• Title/Summary/Keyword: cyber forces

Search Result 25, Processing Time 0.018 seconds

A Study on the Multi-Tactical Data Link Data Management (다중 전술 데이터링크 데이터 관리에 대한 연구)

  • Hwang, Jung-Eun;Lee, Kang;Jung, Suk-Ho
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.15 no.3
    • /
    • pp.457-464
    • /
    • 2020
  • ROK Forces operate Link-11, Link-16 and Korean Tactical Data Link System with Link-K(JTDLS: Joint Tactical Data Link System). As the change from Link-11 to Link-22 approaches, in the JTDLS Completed Business will be added tactical data link processing such as Link-22. In this paper, we propose the data management structure for data from multiple tactical data links. Also, we simulate to find ways to process a lot of data quickly using Shared Memory, In-Memory DB, Self Development DB in DLP, and then we confirm the result.

A Study on the New Vulnerability of Inducing Service Charge Doctoring SSID of Smartphone Based on Android (안드로이드폰 SSID 변조를 통한 새로운 과금 유발 취약점에 관한 연구)

  • Heo, Geon-Il;Yoo, Hong-Ryul;Park, Chan-Uk;Park, Won-Hyung
    • Convergence Security Journal
    • /
    • v.10 no.4
    • /
    • pp.21-30
    • /
    • 2010
  • Wireless network is one of the 2010's most important security issues. As smartphone is popularize, the number of Wireless Internet users is really growing and wireless AP spring up everywhere. But most wireless AP haven't being managed properly in terms of security, Wireless Internet users also don't recognize important of security. This situation causes grave security threats. This paper design and analyze a new cyber attack whose it circulates malware via QR code and activates Mobile AP to induce service charge. The new vulnerability we suggest forces to activate Mobile AP of smartphone based on Android and responds to all Probe Request are generated around, and brings induction of service charge and communication problems in its train.

Curriculum and Characterization Subjects Development for Department of IT convergence Based Army Contract (군계약 IT융복합학과를 위한 특성화 교과목 및 교육과정 개발)

  • Choi, Chul-Jae
    • Journal of the Korea Society of Computer and Information
    • /
    • v.19 no.5
    • /
    • pp.129-137
    • /
    • 2014
  • This study proposed an IT convergence curriculum for educating the Non-Commissioned Officers. This program was produced by the comprehensive reference to the curriculums of military academies and systematic and rational modelling. The key features of the proposed curriculum are to consolidate the following three areas to meet the needs of the NCO, a recipient of the education. First, IT related subjects were posed as a mainstay of the curriculum that is critical for the scientific and information advancement of the forces. Second, the military leadership courses were included in the effective management of the soldiers. Third, military counseling certificate courses were included, a ground breaking trial nationally. In addition to this, we presented a characterized courses that focus on hands-on skills and knowledge for performing the duties of the NCO.

A Study on the Iconization of Che Guevara Expressed in Contemporary Fashion (현대 패션에 나타난 체 게바라(Che Guevara)의 아이콘화에 관한 연구)

  • Kim, Hye-Jeong
    • Journal of the Korean Society of Costume
    • /
    • v.56 no.3 s.102
    • /
    • pp.1-11
    • /
    • 2006
  • Che Guevara spearheading the Cuban Revolution was not only the icon as the revolutionary to the New-leftists of the 1960s advocating the ideology of Marxism but, as the cultural revolutionary, had a tremendous influence on the younger generation living in the digital age Che Guevara take on a figure of both the symbol of the Leftist but the romantic revolutionary because he had the external features such as black beret, red stars, military upper jackets and trousers, beard and pipe tobacco. In fact, the symbolic image of Che Guevara was made as the popular image by the avantgarde artists and political vanguard forces of the times under the necessity of Cuban government. Afterwards, the image of Che Guevara has been patronized in making people of aware of the resistant and revolutionary image to capital, power and the power of the media and symbolized as the resistant image to the American capital as well as the revolutionary guerrilla. And his image has continued to be reproduced and symbolized for the commercial and political purposes and as the enthusiastic image of youth culture. This can be seen as having been created as a new image by the popular culture formed by the development of the cyber culture and mass media in the cyberspace shaped by contemporary 'N' generations. The use of Che Guevara's symbolic image was made in the fashion field as well as in the cultural and artistic circles. The borrowing of the icon of Che Guevara represented in a fashion field is attributed to his free spirit, and it can be seen that fashion exists as the vehicle for representing both the symbol system and the sign system containing ideologies and texts as the communicator of resistance to the regime and to social issues. Therefore, this study attempted to investigate the commercial iconization of Che Guevara in the 1990s by comparing the ideology of the symbol in the 1960s and the 1990s and inquire into the borrowing of his image by the fashion domain as well as the fashion worn by him by reference to domestic books and materials on the fashion site. Thereby, this study attempted to make clear that the borrowing of Che Guevara in the realm of fashion since the 1990s not only contained the meaningful interpretation as the symbolic code in the culture of young people living in a digital era but fashion performs an intervening role in the cultural phenomenon.

Detecting gold-farmers' group in MMORPG by analyzing connection pattern (연결패턴 정보 분석을 통한 온라인 게임 내 불량사용자 그룹 탐지에 관한 연구)

  • Seo, Dong-Nam;Woo, Ji-Young;Woo, Kyung-Moon;Kim, Chong-Kwon;Kim, Huy-Kang
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.3
    • /
    • pp.585-600
    • /
    • 2012
  • Security issues in online games are increasing as the online game industry grows. Real money trading (RMT) by online game users has become a security issue in several countries including Korea because RMT is related to criminal activities such as money laundering or tax evasion. RMT-related activities are done by professional work forces, namely gold-farmers, and many of them employ the automated program, bot, to gain cyber asset in a quick and efficient way. Online game companies try to prevent the activities of gold-farmers using game bots detection algorithm and block their accounts or IP addresses. However, game bot detection algorithm can detect a part of gold-farmer's network and IP address blocking also can be detoured easily by using the virtual private server or IP spoofing. In this paper, we propose a method to detect gold-farmer groups by analyzing their connection patterns to the online game servers, particularly information on their routing and source locations. We verified that the proposed method can reveal gold-farmers' group effectively by analyzing real data from the famous MMORPG.