Turkish Air War College
Turkish Air War College
Caliskan G.,Turkish Air War College |
Karatas Y.,Turkish Air War College |
Newman B.,Old Dominion University
RAST 2013 - Proceedings of 6th International Conference on Recent Advances in Space Technologies | Year: 2013
In this study, methodologies and capabilities for mission trajectory design to asteroid 2000 SG344 are investigated. Design of orbital trajectories for interplanetary space flight requires application of principles from orbital mechanics including three dimensional orbital element description, orbit propagation, asteroid ephemerides, targeting logic, relative motion dynamics, and numerical algorithm implementation. The study research attempted to assemble and integrate these various topics to achieve a general capability to conduct asteroid mission trajectory design. Further, appropriate methodology including selection of assumptions and models, computation process and flow, and design metrics and trades to achieve a practical and effective trajectory design process are considered in the study. A specific case study is considered where a family of near Earth asteroids is reviewed, several candidate asteroids are noted for potential exploration, and a final selection of a single asteroid is made, followed by a specific mission trajectory design search and selection to this asteroid, accounting for mission requirements and constraints. The case study focuses on asteroid 2000 SG344. © 2013 IEEE.
Yilmaz B.,Turkish Air War College
Proceedings of SPIE - The International Society for Optical Engineering | Year: 2013
Drones and Remotely Piloted Vehicles are types of Unmanned Aerial Vehicles. UAVs began to be used with the war of Vietnam, they had a great interest when Israel used them in Bekaa Valley Operations of 1982. UAVs have been used by different countries with different aims with the help of emerging technology and investments. In this article, in the context of areas of UAV usage in national security, benefits and disadvantages of UAVs are put forward. Particularly, it has been evaluated on the basis of cost-effectiveness by focusing the use of UAV in the border security. UAVs have been studied by taking cost analysis, procurement and operational costs into consideration. Analysis of effectiveness has been done with illegal passages of people and drugs from flight times of UAVs. Although the procurement cost of the medium-level UAVs is low, its operational costs are high. For this reason, the idea of less costly alternative systems have been revealed for the border security. As the costs are reduced to acceptable level involving national security and border security in future with high-technology products in their structure, it will continue to be used in an increasing proportion. © 2013 SPIE.
Bayraktar G.,Turkish Air War College
9th International Conference on Cyber Warfare and Security 2014, ICCWS 2014 | Year: 2014
The structure and operational domain of intelligence concept has been evolving continuously in parallel to the change in threat perceptions since it became a discipline more than half a century back. The difficulties encountered in defining the Intelligence concept and its operational domain is a significant barrier to the construct of intelligence theory despite the steady transformation. It is observed that effective utilization of outer space and intelligence surveillance reconnaissance (ISR) functions, such as electronic-war capabilities and remote detection, are as important as command control systems and warfare weapons in present day military expeditions, with respect to comparing military operational excellence and power. Moreover, it is also noticed that nations make use of invisible attacks and cyber space as a defense system during pre-war, crisis and low intensity collisions period without employing conventional arms in addition to countries efforts to obtain new capabilities. All these developments brought a new approach to the war area. Indeed, specific intelligence started to dominate the field in comparison to conventional intelligence due to the quick progress in cyber space. Cyber-attacks, which can be classified as an asymmetric warfare, are not only used as a support tool to conventional wars but also considered as an independent war type on its own so that it brings a new dimension to the military operations. It is predicted that attacks in cyber space will be more dangerous than conventional assaults because the usage of information technology spreads out quickly as well. Cyber-attacks that usually target the information systems of the governments' critical departments, are a great threat, especially for the nations that are heavily dependent on the cyber space domain. The importance of cyber-attacks rise daily because the challenge to detect the source of the attack might be initiated through a wide spectrum of profiles ranging from simple individuals to complex organizations. Moreover, these attacks make a great impact despite their low cost. Furthermore, they are initiated through invisible methods where conventional weapons are not even utilized. Hence, the concept of cyber intelligence looms large against this threat. This paper strives to explain that cyber-attacks can be classified as a new type of warfare, because it threatens national securities and happens in cyber space, a domain that does not have any defined borders in international relations. In addition to the above, this study defines cyber intelligence concept and its operational domain as well as puts forth the methodology for consideration in order to gain the advantage in cyber-attacks and to make analysis on the threat. © Copyright The Authors, 2014. All Rights Reserved.
Akyazi U.,Turkish Air War College |
Akyazi U.,Technical University of Istanbul |
Uyar A.S.,Turkish Air War College |
Uyar A.S.,Technical University of Istanbul
Computing and Informatics | Year: 2012
A Distributed Denial of Service attack is a large-scale, coordinated attack on the availability of services of a victim system, launched indirectly through many compromised computers on the Internet. Intrusion detection systems are network security tools that process local audit data or monitor network traffic to search for specific patterns or certain deviations from expected behavior, which indicate malicious activities against the protected network. In this study, we propose distributed intrusion detection methods to detect Distributed Denial of Service attacks in a special dataset and test these methods in a simulated-real time environment, in which the mobile agents are synchronized with the timestamp stated in the dataset. All of our methods use the alarms generated by SNORT, a signature-based network intrusion detection system. We use mobile agents in our methods on the Jade platform in order to reduce network bandwidth usage and to decrease the dependency on the central unit for a higher reliability. The methods are compared based on reliability, network load and mean detection time values.
Gedikli M.,Turkish Air War College
Proceedings of SPIE - The International Society for Optical Engineering | Year: 2014
Wars previously being executed at land and sea have also become applicable in air and space due to the advancements of aircraft and satellite systems. Rapid improvements in information technologies have triggered the concept of cyberspace which is considered as the fifth dimension of war. While transferring information quickly from physical area to electronic/digital area, cyberspace has caused to emerge a lot of threats and methods like cyber-attack, cyber-crime, cyber war which are spreading too rapidly. Individuals, institutions and establishments have begun to take their own cyber security precautions to cope with these threats. This study gives information about the concepts and advances on cyberspace in order to raise comprehensive awareness. The study also focuses on the effects of these improvements in the battlefield, and analyzes them. © 2014 SPIE.
Cevik P.,Turkish Air War College |
Kocaman I.,Turkish Air War College |
Akgul A.S.,Turkish Air War College |
Akca B.,Turkish Air War College
Journal of Intelligent and Robotic Systems: Theory and Applications | Year: 2013
At the last two decades, according to UAVs concepts and technological advances, there have been lots of unimagined improvements. Nowadays there are serious works and researches about the usage of UAVs in military operations at electronic warfare (EW) missions. But most of the work on UAV platforms is based upon the advantages of a single, big, expensive, and non-expendable platform. In this study, to get rid off the disadvantages of a stand alone platform a new concept is developed consisting of multiple UAVs with smaller dimensions, at a cheaper price and a wider coverage. According to clarify the study, firstly the EW and RADAR systems and then the swarm UAV concepts are explained. In this manner the current and previous works are pointed out and then the use of the swarm UAVs for EA in military operations is stated. Objectively, the swarm UAV concept's advantages and some outstanding challenges to the intra-theater space have been put forward regarding the information mentioned above. As a result it is considered that the swarm UAV systems will be tasked important EW missions in the future operation theatres, as soon as the technical handicaps are solved. © 2012 Springer Science+Business Media B.V.
Dogrul M.,Turkish Air War College |
Aslan A.,Turkish Air War College |
Celik E.,Turkish Air War College
2011 3rd International Conference on Cyber Conflict, ICCC 2011 - Proceedings | Year: 2011
Information Technology (IT) security is a growing concern for governments around the world. Cyber terrorism poses a direct threat to the security of the nations' critical infrastructures and ITs as a low-cost asymmetric warfare element. Most of these nations are aware of the vulnerability of the information technologies and the significance of protecting critical infrastructures. To counteract the threat of potentially disastrous cyber attacks, nations' policy makers are increasingly pondering on the use of deterrence strategies to supplement cyber defense. Nations create their own national policies and strategies which cover cyber security countermeasures including cyber defense and deterrence against cyber threats. But it is rather hard to cope with the threat by means of merely national cyber defense policies and strategies, since the cyberspace spans worldwide and attack's origin can even be overseas. The term "cyber terrorism" is another source of controversy. An agreement on a common definition of cyber terrorism among the nations is needed. However, the international community has not been able to succeed in developing a commonly accepted comprehensive definition of terrorism itself. This paper evaluates the importance of building international cooperation on cyber defense and deterrence against cyber terrorism. It aims to improve and further existing contents and definitions of cyber terrorism; discusses the attractiveness of cyber attacks for terrorists and past experiences on cyber terrorism. It emphasizes establishing international legal measures and cooperation between nations against cyber terrorism in order to maintain the international stability and prosperity. In accordance with NATO's new strategic concept, it focuses on developing the member nations' ability to prevent, detect, defend against and recover from cyber attacks to enhance and coordinate national cyber defense capabilities. It provides necessary steps that have to be taken globally in order to counter cyber terrorism. © 2011 Cooperative Cyber Defenc.
Cebeci F.,Turkish Air War College |
Gozutok T.,Turkish Air War College
Proceedings for the Joint Conference: MFPT 2013 and ISA's 59th International Instrumentation Symposium, ISA 2013: Sensors and Systems for Reliability, Safety and Affordability | Year: 2013
"Performance-based acquisition (PBA)" means an acquisition structured around the results to be achieved as opposed to the manner by which the work is to be performed. Performance-based acquisition is a results-oriented acquisition strategy used to achieve innovative solutions in agency programs. Most military systems have been used for decades, so future planning of defense procurement is critically important. Performance-based acquisition is a strategic method to manage business by promoting flexibility and innovation and creating win/win solutions through effective communication, organizational goal alignment, and clear accountability among the buyer, seller(s), and subcontractors. In this century, many governments are transitioning their acquisition strategy from traditional methods to performance-based methods. In 2000, the U.S. Department of Defense set a goal that a minimum of 50% of the service acquisitions would use performance-based acquisition methods by 2005. Similar to the US DoD policy many defense departments around the world have been in search of new methods to reduce the defense spendings and increase warfighter capability. In this point of search Performance Based Acquisition emerge to be the most effective method. Do cultural differences have significant importance to the success of this new acquisition method? Applying PBA methods in Western countries have shown successful results. What results can be obtained from applying this new strategy in other countries around the world? This article focuses on the implementation of performance-based logistics and search the success of PBA in different countries.
Ozdemir M.C.,Turkish Air War College
AIAA/IEEE Digital Avionics Systems Conference - Proceedings | Year: 2013
There are different opinions about the boundary of the space, the concept of near space as a new term enters into literature. Advances on the near space platforms, to overcome limitations in existing data systems, have the potential to obtain cost-effective systems. As a result of the developments in space technology, because satellite systems have continuous data transfer failure to target regions and the high costs of satellite systems, there are cost-effective near space platforms designed to transmit data continuously to battle field. Unmanned platforms positioned at the near space by means of more operational space systems have been developed on a continuous data transfer, providing more cost-effective information. These systems can stay in the air more than best-known Unmanned Aircraft Systems. Because there is a trend that conventional wars leaving their place to irregular warfare, close to real-time data transfer is crucial in terms of intelligence, reconnaissance and surveillance operations. The effect of near space systems on the concept of operational space usage as literature research; a comparison between near space platforms satellite and UAVs has been done in this paper. © 2013 IEEE.