• Title/Summary/Keyword: Defense modeling and simulation

Search Result 250, Processing Time 0.027 seconds

Cyber Attack and Defense Modeling Using Vulnerability Metrics (취약성 매트릭스를 이용한 사이버 공격 및 방어 모델링)

  • 이장세;지승도
    • Proceedings of the Korea Society for Simulation Conference
    • /
    • 2003.06a
    • /
    • pp.191-198
    • /
    • 2003
  • The major objective of this paper is to perform modeling of cyber attack and defense using vulnerability metrics. To do this, we have attempted command level modeling for realizing an approach of functional level proposed by Nong Ye, and we have defined vulnerability metrics that are able to apply to DEVS(Discrete Event System Specification) and performed modeling of cyber attack and defense using this. Our approach is to show the difference from others in that (ⅰ) it is able to analyze behaviors of system emerged by interaction with functional elements of components composing network and each other, (ⅱ) it is able to analyze vulnerability in quantitative manner, and (ⅲ) it is able to establish defense suitably by using the analyzed vulnerability. We examine an example of vulnerability analysis on the cyber attack and defense through case study.

  • PDF

Cyber Attack and Defense Modeling Using Vulnerability Metrics (취약성 매트릭스를 이용한 사이버 공격 및 방어 모델링)

  • Lee Jang-Se;Chi Sung-Do;Choi Gyoo-Seok
    • Journal of the Korea Society for Simulation
    • /
    • v.13 no.3
    • /
    • pp.11-20
    • /
    • 2004
  • The major objective of this paper is to perform modeling of cyber attack and defense using vulnerability metrics. To do this, we have attempted command level modeling for realizing an approach of functional level proposed by Nong Ye, and we have defined vulnerability metrics that are able to apply to DEVS(Discrete Event System Specification) and performed modeling of cyber attack and defense using this. Our approach is to show the difference from others in that (i) it is able to analyze behaviors of systems being emerged by interaction between functional elements of network components, (ii) it is able to analyze vulnerability in quantitative manner, and (iii) it is able to establish defense suitably by using the analyzed vulnerability. We examine an example of vulnerability analysis on the cyber attack and defense through case study.

  • PDF

Model-based Design for Autonomous Defense Systmes (자치적 방어 시스템을 위한 모델베이스기반 설계)

  • 이종근
    • Journal of the Korea Society for Simulation
    • /
    • v.8 no.1
    • /
    • pp.89-99
    • /
    • 1999
  • The major objective of this research is to propose a design architecture for autonomous defense systems for supporting highly intelligent behavior by combining decision, perception, and action components. Systems with such high levels of autonomy are critical for advanced battlefield missions. By integrating a plenty of advanced modeling concepts such as system entity structure, endomorphic modeling, engine-based modeling, and hierarchical encapsulation & abstraction principle, we have proposed four layered design methodology for autonomous defense systems that can support an intelligent behavior under the complicated and unstable warfare. Proposed methodology has been successfully applied to a design of autonomous tank systems capable of supporting the autonomous planning, sensing, control, and diagnosis.

  • PDF

The Study on CGF Behavior Modeling Methodologies for Defense M&S: Focusing on Survey and Future Direction (국방 M&S의 가상군 행위 모델링 방법론 연구: 조사와 미래방향을 중심으로)

  • Cho, Namsuk;Moon, Hoseok;Pyun, Jai Jeong
    • Journal of the Korea Society for Simulation
    • /
    • v.29 no.2
    • /
    • pp.35-47
    • /
    • 2020
  • Immediate and serious attention on CGF(computer generated forces) behavior modeling for defense M&S (modeling & simulation) is required in response to the reduction in the number of troops and development of 4th industrial technologies. It is crucial for both military person and engineer to understand such technologies. The research aims to provide guidelines for establishment of research direction on CGF behavior modeling. We investigate traditional and/or novel methodologies such as rule-based, agent-based, and learning-based method. Discussions on future direction of applicable area and strategies are followed. We expect that the research plays a key role for understanding CGF behavior modeling.

Current Issues for ROK Defense Modeling & Simulation Scheme under the Transition of New HLA Simulation Architecture (HLA 모의구조전환에 따른 한국군 DM&S 발전방안)

  • 이상헌
    • Journal of the military operations research society of Korea
    • /
    • v.26 no.2
    • /
    • pp.101-119
    • /
    • 2000
  • US DoD designated the High LEvel Architecture (HLA) as the standard technical architecture for all military simulation since 1996. HLA will supercede the current Distributed Interactive Simulation(DIS) and Aggregated LEvel Simulation Protocol(ALSP) methods by no funds for developing/modifying non-HLA compliant simulations. The new architecture specifies Rules which define relationships among federation components, an Objects Model Template which species the form which simulation elements are described, and an Interface Specification which describes the way simulations interact during operations. HLA is named as standard architecture in NATO, Australia and many other militaries. Also, it will be IEEE standard in the near future. It goes without saying that ROK military whose simulation models are almost from US must be prepared in areas such as ROK-US combined exercise, training, weapon system acquisition, interface models with C4I system, OPLAN analysis, operations, and os on. In this paper, we propose several effective alternatives and issues for ROK Defense Modeling and Simulation under the transition of new HLA architecture. Those include secure the kernel of new simulation technology and develop our own conceptual model, RTI software, prototype federation for each service and aggregated one. In order to challenge the new simulation architecture effectively, we should innovate our current defense modeling and simulation infrastructure such s manpower, organization, budget, research environment, relationships among academia and industry, and many others.

  • PDF

Constructive Simulation and Experimentation for Supporting Light Weight Torpedo Operational Tactics Study (경어뢰 운용전술연구지원을 위한 구성시뮬레이션 및 모의실험)

  • Lee, Sim Yong;Go, Seung Ryeol
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.19 no.6
    • /
    • pp.769-778
    • /
    • 2016
  • Technical approach on the modeling, simulation and experimentation methods, which are applied for developing a constructive simulation and engagement experimentation software for supporting light weight torpedo operational tactics study, is introduced. Conceptual modeling for the weapon engagement and simulation entities, mathematical models for the simulation elements, approach for the design of experimentations are described, and screen shots of the software are also presented as some example results of experimentation and analysis. It is found that the simulation and experimentation results are useful to support and fulfill the mission needs and requests. As a consequence, the technical approach is rated to be appropriate to accomplish the dedicated purpose of the simulation and experiments.

Multi-fidelity Modeling and Simulation Methodology to Enhance Simulation Performance of Engineering-level Defense Model (공학급 국방 모델의 시뮬레이션 성능 향상을 위한 다중 충실도 M&S 기법 연구)

  • Choi, Seon Han;Seo, Kyung-Min;Kwon, Se Jung;Kim, Tag Gon
    • Journal of the Korea Society for Simulation
    • /
    • v.22 no.4
    • /
    • pp.67-82
    • /
    • 2013
  • This paper presents multi-fidelity modeling and simulation (M&S) methodology to enhance simulation performance of engineering-level defense models. In this approach, a set of models with varying degrees of fidelity is exercised to reduce computational expense maintaining a similar level of system effectiveness. For multi-fidelity M&S principles, this paper defines model fidelity from two perspectives (i.e., model behavior and execution), and suggests the Fidelity Change Point (FCP) to specify the fidelity conversion. With these concepts, this paper centers on three ideas: 1) two models' structure which are the Behavioral-Fidelity Interchangeable Model (B-FIM) and the Executional-Fidelity Interchangeable Model (E-FIM), 2) modeling formalism, and 3) a simulation algorithm to support them. From an abstract case study regarding a target tracking scenario with the utilization of the proposed method, we can gain interesting experimental results regarding the enhancement of simulation performance. Finally, we expect that this work will serve various M&S-based analysis areas for enhancing simulation performance.

Parameterized Simulation Program with Integrated Circuit Emphasis Modeling of Two-level Microbolometer

  • Han, Seung-Oh;Chun, Chang-Hwan;Han, Chang-Suk;Park, Seung-Man
    • Journal of Electrical Engineering and Technology
    • /
    • v.6 no.2
    • /
    • pp.270-274
    • /
    • 2011
  • This paper presents a parameterized simulation program with integrated circuit emphasis (SPICE) model of a two-level microbolometer based on negative-temperature-coefficient thin films, such as vanadium oxide or amorphous silicon. The proposed modeling begins from the electric-thermal analogy and is realized on the SPICE modeling environment. The model consists of parametric components whose parameters are material properties and physical dimensions, and can be used for the fast design study, as well as for the co-design with the readout integrated circuit. The developed model was verified by comparing the obtained results with those from finite element method simulations for three design cases. The thermal conductance and the thermal capacity, key performance parameters of a microbolometer, showed the average difference of only 4.77% and 8.65%, respectively.

Modeling and Simulation Methodology for Defense Systems Based on Concept of System of Systems (복합체계 개념에 기반한 국방체계 모델링 시뮬레이션 방법론)

  • Kim, Tag Gon;Kwon, Se Jung;Kang, Bonggu
    • Journal of Korean Institute of Industrial Engineers
    • /
    • v.39 no.6
    • /
    • pp.450-460
    • /
    • 2013
  • A complex system such as defense systems is in a form of System of Systems (SoS) in which each component is a system being independent of other component systems. Dynamical behavior of SoS is represented by a composition of behaviors of component systems. Thus, a M&S tool/environment would not be efficient for development of heterogeneous models nor for simulation in a centralized environment. Moreover, such an environment restricts reusability and composability. This paper presents an interoperation method for M&S of defense systems as SoS. The approach first develops component system models using tools, each specialized to M&S of each component system. It then interoperates such simulations together to simulate a whole system as SoS. HLA/RTI is employed for such interoperation, which is a DoD/IEEE standard to support interoperation. We will introduce a case study for interoperable simulation of defense systems, which consists of a wargame simulator and a communication simulator.

Verification, Validation, and Accreditation (VV&A) Considering Military and Defense Characteristics

  • Kim, Jung Hoon;Jeong, Seugmin;Oh, Sunkyung;Jang, Young Jae
    • Industrial Engineering and Management Systems
    • /
    • v.14 no.1
    • /
    • pp.88-93
    • /
    • 2015
  • In this paper, we identify the characteristics of modeling and simulation (M&S) for military and defense and propose the method of verification, validation, and accreditation (VV&A) using the identified characteristics. M&S has been widely used for many different applications in military and defense, including training, analysis, and acquisition. Various methods and processes of VV&A have been proposed by researchers and M&S practitioners to guarantee the correctness of M&S. The notion of applying formal credibility assessment in VV&A originated in software engineering reliability testing and the systems engineering development process. However, the VV&A techniques and processes proposed for M&S by the research community have not addressed the characteristics and issues specific to military and defense. We first identify the characteristics and issues of military/defense M&S and then propose techniques and methods for VV&A that are specific for military/defense M&S. Possible approaches for the development of VV&A are also proposed.