국방 AI의 보안성 강화를 위한 보안정책 및 연구개발 전략 수립방향

Vol. 34, No. 6, pp. 1415-1430, 12월. 2024
10.13089/JKIISC.2024.34.6.1415, Full Text:
Keywords: Security for AI, Security Policy, Security requirement, Research and Development
Abstract

As international discussions on the ethics and responsibility of AI technology are actively taking place, practical measures must be developed to strengthen the security of AI. In particular, defense systems equipped with AI technology have a high potential impact on national security and people's lives, so higher security must be required than in other fields. This paper presents policy directions for preventing security vulnerabilities that may arise during the development and use of defense AI and managing security risks, as well as directions for establishing research and development strategies necessary for policy implementation. To this end, we analyze the security measures presented in guides on the security of AI developed domestically and overseas. Also, we propose specific security requirements for defense domain considering characteristics of the defense security policy. Moreover, we present the strategic direction of research and development tasks necessary to strengthen security and institutionalize future defense AI security by verifying the appropriateness of implemented security measures and managing vulnerabilities of AI efficiently.

Statistics
Show / Hide Statistics

Statistics (Cumulative Counts from December 1st, 2017)
Multiple requests among the same browser session are counted as one view.
If you mouse over a chart, the values of data points will be shown.


Cite this article
[IEEE Style]
김대건, 이종관, 이종덕, 김주성, 황슬기, "Security Policy and R&D Directions to Enhance Security for Defense AI," Journal of The Korea Institute of Information Security and Cryptology, vol. 34, no. 6, pp. 1415-1430, 2024. DOI: 10.13089/JKIISC.2024.34.6.1415.

[ACM Style]
김대건, 이종관, 이종덕, 김주성, and 황슬기. 2024. Security Policy and R&D Directions to Enhance Security for Defense AI. Journal of The Korea Institute of Information Security and Cryptology, 34, 6, (2024), 1415-1430. DOI: 10.13089/JKIISC.2024.34.6.1415.