• 제목/요약/키워드: Threat

검색결과 2,719건 처리시간 0.027초

적기의 위협 평가 자동화를 위한 퍼지 규칙 방법론 (Fuzzy Rule-Based Method for Air Threat Evaluation)

  • 최병주;김지은;김진수;김창욱
    • 한국군사과학기술학회지
    • /
    • 제19권1호
    • /
    • pp.57-65
    • /
    • 2016
  • Threat evaluation is a process to estimate the threat score which enemy aerial threat poses to defended assets. The objective of threat evaluation is concerned with making an engagement priority list for optimal weapon allocation. Traditionally, the threat evaluation of massive air threats has been carried out by air defence experts, but the human decision making is less effective in real aerial attack situations with massive enemy fighters. Therefore, automation to enhance the speed and efficiency of the human operation is required. The automatic threat evaluation by air defense experts who will perform multi-variable judgment needs formal models to accurately quantify their linguistic evaluation of threat level. In this paper we propose a threat evaluation model by using a fuzzy rule-based inference method. Fuzzy inference is an appropriate method for quantifying threat level and integrating various threat attribute information. The performance of the model has been tested with a simulation that reflected real air threat situation and it has been verified that the proposed model was better than two conventional threat evaluation models.

퍼지추론을 이용한 정량적 사이버 위협 수준 평가방안 연구 (A Study on the Quantitative Threat-Level Assessment Measure Using Fuzzy Inference)

  • 이광호;김종화;김지원;윤석준;김완주;정찬기
    • 융합보안논문지
    • /
    • 제18권2호
    • /
    • pp.19-24
    • /
    • 2018
  • 이 연구에서는 사이버 위협을 평가할 시 복합적인 요소들을 고려한 위협 수준의 정량적 평가방안을 제안하였다. 제안된 평가방안은 공격방법과 행위자, 위협유형에 따른 강도, 근접성의 4가지 사이버 위협 요소를 기반으로 퍼지이론을 사용하여 사이버 위협 수준을 정량화하였다. 본 연구를 통해 제시된 사이버 위협 수준 평가는 언어로 표현된 위협 정보를 정량화된 데이터로 제시해 조직이 위협의 수준을 정확하게 평가하고 판단할 수 있다.

  • PDF

방위각 변화율을 이용한 방호용레이다 위협 판단 알고리즘 (Threat Decision Algorithm of Missile Warning Radar Using Azimuth Angular Rate)

  • 하종수
    • 한국군사과학기술학회지
    • /
    • 제11권1호
    • /
    • pp.93-101
    • /
    • 2008
  • It is difficult for a MWR(Missile Warning Radar) to perform a threat decision accurately since there is no tracking part which gives more accurate threat information to the MWR. In this paper, the threat decision algorithm is proposed using an azimuth angular rate to improve the accuracy. The azimuth angular rate is dependent upon the direction of an approaching target. The target is classified into a threat or non-threat using a boundary condition of the azimuth angular rate. The boundary condition is determined using the Monte-Carlo simulation. The performance of the proposed algorithm is evaluated using this condition at field tests of MWR. The efficiency of the proposed method for the threat decision is proved by comparing the results of field tests with the simulation results.

전장 헬기의 다중센서 시뮬레이터를 통한 위협통합 및 구현 (Threat Unification using Multi-Sensor Simulator of Battlefield Helicopter and Its Implementation)

  • 박헌우;강신봉;노상욱;정운섭
    • 인터넷정보학회논문지
    • /
    • 제10권3호
    • /
    • pp.35-49
    • /
    • 2009
  • 전자전 환경에서 헬기는 헬기생존체계(aircraft survivability equipment: ASE)의 다양한 센서를 통하여 수집한 데이터를 기반으로 헬기에 대한 위협을 식별한다. 헬기의 성공적인 임무 수행 및 생존을 위하여 헬기에 대한 위협을 반복적으로 확인할 수 있는 시뮬레이터의 구현은 필수적이다. 본 논문에서는 (1) 전장 헬기의 센서가 수신하는 위협요소를 정의하는 위협속성 생성기, (2) 전장환경과 유사한 위협을 정규, 균일, 지수 분포로 생성하는 위협자료 생성기 및 (3) 다양한 전장 시나리오에서 센서들이 수집한 데이터를 통합하여 위협의 방향과 정도를 사용자에게 실시간으로 보여주는 위협 분석 및 통합 표시기를 개발한다. 구현한 전장 헬기의 다중센서 위협 시뮬레이터를 이용하여 생성된 다양한 시나리오에서 다수의 위협에 대한 통합정확도를 측정하였다.

  • PDF

블록체인을 활용한 내부자 유출위협 데이터 공유 연구 (A Study on Insider Threat Dataset Sharing Using Blockchain)

  • 윤원석;장항배
    • Journal of Platform Technology
    • /
    • 제11권2호
    • /
    • pp.15-25
    • /
    • 2023
  • 본 연구는 유출위협 탐지 연구에 활용되는 유출위협 데이터 셋의 한계점을 분석하고 현재의 문제를 극복하기 위해 보안솔루션을 활용하여 공개된 유출위협 데이터와 비교 분석한다. 이를 통해 유출위협 탐지에 적합한 데이터 포맷을 설계하고 블록체인 기술을 사용하여 서로 다른 기관 및 기업 간 유출위협 정보를 안전하게 공유할 수 있는 시스템을 구현한다. 현재 연구원들에게 공개된 유출위협 데이터 셋에서 실제 사건을 기반으로 수집한 데이터 셋은 없다. 공개된 데이터 셋은 연구를 위해 임의로 만들어진 가상의 합성데이터로 학습모델로 사용 시 실제 환경에서의 많은 한계점이 존재한다. 본 연구에서는 이러한 한계점들을 개선하기 위해서 프라이빗 블록체인 설계하여 소속이 다른 기관끼리 안전한 정보공유를 위해 참여자 간 합의와 검증을 통해 신뢰성을 높이고 정보의 무결성과 정합성을 유지하는 방안을 도출하였다. 제시한 방법은 유출위협 수집기를 통해 데이터를 수집하고 블록체인 기반 공유 시스템을 통해 합성데이터가 아닌 실제 위협을 가했던 양질의 데이터 셋을 수집하여 현재의 유출위협 데이터 셋 문제를 해결하고 향후 내부자 유출위협 탐지 모델에 기여할 것으로 사료된다.

  • PDF

이기종 다중센서 위협데이터 통합 및 대응책 선정 알고리즘 (Algorithm for Threat Data Integration of Multiple Sensor and selection of CounterMeasures)

  • 고은경;우상민;정운섭
    • 한국군사과학기술학회지
    • /
    • 제14권3호
    • /
    • pp.474-481
    • /
    • 2011
  • The Electronic Warfare Computer for the Aircraft Survivability Equipment will improve the ability for countermeasures by analysis about threat information. This paper suggests method that threat data integration of multiple sensors(Radar Warning Receiver, Laser Warning Receiver, Missile Warning Receiver). The algorithm of threat data integration is based on detected threat sequence and azimuth information. The threat sequence information is analyzed in advance and the azimuth data is received from sensors. The suggested method is evaluated through simulation under the environment like real helicopter.

SVM을 이용한 교전영역 내 위협목록 획득방법 (The Threat List Acquisition Method in an Engagement Area using the Support Vector Machines)

  • 고혜승
    • 한국군사과학기술학회지
    • /
    • 제19권2호
    • /
    • pp.236-243
    • /
    • 2016
  • This paper presents a threat list acquisition method in an engagement area using the support vector machines (SVM). The proposed method consists of track creation, track estimation, track feature extraction, and threat list classification. To classify the threat track robustly, dynamic track estimation and pattern recognition algorithms are used. Dynamic tracks are estimated accurately by approximating a track movement using position, velocity and time. After track estimation, track features are extracted from the track information, and used to classify threat list. Experimental results showed that the threat list acquisition method in the engagement area achieved about 95 % accuracy rate for whole test tracks when using the SVM classifier. In case of improving the real-time process through further studies, it can be expected to apply the fire control systems.

사이버전 훈련을 위한 ATT&CK 기반 모의 위협 발생기 설계 및 구현 (The Design and Implementation of Simulated Threat Generator based on MITRE ATT&CK for Cyber Warfare Training)

  • 홍수연;김광수;김태규
    • 한국군사과학기술학회지
    • /
    • 제22권6호
    • /
    • pp.797-805
    • /
    • 2019
  • Threats targeting cyberspace are becoming more intelligent and increasing day by day. To cope with such cyber threats, it is essential to improve the coping ability of system security officers. In this paper, we propose a simulated threat generator that automatically generates cyber threats for cyber defense training. The proposed Simulated Threat Generator is designed with MITRE ATT & CK(Adversarial Tactics, Techniques and Common Knowledge) framework to easily add an evolving cyber threat and select the next threat based on the threat execution result.

위협 헌팅을 적용한 사이버 상황인식 시스템 개발에 관한 연구 (A Study for Cyber Situation Awareness System Development with Threat Hunting)

  • 이재연;최정인;박상현;김병진;현대원;김관영
    • 한국군사과학기술학회지
    • /
    • 제21권6호
    • /
    • pp.807-816
    • /
    • 2018
  • Threat hunting is defined as a process of proactively and iteratively searching through networks to detect and isolate advanced threats that evade existing security solutions. The main concept of threat hunting is to find out weak points and remedy them before actual cyber threat has occurred. And HMM(Hunting Maturity Matrix) is suggested to evolve hunting processes with five levels, therefore, CSOC(Cyber Security Operations Center) can refer HMM how to make them safer from complicated and organized cyber attacks. We are developing a system for cyber situation awareness system with pro-active threat hunting process called unMazeTM. With this unMaze, it can be upgraded CSOC's HMM level from initial level to basic level. CSOC with unMaze do threat hunting process not only detecting existing cyber equipment post-actively, but also proactively detecting cyber threat by fusing and analyzing cyber asset data and threat intelligence.

다대다 대응 위협평가 및 무기할당 알고리즘 연구: 탄도미사일 및 장사정포 위협을 중심으로 (A Study of Multi-to-Majority Response on Threat Assessment and Weapon Assignment Algorithm: by Adjusting Ballistic Missiles and Long-Range Artillery Threat)

  • 임준성;유병천;김주현;최봉완
    • 산업경영시스템학회지
    • /
    • 제44권4호
    • /
    • pp.43-52
    • /
    • 2021
  • In weapon assignment studies to defend against threats such as ballistic missiles and long range artillery, threat assessment was partially lacking in analysis of various threat attributes, and considering the threat characteristics of warheads, which are difficult to judge in the early flight stages, it is very important to apply more reliable optimal solutions than approximate solution using LP model, Meta heuristics Genetic Algorithm, Tabu search and Particle swarm optimization etc. Our studies suggest Generic Rule based threat evaluation and weapon assignment algorithm in the basis of various attributes of threats. First job of studies analyzes information on Various attributes such as the type of target, Flight trajectory and flight time, range and intercept altitude of the intercept system, etc. Second job of studies propose Rule based threat evaluation and weapon assignment algorithm were applied to obtain a more reliable solution by reflection the importance of the interception system. It analyzes ballistic missiles and long-range artillery was assigned to multiple intercept system by real time threat assessment reflecting various threat information. The results of this study are provided reliable solution for Weapon Assignment problem as well as considered to be applicable to establishing a missile and long range artillery defense system.