• Journal of Internet Computing and Services
    ISSN 2287 - 1136 (Online) / ISSN 1598 - 0170 (Print)
    https://jics.or.kr/

Proposal for the『Army TIGER Cyber Defense System』Installation capable of responding to future enemy cyber attack


Byeong-jun Park, Cheol-jung Kim, Journal of Internet Computing and Services, Vol. 25, No. 1, pp. 157-166, Feb. 2024
10.7472/jksii.2024.25.1.157, Full Text:
Keywords: Army TIGER, Drone, robot, unmanned vehicle, AI, Cloud Center, Cyber Defense

Abstract

The Army TIGER System, which is being deployed to implement a future combat system, is expected to bring innovative changes to the army's combat methods and comabt execution capability such as mobility, networking and intelligence. To this end, the Army will introduce various systems using drones, robots, unmanned vehicles, AI(Artificial Intelligence), etc. and utilize them in combat. The use of various unmanned vehicles and AI is expected to result in the introduction of equipment with new technologies into the army and an increase in various types of transmitted information, i.e. data. However, currently in the military, there is an acceleration in research and combat experimentations on warfigthing options using Army TIGER forces system for specific functions. On the other hand, the current reality is that research on cyber threats measures targeting information systems related to the increasing number of unmanned systems, data production, and transmission from unmanned systems, as well as the establishment of cloud centers and AI command and control center driven by the new force systems, is not being pursued. Accordingly this paper analyzes the structure and characteristics of the Army TIGER force integration system and makes suggestions for necessity of building, available cyber defense solutions and Army TIGER integrated cyber protections system that can respond to cyber threats in the future.


Statistics
Show / Hide Statistics

Statistics (Cumulative Counts from November 1st, 2017)
Multiple requests among the same browser session are counted as one view.
If you mouse over a chart, the values of data points will be shown.


Cite this article
[APA Style]
Park, B. & Kim, C. (2024). Proposal for the『Army TIGER Cyber Defense System』Installation capable of responding to future enemy cyber attack. Journal of Internet Computing and Services, 25(1), 157-166. DOI: 10.7472/jksii.2024.25.1.157.

[IEEE Style]
B. Park and C. Kim, "Proposal for the『Army TIGER Cyber Defense System』Installation capable of responding to future enemy cyber attack," Journal of Internet Computing and Services, vol. 25, no. 1, pp. 157-166, 2024. DOI: 10.7472/jksii.2024.25.1.157.

[ACM Style]
Byeong-jun Park and Cheol-jung Kim. 2024. Proposal for the『Army TIGER Cyber Defense System』Installation capable of responding to future enemy cyber attack. Journal of Internet Computing and Services, 25, 1, (2024), 157-166. DOI: 10.7472/jksii.2024.25.1.157.