• Title/Summary/Keyword: Threat

Search Result 2,703, Processing Time 0.033 seconds

An Effective Threat Evaluation Algorithm for Multiple Ground Targets in Multi-target and Multi-weapon Environments

  • Yoon, Moonhyung;Park, Junho;Yi, Jeonghoon
    • International Journal of Contents
    • /
    • v.15 no.1
    • /
    • pp.32-38
    • /
    • 2019
  • In an environment where a large number of weapons are operated compared to a large number of ground targets, it is important to monitor and manage the targets to set up a fire plan, and through their multilateral analysis, to equip them with a priority order process for targets having a high threat level through the quantitative calculation of the threat level. Existing studies consider the anti-aircraft and anti-ship targets only, hence, it is impossible to apply the existing algorithm to ground weapon system development. Therefore, we proposed an effective threat evaluation algorithm for multiple ground targets in multi-target and multi-weapon environments. Our algorithm optimizes to multiple ground targets by use of unique ground target features such as proximity degree, sorts of weapons and protected assets, target types, relative importance of the weapons and protected assets, etc. Therefore, it is possible to maximize an engagement effect by deducing an effective threat evaluation model by considering the characteristics of ground targets comprehensively. We carried out performance evaluation and verification through simulations and visualizations, and confirmed high utility and effect of our algorithm.

Extraction of Network Threat Signatures Using Latent Dirichlet Allocation (LDA를 활용한 네트워크 위협 시그니처 추출기법)

  • Lee, Sungil;Lee, Suchul;Lee, Jun-Rak;Youm, Heung-youl
    • Journal of Internet Computing and Services
    • /
    • v.19 no.1
    • /
    • pp.1-10
    • /
    • 2018
  • Network threats such as Internet worms and computer viruses have been significantly increasing. In particular, APTs(Advanced Persistent Threats) and ransomwares become clever and complex. IDSes(Intrusion Detection Systems) have performed a key role as information security solutions during last few decades. To use an IDS effectively, IDS rules must be written properly. An IDS rule includes a key signature and is incorporated into an IDS. If so, the network threat containing the signature can be detected by the IDS while it is passing through the IDS. However, it is challenging to find a key signature for a specific network threat. We first need to analyze a network threat rigorously, and write a proper IDS rule based on the analysis result. If we use a signature that is common to benign and/or normal network traffic, we will observe a lot of false alarms. In this paper, we propose a scheme that analyzes a network threat and extracts key signatures corresponding to the threat. Specifically, our proposed scheme quantifies the degree of correspondence between a network threat and a signature using the LDA(Latent Dirichlet Allocation) algorithm. Obviously, a signature that has significant correspondence to the network threat can be utilized as an IDS rule for detection of the threat.

Research on the Implementation of Infrared Threat Surrogate for DIRCM Performance Analysis (지향성 적외선 방해장치 성능분석을 위한 위협체모사기 구축에 관한 연구)

  • Chun, Seung-Woo;Kim, Joy;Cho, Soo-Hyung;Kim, Jae-Hyup;Yu, Hyun-Geun
    • Journal of the Korea Society of Computer and Information
    • /
    • v.20 no.3
    • /
    • pp.97-106
    • /
    • 2015
  • In this paper, the development of infrared threat surrogate system is described and it can be used to verify the performance of DIRCM system. In this research, threat surrogates are manufactured using same F# and reflective optics used in 1st- and 2nd-Gen. real seeker so that the threat surrogate system can be used to develop code-based jamming techniques. Also the threat surrogate system can analyze the saturation jamming effect for image seeker using FPA detector. The result shows that 1st- and 2nd-generation threat surrogates have relatively precise tracking performance and jamming effect.

Air Threat Evaluation System using Fuzzy-Bayesian Network based on Information Fusion (정보 융합 기반 퍼지-베이지안 네트워크 공중 위협평가 방법)

  • Yun, Jongmin;Choi, Bomin;Han, Myung-Mook;Kim, Su-Hyun
    • Journal of Internet Computing and Services
    • /
    • v.13 no.5
    • /
    • pp.21-31
    • /
    • 2012
  • Threat Evaluation(TE) which has air intelligence attained by identifying friend or foe evaluates the target's threat degree, so it provides information to Weapon Assignment(WA) step. Most of TE data are passed by sensor measured values, but existing techniques(fuzzy, bayesian network, and so on) have many weaknesses that erroneous linkages and missing data may fall into confusion in decision making. Therefore we need to efficient Threat Evaluation system that can refine various sensor data's linkages and calculate reliable threat values under unpredictable war situations. In this paper, we suggest new threat evaluation system based on information fusion JDL model, and it is principle that combine fuzzy which is favorable to refine ambiguous relationships with bayesian network useful to inference battled situation having insufficient evidence and to use learning algorithm. Finally, the system's performance by getting threat evaluation on an air defense scenario is presented.

A Study on Establishment of Cyber Threat Information Sharing System Focusing on U.S. Case (사이버 위협정보 공유체계 구축방안에 관한 연구 - 미국 사례를 중심으로 -)

  • Kim, Dong Hee;Park, Sangdon;Kim, So Jeong;Yoon, Oh-Jun
    • Convergence Security Journal
    • /
    • v.17 no.2
    • /
    • pp.53-68
    • /
    • 2017
  • Today, information sharing is recognized as a means to effectively prevent cyber attacks, which are becoming more intelligent and advanced, so that many countries such as U.S., EU, UK, Japan, etc. are establishing cyber threat information sharing system at national level. In particular, the United States has enacted the "Cyber Threat Information Sharing Act (CISA)" in December 2015, and has been promoting the establishment of a legal and institutional basis for sharing threat information and the implementation of the system. Korea is sharing cyber threat information in public and private sectors mainly through the National Cyber Security Center(NCSC) and the Korea Internet & Security Agency(KISA). In addition, Korean government is attempting to strengthen and make legal basis for unified cyber threat information sharing system through establishing policies. However, there are also concerns about issues such as leakage of sensitive information of companies or individuals including personal identifiable information that may produced during the cyber threat information sharing process, reliability and efficiency issues of the main agents who gather and manage information. In this paper, we try to derive improvement plans and implications by comparing and analyzing cyber threat information sharing status between U.S. and Korea.

Dynamic Dependability Level Switching Strategies by Utilizing Threat Predictions

  • Lim, Sung-Hwa
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.22 no.2
    • /
    • pp.15-25
    • /
    • 2017
  • A System can be more Dependable from some types of Threats if the Dependability Level Against the Threat on the System is Increased. However, The Dependability-performance Tradeoff should be Considered because the Increased Dependability may Degrade the Performance of the System. Therefore, it is Efficient to Temporally Increase the Dependability Level to High only when an Threat is Predicted on the System in a Short time while Maintaining the Level in Low or mid in Normal Situations. In this Paper, we Present a Threat Prevention Strategy for a Networked Node by Dynamically Changing the Dependability Level According to the Threat Situation on its Logically/physically Neighboring Nodes. As case Studies, we Employ our Strategy to an Internet Server Against TCP SYN Flood Attacks and to a Checkpoint and Rollback System Against Transient Faults. Our Performance Analysis Shows that our Strategy can Effectively Relieve the Damage of the Failure without Serious Performance Degradation.

Security Threat Evaluation for Smartgrid Control System (스마트그리드 제어시스템 보안 위협 평가 방안 연구)

  • Ko, Jongbin;Lee, Seokjun;Shon, Taeshik
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.23 no.5
    • /
    • pp.873-883
    • /
    • 2013
  • Security vulnerability quantification is the method that identify potential vulnerabilities by scoring vulnerabilities themselves and their countermeasures. However, due to the structural feature of smart grid system, it is difficult to apply existing security threat evaluation schemes. In this paper, we propose a network model to evaluate smartgrid security threat for AMI and derive attack scenarios. Additionally, we show that the result of security threat evaluation for proposed network model and attack scenario by applying MTTC scheme.

A Study on the Establishment of Threat Hunting Concept and Comparative Analysis of Defense Techniques (위협 헌팅 개념 정립 및 방어기법 비교분석에 관한 연구)

  • Ryu, Ho Chan;Jeong, Ik Rae
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.31 no.4
    • /
    • pp.793-799
    • /
    • 2021
  • Recently, there has been a growing interest in threat hunting presented to overcome the limitations of existing security solutions. Threat hunting is generally recognized as a technique for identifying and eliminating threats that exit inside the system. But, the definition is not clear, so there is confusion in terms with penetration testing, intrusion detection, and incident analysis. Therefore, in this paper, compare and analyze the definitions of threat hunting extracted from reports and papers to clarify their implications and compare with defense techniques.

Doing More by Seeing Less: Gritty Applicants are Less Sensitive to Facial Threat Cues

  • Shin, Ji-eun;Lee, Hyeonju
    • Science of Emotion and Sensibility
    • /
    • v.25 no.1
    • /
    • pp.21-28
    • /
    • 2022
  • People differ greatly in their capacity to persist in the face of challenges. Despite significant research, relatively little is known about cognitive factors that might be involved in perseverance. Building upon human threat-management mechanism, we predicted that perseverant people would be characterized by reduced sensitivity (i.e., longer detection latency) to threat cues. Our data from 5,898 job applicants showed that highly perseverant individuals required more time to correctly identify anger in faces, regardless of stimulus type (dynamic or static computer-morphed faces). Such individual differences were not observed in response to other facial expressions (happiness, sadness), and the effect was independent of gender, dispositional anxiety, or conscientiousness. Discussions were centered on the potential role of threat sensitivity in effortful pursuit of goals.

The Azimuth Calculation Algorithm of Pulse-Doppler Radar for GVES (지상 기동 장비용 펄스 도플러 레이더의 방위각 계산 알고리즘)

  • Park, Gyu-Churl;Ha, Jong-Soo
    • The Journal of Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.21 no.9
    • /
    • pp.947-954
    • /
    • 2010
  • The decision of threat target in the MWR(Missile Warning Radar) of GVES(Ground Vehicle Equipment System) such as MBT(Main Battle Tank) is very important. Threat decision is judged by angular rate and the accurate azimuth calculation for good threat decision is very important. The angular rate is dependent upon the direction of an approaching target. The target is classified into a threat or non-threat using a boundary condition of the angular rate. This paper presents the eighth azimuth calculation methods and compares the results.