• Title/Summary/Keyword: survivability

Search Result 619, Processing Time 0.027 seconds

A Development of 3D Penetration Analysis Program for Survivability Analysis of Combat System : Focused on Tank Model (전투 시스템 생존성 분석을 위한 3차원 관통 해석 프로그램 개발 : 전차 모델을 대상으로)

  • Hwang, Hun-Gyu;Lee, Jae-Woong;Lee, Jang-Se;Park, Jong-Sou
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.19 no.1
    • /
    • pp.244-250
    • /
    • 2015
  • Survivability is avoidance and tolerance ability of combat systems for accomplishing mission in battle field. Therefore, the combat system has to protect or minimize any damage from threats. For this reason, many modeling and simulation based studies which analyze vulnerability of the combat system by threats, are in progress to improve survivability of the combat system. In this paper, we developed a 3D penetration analysis program for survivability analysis of combat system. To do this, we applied the penetration analysis equation to threat and protection performance of tank. Also we implemented simple tank models based on 3D CAD, and tested the developed program using the implemented tank models. As a result, we verified the developed program that is possible to analyze penetration by threat and protection performance of tank and to visualize its result, based on scenarios.

Network Information System Vulnerability Analysis and Survivability (네트워크 정보 시스템의 취약성 분석과 Survivability)

  • 남영우;이장세;지승도;박종서;구경옥
    • Proceedings of the Korea Institutes of Information Security and Cryptology Conference
    • /
    • 2002.11a
    • /
    • pp.459-462
    • /
    • 2002
  • 기존의 개별적 보안 사항에 맞추어 서비스를 제공하는 여러 보안 솔루션들이 급변하는 네트워크 환경에 적절한 대응을 못하고 있는 실정이다. 단순한 보안 문제에 대한 특화된 솔루션에 의존을 해왔기 때문에 해당 네트워크와 시스템 환경에 맞는 적절한 대응책을 마련하지 못하고 있으며, 그 이전에 취약성 분석조차도 미비하기 때문이다. 그러므로 적절한 취약성 분식에 대한 방법론 제시가 필수적이다. 사이버 공격과 방어 메커니즘 분석을 통해 얻어지는 시스템의 각 요소들을 Modeling하고, 시뮬레이션 기법을 이용하여 취약성을 평가하고 다시 재구성하여 적용해보는 취약성 분석 방법을 기술하고자 한다. 다양한 공격들로부터 전체 시스템을 보호하고, Survivability를 증가시키기 위해서는 취약성 분석이 기반이 되어야 하며, 그 시스템은 취약성에 의한 결함이나, 공격에 의한 장애에도 불구하고, 고유의 기능을 완전하게 제공하기 위해서 지속적으로 수행되는 속성을 유지해야 할 것이다.

  • PDF

A Study of Survivable Alternate Routing Algorithm (생존성있는 대체 경로 라우팅 알고리즘 연구)

  • Park, Young-Chul
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.13 no.7
    • /
    • pp.535-539
    • /
    • 2007
  • We study an degree of alternativeness and a survivability of alternate routing algorithm in mobile ad-hoc tactical communication networks. The common channel signaling scheme is used and flood search routing algorithm is used for analysis. We also study a connectivity performance for flood search routing, restricted flooding and hybrid routing. From the results we expect low blocking probabilities with alternate routing and the conventional flood search routing shows better connectivity performance which results in high survivability.

Aircraft Combat Survivability Analysis Model for the Air-to-Ground Mission (공대지 임무를 위한 항공기 전투생존성 분석모형)

  • 김인동;하석태
    • Journal of the military operations research society of Korea
    • /
    • v.24 no.2
    • /
    • pp.1-16
    • /
    • 1998
  • Aircraft combat survivability(ACS) can be defined here as the probability of an aircraft to accomplish a given mission and not to be killed by enemy threats. The purpose of this thesis is to obtain analytically the combat survivability of the military aircraft according to the enemy and operation environment. Five factors under which a mission is being carried out are considered in this study. These factors are types and performance of enemy threats, aircraft susceptibility, aircraft vulnerability, ECM(electronic counter measures) capability, and pilot's capability. The model constructed in this study would be a useful tool to analyze ACS based on analytical method. It is also able to provide a better input data for wargaming simulation and present a criterion on determining optimal sorties for aircraft's air-to-ground mission.

  • PDF

Evaluation of the Combat Aircraft Susceptibility Against Surface-Based Threat Using the Weighted Score Algorithm

  • Kim, Joo-Young;Kim, Jin-Young;Lee, Kyung-Tae
    • International Journal of Aeronautical and Space Sciences
    • /
    • v.12 no.4
    • /
    • pp.396-402
    • /
    • 2011
  • Aircraft combat survivability is an essential factor in the design of combat aircrafts that operate in an enemy air defense area. The combat aircrafts will be confronted with anti-aircraft artillery and/or surface-to-air missiles (SAM) from the ground, and their survivability can be divided into two categories: susceptibility and vulnerability. This article studies the prediction of susceptibility in the case of a one-on-one engagement between the combat aircraft and a surface-based threat. The weighted score method is suggested for the prediction of susceptibility parameters, and Monte Carlo simulations are carried out to draw qualitative interpretation of the susceptibility characteristics of combat aircraft systems, such as the F-16 C/D, and the hypersonic aircraft, which is under development in the United States, versus ground threat from the SAM SA-10.

Survivability in the Optical Internet Using the Optical Burst Switch

  • Oh, Seung-Hun;Kim, Young-Han;Yoo, Myung-Sik;Hong, Hyun-Ha
    • ETRI Journal
    • /
    • v.24 no.2
    • /
    • pp.117-130
    • /
    • 2002
  • Due to its salient features, the optical burst switch is becoming a key technology for the optical Internet. Within this technology, the survivability issue in the optical Internet has to be addressed because a simple failure causes severe damage to the huge amount of data carried in optical fiber. In this paper, we introduce a restoration procedure that can provide good survivability in the optical burst switch (OBS)-based optical Internet. OBS restoration can survive various types of network failure while maintaining good network performance. We propose novel restoration mechanisms, namely, "temporary Label Switched Path (LSP)" and "bossy LSP," to enhance restoration time and network utilization. The simulation results verify that the proposed OBS restoration achieves good network performance and provides good network connectivity as well.

  • PDF

Application of Arbitrary Lagrangian-Eulerian Technique for Air Explosion Structural Analysis for Naval Ships Using LS-DYNA

  • Kim Jae-Hyun;Shin Hyung-Cheol;Park Myung-Kyu
    • Journal of Ship and Ocean Technology
    • /
    • v.9 no.1
    • /
    • pp.38-46
    • /
    • 2005
  • Survivability improvement method for naval ship design has been continually developed. In order to design naval ships considering survivability, it is demanded that designers should establish reasonable damage conditions by air explosion. Explosion may induce local damage as well as global collapse to the ship. Therefore possible damage conditions should be realistically estimated in the design stage. In this study the authors used ALE technique, one of the structure-fluid interaction techniques, to simulate air explosion and investigated survival capability of damaged naval ships. Lagrangian-Eulerian coupling algorithm, equation of the state for explosive and air, and simple calculation method for explosive loading were also reviewed. It is shown that air explosion analysis using ALE technique can evaluate structural damage after being attacked. This procedure can be applied to the real structural design quantitatively by calculating surviving time and probability.

A Selection of Path Planning Algorithm to Maximize Survivability for Unmanned Aerial Vehicle (무인 항공기 생존성 극대화를 위한 이동 경로 계획 알고리즘 선정)

  • Kim, Ki-Tae;Jeon, Geon-Wook
    • Journal of the Korea Safety Management & Science
    • /
    • v.13 no.2
    • /
    • pp.103-113
    • /
    • 2011
  • This research is to select a path planning algorithm to maximize survivability for Unmanned Aerial Vehicle(UAV). An UAV is a powered pilotless aircraft, which is controlled remotely or autonomously. UAVs are currently employed in many military missions(surveillance, reconnaissance, communication relay, targeting, strike etc.) and a number of civilian applications(communication service, broadcast service, traffic control support, monitoring, measurement etc.). In this research, a mathematical programming model is suggested by using MRPP(Most Reliable Path Problem) and verified by using ILOG CPLEX. A path planning algorithm for UAV is selected by comparing of SPP(Shortest Path Problem) algorithms which transfer MRPP into SPP.

Aircraft Survivability and Sensors Alignment Techniques (항공기의 생존성과 센서 정렬의 기술 분석)

  • Kang, J.;Lee, S.;Jun, G.;Moon, S.;Seo, S.;Lee, C.
    • Journal of the Korean Society for Aviation and Aeronautics
    • /
    • v.16 no.1
    • /
    • pp.29-36
    • /
    • 2008
  • The vulnerability of aircraft, especially rotary wing aircraft, has been an ongoing issue since their advent in combat operations during the 1940s. In this paper, representative sensors for survivability of those aircraft in modern battlefield are surveyed and top level requirements and parameters are defined. Also problems of multi-sensor alignment on modern agile and flexible platform are discussed and several techniques such as static alignment and transfer alignment are introduced.

  • PDF

Ad hoc Software Rejuvenation for Survivability

  • Khin Mi Mi Aung;Park, Jong-Sou
    • Proceedings of the Korea Institutes of Information Security and Cryptology Conference
    • /
    • 2003.12a
    • /
    • pp.141-145
    • /
    • 2003
  • We propose the model of Software Rejuvenation methodology, which is applicable for survivability. Software rejuvenation is a proactive fault management technique and being used in fault tolerant systems as a cost effective technique for dealing with software faults. Survivability focuses on delivery of essential services and preservation of essential assets, even systems are penetrated and compromised. Thus, our objective is to detect the intrusions in a real time and survive in face of such attacks. As we deterrent against an attack in a system level, the Intrusion tolerance could be maximized at the target environment. We address the optimal time to execute ad hoc software rejuvenation and we compute it by using the semi Markov process. This is one way that could be really frustrated and deterred the attacks, as the attacker can't make their progress. This Software Rejuvenation method can be very effective under the assumption of unknown attacks. In this paper, we compute the optimum time to perform an ad hoc Software Rejuvenation through intrusions.

  • PDF