• 제목/요약/키워드: warfare information system

Search Result 205, Processing Time 0.028 seconds

Development of Korean Joint Tactical Data Link System Based on CLIP (CLIP 기반의 한국형 합동전술데이터링크 체계 개발)

  • Kim, Seung-Chun;Lee, Hyung-Keun
    • Journal of IKEEE
    • /
    • v.15 no.1
    • /
    • pp.15-22
    • /
    • 2011
  • In order to performing the joint operation of Korean army efficiently, informations about surveillance, reconnaissance, and situation awareness need to be possessed jointly. In the first development phase (basis type) of the Korean joint tactical data link system (JTDLS-K), essential tactical information and recognized situation are owned among platforms in common by using existing wireless terminals. In the second development phase (completion type) of the JTDLS-K, a JTDLS which can perform network centric warfare (NCW) will be developed in due consideration of technology development of the basis type and common technology maturity degree. This is a joint battlefield system that can show fighting power simultaneous and polysynthetically through providing command and control messages effectively to each platform, which is participating in the joint and combined operations. In this paper, the development of JTDLS-K with a common data processor based on common link integration processing (CLIP) is described. From the test results of the system presented in this paper, it is demonstrated that quadrature phase shift keying (QPSK) signals can be applied to the system.

QoS Support in the Air Defense Alternative System (방공작전 예비체계의 QoS 지원)

  • Sim, Dong-Sub;Lee, Young-Ran;Kim, Ki-Hyung
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.13 no.5
    • /
    • pp.903-909
    • /
    • 2010
  • ADAS is the air defense control system performing air surveillance and identification of ROK and near air. This system is self-developed by Air Force, currently operated successfully as the alternative system of MCRC. ADAS processes converting and combining transferred the real time radar data detected by radars. additionally, it displays significant radar data as producing in tracks. Then, it uses the message queue for IPC(Inter Process Communication). the various tactical data processed in the server is ultimately send to the network management process through the message queue for transmitting to the weapon director console. the weapon director receives this transmitted tactical data through the console to execute air defense operations. However, there is a problem that data packet is delayed or lost since the weapon Director does not receive as the amount of tactical data from the server overflowed with air tracks and missions increased. This paper improved the algorism to display and transmit the various tactical data processed from ADAS server to numbers of the weapon director console in the real time without any delay or lost. Improved the algorism, established at exercise, the development server in the real operation network and the weapon director console, is proved by comparing the number of sending tactical data packets in the server and receiving packets in the weapon director.

Reverse Simulation Software Architecture for Required Performance Analysis of Defense System (국방 시스템의 요구 성능 분석을 위한 역 방향 시뮬레이션 소프트웨어 아키텍처)

  • Hong, Jeong Hee;Seo, Kyung-Min;Kim, Tag Gon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.40 no.4
    • /
    • pp.750-759
    • /
    • 2015
  • This paper focuses on reverse simulation methods to find and analyze the required performance of a defense system under a given combat effectiveness. Our approach is motivated that forward simulation, that traditionally employs the effectiveness analysis of performance alternatives, is not suitable for resolving the above issue because it causes a high computational cost due to repeating simulations of all possible alternatives. To this end, the paper proposes a reverse simulation software architecture, which consists of several functional sub-modules that facilitate two types of reverse simulations according to possibility of inverse model design. The proposed architecture also enable to apply various search algorithms to find required operational capability efficiently. With this architecture, we performed two case studies about underwater and anti-air warfare scenarios. The case studies show that the proposed reverse simulation incurs a smaller computational cost, while finding the same level of performance alternatives compared with traditional forward simulation. Finally we expect that this study provides a guide those who desire to make decisions about new defense systems development.

Application and Performance Analysis of Machine Learning for GPS Jamming Detection (GPS 재밍탐지를 위한 기계학습 적용 및 성능 분석)

  • Jeong, Inhwan
    • The Journal of Korean Institute of Information Technology
    • /
    • v.17 no.5
    • /
    • pp.47-55
    • /
    • 2019
  • As the damage caused by GPS jamming has been increased, researches for detecting and preventing GPS jamming is being actively studied. This paper deals with a GPS jamming detection method using multiple GPS receiving channels and three-types machine learning techniques. Proposed multiple GPS channels consist of commercial GPS receiver with no anti-jamming function, receiver with just anti-noise jamming function and receiver with anti-noise and anti-spoofing jamming function. This system enables user to identify the characteristics of the jamming signals by comparing the coordinates received at each receiver. In this paper, The five types of jamming signals with different signal characteristics were entered to the system and three kinds of machine learning methods(AB: Adaptive Boosting, SVM: Support Vector Machine, DT: Decision Tree) were applied to perform jamming detection test. The results showed that the DT technique has the best performance with a detection rate of 96.9% when the single machine learning technique was applied. And it is confirmed that DT technique is more effective for GPS jamming detection than the binary classifier techniques because it has low ambiguity and simple hardware. It was also confirmed that SVM could be used only if additional solutions to ambiguity problem are applied.

M&S Software Design of Multiple Radio Positioning Integration System (다중 전파측위 융복합 시스템의 M&S 소프트웨어 설계)

  • Koo, Moonsuk;Kim, YoungJoon;Choi, Kwang-Ho;So, Hyoungmin;Oh, Sang Heon;Kim, Seong-Cheol;Lee, Hyung-Keun;Hwang, Dong-Hwan
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.18 no.5
    • /
    • pp.602-611
    • /
    • 2015
  • Even though GNSS provides highly accurate navigation information all over the world, it is vulnerable to jamming in the electronic warfare due to its weak signal power. The United States and Korea have plans to use terrestrial navigation systems as back-up systems during outage of GNSS. In order to develop back-up systems of GNSS, an M&S software platform is necessary for performance evaluation of various vehicle trajectories and integrated navigation systems. In this paper a design method of an M&S software is proposed for evaluation of multiple radio positioning integration systems. The proposed M&S software consists of a navigation environment generation part, a navigation algorithm part, a GUI part and a coverage analysis part. Effectiveness of the proposed design method is shown by implementing an M&S software for the GPS, DME and eLoran navigation systems.

Attack Modeling for an Internet Security Simulation (인터넷 보안 시뮬레이션을 위한 공격 모델링)

  • Seo, Jung-Kuk;Choi, Kyung-Hee;Jung, Gi-Hyun;Park, Seung-Kyu;Sim, Jae-Hong
    • The KIPS Transactions:PartC
    • /
    • v.11C no.2
    • /
    • pp.183-192
    • /
    • 2004
  • As the use of the Internet has explosively increased, it is likely for the Internet to be exposed to various attacks. Modeling the Internet attacks is essential to simulate the attacks. However, the existing studies on attack modeling have mainly focused on classifying and categorizing the attacks and consequently they are not suitable to representing attack scenarios in the Internet security simulation. In this paper, we introduce the existing methods of attack modeling, and propose an adapted attack modeling to properly express the properties for the Internet security simulator. The adapted attack modeling suggests a solution to the problems of the existing attack tree modelings, such as difficulty of composing complex scenarios ambiguity of attack sequence, lack of system state information. And it can represent simultaneous, precise time-dependent attack, and attack period, which are nearly impossible to be represented in many other existing methods.

A Study on the Implementation of a Model for Mission Impact Assessment due to Cyber Attacks (사이버공격에 의한 임무피해 평가를 위한 모델 구현에 관한 연구)

  • Yonghyun Kim;Donghwa Kim;Donghwan Lee;Juyoub Kim;Miyoung Kwon;Myung Kil Ahn
    • Journal of Internet Computing and Services
    • /
    • v.25 no.5
    • /
    • pp.1-11
    • /
    • 2024
  • Cyber Attacks on physical asset impacts the missions the asset performs. To determine how the resources of an asset are affected by various cyber attacks and to assess the impact on mission performance due to the asset's condition, modeling & simulation technology can be utilized. Many studies on mission impact analysis due to cyber warfare have been conducted, primarily in the United States. Existing research provides frameworks and methodologies to capture how and to what extent cyber attacks impact critical missions. However, it lacks specificity in the construction of models representing the mission and cyber environment, as well as in the relationships between these models. To overcome these limitations, it is necessary to develop simulation logic and modeling for cyber attacks and mission models. In addition, it is necessary to classify from assets to mission systems by hierarchy, define the connections between the hierarchies, and develop the propagation of damage across these hierarchies. This paper proposes a simulation method for a model that can evaluate mission system damage caused by cyber attacks using inter-hierarchical dependencies, and presents a method for implementing a model for mission impact assessment due to cyber warfare. The model implemented according to the proposed method is also presented. The model proposed in this paper was tested on three types of mission systems as a pilot study. It is expected to quantitatively analyze mission damage assessments due to cyber attacks on various military mission systems in the future.

A Scheme on applying IT technology for TLCSM improvements (TLCSM 개선을 위한 IT기술의 적용방안)

  • Choi, Myoungjin;Kwon, Daeil;Yang, Jeakyung
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.17 no.12
    • /
    • pp.26-33
    • /
    • 2016
  • The cost of preparing munitions in weapon system operation and management has been rapidly increasing and current weapon systems have become complicated and diverse due to new warfare pattern changes and the rapid growth of advanced scientific technology. Moreover, as a part of the execution plans of creative economics, the Korean government is actively reviewing how to minimize the costs of preparing munitions. Accordingly, this study derived the issues of munitions management for decreasing munitions preparing costs. First, the issues of munitions management were introduced through review and analysis with respect to the munitions classification criteria, regulations and systems, and equipment maintenance information systems. Second, we proposed the application and necessity for the real-name system which is responsible for munitions management and the fragmentation of the maintenance instructions status classification criteria.. Also, we were analyzed that the effects depending on the application. Finally, we proposed that the linkage system which is currently military active with equipment maintenance information systems as well as the total life-cycle management system (TLCSM) improvements to the itemized data and records management system by utilizing IT technology CMB that must be done in order to improve the issues.

Efficient Feature Selection Based Near Real-Time Hybrid Intrusion Detection System (근 실시간 조건을 달성하기 위한 효과적 속성 선택 기법 기반의 고성능 하이브리드 침입 탐지 시스템)

  • Lee, Woosol;Oh, Sangyoon
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.5 no.12
    • /
    • pp.471-480
    • /
    • 2016
  • Recently, the damage of cyber attack toward infra-system, national defence and security system is gradually increasing. In this situation, military recognizes the importance of cyber warfare, and they establish a cyber system in preparation, regardless of the existence of threaten. Thus, the study of Intrusion Detection System(IDS) that plays an important role in network defence system is required. IDS is divided into misuse and anomaly detection methods. Recent studies attempt to combine those two methods to maximize advantagesand to minimize disadvantages both of misuse and anomaly. The combination is called Hybrid IDS. Previous studies would not be inappropriate for near real-time network environments because they have computational complexity problems. It leads to the need of the study considering the structure of IDS that have high detection rate and low computational cost. In this paper, we proposed a Hybrid IDS which combines C4.5 decision tree(misuse detection method) and Weighted K-means algorithm (anomaly detection method) hierarchically. It can detect malicious network packets effectively with low complexity by applying mutual information and genetic algorithm based efficient feature selection technique. Also we construct upgraded the the hierarchical structure of IDS reusing feature weights in anomaly detection section. It is validated that proposed Hybrid IDS ensures high detection accuracy (98.68%) and performance at experiment section.

Methodology of Interoperating Link-K Track Number in Multi TDLs (다중 전술데이터링크 간 Link-K 트랙 번호 상호운용 기술)

  • Lee, Youn-Jeong;Kim, Sang-Jun;Lim, Man-Yeob
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.38C no.12
    • /
    • pp.1186-1195
    • /
    • 2013
  • In modern warfare, the main factor of triumph is superior situation awareness which leads rapid command decision and precisely guided munition, and TDL(Tactical Data Link) is the main communicational enabler. ROK forces currently operate Link-16 with allied forces and are also developing Korean national data link, Link-K which is also planned to be cooperated with Link-16. Assigning participant and track numbers needs agreement between ROK and allied forces, but ROK forces have exclusive authority in assigning numbers in Link-K. This paper proposes the effective method of exchange participant and track numbers between Link-16 and Link-K, and applicability verification in operational test and evaluation will be also presented.