• Title/Summary/Keyword: Threat Intelligence

Search Result 128, Processing Time 0.021 seconds

A Methodology for SDLC of AI-based Defense Information System (AI 기반 국방정보시스템 개발 생명주기 단계별 보안 활동 수행 방안)

  • Gyu-do Park;Young-ran Lee
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.33 no.3
    • /
    • pp.577-589
    • /
    • 2023
  • Ministry of National Defense plans to harness AI as a key technology to bolster overall defense capability for cultivation of an advanced strong military based on science and technology based on Defense Innovation 4.0 Plan. However, security threats due to the characteristics of AI can be a real threat to AI-based defense information system. In order to solve them, systematic security activities must be carried out from the development stage. This paper proposes security activities and considerations that must be carried out at each stage of AI-based defense information system. Through this, It is expected to contribute to preventing security threats caused by the application of AI technology to the defense field and securing the safety and reliability of defense information system.

Is ChatGPT an Ally or an Enemy? Its Impact on Society Based on a Systematic Literature Review

  • Juliana Basulo-Ribeiro;Leonor Teixeira
    • Journal of Information Science Theory and Practice
    • /
    • v.12 no.2
    • /
    • pp.79-95
    • /
    • 2024
  • The new AI based conversational chatbot, ChatGPT, launched in November 2022, is causing a stir. There are many opinions about this being a 'threat or a promise,' and thus it is important to understand what has been said about this tool and, based on the growing literature that has emerged on the subject, demystify its effective impact on society. To analyse this impact, a systematic literature review with the support of the preferred reporting items for systematic reviews and meta-analysis protocol was used. The data, scientific documents, were collected using the main scientific databases - SCOPUS and Web of Science - and the results were presented based on a bibliometric and thematic exploration of content. The main findings indicate that people are increasingly using this chatbot in more diverse areas. Therefore, this study contributes at the practical level, aiming to enlighten people in general - both in professional and personal life - about this tool and its impacts. Also, it contributes at the theoretical level, which involves expanding understanding and elucidation of the impacts of ChatGPT in different areas of study.

Contents application airport security equipment·facility for terror prevention (테러방지를 위한 콘텐츠 응용 공항보안 장비·시설)

  • Kang, maeng-jin
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2008.05a
    • /
    • pp.228-235
    • /
    • 2008
  • Terror for airplane, airport and passengers of the problems is being threat over the world. and since 9.11 terror of 2001 year, many countries have endeavored to prevent terror and have manipulate airport security part as important field. Especially, The U.S.A made Transportation security Administration in Homeland security adminstration and strongly execute for policies related anti-terror. many countries over the world enforce airport and airplane security facilities with science-technology contents. and with security exploitation for the passengers and freight security inspection level enforcement, many countries also make effort to interupt aviation terror threat. In this process, in the center of developed countries that need science-technology contents adaption, much budget and personals are invested and exploited a security inspection instrument and complimented of many facilities As a result, according to the development of science-technology, prevention of Terror have much developed. The contents using intelligence-communication technology inevitably needed on the goal of terror prevention and safty. From simple monitoring for the people who come in and out airport to boarding process and inspection for the freight, security inspection process for the passengers, bio information input, confirmation, of the level that there is no cases of adaption of contents, The reality have generalized of using contents. The study is going to research contents application situation.

  • PDF

Development of Smart Livestock Disease Control Strategies and Policy Priorities (스마트 가축방역 추진전략 및 정책 우선순위)

  • Lee, Jeongyoung;Ko, Sang Min;Kim, Meenjong;Ji, Yong Gu;Kim, Hoontae
    • The Journal of Society for e-Business Studies
    • /
    • v.23 no.4
    • /
    • pp.109-126
    • /
    • 2018
  • With massive and dense production, the livestock industry is rapidly moving into a large-scale, capital-intensive industry especially in swine, poultry, and ducks. However, livestock epidemics can pose a serious threat to the livestock industry and the lives of the people. The government has established and operates the National Animal Protection and Prevention System (KAHIS) since 2013 in order to control the threat, in accordance with the five stages. The digitalized data and information are excellent in ease of management, but it is also pointed out that it is difficult to take countermeasures through linkage with the data in an emergency situation. Recently, the technology of the fourth industrial revolution such as Internet of Things (IoT), Big Data, Artificial intelligence (AI) has been rapidly implemented to the livestock industry, which makes smart livestock disease control system possible. Therefore, this study investigated the domestic and overseas cases which apply 4th Industrial Revolution technology in the industry, and derived 13 possible candidate tasks in the near future. In order to ascertain the priority of policy formulation, we surveyed the expert groups and examined the priority of each of the five stages of the prevention and the priority of each stage. The results of this study are expected to contribute to the establishment of policies for the advancement of smart livestock disease control research and livestock protection.

A Research on Adversarial Example-based Passive Air Defense Method against Object Detectable AI Drone (객체인식 AI적용 드론에 대응할 수 있는 적대적 예제 기반 소극방공 기법 연구)

  • Simun Yuk;Hweerang Park;Taisuk Suh;Youngho Cho
    • Journal of Internet Computing and Services
    • /
    • v.24 no.6
    • /
    • pp.119-125
    • /
    • 2023
  • Through the Ukraine-Russia war, the military importance of drones is being reassessed, and North Korea has completed actual verification through a drone provocation towards South Korea at 2022. Furthermore, North Korea is actively integrating artificial intelligence (AI) technology into drones, highlighting the increasing threat posed by drones. In response, the Republic of Korea military has established Drone Operations Command(DOC) and implemented various drone defense systems. However, there is a concern that the efforts to enhance capabilities are disproportionately focused on striking systems, making it challenging to effectively counter swarm drone attacks. Particularly, Air Force bases located adjacent to urban areas face significant limitations in the use of traditional air defense weapons due to concerns about civilian casualties. Therefore, this study proposes a new passive air defense method that aims at disrupting the object detection capabilities of AI models to enhance the survivability of friendly aircraft against the threat posed by AI based swarm drones. Using laser-based adversarial examples, the study seeks to degrade the recognition accuracy of object recognition AI installed on enemy drones. Experimental results using synthetic images and precision-reduced models confirmed that the proposed method decreased the recognition accuracy of object recognition AI, which was initially approximately 95%, to around 0-15% after the application of the proposed method, thereby validating the effectiveness of the proposed method.

Artificial Intelligence Strategy for Advertising and Media Industries: Focused on In-depth Interviews (광고 및 미디어 산업 분야의 인공지능(AI) 활용 전략 : 심층인터뷰를 중심으로)

  • Cha, Young Ran
    • The Journal of the Korea Contents Association
    • /
    • v.18 no.9
    • /
    • pp.102-115
    • /
    • 2018
  • The world's major countries carry forward strategies for enhancing industrial competitiveness, resulting in the fourth industrial revolution while a new growth engine is required to deal with the slow growth of global economy and declining productivity. Artificial intelligence (AI) is regarded as a core technology of the fourth industrial revolution. AI is expected to be implemented rapidly in advertising and media industries. However, it is hard to find an effective way to implement AI in these industries, especially because of how quickly the AI market changes and develops. Therefore, this study seeks the possible industrial influence of AI in advertising and media industries and invigoration plan for AI, by an in-depth interview with 10 professionals who lead the AI market. First, it was analyzed to explore the macroscopic side of the AI market through P (Politics), E (Economy), S (Society), and T (Technology). Also, the applicability of AI in advertising and media industries was explored by analyzing its S (Strength), W (Weakness), O (Opportunity), and T (Threat).The result indicates that it is necessary to build up a nation-wide construction of infrastructure for the fourth industrial revolution to invigorate AI in advertising and media industries. Moreover, a social environment capable of overcoming a hyper-connected society and social risks should be fostered. Lastly, it is urgent for both the industrial and academic world to diagnose the influence of AI in advertising and media industries, to anticipate the future in accordance with technological advance, set a proper direction, to invest actively for technical development of AI, and to formulate innovative policies.

Development and Assessment of LSTM Model for Correcting Underestimation of Water Temperature in Korean Marine Heatwave Prediction System (한반도 고수온 예측 시스템의 수온 과소모의 보정을 위한 LSTM 모델 구축 및 예측성 평가)

  • NA KYOUNG IM;HYUNKEUN JIN;GYUNDO PAK;YOUNG-GYU PARK;KYEONG OK KIM;YONGHAN CHOI;YOUNG HO KIM
    • The Sea:JOURNAL OF THE KOREAN SOCIETY OF OCEANOGRAPHY
    • /
    • v.29 no.2
    • /
    • pp.101-115
    • /
    • 2024
  • The ocean heatwave is emerging as a major issue due to global warming, posing a direct threat to marine ecosystems and humanity through decreased food resources and reduced carbon absorption capacity of the oceans. Consequently, the prediction of ocean heatwaves in the vicinity of the Korean Peninsula is becoming increasingly important for marine environmental monitoring and management. In this study, an LSTM model was developed to improve the underestimated prediction of ocean heatwaves caused by the coarse vertical grid system of the Korean Peninsula Ocean Prediction System. Based on the results of ocean heatwave predictions for the Korean Peninsula conducted in 2023, as well as those generated by the LSTM model, the performance of heatwave predictions in the East Sea, Yellow Sea, and South Sea areas surrounding the Korean Peninsula was evaluated. The LSTM model developed in this study significantly improved the prediction performance of sea surface temperatures during periods of temperature increase in all three regions. However, its effectiveness in improving prediction performance during periods of temperature decrease or before temperature rise initiation was limited. This demonstrates the potential of the LSTM model to address the underestimated prediction of ocean heatwaves caused by the coarse vertical grid system during periods of enhanced stratification. It is anticipated that the utility of data-driven artificial intelligence models will expand in the future to improve the prediction performance of dynamical models or even replace them.

Lessons learned from Operation Iraqi Freedom(OIF) for ROK forces (이라크전쟁의 군사적 교훈)

  • Mun, Gwang-Geon
    • Journal of National Security and Military Science
    • /
    • s.1
    • /
    • pp.71-111
    • /
    • 2003
  • The key lessons of the very complex modern war can be dangerously misleading to the outsiders. The efforts trying to draw lessons learned from the Iraq War (OIF : Operation Iraqi Freedom) may be biased by the view of point by Americans, because most of war episodes have been come from the Western media coverage. More serious bias can be committed thanks to the differences of warfighting doctrines and military technology between US forces and ROK forces. However, OIF-fought allied commanders and outside military experts said this campaign exemplified 21st-century warfare: swift, agile and decisive, employing overpowering technology to bring relentless violence to bear in many places at once. Even though the campaign evolved differently than anticipated, allied forces regrouped and regained the initiative remarkably quickly, thanks in large part to a new command flexibility, tied to new technology that made possible the more rapid sharing of data. These factors permitted "new air-land dynamic". The things that compel that are good sensors networked with good intelligence disseminated through a robust networking system, which then yields speed. Speed turns out to be a very important factor for conducting "Rapid Decisive Operations" relied on joint "Mass of Effects". ROK forces facing the heaviest ground threat in the world may learn more from Cold War era-typed US Army 3rd Infantry Division (3ID), which operating considerably beyond existing doctrine. 3ID flew its personnel into Kuwait to meet up with equipment already located in the region as pre-positioned stock. During OIF, the division conducted continuous offensive operations over 230km deep battlespace for 21 days. The lessons learned for ROK army to prepare tomorrow's war may be found from 3ID in its training, command and control, task organization, firepower and battlespace management, and logistics.

  • PDF

The Composition and Analytical Classification of Cyber Incident based Hierarchical Cyber Observables (계층적 침해자원 기반의 침해사고 구성 및 유형분석)

  • Kim, Young Soo;Mun, Hyung-Jin;Cho, Hyeisun;Kim, Byungik;Lee, Jin Hae;Lee, Jin Woo;Lee, Byoung Yup
    • The Journal of the Korea Contents Association
    • /
    • v.16 no.11
    • /
    • pp.139-153
    • /
    • 2016
  • Cyber incident collected from cyber-threat-intelligence sharing Center is growing rapidly due to expanding malicious code. It is difficult for Incident analysts to extract and classify similar features due to Cyber Attacks. To solve these problems the existing Similarity Analysis Method is based on single or multiple cyber observable of similar incidents from Cyber Attacks data mining. This method reduce the workload for the analysis but still has a problem with enhancing the unreality caused by the provision of improper and ambiguous information. We propose a incident analysis model performed similarity analysis on the hierarchically classified cyber observable based on cyber incident that can enhance both availability by the provision of proper information. Appling specific cyber incident analysis model, we will develop a system which will actually perform and verify our suggested model.

A Study on the Operation Concept of Cyber Warfare Execution Procedures (사이버전 수행절차 운영개념에 관한 연구)

  • Kim, Sung-Joong;Yoo, JiHoon;Oh, HaengRok;Shin, Dongil;Shin, DongKyoo
    • Journal of Internet Computing and Services
    • /
    • v.21 no.2
    • /
    • pp.73-80
    • /
    • 2020
  • Due to the expansion of cyber space, war patterns are also changing from traditional warfare to cyber warfare. Cyber warfare is the use of computer technology to disrupt the activities of nations and organizations, especially in the defense sector. However, the defense against effective cyber threat environment is inadequate. To complement this, a new cyber warfare operation concept is needed. In this paper, we study the concepts of cyber intelligence surveillance reconnaissance, active defense and response, combat damage assessment, and command control in order to carry out cyber operations effectively. In addition, this paper proposes the concept of cyber warfare operation that can achieve a continuous strategic advantage in cyber battlefield.