• Title/Summary/Keyword: warfare information system

Search Result 205, Processing Time 0.026 seconds

Radar Pulse Clustering using Kernel Density Window (커널 밀도 윈도우를 이용한 레이더 펄스 클러스터링)

  • Lee, Dong-Weon;Han, Jin-Woo;Lee, Won-Don
    • Proceedings of the IEEK Conference
    • /
    • 2008.06a
    • /
    • pp.973-974
    • /
    • 2008
  • As radar signal environments become denser and more complex, the capability of high-speed and accurate signal analysis is required for ES(Electronic warfare Support) system to identify individual radar signals at real-time. In this paper, we propose the new novel clustering algorithm of radar pulses to alleviate the load of signal analysis process and support reliable analysis. The proposed algorithm uses KDE(Kernel Density Estimation) and its CDF(Cumulative Distribution Function) to compose clusters considering the distribution characteristics of pulses. Simulation results show the good performance of the proposed clustering algorithm in clustering and classifying the emitters.

  • PDF

A Security Monitoring System for Security Information Sharing and Cooperative Countermeasure (협력대응기반 전역네트워크 보안정보공유 시스템)

  • Kim, Ki-Young;Lee, Sung-Won;Kim, Jong-Hyun
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.50 no.2
    • /
    • pp.60-69
    • /
    • 2013
  • Highlighted by recent security breaches including Google, Western Energy Company, and the Stuxnet infiltration of Iranian nuclear sites, Cyber warfare attacks pose a threat to national and global security. In particular, targeted attacks such as APT exploiting a high degree of stealthiness over a long period, has extended their victims from PCs and enterprise servers to government organizations and critical national infrastructure whereas the existing security measures exhibited limited capabilities in detecting and countermeasuring them. As a solution to fight against such attacks, we designed and implemented a security monitoring system, which shares security information and helps cooperative countermeasure. The proposed security monitoring system collects security event logs from heterogeneous security devices, analyses them, and visualizes the security status using 3D technology. The capability of the proposed system was evaluated and demonstrated throughly by deploying it under real network in a ISP for a week.

Design of the homomorphic encryption system for secure data management in the future battlefield environment (미래 전장환경에서 안전한 데이터 관리를 위한 준동형 시스템 설계)

  • Cha, HyunJong;Kim, JinMook;Ryou, HwangBin
    • Convergence Security Journal
    • /
    • v.14 no.2
    • /
    • pp.51-56
    • /
    • 2014
  • Be expressed in network-centric warfare, mainly battlefield environment of the future. The purpose of the system for the war of the future, is to recognize the enemy before the enemy, and rapid decision-making, to hit accurately. For this reason, it is during the construction of the integrated system of C4ISR+PGM. In such an integrated system, it is necessary to further enhance the security aspects of the information. In particular, strengthening of security leads to a decrease of efficiency. Therefore, security and efficiency should be considered together. In this study, we provide a homomorphic encryption system that can be safely managed information environment on the battlefield of the future. The proposed method uses encryption technology of homomorphic that can be the arithmetic operations on encrypted state. It has changed from the state of the encryption. Therefore, the attacker can not know a decent information.

A Development of Weapon System Test Set's Display Using an Ecological Interface Design Methodology (생태학적 인터페이스 디자인(EID) 기법을 활용한 무기체계점검장비(WSTS) 디스플레이 개발)

  • Park, Jae-Eun;Seo, Yang-Woo;Kim, Ko-Kyun
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.16 no.6
    • /
    • pp.4147-4157
    • /
    • 2015
  • The weapon system has developed by adding various functions because of the warfare change. And, an weapon system test set (WSTS) that is used to test and judge the condition of weapon system also deal with a lot of complex information. However, almost WSTS is developed on the basis of developer-centric. Because of it, it is hard to make a result by apprehending information on WSTS's display. Thus, I proposed a new display of WSTS by adapting the Ecological Interface Design(EID) Methodology to reduce operator's cognitive workload and assure safe testing. WSTS's Display is developed through Information Requirement and Work Domain Model as a result of Work Domain Analysis. The most powerful thing in the new display is that operator can identify his testing and status of WSTS directly. I expect that it reduces operator's cognitive workload and helps safe testing.

A Study about the Direction and Responsibility of the National Intelligence Agency to the Cyber Security Issues (사이버 안보에 대한 국가정보기구의 책무와 방향성에 대한 고찰)

  • Han, Hee-Won
    • Korean Security Journal
    • /
    • no.39
    • /
    • pp.319-353
    • /
    • 2014
  • Cyber-based technologies are now ubiquitous around the glob and are emerging as an "instrument of power" in societies, and are becoming more available to a country's opponents, who may use it to attack, degrade, and disrupt communications and the flow of information. The globe-spanning range of cyberspace and no national borders will challenge legal systems and complicate a nation's ability to deter threats and respond to contingencies. Through cyberspace, competitive powers will target industry, academia, government, as well as the military in the air, land, maritime, and space domains of our nations. Enemies in cyberspace will include both states and non-states and will range from the unsophisticated amateur to highly trained professional hackers. In much the same way that airpower transformed the battlefield of World War II, cyberspace has fractured the physical barriers that shield a nation from attacks on its commerce and communication. Cyberthreats to the infrastructure and other assets are a growing concern to policymakers. In 2013 Cyberwarfare was, for the first time, considered a larger threat than Al Qaeda or terrorism, by many U.S. intelligence officials. The new United States military strategy makes explicit that a cyberattack is casus belli just as a traditional act of war. The Economist describes cyberspace as "the fifth domain of warfare and writes that China, Russia, Israel and North Korea. Iran are boasting of having the world's second-largest cyber-army. Entities posing a significant threat to the cybersecurity of critical infrastructure assets include cyberterrorists, cyberspies, cyberthieves, cyberwarriors, and cyberhacktivists. These malefactors may access cyber-based technologies in order to deny service, steal or manipulate data, or use a device to launch an attack against itself or another piece of equipment. However because the Internet offers near-total anonymity, it is difficult to discern the identity, the motives, and the location of an intruder. The scope and enormity of the threats are not just focused to private industry but also to the country's heavily networked critical infrastructure. There are many ongoing efforts in government and industry that focus on making computers, the Internet, and related technologies more secure. As the national intelligence institution's effort, cyber counter-intelligence is measures to identify, penetrate, or neutralize foreign operations that use cyber means as the primary tradecraft methodology, as well as foreign intelligence service collection efforts that use traditional methods to gauge cyber capabilities and intentions. However one of the hardest issues in cyber counterintelligence is the problem of "Attribution". Unlike conventional warfare, figuring out who is behind an attack can be very difficult, even though the Defense Secretary Leon Panetta has claimed that the United States has the capability to trace attacks back to their sources and hold the attackers "accountable". Considering all these cyber security problems, this paper examines closely cyber security issues through the lessons from that of U.S experience. For that purpose I review the arising cyber security issues considering changing global security environments in the 21st century and their implications to the reshaping the government system. For that purpose this study mainly deals with and emphasis the cyber security issues as one of the growing national security threats. This article also reviews what our intelligence and security Agencies should do among the transforming cyber space. At any rate, despite of all hot debates about the various legality and human rights issues derived from the cyber space and intelligence service activity, the national security should be secured. Therefore, this paper suggests that one of the most important and immediate step is to understanding the legal ideology of national security and national intelligence.

  • PDF

M&S Case Study for Information Sharing Enabled Combat Entities (전투 개체간의 정보 공유가 가능한 모델링 및 시뮬레이션 사례 분석)

  • Kho, Younghoon;Lim, Byungyoun;Park, Sangchul;Kwon, Yongjin
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.17 no.4
    • /
    • pp.395-403
    • /
    • 2014
  • Recent technological advancement has a profound effect on the ways that the war is being conducted and fought. The advanced communications, information, computing and sensor technologies enable the combat units to be integrated in the battlefield management network. By exchanging and sharing real-time battlefield information that is critical for the successful outcome of military engagement, the legacy forces are becoming much more effective and lethal than ever before, The bigger picture of such phenomena can be summarized as the concept of Network Centric Warfare(NCW). The main purpose of this study is to compare the outcome of regional combat engagement between the legacy forces and the future combat systems(FCS). The FCS capitalizes on the advanced technologies within the frame of NCW. This study uses the modeling and simulation methodology to assess the effectiveness of two different combat forces. The simulation results show that the FCS is more effective, hence vindicating the superiority of technologically advanced combat units.

Ad Hoc Routing Method Based on Betweenness Centrality and Location Information for Unmanned Ground System Networks (지상 무인로봇체계 네트워크를 위한 매개 중심도와 위치정보 기반 Ad Hoc 라우팅)

  • Ahn, Hyochun;Yim, Jinhyuk;Ko, Young-Bae;Choi, HyungSeok;Kwon, DaeHoon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.41 no.4
    • /
    • pp.441-450
    • /
    • 2016
  • Wireless multi-hop communication is one of the key technologies to operate Unmanned Ground System (UGS) networks efficiently. Conventionally a lot of routing protocol has been developed and studied for multi-hop networks like Mobile Ad-hoc Network (MANET). However, the routing protocol for the unique environment of the UGS requires further studies, since conventional routing protocols cannot be used itself for UGS networks. In this paper, we propose the Betweenness Centrality based Geographic Routing (BCGR) which considers the main function of UGS. BCGR utilizes expanded ego betweenness centrality, mobility and location information error, respectively. We have conducted a simulation study for evaluating the performance of the BCGR using ns-3, and our simulation results show that BCGR outperforms the conventional routing protocols such as AODV and GPSR in terms of end-to-end transmission reliability, throughput and delay.

Smart Device Security Technology for Cyber Defense (사이버 국방을 위한 스마트 단말 보안기술)

  • Son, Iek-Jae;Kim, Il-Ho;Yang, Jong-Hyu;Lee, Nam-Young
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.37C no.10
    • /
    • pp.986-992
    • /
    • 2012
  • As the utilization of smart mobile devices such as smartphones increases, the desire to utilize such devices to control and monitor combat situations also arises. As smart mobile devices with various ICT get integrated with various weaponry system, a new phase of future warfare can be introduced. Moreover, smartphone-based real-time information technology for joint battle command system will be converged with surveillance control to become a leading example of convergence of cyber defense and information technology. Furthermore, mobile device security technology ideal for mobile wireless network environments can be applied to military robots. The following paper will give an overview of smart mobile device usage used for military purposes in battle command system, various security threats and the mobile device security technology to correspond to such security threats.

Design of Ubiquitous Multi-Static Sonobuoy System with Smart Phone Control Function (스마트 폰 제어기능을 갖는 유비쿼터스 다중상태 소노부이 시스템 설계)

  • Kim, Jong-In;Lee, Seok-Won;Han, Min-Seok
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.14 no.2
    • /
    • pp.140-148
    • /
    • 2021
  • In this paper, we intend to improve the availability by integrating Sonobuoy, the most essential detection system used in anti-submarine operations, with LTE communication of smart devices. Anti-submarine capability to respond to the threat of North Korean submarine forces is becoming increasingly important, and continuous research and development is required. This paper aims to enhance the ability of acoustic tactics by using a military-only LTE communication system installed on a ship, smart devices that can be linked to it, and a multi-static sonobuoy controlled by them. The proposed system can increase the visual effect by not only displaying coordinate values by receiving accurate coordinate information of each sonobuoy to a smart device, but also displaying a marker on a map.

History and Development Status of Aegis Ships (이지스함의 역사와 발전 현황)

  • Go, Kyung-min;Jeon, Eun-seon;Park, Tae-yong
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2015.10a
    • /
    • pp.433-435
    • /
    • 2015
  • Aegis Combat System(ACS) is a shipboard combat system developed by U.S. Navy. Its name, Aegis, came from a shield 'Aegis' in greek mythology, which Zeus gave to his daughter Athena. U.S. Navy uses Aegis ships(ships which mount ACS) as their main surface forces. It is known as one of the greatest anti-air warfare ship in the world by its ability to detect air threats with AN/SPY-1, phased array radar, superior Target management and command and control capabilities of the combat system, and SM series interceptors. After first Aegis cruiser USS Ticonderoga was deployed at 1983, U.S. Navy continuously put effort in developing Aegis Combat Systems and Aegis ships. They also improve old fashion existing ships by modernize them. In this Paper, to deduct a lesson which Korea Navy should benchmark, it is went through that a history of Aegis ships and development of ACS, and also its feature.

  • PDF