• Title/Summary/Keyword: moving target defense

Search Result 75, Processing Time 0.021 seconds

네트워크 주소 변이 기반 Moving Target Defense 연구 동향

  • Woo, Samuel;Park, Kyungmin;Moon, Daesung;Kim, Ikkyun
    • Review of KIISC
    • /
    • v.28 no.2
    • /
    • pp.5-11
    • /
    • 2018
  • 지능형 지속 위협(Advanced Persistent Threat) 공격은 Intrusion Kill Chain과 같은 일련의 단계로 구성되어 있기 때문에 특정 단계가 차단되면 공격은 실패하게 된다. Moving Target Defense(MTD)는 보호대상의 주요 속성(네트워크, 운영체제, 소프트웨어, 데이터)을 변화시켜 Intrusion Kill Chain을 구성하는 각 단계를 차단하는 능동적 사전 보안 기술이다. MTD 전략 중에서 네트워크 주소 변이(Network Address Mutation) 기술은 보호대상의 네트워크 주소(IP. Port)를 능동적으로 변이하는 기술로써, Intrusion Kill Chain의 첫 단계인 정찰(Reconnaissance) 행위에 소요되는 비용을 급격하게 증가시킬 수 있는 효율적인 보안 기술이다. 본 논문은 네트워크 주소 변이 기술 분야의 관련 연구들을 살펴보고 네트워크 주소 변이 기술 설계 시 고려해야하는 보안 요구사항과 기능 요구사항을 제안한다.

Maximum Likelihood Based Doppler Estimation and Target Detection with Pulse Code Modulated Waveform (ML 기법을 이용한 PCM 파형에서의 표적 탐지 및 도플러 추정)

  • Yang, Eunjung;Lee, Heeyoung;Song, Junho
    • The Journal of Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.25 no.12
    • /
    • pp.1275-1283
    • /
    • 2014
  • Characteristics of PCM(Pulse Code Modulation) waveform are suitable for target tracking. Especially in terms of dwell time, it is desirable to detect and track a moving target with the single PCM waveform for a MFR(Multi-Function Radar) which carries out multiple tasks. General PCM waveform processing includes Doppler filter bank caused by the characteristics of ambiguity function, to detect target and estimate Doppler frequency, which induces hardware burden and computational complexity. We propose a ML(Maximum Likelihood) based Doppler estimator for a PCM waveform, which is the closed form suboptimal solution and computationally efficient to estimate Doppler frequency and detect a moving target.

A Study on the Simulation Method of the Code Correlation Range (코드상관 거리측정센서의 시뮬레이션 기법 연구)

  • Kim, Ung-Sik;Kang, Byoung-Moo;Kim, Wan-Joo
    • Proceedings of the KIEE Conference
    • /
    • 1997.07b
    • /
    • pp.459-461
    • /
    • 1997
  • This paper describes a simulation method of the correlation-signal output, which has Doppler effect (variation of amplitude, phase, and frequency) caused by the moving-effect of target and encounter conditions. Using these results, we can develope and verify the algorithm of the signal processing parts of the code correlation range sensor with ease.

  • PDF

A Study on the Laser Designator for the Missile System Using Semi-Active Laser Seeker (반능동 레이저 탐색기를 사용하는 유도무기체계의 레이저 조사기 연구)

  • Bae, Minji;Ha, Jaehoon;Park, Heechan
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.23 no.5
    • /
    • pp.466-474
    • /
    • 2020
  • Semi-active laser missile systems with high accuracy are necessary to asymmetric threats, such as UAV(Unmanned Aerial Vehicle). They are usually used to attack stationary or slow moving targets, therefore we should study on the laser designator which can detect and track fast moving targets in order to deal with UAV. In this study, design specifications are came up through performance analysis of existing laser designators, and laser designation method for fast moving target is developed. The detection and tracking performance of developed laser designator are verified through inside/outside tests on ground/aerial stationary/moving targets. Through this study, we obtain laser designator techniques that could be applied to actual semi-active laser missile systems.

An Attack Graph Model for Dynamic Network Environment (동적 네트워크 환경에 적용 가능한 Attack Graph 모델 연구)

  • Moon, Joo Yeon;Kim, Taekyu;Kim, Insung;Kim, Huy Kang
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.2
    • /
    • pp.485-500
    • /
    • 2018
  • As the size of the system and network environment grows and the network structure and the system configuration change frequently, network administrators have difficulty managing the status manually and identifying real-time changes. In this paper, we suggest a system that scans dynamic network information in real time, scores vulnerability of network devices, generates all potential attack paths, and visualizes them using attack graph. We implemented the proposed algorithm based attack graph; and we demonstrated that it can be applicable in MTD concept based defense system by simulating on dynamic virtual network environment with SDN.

Setting an Initial Validation Gate based on Signal Intensity for Target Tracking in IR Image Sequences (적외선 영상에서 표적 추적을 위한 신호세기 기반 초기 유효게이트 설정 방법)

  • Yang, Yu Kyung;Kim, Jieun;Lee, Boohwan
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.17 no.1
    • /
    • pp.108-114
    • /
    • 2014
  • This paper describes a method to set an intensity-based initial validation gate for tracking filter while preserves the ability of tracking a target with maximum speed. First, we collected real data set of signal versus distance of an airplane target. And at each data point, we computed maximum distance the target can move. And a function is modeled to expect the maximum moving pixels on the lateral direction based on the intensity of the detected target in IR image sequence. The initial prediction error covariance can be computed using this function to decide the size of the initial validation gate. The simulation results show the proposed method can set the appropriate initial validation gates to track the targets with the maximum speed.

Rake-Based Cellular Radar Receiver Design for Moving Target Detection in Multipath Channel

  • Kim, Yeejung;Jeong, Myungdeuk;Han, Youngnam
    • ETRI Journal
    • /
    • v.36 no.5
    • /
    • pp.799-807
    • /
    • 2014
  • In this paper, we design a rake-based cellular radar receiver (CRR) scheme to detect a moving target located in a multipath environment. The modules of Doppler filter banks, threshold level test, and target detection module are newly introduced into the conventional rake receiver so that it can function as a radar system. The proposed CRR tests the Doppler-shift frequency and signal-to-noise ratio of the received signal against predefined threshold levels to determine detection and then calculates target velocities and ranges. The system performance is evaluated in terms of detection probability and the maximum detection range under a Nakagami-n channel that reflects the multipath environment.

Effect of System Instability Factors in a Bistatic MTI Radar Using Pulse Chasing Scan Method (펄스 체이싱 스캔 방식을 이용한 바이스태틱 MTI 레이더에서 시스템 불안정 요소들의 영향)

  • Yang, Jin-Mo;Han, Il-Tak;Lee, Yong-Suk;Lee, Min-Joon;Kim, Whan-Woo
    • The Journal of Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.22 no.3
    • /
    • pp.299-311
    • /
    • 2011
  • In this paper, we have identified the system instability factors in a bistatic radar system using pulse chasing and considered their effects on the bistatic receiver's MTI(Moving Target Indication) improvement performance. The pulse chasing is a scan method that searchs a restricted area on the transmit pulse-to-pulse basis and the MTI filter is a signal processing that separates a target from some kinds of interferences such as clutter using small number of transmit pulses. Ideal MTI processing performance, e.g., clutter attenuation and improvement, has been limited by the property of the clutter itself, however, the MTI performance in a proposed bistatic receiver configuration could be affected by the receiving beam pointing error during pulse chasing scanning. Also, for the bistatic receiver, we have defined other system instability factors, which result from the time synchronization error, COHO's phase error, the frequency/phase synchronization error, and have analyzed their effects on the system performance improvement.

Development and Testing of a New Area Search Model with Partially Overlapping Target and Searcher Patrol Area

  • Kim, Gi-Young;Eagle, James N.;Kang, Sung-Jin
    • Journal of the military operations research society of Korea
    • /
    • v.35 no.1
    • /
    • pp.21-32
    • /
    • 2009
  • In this study, the author uses a MATLAB simulation to develop and test a generalization of the traditional Random Search model which allows both the searcher and target to move and to be in different, but overlapping, areas. Also the best evasion speed for a randomly moving target against a Systematic Search is studied.

A Survey of Research on Human-Vehicle Interaction in Defense Area (국방 분야의 인간-차량 인터랙션 연구)

  • Yang, Ji Hyun;Lee, Sang Hun
    • Korean Journal of Computational Design and Engineering
    • /
    • v.18 no.3
    • /
    • pp.155-166
    • /
    • 2013
  • We present recent human-vehicle interaction (HVI) research conducted in the area of defense and military application. Research topics discussed in this paper include: training simulation for overland navigation tasks; expertise effects in overland navigation performance and scan patterns; pilot's perception and confidence on an overland navigation task; effects of UAV (Unmanned Aerial Vehicle) supervisory control on F-18 formation flight performance in a simulator environment; autonomy balancing in a manned-unmanned teaming (MUT) swarm attack, enabling visual detection of IED (Improvised Explosive Device) indicators through Perceptual Learning Assessment and Training; usability test on DaViTo (Data Visualization Tool); and modeling peripheral vision for moving target search and detection. Diverse and leading HVI study in the defense domain suggests future research direction in other HVI emerging areas such as automotive industry and aviation domain.