically.

A Study on the Response to Acts of Unlawful Interference by Insider Threat in Aviation Security (항공보안 내부자 위협에 의한 불법방해행위의 대응을 위한 연구)

  • Sang-hoon Lim;Baek-yong Heo;Ho-won Hwang
    • Journal of Advanced Navigation Technology
    • /
    • v.27 no.1
    • /
    • pp.16-22
    • /
    • 2023
  • Terrorists have been attacking in the vulnerable points of aviation sector with the diverse methods of attacks. Recently, Vulnerability is increasing because the Modus Operandi of Terrorism is carried out by exploitation of people in the form of employee working in aviation sector whose role provides them with privileged access to secured locations, secured items or security sensitive information. Furthermore, cases of insider threat are rising across the world with the phenomenon of personal radicalization through internet and social network service. The government of ROK must respond to insider threat could exploit to acts of unlawful interference and the security regulations should be established to prevent from insider threat in advance refer to the acts of unlawful interference carried out in foreign countries and the recommendations by USA, UK and ICAO.

A Conceptual Design of Knowledge-based Real-time Cyber-threat Early Warning System (지식기반 실시간 사이버위협 조기 예.경보시스템)

  • Lee, Dong-Hwi;Lee, Sang-Ho;J. Kim, Kui-Nam
    • Convergence Security Journal
    • /
    • v.6 no.1
    • /
    • pp.1-11
    • /
    • 2006
  • The exponential increase of malicious and criminal activities in cyber space is posing serious threat which could destabilize the foundation of modem information society. In particular, unexpected network paralysis or break-down created by the spread of malicious traffic could cause confusion and disorder in a nationwide scale, and unless effective countermeasures against such unexpected attacks are formulated in time, this could develop into a catastrophic condition. As a result, there has been vigorous effort and search to develop a functional state-level cyber-threat early-warning system however, the efforts have not yielded satisfying results or created plausible alternatives to date, due to the insufficiency of the existing system and technical difficulties. The existing cyber-threat forecasting and early-warning depend on the individual experience and ability of security manager whose decision is based on the limited security data collected from ESM (Enterprise Security Management) and TMS (Threat Management System). Consequently, this could result in a disastrous warning failure against a variety of unknown and unpredictable attacks. It is, therefore, the aim of this research to offer a conceptual design for "Knowledge-based Real-Time Cyber-Threat Early-Warning System" in order to counter increasinf threat of malicious and criminal activities in cyber suace, and promote further academic researches into developing a comprehensive real-time cyber-threat early-warning system to counter a variety of potential present and future cyber-attacks.

  • PDF

Determination of Waypoints to Maximize the Survivability of UAV against Anti-air Threats (대공위협에 대한 무인기 생존성 최대화 경로점 결정기법)

  • Park, Sanghyuk;Hong, Ju-Hyeon;Ha, Hyun-Jong;Ryoo, Chang-Kyung;Shin, Wonyoung
    • Journal of the Korean Society for Aeronautical & Space Sciences
    • /
    • v.42 no.2
    • /
    • pp.127-133
    • /
    • 2014
  • This paper proposes a determination method of waypoints to maximize the survivability of a UAV. Voronoi diagram which is used for the initial selection of waypoint candidates is the most widely used path planning technique to avoid the threat as far as possible when the location and strength of the threat are given. But if threat strength is different each other and flight path is constrained along with straight lines, Voronoi diagram has limitations in real applications. In this study, the initial waypoints obtained from Voronoi diagram are optimized considering the shape of each threat. Here, a waypoint is optimized while adjacent waypoints are fixed. By repeating this localized optimization until whole waypoints are converged, computation time for finding the best waypoints is greatly reduced.

Data Quality Analysis of Korean GPS Reference Stations Using Comprehensive Quality Check Algorithm (종합적 품질평가 기법을 이용한 국내 GPS 상시관측소의 데이터 품질 분석)

  • Kim, Minchan;Lee, Jiyun
    • Journal of the Korean Society for Aeronautical & Space Sciences
    • /
    • v.41 no.9
    • /
    • pp.689-699
    • /
    • 2013
  • During extreme ionospheric storms, anomalous ionospheric delays and gradients could cause potential integrity threats to users of GNSS (Global Navigation Satellite System) augmentation systems. GNSS augmentation ground facilities must monitor these ionospheric anomalies defined by a threat model and alarm the users of safely-of-life applications within time-to-alerts. Because the ionospheric anomaly threat model is developed using data collected from GNSS reference stations, the use of poor-quality data can degrade the performance of the threat model. As the total number of stations increases, the number of station with poor GNSS data quality also increases. This paper analyzes the quality of data collected from Korean GPS reference stations using comprehensive GNSS data quality check algorithms. The results show that the range of good and poor qualities varies noticeably for each quality parameter. Especially erroneous ionospheric delay and gradients estimates are produced due to poor quality data. The results obtained in this study should be a basis for determining GPS data quality criteria in the development of ionospheric threat models.

Determination of flight route using optimal control theory (최적 제어 이론을 사용한 비행 경로 선정)

  • 김을곤
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 1992.10a
    • /
    • pp.407-411
    • /
    • 1992
  • A method for optimal route planning is presented with the assumption that the overall defended area is known in terms of threat potential function. This approach employes tangent plane to reduce the dimension of the state space for optimal programming problems with a state equality constraint. One-dimensional search algorithm is used to select the optimal route among the extermal fields which are obtained by integrating three differential equations from the initial values. In addition to being useful for the route planning through threat potential area, the trajectory planning will be suitable for general two-dimensional searching problems.

  • PDF

A Study of Threat Evaluation using Learning Bayesian Network on Air Defense (베이지안 네트워크 학습을 이용한 방공 무기 체계에서의 위협평가 기법연구)

  • Choi, Bomin;Han, Myung-Mook
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.22 no.6
    • /
    • pp.715-721
    • /
    • 2012
  • A threat evaluation is the technique which decides order of priority about tracks engaging with enemy by recognizing battlefield situation and making it efficient decision making. That is, in battle situation of multiple target it makes expeditious decision making and then aims at minimizing asset's damage and maximizing attack to targets. Threat value computation used in threat evaluation is calculated by sensor data which generated in battle space. Because Battle situation is unpredictable and there are various possibilities generating potential events, the damage or loss of data can make confuse decision making. Therefore, in this paper we suggest that substantial threat value calculation using learning bayesian network which makes it adapt to the varying battle situation to gain reliable results under given incomplete data and then verify this system's performance.

A Study on Determination of the Size of Battery Position in Consideration of Enemy Threat (적 위협을 고려한 포병진지 규모결정에 관한 연구)

  • 허화만;김충영
    • Journal of the military operations research society of Korea
    • /
    • v.23 no.2
    • /
    • pp.155-170
    • /
    • 1997
  • Currently, increasing the number of artillery units requires more deployment space in FABA. However, available positions of artillery units in FEBA is limited due to mountainous terrains. Therefore, it is hard to find enough artillery position space in accordance with the field artillery mannual. This paper studies on determination of the size of battery position in order to maximize the firing-effectiveness and to minimize the enemy threat. Also, it studies the possibility of reducing the size of a battery position. The optimum size of a battery position id obtained by using Dantzig's model and Supper Quick II model which produces the probability of kill data with various input data. As a result, it shows that the size of battery position can be reduced without decreasing the firing-effectiveness.

  • PDF