• Title/Summary/Keyword: defense information system

Search Result 1,135, Processing Time 0.022 seconds

Feasibility of Using Norad Orbital Elements for Pass Programming and Catalog Generation for High Resolution Satellite Images (고해상도 위성영상 촬영계획 수립 및 카탈로그 생성을 위한 NORAD 궤도 데이터의 이용 가능성 연구)

  • 신동석;김탁곤;곽성희;이영란
    • Korean Journal of Remote Sensing
    • /
    • v.15 no.2
    • /
    • pp.119-130
    • /
    • 1999
  • At present, many ground stations all over the world are using NORAD orbit element data in order to track and communicate with Earth orbiting satellites. The North American Aerospace Defense Command (NORAD) observes thousands of Earth orbiting objects on daily basis and provides their orbital information via internet. The orbital data provided by NORAD, which is also called two line element (TLE) sets, allows ground stations to predict the time-varying positions of satellites accurately enough to communicate with the satellites. In order to complete the mission of a high resolution remote sensing satellite which requires very high positional determination and control accuracy, however, a mission control and tracking ground station is dedicated for the observation and positional determination of the satellite rather than using NORAD orbital sets. In the case of KITSAT-3, NORAD orbital elements are currently used for image acquisition planning and for the processing of acquired images due to the absence of a dedicated KITSAT-3 tracking ground system. In this paper, we tested and analyzed the accuracy of NORAD orbital elements and the appropriate prediction model to determine how accurately a satellite acquisites an image of the location of interest and how accurately a ground processing system can generate the catalog of the images.

A Research on Network Intrusion Detection based on Discrete Preprocessing Method and Convolution Neural Network (이산화 전처리 방식 및 컨볼루션 신경망을 활용한 네트워크 침입 탐지에 대한 연구)

  • Yoo, JiHoon;Min, Byeongjun;Kim, Sangsoo;Shin, Dongil;Shin, Dongkyoo
    • Journal of Internet Computing and Services
    • /
    • v.22 no.2
    • /
    • pp.29-39
    • /
    • 2021
  • As damages to individuals, private sectors, and businesses increase due to newly occurring cyber attacks, the underlying network security problem has emerged as a major problem in computer systems. Therefore, NIDS using machine learning and deep learning is being studied to improve the limitations that occur in the existing Network Intrusion Detection System. In this study, a deep learning-based NIDS model study is conducted using the Convolution Neural Network (CNN) algorithm. For the image classification-based CNN algorithm learning, a discrete algorithm for continuity variables was added in the preprocessing stage used previously, and the predicted variables were expressed in a linear relationship and converted into easy-to-interpret data. Finally, the network packet processed through the above process is mapped to a square matrix structure and converted into a pixel image. For the performance evaluation of the proposed model, NSL-KDD, a representative network packet data, was used, and accuracy, precision, recall, and f1-score were used as performance indicators. As a result of the experiment, the proposed model showed the highest performance with an accuracy of 85%, and the harmonic mean (F1-Score) of the R2L class with a small number of training samples was 71%, showing very good performance compared to other models.

An Interpretable Log Anomaly System Using Bayesian Probability and Closed Sequence Pattern Mining (베이지안 확률 및 폐쇄 순차패턴 마이닝 방식을 이용한 설명가능한 로그 이상탐지 시스템)

  • Yun, Jiyoung;Shin, Gun-Yoon;Kim, Dong-Wook;Kim, Sang-Soo;Han, Myung-Mook
    • Journal of Internet Computing and Services
    • /
    • v.22 no.2
    • /
    • pp.77-87
    • /
    • 2021
  • With the development of the Internet and personal computers, various and complex attacks begin to emerge. As the attacks become more complex, signature-based detection become difficult. It leads to the research on behavior-based log anomaly detection. Recent work utilizes deep learning to learn the order and it shows good performance. Despite its good performance, it does not provide any explanation for prediction. The lack of explanation can occur difficulty of finding contamination of data or the vulnerability of the model itself. As a result, the users lose their reliability of the model. To address this problem, this work proposes an explainable log anomaly detection system. In this study, log parsing is the first to proceed. Afterward, sequential rules are extracted by Bayesian posterior probability. As a result, the "If condition then results, post-probability" type rule set is extracted. If the sample is matched to the ruleset, it is normal, otherwise, it is an anomaly. We utilize HDFS datasets for the experiment, resulting in F1score 92.7% in test dataset.

A Methodology of AI Learning Model Construction for Intelligent Coastal Surveillance (해안 경계 지능화를 위한 AI학습 모델 구축 방안)

  • Han, Changhee;Kim, Jong-Hwan;Cha, Jinho;Lee, Jongkwan;Jung, Yunyoung;Park, Jinseon;Kim, Youngtaek;Kim, Youngchan;Ha, Jeeseung;Lee, Kanguk;Kim, Yoonsung;Bang, Sungwan
    • Journal of Internet Computing and Services
    • /
    • v.23 no.1
    • /
    • pp.77-86
    • /
    • 2022
  • The Republic of Korea is a country in which coastal surveillance is an imperative national task as it is surrounded by seas on three sides under the confrontation between South and North Korea. However, due to Defense Reform 2.0, the number of R/D (Radar) operating personnel has decreased, and the period of service has also been shortened. Moreover, there is always a possibility that a human error will occur. This paper presents specific guidelines for developing an AI learning model for the intelligent coastal surveillance system. We present a three-step strategy to realize the guidelines. The first stage is a typical stage of building an AI learning model, including data collection, storage, filtering, purification, and data transformation. In the second stage, R/D signal analysis is first performed. Subsequently, AI learning model development for classifying real and false images, coastal area analysis, and vulnerable area/time analysis are performed. In the final stage, validation, visualization, and demonstration of the AI learning model are performed. Through this research, the first achievement of making the existing weapon system intelligent by applying the application of AI technology was achieved.

A Study on the Change of Cyber Attacks in North Korea (북한의 사이버 공격 변화 양상에 대한 연구)

  • Chanyoung Park;Hyeonsik Kim
    • The Journal of the Convergence on Culture Technology
    • /
    • v.10 no.4
    • /
    • pp.175-181
    • /
    • 2024
  • The U.N. Security Council's North Korea Sanctions Committee estimated that the amount of North Korea's cyberattacks on virtual asset-related companies from 2017 to 2023 was about 4 trillion won. North Korea's cyberattacks have secured funds through cryptocurrency hacking as it has been restricted from securing foreign currency due to economic sanctions by the international community, and it also shows the form of technology theft against defense companies, and illegal assets are being used to maintain the Kim Jong-un regime and develop nuclear and missile development. When North Korea conducted its sixth nuclear test on September 3, 2017, and declared the completion of its national nuclear armament following the launch of an intercontinental ballistic missile on November 29 of the same year, the U.N. imposed sanctions on North Korea, which are considered the strongest economic sanctions in history. In these difficult economic situations, North Korea tried to overcome the crisis through cyberattacks, but as a result of analyzing the changes through the North's cyber attack cases, the strategic goal from the first period from 2009 to 2016 was to verify and show off North Korea's cyber capabilities through the neutralization of the national network and the takeover of information, and was seen as an intention to create social chaos in South Korea. When foreign currency earnings were limited due to sanctions against North Korea in 2016, the second stage seized virtual currency and secured funds to maintain the Kim Jong-un regime and advance nuclear and missile development. The third stage is a technology hacking of domestic and foreign defense companies, focusing on taking over key technologies to achieve the five strategic weapons tasks proposed by Chairman Kim Jong-un at the 8th Party Congress in 2021. At the national level, security measures for private companies as well as state agencies should be established against North Korea's cyberattacks, and measures for legal systems, technical problems, and budgets related to science are urgently needed. It is also necessary to establish a system and manpower to respond to the ever-developing cyberattacks by focusing on cultivating and securing professional manpower such as white hackers.

Study on Cavitation Noise Predictions for an Elliptic Wing (타원형 날개에 대한 공동소음 예측 연구)

  • Jeong, Seung-Jin;Hong, Suk-Yoon;Song, Jee-Hun;Kwon, Hyun-Wung;Park, Il-Ryong;Seol, Han-Shin;Kim, Min-Jae
    • Journal of the Korean Society of Marine Environment & Safety
    • /
    • v.25 no.6
    • /
    • pp.757-764
    • /
    • 2019
  • Depressurization occurs around underwater objects moving at high speeds. This causes cavitation nuclei to expand, resulting in cavitation. Cavitation is accompanied by an increase in noise and vibration at the site, particularly in the case of thrusters, and this has a detrimental ef ect on propulsion performance. Therefore, predicting cavitation is necessary. In this study, an analytical method for cavitation noise is developed and applied to an elliptic wing. First, computational fluid dynamics are performed to obtain information about the flow fields around the wing. Then, through the cavitation nuclei density function, number of cavitation nuclei is calculated using the initial radius of the nuclei and nuclei are randomly placed in the upstream with large pressure drop around the wing tip. Bubble dynamics are then applied to each nucleus using a Lagrangian approach for noise analysis and to determine cavitation behavior. Cavitation noise is identified as having the characteristics of broadband noise. Verification of analytical method is performed by comparing experimental results derived from the large cavitation tunnel at the Korea Research Institute of Ships & Ocean Engineering.

Analysis of Spatio-Temporal Patterns of Nighttime Light Brightness of Seoul Metropolitan Area using VIIRS-DNB Data (VIIRS-DNB 데이터를 이용한 수도권 야간 빛 강도의 시·공간 패턴 분석)

  • Zhu, Lei;Cho, Daeheon;Lee, Soyoung
    • Journal of Cadastre & Land InformatiX
    • /
    • v.47 no.2
    • /
    • pp.19-37
    • /
    • 2017
  • Visible Infrared Imaging Radiometer Suite Day-Night Band (VIIRS-DNB) data provides a much higher capability for observing and quantifying nighttime light (NTL) brightness in comparison with Defense Meteorological Satellite-Operational Linescan System (DMSP-OLS) data. In South Korea, there is little research on the detection of NTL brightness change using VIIRS-DNB data. This study analyzed the spatial distribution and change of NTL brightness between 2013 and 2016 using VIIRS-DNB data, and detected its spatial relation with possible influencing factors using regression models. The intra-year seasonality of NTL brightness in 2016 was also studied by analyzing the deviation and change clusters, as well as the influencing factors. Results are as follows: 1) The higher value of NTL brightness in 2013 and 2016 is concentrated in Seoul and its surrounding cities, which positively correlated with population density and residential areas, economic land use, and other factors; 2) There is a decreasing trend of NTL brightness from 2013 to 2016, which is obvious in Seoul, with the change of population density and area of industrial buildings as the main influencing factors; 3) Areas in Seoul, and some surrounding areas have high deviation of the intra-year NTL brightness, and 71% of the total areas have their highest NTL brightness in January, February, October, November and December; and 4) Change of NTL brightness between summer and winter demonstrated a significantly positive relation with snow cover area change, and a slightly and significantly negative relation with albedo change.

The Incidence Rate of Anxiety Disorders in the Korean Military (한국 군 장병에서의 불안장애의 발생률)

  • Lee, Seung-Yup;Yoon, Chang-Gyo;Min, Jung-Ah;Lee, Chang-Uk;Park, Dong-Un;Ahn, Jong-Seong;Lee, Sang Don;Baik, Myung Jae;Jang, Jun Young;Yang, Juyoun;Chae, Jeong-Ho
    • Anxiety and mood
    • /
    • v.10 no.1
    • /
    • pp.59-67
    • /
    • 2014
  • Objective : To obtain the incidence rate of anxiety disorders among the active duty Korean military personnel, who visited the military hospitals from 2011 to 2013, this descriptive epidemiological study was performed. Methods : After acquiring the data for the anxiety disorders from Defense Medical Statistics Information System, the annual incidence rates were analyzed by forces, position status, and specific disease entities. Results : One thousand, nine hundred and thirteen (1,913) active duty male military personnel were diagnosed with any kinds of anxiety disorders in their first visit to the psychiatric outpatient department (OPD). The total OPD visit counts were 7,870 during the same period. Anxiety disorder, NOS was the most frequent disorder, followed by panic disorder. While the incidence rate for anxiety disorder, NOS decreased, panic disorder displayed increasing tendency. Stress-related disorders and obsessive-compulsive disorder were positioned third and fourth, respectively, for the number of first visit and they both showed decreasing tendency in annual incidence rates. Social anxiety disorder, specific phobias, generalized anxiety disorder (GAD) and mixed anxiety-depressive disorder followed next. The annual incidence rates for anxiety disorders showed decreasing tendency, particularly evident in army soldiers. However, naval officers showed higher anxiety disorder incidence rate compared to those of the army and the air forces. Conclusion : Comparing to general population, panic disorder was higher while specific phobias and GAD were lower in the Korean military. It is interesting to observe higher incidence rate for anxiety disorder in naval officers and warrants further evaluation.

Modeling and Analysis of Cooperative Engagements with Manned-Unmanned Ground Combat Systems (무인 지상 전투 체계의 협동 교전 모델링 및 분석)

  • Han, Sang Woo;Pyun, Jai Jeong
    • Journal of the Korea Society for Simulation
    • /
    • v.29 no.2
    • /
    • pp.105-117
    • /
    • 2020
  • Analysis of combat effectiveness is required to consider the concept of tactical cooperative engagement between manned-unmanned weapon systems, in order to predict the required operational capabilities of future weapon systems that meets the concept of 'effect-based synchronized operations.' However, analytical methods such as mathematical and statistical models make it difficult to analyze the effects of complex systems under nonlinear warfare. In this paper, we propose a combat simulation model that can simulate the concept of cooperative engagement between manned-unmanned combat entities based on wireless communications. First, we model unmanned combat entities, e.g., unmanned ground vehicles and drones, and manned combat entities, e.g., combatants and artillery, considering the capabilities required by the future ground system. We also simulate tactical behavior in which all entities perform their mission while sharing battlefield situation information through wireless communications. Finally we explore the feasibility of the proposed model by analyzing combat effectiveness such as target acquisition rate, remote control success rate, reconnaissance lead time, survival rate, and enemy's loss rate under a small-unit armor reconnaissance scenario. The proposed model is expected to be used in war-game combat experiments as well as analysis of the effects of manned-unmanned ground weapons.

A Study on Intelligent Self-Recovery Technologies for Cyber Assets to Actively Respond to Cyberattacks (사이버 공격에 능동대응하기 위한 사이버 자산의 지능형 자가복구기술 연구)

  • Se-ho Choi;Hang-sup Lim;Jung-young Choi;Oh-jin Kwon;Dong-kyoo Shin
    • Journal of Internet Computing and Services
    • /
    • v.24 no.6
    • /
    • pp.137-144
    • /
    • 2023
  • Cyberattack technology is evolving to an unpredictable degree, and it is a situation that can happen 'at any time' rather than 'someday'. Infrastructure that is becoming hyper-connected and global due to cloud computing and the Internet of Things is an environment where cyberattacks can be more damaging than ever, and cyberattacks are still ongoing. Even if damage occurs due to external influences such as cyberattacks or natural disasters, intelligent self-recovery must evolve from a cyber resilience perspective to minimize downtime of cyber assets (OS, WEB, WAS, DB). In this paper, we propose an intelligent self-recovery technology to ensure sustainable cyber resilience when cyber assets fail to function properly due to a cyberattack. The original and updated history of cyber assets is managed in real-time using timeslot design and snapshot backup technology. It is necessary to secure technology that can automatically detect damage situations in conjunction with a commercialized file integrity monitoring program and minimize downtime of cyber assets by analyzing the correlation of backup data to damaged files on an intelligent basis to self-recover to an optimal state. In the future, we plan to research a pilot system that applies the unique functions of self-recovery technology and an operating model that can learn and analyze self-recovery strategies appropriate for cyber assets in damaged states.